/freebsd-current/contrib/wpa/src/eap_server/ |
H A D | eap_sim_db.h | 41 const char *username, int max_chal, 69 char *permanent; /* Permanent username */ 70 char *reauth_id; /* Fast re-authentication username */ 85 int eap_sim_db_get_aka_auth(struct eap_sim_db_data *data, const char *username, 90 const char *username, const u8 *auts,
|
H A D | eap_server_aka.c | 54 char permanent[20]; /* Permanent username */ 93 const char *username) 96 username[0] != EAP_AKA_PRIME_REAUTH_ID_PREFIX) 99 username[0] != EAP_AKA_REAUTH_ID_PREFIX) 102 wpa_printf(MSG_DEBUG, "EAP-AKA: Reauth username '%s'", username); 104 username); 135 char *username; local 139 username = sim_get_username(sm->identity, sm->identity_len); 140 if (username 91 eap_aka_check_identity_reauth(struct eap_sm *sm, struct eap_aka_data *data, const char *username) argument 734 char *username; local [all...] |
/freebsd-current/usr.bin/mail/ |
H A D | temp.c | 67 if ((cp = username()) == NULL) {
|
H A D | v7.local.c | 77 username(void) function
|
/freebsd-current/contrib/wpa/src/utils/ |
H A D | http-utils.h | 39 const char *ca_fname, const char *username, 54 const char *username, const char *password,
|
/freebsd-current/contrib/unbound/testdata/ip_ratelimit.tdir/ |
H A D | ip_ratelimit.conf | 10 username: ""
|
/freebsd-current/contrib/unbound/testdata/stat_values.tdir/ |
H A D | stat_values_downstream_cookies.conf | 11 username: ""
|
H A D | stat_values_cachedb.conf | 12 username: ""
|
/freebsd-current/contrib/unbound/testdata/cachedb_no_store.tdir/ |
H A D | cachedb_no_store.conf | 9 username: ""
|
/freebsd-current/contrib/unbound/testdata/root_zonemd.tdir/ |
H A D | root_zonemd.conf | 10 username: ""
|
/freebsd-current/contrib/unbound/testdata/rpz_reload.tdir/ |
H A D | rpz_reload.conf | 10 username: ""
|
/freebsd-current/crypto/openssh/ |
H A D | logintest.c | 77 li->username, li->hostname, li->exit, 91 char username[32]; local 101 strlcpy(username, pw->pw_name, sizeof(username)); 108 li1 = login_alloc_entry((int)getpid(), username, NULL, ttyname(0));
|
H A D | loginrec.c | 311 * If we don't have a 'real' lastlog, we need the username to 320 if (strlcpy(li->username, pw->pw_name, sizeof(li->username)) >= 321 sizeof(li->username)) { 322 error("%s: username too long (%lu > max %lu)", __func__, 324 (unsigned long)sizeof(li->username) - 1); 345 logininfo *login_alloc_entry(pid_t pid, const char *username, argument 351 login_init_entry(newli, pid, username, hostname, line); 373 login_init_entry(struct logininfo *li, pid_t pid, const char *username, argument 386 if (username) { 1662 record_failed_login(struct ssh *ssh, const char *username, const char *hostname, const char *ttyn) argument [all...] |
/freebsd-current/usr.bin/login/ |
H A D | login.c | 131 static char *username; /* user name */ variable 186 badlogin(username); 229 username = strdup(*argv); 230 if (username == NULL) 277 olduser = username; 278 username = getloginname(); 285 * for nonexistent name (mistyped username). 287 if (failures && strcmp(olduser, username) != 0) { 295 pam_err = pam_start("login", username, &pamc, &pamh); 320 (void)getpwnam_r(username, [all...] |
/freebsd-current/lib/libpam/modules/pam_login_access/ |
H A D | login_access.c | 46 /* login_access - match username/group and host/tty with access control file */ 176 group_match(const char *tok, const char *username) argument 183 if ((passwd = getpwnam(username)) == NULL) 188 syslog(LOG_ERR, "getgrnam() failed for %s: %s", username, strerror(errno)); 190 syslog(LOG_NOTICE, "group not found: %s", username); 194 syslog(LOG_ERR, "cannot allocate memory for grouplist: %s", username); 198 if (getgrouplist(username, passwd->pw_gid, grouplist, &ngroups) != 0) 199 syslog(LOG_ERR, "getgrouplist() failed for %s", username); 207 /* user_match - match a username against one token */ 219 * Otherwise, return YES if the token fully matches the username, o [all...] |
/freebsd-current/usr.sbin/cron/lib/ |
