/macosx-10.10.1/Heimdal-398.1.2/lib/ntlm/ |
H A D | ntlm.c | 971 if (data->username) 972 free(data->username); 992 struct sec_buffer lm, ntlm, target, username, sessionkey, ws; local 1017 CHECK(ret_sec_buffer(in, &username), 0); 1018 min_offset = MIN(min_offset, username.offset); 1040 CHECK(ret_sec_string(in, ucs2, &username, &type3->username), 0); 1070 struct sec_buffer lm, ntlm, target, username, sessionkey, ws; local 1079 memset(&username, 0, sizeof(username)); 1510 heim_ntlm_ntlmv2_key(const void *key, size_t len, const char *username, const char *target, int upper_case_target, unsigned char ntlmv2[16]) argument 1583 heim_ntlm_calculate_lm2(const void *key, size_t len, const char *username, const char *target, const unsigned char serverchallenge[8], unsigned char ntlmv2[16], struct ntlm_buf *answer) argument 1632 heim_ntlm_calculate_ntlm2(const void *key, size_t len, const char *username, const char *target, const unsigned char serverchallenge[8], const struct ntlm_buf *infotarget, unsigned char ntlmv2[16], struct ntlm_buf *answer) argument 1716 verify_ntlm2(const void *key, size_t len, const char *username, const char *target, int upper_case_target, time_t now, const unsigned char serverchallenge[8], const struct ntlm_buf *answer, struct ntlm_buf *infotarget, unsigned char ntlmv2[16]) argument 1839 heim_ntlm_verify_ntlm2(const void *key, size_t len, const char *username, const char *target, time_t now, const unsigned char serverchallenge[8], const struct ntlm_buf *answer, struct ntlm_buf *infotarget, unsigned char ntlmv2[16]) argument [all...] |
H A D | test_ntlm.c | 114 type3.username = rk_UNCONST(user); 147 if (strcmp(user, type3.username) != 0) 148 errx(1, "type3 username wrong"); 187 *username = "test", local 212 username, 223 username, 356 t3.username,
|
/macosx-10.10.1/shell_cmds-179/su/ |
H A D | su.c | 179 char *username, *class, shellbuf[MAXPATHLEN]; local 255 EPERM, 1, "username too long: '%s'", user)) 258 errx(1, "username too long"); 282 username = getlogin(); 283 pwd = getpwnam(username); 284 if (username == NULL || pwd == NULL || pwd->pw_uid != ruid) 289 "unable to determine invoking subject: '%s'", username)) 295 username = strdup(pwd->pw_name); 296 if (username == NULL) 319 PAM_SET_ITEM(PAM_RUSER, username); [all...] |
/macosx-10.10.1/Heimdal-398.1.2/appl/otp/ |
H A D | otp.c | 117 verify_user_otp(char *username) argument 123 if (otp_challenge (&ctx, username, ss, sizeof(ss)) != 0) { 124 warnx("no otp challenge found for %s", username); 128 snprintf (prompt, sizeof(prompt), "%s's %s Password: ", username, ss);
|
/macosx-10.10.1/Heimdal-398.1.2/lib/gssapi/gssapi/ |
H A D | gssapi_spi.h | 36 char *username; member in struct:gss_auth_identity
|
/macosx-10.10.1/WebKit-7600.1.25/mac/Panels/ |
H A D | WebAuthenticationPanel.h | 42 IBOutlet NSTextField *username; variable
|
H A D | WebAuthenticationPanel.m | 224 [username setStringValue:[[chall proposedCredential] user]]; 227 [username setStringValue:@""]; 229 [panel setInitialFirstResponder:username]; 242 credential = [[NSURLCredential alloc] initWithUser:[username stringValue] password:[password stringValue] persistence:([remember state] == NSOnState) ? NSURLCredentialPersistencePermanent : NSURLCredentialPersistenceForSession]; 278 credential = [[NSURLCredential alloc] initWithUser:[username stringValue] password:[password stringValue] persistence:([remember state] == NSOnState) ? NSURLCredentialPersistencePermanent : NSURLCredentialPersistenceForSession];
|
/macosx-10.10.1/bind9-45.101/bind9/lib/isc/win32/ |
H A D | fsaccess.c | 50 static char username[255] = "\0"; variable 291 namelen = sizeof(username); 292 if (GetUserName(username, &namelen) == 0) 295 return (NTFS_Access_Control(path, username, access, isdir));
