/freebsd-current/contrib/wpa/src/utils/ |
H A D | http_curl.c | 1349 const char *ca_fname, const char *username, 1361 "username=%s%s", address, ca_fname, username, extra); 1401 if (username) { 1403 curl_easy_setopt(curl, CURLOPT_USERNAME, username); 1412 const char *ca_fname, const char *username, 1421 clone_str(&ctx->svc_username, username); 1437 ctx->curl = setup_curl_post(ctx, ctx->svc_address, ca_fname, username, 1447 const char *ca_fname, const char *username, 1451 if (post_init_client(ctx, address, ca_fname, username, passwor 1348 setup_curl_post(struct http_ctx *ctx, const char *address, const char *ca_fname, const char *username, const char *password, const char *client_cert, const char *client_key) argument 1411 post_init_client(struct http_ctx *ctx, const char *address, const char *ca_fname, const char *username, const char *password, const char *client_cert, const char *client_key) argument 1446 soap_init_client(struct http_ctx *ctx, const char *address, const char *ca_fname, const char *username, const char *password, const char *client_cert, const char *client_key) argument 1469 char *username = NULL; local 1680 http_post(struct http_ctx *ctx, const char *url, const char *data, const char *content_type, const char *ext_hdr, const char *ca_fname, const char *username, const char *password, const char *client_cert, const char *client_key, size_t *resp_len) argument [all...] |
/freebsd-current/contrib/wpa/src/eap_server/ |
H A D | eap_server_ttls.c | 699 u8 *chal, *username, nt_response[24], *rx_resp, *peer_challenge, local 732 username = sm->identity; 735 if (username[i] == '\\') { 737 username += i + 1; 765 username, username_len); 773 username, username_len, 778 username, username_len, 790 username, username_len, challenge2) == 0) { 792 username, username_len, 806 username, username_le [all...] |
H A D | eap.h | 289 const u8 *username, size_t username_len,
|
/freebsd-current/crypto/heimdal/lib/gssapi/ |
H A D | test_ntlm.c | 111 type3.username = rk_UNCONST(user); 235 type3.username = rk_UNCONST(user);
|
/freebsd-current/contrib/wpa/src/eapol_supp/ |
H A D | eapol_supp_sm.h | 359 const u8 **username, size_t *username_len, 489 const u8 **username, size_t *username_len, 488 eapol_sm_get_erp_info(struct eapol_sm *sm, struct eap_peer_config *config, const u8 **username, size_t *username_len, const u8 **realm, size_t *realm_len, u16 *erp_next_seq_num, const u8 **rrk, size_t *rrk_len) argument
|
/freebsd-current/usr.bin/stat/tests/ |
H A D | stat_test.sh | 199 local username=$(stat -f '%8Su' $path) 204 Mode: ($mode/$mode_s) Uid: ($uid/$username) Gid: ($gid/$groupname)
|
/freebsd-current/contrib/tcpdump/ |
H A D | tcpdump.c | 778 droproot(const char *username, const char *chroot_dir) argument 782 if (chroot_dir && !username) 785 pw = getpwnam(username); 798 fprintf(stderr, "dropped privs to %s\n", username); 804 username, 809 fprintf(stderr, "dropped privs to %s\n", username); 813 error("Couldn't find user '%.32s'", username); 1503 const char *username = NULL; local 1910 username = optarg; 2035 if (!username) [all...] |
/freebsd-current/crypto/heimdal/kuser/ |
H A D | kdigest.c | 272 const char *username, 287 EVP_DigestUpdate(ctx, username, strlen(username)); 327 EVP_DigestUpdate(ctx, username, strlen(username)); 270 client_mschapv2(const void *server_nonce, size_t snoncelen, const void *client_nonce, size_t cnoncelen, const char *username, const char *password) argument
|
/freebsd-current/usr.bin/find/ |
H A D | function.c | 1656 char *username; local 1661 username = nextarg(option, argvp); 1665 p = getpwnam(username); 1667 char* cp = username; 1668 if( username[0] == '-' || username[0] == '+' ) 1669 username++; 1670 uid = atoi(username); 1671 if (uid == 0 && username[0] != '0') 1672 errx(1, "%s: %s: no such user", option->name, username); [all...] |
