Searched refs:username (Results 101 - 125 of 334) sorted by relevance

1234567891011>>

/macosx-10.10.1/Heimdal-398.1.2/lib/ntlm/
H A Dntlm.c971 if (data->username)
972 free(data->username);
992 struct sec_buffer lm, ntlm, target, username, sessionkey, ws; local
1017 CHECK(ret_sec_buffer(in, &username), 0);
1018 min_offset = MIN(min_offset, username.offset);
1040 CHECK(ret_sec_string(in, ucs2, &username, &type3->username), 0);
1070 struct sec_buffer lm, ntlm, target, username, sessionkey, ws; local
1079 memset(&username, 0, sizeof(username));
1510 heim_ntlm_ntlmv2_key(const void *key, size_t len, const char *username, const char *target, int upper_case_target, unsigned char ntlmv2[16]) argument
1583 heim_ntlm_calculate_lm2(const void *key, size_t len, const char *username, const char *target, const unsigned char serverchallenge[8], unsigned char ntlmv2[16], struct ntlm_buf *answer) argument
1632 heim_ntlm_calculate_ntlm2(const void *key, size_t len, const char *username, const char *target, const unsigned char serverchallenge[8], const struct ntlm_buf *infotarget, unsigned char ntlmv2[16], struct ntlm_buf *answer) argument
1716 verify_ntlm2(const void *key, size_t len, const char *username, const char *target, int upper_case_target, time_t now, const unsigned char serverchallenge[8], const struct ntlm_buf *answer, struct ntlm_buf *infotarget, unsigned char ntlmv2[16]) argument
1839 heim_ntlm_verify_ntlm2(const void *key, size_t len, const char *username, const char *target, time_t now, const unsigned char serverchallenge[8], const struct ntlm_buf *answer, struct ntlm_buf *infotarget, unsigned char ntlmv2[16]) argument
[all...]
H A Dtest_ntlm.c114 type3.username = rk_UNCONST(user);
147 if (strcmp(user, type3.username) != 0)
148 errx(1, "type3 username wrong");
187 *username = "test", local
212 username,
223 username,
356 t3.username,
/macosx-10.10.1/shell_cmds-179/su/
H A Dsu.c179 char *username, *class, shellbuf[MAXPATHLEN]; local
255 EPERM, 1, "username too long: '%s'", user))
258 errx(1, "username too long");
282 username = getlogin();
283 pwd = getpwnam(username);
284 if (username == NULL || pwd == NULL || pwd->pw_uid != ruid)
289 "unable to determine invoking subject: '%s'", username))
295 username = strdup(pwd->pw_name);
296 if (username == NULL)
319 PAM_SET_ITEM(PAM_RUSER, username);
[all...]
/macosx-10.10.1/Heimdal-398.1.2/appl/otp/
H A Dotp.c117 verify_user_otp(char *username) argument
123 if (otp_challenge (&ctx, username, ss, sizeof(ss)) != 0) {
124 warnx("no otp challenge found for %s", username);
128 snprintf (prompt, sizeof(prompt), "%s's %s Password: ", username, ss);
/macosx-10.10.1/Heimdal-398.1.2/lib/gssapi/gssapi/
H A Dgssapi_spi.h36 char *username; member in struct:gss_auth_identity
/macosx-10.10.1/WebKit-7600.1.25/mac/Panels/
H A DWebAuthenticationPanel.h42 IBOutlet NSTextField *username; variable
H A DWebAuthenticationPanel.m224 [username setStringValue:[[chall proposedCredential] user]];
227 [username setStringValue:@""];
229 [panel setInitialFirstResponder:username];
242 credential = [[NSURLCredential alloc] initWithUser:[username stringValue] password:[password stringValue] persistence:([remember state] == NSOnState) ? NSURLCredentialPersistencePermanent : NSURLCredentialPersistenceForSession];
278 credential = [[NSURLCredential alloc] initWithUser:[username stringValue] password:[password stringValue] persistence:([remember state] == NSOnState) ? NSURLCredentialPersistencePermanent : NSURLCredentialPersistenceForSession];
/macosx-10.10.1/bind9-45.101/bind9/lib/isc/win32/
H A Dfsaccess.c50 static char username[255] = "\0"; variable
291 namelen = sizeof(username);
292 if (GetUserName(username, &namelen) == 0)
295 return (NTFS_Access_Control(path, username, access, isdir));
/macosx-10.10.1/configd-699.1.5/SystemConfiguration.fproj/
H A DSCDPlugin.c285 char *username = NULL; local
294 username = result->pw_name;
339 if (((euid != uid) || (egid != gid)) && username) {
340 initgroups(username, gid);
/macosx-10.10.1/eap8021x-198/eapolclient.tproj/
H A DDialogue.h42 CFStringRef username; member in struct:__anon8423
/macosx-10.10.1/emacs-93/emacs/lib-src/
H A Dpop.h58 extern popserver pop_open _ARGS((char *host, char *username, char *password,
H A Dpop.c149 * Function: pop_open (char *host, char *username, char *password,
160 * username
161 * The username of the mail-drop to access. Optional.