H A D | misc.c | 328 /* int allowed(char *username) 334 allowed(char *username) argument 353 isallowed = in_file(username, allow); 355 isallowed = !in_file(username, deny); 358 isallowed = (strcmp(username, ROOT_USER) == 0); 372 log_it(const char *username, int xpid, const char *event, const char *detail) argument 390 msg = malloc(strlen(username) 412 username, 444 syslog(LOG_INFO, "(%s) %s (%s)\n", username, event, detail); 451 username, pi [all...] |
/freebsd-current/crypto/heimdal/appl/ftp/ftp/ |
H A D | globals.c | 75 char username[32]; variable
|
/freebsd-current/contrib/unbound/daemon/ |
H A D | unbound.c | 477 if(cfg->username && cfg->username[0]) { 478 if((pwd = getpwnam(cfg->username)) == NULL) 479 fatal_exit("user '%s' does not exist.", cfg->username); 546 /* Check old pid if there is no username configured. 547 * With a username, the assumption is that the privilege 553 if(cfg->username && cfg->username[0]) 575 if(cfg->username && cfg->username[ [all...] |
/freebsd-current/crypto/heimdal/appl/login/ |
H A D | login.c | 266 update_utmp(const char *username, const char *hostname, argument 272 if (utmpx_login(tty, username, hostname) != 0 && !f_flag) { 277 utmp_login(ttyn, username, hostname); 549 arg_printusage(args, nargs, NULL, "[username]"); 570 char username[32]; local 621 strlcpy (username, *argv, sizeof(username)); 655 ret = read_string("login: ", username, sizeof(username), 1); 661 pwd = k_getpwnam(username); [all...] |
/freebsd-current/usr.bin/su/ |
H A D | su.c | 152 char *username, *class, shellbuf[MAXPATHLEN]; local 217 EPERM, 1, "username too long: '%s'", user)) 220 errx(1, "username too long"); 244 username = getlogin(); 245 if (username != NULL) 246 pwd = getpwnam(username); 252 "unable to determine invoking subject: '%s'", username)) 258 username = strdup(pwd->pw_name); 259 if (username == NULL) 282 PAM_SET_ITEM(PAM_RUSER, username); [all...] |
/freebsd-current/contrib/libpcap/testprogs/ |
H A D | findalldevstest.c | 111 char username[128+1]; local 125 if (fgets(username, sizeof username, stdin) == NULL) 127 p = strchr(username, '\n'); 132 auth.username = username;
|
/freebsd-current/contrib/wpa/src/crypto/ |
H A D | ms_funcs.c | 76 * @username: 0-to-256-char UserName (IN) 77 * @username_len: Length of username 82 const u8 *username, size_t username_len, u8 *challenge) 92 addr[2] = username; 164 * @username: 0-to-256-char UserName (IN) 165 * @username_len: Length of username 172 const u8 *username, size_t username_len, 179 if (challenge_hash(peer_challenge, auth_challenge, username, 192 * @username: 0-to-256-char UserName (IN) 193 * @username_len: Length of username 81 challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, u8 *challenge) argument 171 generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password, size_t password_len, u8 *response) argument 198 generate_nt_response_pwhash(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password_hash, u8 *response) argument 227 generate_authenticator_response_pwhash( const u8 *password_hash, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument 283 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument [all...] |
/freebsd-current/usr.sbin/pwd_mkdb/ |
H A D | pwd_mkdb.c | 102 char *username; local 110 username = NULL; 134 username = optarg; 144 if (argc != 1 || (username && (*username == '+' || *username == '-'))) 192 warnx("%s: username too long", pwd.pw_name); 201 if (username) { 237 len = strlen(username); 239 /* Only check that username fit [all...] |
/freebsd-current/crypto/heimdal/lib/ntlm/ |
H A D | test_ntlm.c | 112 type3.username = rk_UNCONST(user); 145 if (strcmp(user, type3.username) != 0) 146 errx(1, "type3 username wrong"); 185 *username = "test", local 210 username, 221 username,
|
/freebsd-current/usr.sbin/jail/ |
H A D | command.c | 74 static int get_user_info(struct cfjail *j, const char *username, 294 const char *jidstr, *conslog, *fmt, *path, *ruleset, *term, *username; local 678 username = string_param(j->intparams[injail 708 injail ? " in jail" : "", username ? " as " : "", 709 username ? username : "", j->comline); 730 if ((clean || username) && injail && sjuser && 731 get_user_info(j, username, &pwd, &lcap) < 0) 763 if (clean || username) { 765 get_user_info(j, username, 947 get_user_info(struct cfjail *j, const char *username, const struct passwd **pwdp, login_cap_t **lcapp) argument [all...] |