/freebsd-current/crypto/heimdal/lib/krb5/ |
H A D | digest.c | 511 const char *username) 513 if (digest->request.username) { 514 krb5_set_error_message(context, EINVAL, "username already set"); 517 digest->request.username = strdup(username); 518 if (digest->request.username == NULL) { 1060 const char *username) 1062 ntlm->request.username = strdup(username); 1063 if (ntlm->request.username 509 krb5_digest_set_username(krb5_context context, krb5_digest digest, const char *username) argument 1058 krb5_ntlm_req_set_username(krb5_context context, krb5_ntlm ntlm, const char *username) argument [all...] |
/freebsd-current/contrib/wpa/src/eap_peer/ |
H A D | eap.h | 374 const u8 **username, size_t *username_len,
|
/freebsd-current/contrib/wpa/src/radius/ |
H A D | radius_server.c | 76 char *username; /* from User-Name attribute */ member in struct:radius_session 310 "(timestamp,session,nas_ip,username,note)" 315 sess->username, buf); 395 os_free(sess->username); 529 pos = os_strstr(sess->username, "@test-"); 586 char *username; local 588 username = os_zalloc(user_len + 1); 589 if (username) { 590 os_memcpy(username, user, user_len); 591 if (radius_server_erp_find_key(data, username)) [all...] |
/freebsd-current/contrib/dma/ |
H A D | dma.h | 180 extern char username[USERNAME_SIZE];
|
H A D | dma.c | 69 char username[USERNAME_SIZE]; variable 111 addr = username;
|
/freebsd-current/crypto/openssh/ |
H A D | audit-bsm.c | 235 selected(char *username, uid_t uid, au_event_t event, int sf) argument 248 rc = au_user_mask(username, &mask);
|
/freebsd-current/usr.bin/mail/ |
H A D | extern.h | 66 char *username(void);
|
/freebsd-current/contrib/tnftp/src/ |
H A D | util.c | 314 if (username) 315 free(username); 316 username = NULL; 375 * Login to remote host, using given username & password if supplied. 477 username = ftp_strdup(fuser); 1237 for (p2 = connected ? username : "-"; *p2 ; p2++)
|
H A D | ftp_var.h | 276 GLOBAL char *username; /* name of user logged in as. (dynamic) */ variable
|
/freebsd-current/crypto/openssl/include/openssl/ |
H A D | srp.h | 187 SRP_user_pwd *SRP_VBASE_get1_by_user(SRP_VBASE *vb, char *username); 277 SRP_user_pwd *SRP_VBASE_get_by_user(SRP_VBASE *vb, char *username);
|
/freebsd-current/crypto/heimdal/lib/gssapi/ntlm/ |
H A D | accept_sec_context.c | 206 n->user = strdup(type3.username);
|
/freebsd-current/sys/contrib/openzfs/contrib/pam_zfs_key/ |
H A D | pam_zfs_key.c | 442 const char *username; member in struct:__anon4813 466 "couldn't get username from PAM stack"); 480 config->username = name; 583 + strlen(config->username); 593 config->username);
|
/freebsd-current/contrib/sendmail/contrib/ |
H A D | buildvirtuser | 46 usernames on the left and the actual address for that username on the
|
/freebsd-current/contrib/unbound/smallapp/ |
H A D | unbound-checkconf.c | 903 if(cfg->username && cfg->username[0]) { 904 if(getpwnam(cfg->username) == NULL) 905 fatal_exit("user '%s' does not exist.", cfg->username);
|
/freebsd-current/contrib/wpa/wpa_supplicant/ |
H A D | interworking.c | 607 "nai-realm-cred-username: EAP method not supported: %d", 614 /* Only tunneled methods with username/password supported */ 616 "nai-realm-cred-username: Method: %d is not TTLS, PEAP, or FAST", 625 "nai-realm-cred-username: PEAP/FAST: Inner method not supported: %d", 632 "nai-realm-cred-username: MSCHAPv2 not supported"); 643 "nai-realm-cred-username: TTLS, but inner not supported: %d", 653 "nai-realm-cred-username: TTLS, inner-non-eap not supported: %d", 663 "nai-realm-cred-username: inner-method not GTC or MSCHAPv2: %d", 700 if (cred->username == NULL || 701 cred->username[ [all...] |
/freebsd-current/libexec/nuageinit/ |
H A D | nuageinit | 231 -- ignore users without a username
|