Searched refs:username (Results 26 - 50 of 147) sorted by relevance

123456

/freebsd-current/contrib/wpa/src/eap_server/
H A Deap_sim_db.h41 const char *username, int max_chal,
69 char *permanent; /* Permanent username */
70 char *reauth_id; /* Fast re-authentication username */
85 int eap_sim_db_get_aka_auth(struct eap_sim_db_data *data, const char *username,
90 const char *username, const u8 *auts,
H A Deap_server_aka.c54 char permanent[20]; /* Permanent username */
93 const char *username)
96 username[0] != EAP_AKA_PRIME_REAUTH_ID_PREFIX)
99 username[0] != EAP_AKA_REAUTH_ID_PREFIX)
102 wpa_printf(MSG_DEBUG, "EAP-AKA: Reauth username '%s'", username);
104 username);
135 char *username; local
139 username = sim_get_username(sm->identity, sm->identity_len);
140 if (username
91 eap_aka_check_identity_reauth(struct eap_sm *sm, struct eap_aka_data *data, const char *username) argument
734 char *username; local
[all...]
/freebsd-current/usr.bin/mail/
H A Dtemp.c67 if ((cp = username()) == NULL) {
H A Dv7.local.c77 username(void) function
/freebsd-current/contrib/wpa/src/utils/
H A Dhttp-utils.h39 const char *ca_fname, const char *username,
54 const char *username, const char *password,
/freebsd-current/contrib/unbound/testdata/ip_ratelimit.tdir/
H A Dip_ratelimit.conf10 username: ""
/freebsd-current/contrib/unbound/testdata/stat_values.tdir/
H A Dstat_values_downstream_cookies.conf11 username: ""
H A Dstat_values_cachedb.conf12 username: ""
/freebsd-current/contrib/unbound/testdata/cachedb_no_store.tdir/
H A Dcachedb_no_store.conf9 username: ""
/freebsd-current/contrib/unbound/testdata/root_zonemd.tdir/
H A Droot_zonemd.conf10 username: ""
/freebsd-current/contrib/unbound/testdata/rpz_reload.tdir/
H A Drpz_reload.conf10 username: ""
/freebsd-current/crypto/openssh/
H A Dlogintest.c77 li->username, li->hostname, li->exit,
91 char username[32]; local
101 strlcpy(username, pw->pw_name, sizeof(username));
108 li1 = login_alloc_entry((int)getpid(), username, NULL, ttyname(0));
H A Dloginrec.c311 * If we don't have a 'real' lastlog, we need the username to
320 if (strlcpy(li->username, pw->pw_name, sizeof(li->username)) >=
321 sizeof(li->username)) {
322 error("%s: username too long (%lu > max %lu)", __func__,
324 (unsigned long)sizeof(li->username) - 1);
345 logininfo *login_alloc_entry(pid_t pid, const char *username, argument
351 login_init_entry(newli, pid, username, hostname, line);
373 login_init_entry(struct logininfo *li, pid_t pid, const char *username, argument
386 if (username) {
1662 record_failed_login(struct ssh *ssh, const char *username, const char *hostname, const char *ttyn) argument
[all...]
/freebsd-current/usr.bin/login/
H A Dlogin.c131 static char *username; /* user name */ variable
186 badlogin(username);
229 username = strdup(*argv);
230 if (username == NULL)
277 olduser = username;
278 username = getloginname();
285 * for nonexistent name (mistyped username).
287 if (failures && strcmp(olduser, username) != 0) {
295 pam_err = pam_start("login", username, &pamc, &pamh);
320 (void)getpwnam_r(username,
[all...]
/freebsd-current/lib/libpam/modules/pam_login_access/
H A Dlogin_access.c46 /* login_access - match username/group and host/tty with access control file */
176 group_match(const char *tok, const char *username) argument
183 if ((passwd = getpwnam(username)) == NULL)
188 syslog(LOG_ERR, "getgrnam() failed for %s: %s", username, strerror(errno));
190 syslog(LOG_NOTICE, "group not found: %s", username);
194 syslog(LOG_ERR, "cannot allocate memory for grouplist: %s", username);
198 if (getgrouplist(username, passwd->pw_gid, grouplist, &ngroups) != 0)
199 syslog(LOG_ERR, "getgrouplist() failed for %s", username);
207 /* user_match - match a username against one token */
219 * Otherwise, return YES if the token fully matches the username, o
[all...]
/freebsd-current/usr.sbin/cron/lib/
H A Dmisc.c328 /* int allowed(char *username)
334 allowed(char *username) argument
353 isallowed = in_file(username, allow);
355 isallowed = !in_file(username, deny);
358 isallowed = (strcmp(username, ROOT_USER) == 0);