|
/macosx-10.10.1/configd-699.1.5/SystemConfiguration.fproj/ |
H A D | SCDPlugin.c | 285 char *username = NULL; local 294 username = result->pw_name; 339 if (((euid != uid) || (egid != gid)) && username) { 340 initgroups(username, gid);
|
/macosx-10.10.1/eap8021x-198/eapolclient.tproj/ |
H A D | Dialogue.h | 42 CFStringRef username; member in struct:__anon8423
|
/macosx-10.10.1/emacs-93/emacs/lib-src/ |
H A D | pop.h | 58 extern popserver pop_open _ARGS((char *host, char *username, char *password,
|
H A D | pop.c | 149 * Function: pop_open (char *host, char *username, char *password, 160 * username 161 * The username of the mail-drop to access. Optional. 163 * determine the username, if possible. 178 pop_open (host, username, password, flags) 180 char *username; 188 if (! username) 190 username = getenv ("USER"); 191 if (! (username && *username)) [all...] |
/macosx-10.10.1/ntp-92/lib/isc/win32/ |
H A D | fsaccess.c | 50 static char username[255] = "\0"; variable 291 namelen = sizeof(username); 292 if (GetUserName(username, &namelen) == 0) 295 return (NTFS_Access_Control(path, username, access, isdir));
|
/macosx-10.10.1/remote_cmds-47/rexecd.tproj/ |
H A D | rexecd.c | 92 * username\0 115 char username[20] = "USER="; variable 120 {homedir, shell, path, username, 0}; 179 getstr(user, sizeof(user), "username"); 251 strncat(username, pwd->pw_name, sizeof(username)-6);
|
/macosx-10.10.1/sudo-73/src/auth/ |
H A D | securid.c | 83 /* The programmer's guide says username is 32 bytes */ 84 strlcpy(sd->username, pw->pw_name, 32);
|
/macosx-10.10.1/tcl-105/tcl_ext/tcllib/tcllib/examples/mime/ |
H A D | maildemo.tcl | 66 -username $::USERNAME \
|
/macosx-10.10.1/apache-793/httpd/modules/ldap/ |
H A D | util_ldap_cache.c | 136 return util_ald_hash_string(1, node->username); 144 return (strcmp(na->username, nb->username) == 0); 179 if (!(newnode->username = util_ald_strdup(cache, node->username)) || 212 util_ald_free(cache, node->username); 231 node->username,
|
/macosx-10.10.1/KerberosHelper-151/Source/ |
H A D | na.c | 104 CFStringRef username; member in struct:NAHData 406 CFRELEASE(na->username); 598 na->username = CFDictionaryGetValue(info, kNAHUserName); 599 if (na->username) { 602 CFRetain(na->username); 604 if (CFStringFindWithOptions(na->username, CFSTR("@"), CFRangeMake(0, CFStringGetLength(na->username)), 0, &range)) { 607 na->specificname = CFStringCreateWithSubstring(na->alloc, na->username, ur); 608 } else if (CFStringFindWithOptions(na->username, CFSTR("\\"), CFRangeMake(0, CFStringGetLength(na->username)), [all...] |
/macosx-10.10.1/postfix-255/postfix/src/global/ |
H A D | dict_pgsql.c | 100 /* forw_addr from aliases where alias like '<some username>' 210 char *username; member in struct:__anon11514 386 dict_pgsql->username, 464 char *username, char *password) 492 plpgsql_connect_single(host, dbname, username, password); 522 char *username, 530 while ((host = dict_pgsql_get_active(PLDB, dbname, username, password)) != NULL) { 625 static void plpgsql_connect_single(HOST *host, char *dbname, char *username, char *password) argument 628 dbname, username, password)) == NULL 688 dict_pgsql->username 463 dict_pgsql_get_active(PLPGSQL *PLDB, char *dbname, char *username, char *password) argument 518 plpgsql_query(DICT_PGSQL *dict_pgsql, const char *name, VSTRING *query, char *dbname, char *username, char *password) argument [all...] |
/macosx-10.10.1/apache-793/httpd/os/unix/ |
H A D | unixd.c | 509 char username[USER_LEN+1]; local 518 apr_cpystrn(username, user, sizeof username); 521 ap_str_toupper(username); 523 pid = ufork(username);
|
/macosx-10.10.1/Heimdal-398.1.2/kdc/ |
H A D | digest.c | 166 const char *username, 174 /* get username */ 175 ret = krb5_parse_name(context, username, &clientprincipal); 640 ireq.u.digestRequest.username, 671 ireq.u.digestRequest.username); 696 ireq.u.digestRequest.username, 704 EVP_DigestUpdate(ctx, ireq.u.digestRequest.username, 705 strlen(ireq.u.digestRequest.username)); 796 ireq.u.digestRequest.username); 804 const char *username; local 164 get_password_entry(krb5_context context, krb5_kdc_configuration *config, const char *username, char **password) argument [all...] |
/macosx-10.10.1/eap8021x-198/EAP8021X.fproj/ |
H A D | mschap.c | 122 const uint8_t * username, 130 user = (const uint8_t *)strrchr((const char *)username, '\\'); 132 user = username; 166 const uint8_t * username, 184 ChallengeHash(peer_challenge, auth_challenge, username, 284 const uint8_t * username, 291 ChallengeHash(peer_challenge, auth_challenge, username, 304 const uint8_t * username, 316 username, 120 ChallengeHash(const uint8_t peer_challenge[MSCHAP2_CHALLENGE_SIZE], const uint8_t auth_challenge[MSCHAP2_CHALLENGE_SIZE], const uint8_t * username, uint8_t challenge[MSCHAP_NT_CHALLENGE_SIZE]) argument 162 GenerateAuthResponse(uint8_t * password, uint32_t password_len, const uint8_t nt_response[MSCHAP_NT_RESPONSE_SIZE], const uint8_t peer_challenge[MSCHAP2_CHALLENGE_SIZE], const uint8_t auth_challenge[MSCHAP2_CHALLENGE_SIZE], const uint8_t * username, uint8_t auth_response[MSCHAP2_AUTH_RESPONSE_SIZE]) argument 282 MSChap2(const uint8_t auth_challenge[MSCHAP2_CHALLENGE_SIZE], const uint8_t peer_challenge[MSCHAP2_CHALLENGE_SIZE], const uint8_t * username, const uint8_t * password, uint32_t password_len, uint8_t response[MSCHAP_NT_RESPONSE_SIZE]) argument 300 MSChap2AuthResponseValid(const uint8_t * password, uint32_t password_len, const uint8_t nt_response[MSCHAP_NT_RESPONSE_SIZE], const uint8_t peer_challenge[MSCHAP2_CHALLENGE_SIZE], const uint8_t auth_challenge[MSCHAP2_CHALLENGE_SIZE], const uint8_t * username, const uint8_t response[MSCHAP2_AUTH_RESPONSE_SIZE]) argument
|
/macosx-10.10.1/emacs-93/emacs/lisp/mh-e/ |
H A D | mh-alias.el | 115 (defun mh-alias-gecos-name (gecos-name username comma-separator) 124 ;; Replace "&" with capitalized username 126 (setq res (mh-replace-regexp-in-string "&" (capitalize username) res))) 130 ;; If empty string, use username instead 132 (setq res username)) 157 (let* ((username (match-string 1)) 160 gecos-name username 165 username)) 167 (if (string-equal username realname) 168 (concat "<" username ">") [all...] |
/macosx-10.10.1/apache-793/httpd/modules/aaa/ |
H A D | mod_auth_form.c | 58 const char *username; member in struct:__anon5832 96 conf->username = "httpd_username"; 117 new->username = (add->username_set == 0) ? base->username : add->username; 233 static const char *set_cookie_form_username(cmd_parms * cmd, void *config, const char *username) argument 236 conf->username = username; 238 return check_string(cmd, username); 377 "The field of the login form carrying the username"), 608 get_form_auth(request_rec * r, const char *username, const char *password, const char *location, const char *method, const char *mimetype, const char *body, const char **sent_user, const char **sent_pw, const char **sent_loc, const char **sent_method, const char **sent_mimetype, apr_bucket_brigade **sent_body, auth_form_config_rec * conf) argument [all...] |
/macosx-10.10.1/ppp-786.1.1/Helpers/pppd/ |
H A D | eap.c | 167 if (username[0] == 0) { 176 && (eap->identity(username, sizeof(username)) == EAP_NO_ERROR)) 181 cstate->our_identity = username; 182 cstate->username = username; 212 cstate->username = 0; 659 cstate->client_ext_input->username = cstate->username; 803 cstate->server_ext_input->username [all...] |