372 log_it(const char *username, int xpid, const char *event, const char *detail) argument
390 msg = malloc(strlen(username)
412 username,
444 syslog(LOG_INFO, "(%s) %s (%s)\n", username, event, detail);
451 username, pi
[all...]
/freebsd-current/crypto/heimdal/appl/ftp/ftp/
H A Dglobals.c75 char username[32]; variable
/freebsd-current/contrib/unbound/daemon/
H A Dunbound.c477 if(cfg->username && cfg->username[0]) {
478 if((pwd = getpwnam(cfg->username)) == NULL)
479 fatal_exit("user '%s' does not exist.", cfg->username);
546 /* Check old pid if there is no username configured.
547 * With a username, the assumption is that the privilege
553 if(cfg->username && cfg->username[0])
575 if(cfg->username && cfg->username[
[all...]
/freebsd-current/crypto/heimdal/appl/login/
H A Dlogin.c266 update_utmp(const char *username, const char *hostname, argument
272 if (utmpx_login(tty, username, hostname) != 0 && !f_flag) {
277 utmp_login(ttyn, username, hostname);
549 arg_printusage(args, nargs, NULL, "[username]");
570 char username[32]; local
621 strlcpy (username, *argv, sizeof(username));
655 ret = read_string("login: ", username, sizeof(username), 1);
661 pwd = k_getpwnam(username);
[all...]
/freebsd-current/usr.bin/su/
H A Dsu.c152 char *username, *class, shellbuf[MAXPATHLEN]; local
217 EPERM, 1, "username too long: '%s'", user))
220 errx(1, "username too long");
244 username = getlogin();
245 if (username != NULL)
246 pwd = getpwnam(username);
252 "unable to determine invoking subject: '%s'", username))
258 username = strdup(pwd->pw_name);
259 if (username == NULL)
282 PAM_SET_ITEM(PAM_RUSER, username);
[all...]
/freebsd-current/contrib/libpcap/testprogs/
H A Dfindalldevstest.c111 char username[128+1]; local
125 if (fgets(username, sizeof username, stdin) == NULL)
127 p = strchr(username, '\n');
132 auth.username = username;
/freebsd-current/contrib/wpa/src/crypto/
H A Dms_funcs.c76 * @username: 0-to-256-char UserName (IN)
77 * @username_len: Length of username
82 const u8 *username, size_t username_len, u8 *challenge)
92 addr[2] = username;
164 * @username: 0-to-256-char UserName (IN)
165 * @username_len: Length of username
172 const u8 *username, size_t username_len,
179 if (challenge_hash(peer_challenge, auth_challenge, username,
192 * @username: 0-to-256-char UserName (IN)
193 * @username_len: Length of username
81 challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, u8 *challenge) argument
171 generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password, size_t password_len, u8 *response) argument
198 generate_nt_response_pwhash(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password_hash, u8 *response) argument
227 generate_authenticator_response_pwhash( const u8 *password_hash, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument
283 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument
[all...]
/freebsd-current/usr.sbin/pwd_mkdb/
H A Dpwd_mkdb.c102 char *username; local
110 username = NULL;
134 username = optarg;
144 if (argc != 1 || (username && (*username == '+' || *username == '-')))
192 warnx("%s: username too long", pwd.pw_name);
201 if (username) {
237 len = strlen(username);
239 /* Only check that username fit
[all...]
/freebsd-current/crypto/heimdal/lib/ntlm/
H A Dtest_ntlm.c112 type3.username = rk_UNCONST(user);
145 if (strcmp(user, type3.username) != 0)
146 errx(1, "type3 username wrong");
185 *username = "test", local
210 username,
221 username,
/freebsd-current/usr.sbin/jail/
H A Dcommand.c74 static int get_user_info(struct cfjail *j, const char *username,
294 const char *jidstr, *conslog, *fmt, *path, *ruleset, *term, *username; local
678 username = string_param(j->intparams[injail
708 injail ? " in jail" : "", username ? " as " : "",
709 username ? username : "", j->comline);
730 if ((clean || username) && injail && sjuser &&
731 get_user_info(j, username, &pwd, &lcap) < 0)
763 if (clean || username) {
765 get_user_info(j, username,
947 get_user_info(struct cfjail *j, const char *username, const struct passwd **pwdp, login_cap_t **lcapp) argument
[all...]

Completed in 515 milliseconds

123456