163 * determine the username, if possible.
178 pop_open (host, username, password, flags)
180 char *username;
188 if (! username)
190 username = getenv ("USER");
191 if (! (username && *username))
[all...]
/macosx-10.10.1/ntp-92/lib/isc/win32/
H A Dfsaccess.c50 static char username[255] = "\0"; variable
291 namelen = sizeof(username);
292 if (GetUserName(username, &namelen) == 0)
295 return (NTFS_Access_Control(path, username, access, isdir));
/macosx-10.10.1/remote_cmds-47/rexecd.tproj/
H A Drexecd.c92 * username\0
115 char username[20] = "USER="; variable
120 {homedir, shell, path, username, 0};
179 getstr(user, sizeof(user), "username");
251 strncat(username, pwd->pw_name, sizeof(username)-6);
/macosx-10.10.1/sudo-73/src/auth/
H A Dsecurid.c83 /* The programmer's guide says username is 32 bytes */
84 strlcpy(sd->username, pw->pw_name, 32);
/macosx-10.10.1/tcl-105/tcl_ext/tcllib/tcllib/examples/mime/
H A Dmaildemo.tcl66 -username $::USERNAME \
/macosx-10.10.1/apache-793/httpd/modules/ldap/
H A Dutil_ldap_cache.c136 return util_ald_hash_string(1, node->username);
144 return (strcmp(na->username, nb->username) == 0);
179 if (!(newnode->username = util_ald_strdup(cache, node->username)) ||
212 util_ald_free(cache, node->username);
231 node->username,
/macosx-10.10.1/KerberosHelper-151/Source/
H A Dna.c104 CFStringRef username; member in struct:NAHData
406 CFRELEASE(na->username);
598 na->username = CFDictionaryGetValue(info, kNAHUserName);
599 if (na->username) {
602 CFRetain(na->username);
604 if (CFStringFindWithOptions(na->username, CFSTR("@"), CFRangeMake(0, CFStringGetLength(na->username)), 0, &range)) {
607 na->specificname = CFStringCreateWithSubstring(na->alloc, na->username, ur);
608 } else if (CFStringFindWithOptions(na->username, CFSTR("\\"), CFRangeMake(0, CFStringGetLength(na->username)),
[all...]
/macosx-10.10.1/postfix-255/postfix/src/global/
H A Ddict_pgsql.c100 /* forw_addr from aliases where alias like '<some username>'
210 char *username; member in struct:__anon11514
386 dict_pgsql->username,
464 char *username, char *password)
492 plpgsql_connect_single(host, dbname, username, password);
522 char *username,
530 while ((host = dict_pgsql_get_active(PLDB, dbname, username, password)) != NULL) {
625 static void plpgsql_connect_single(HOST *host, char *dbname, char *username, char *password) argument
628 dbname, username, password)) == NULL
688 dict_pgsql->username
463 dict_pgsql_get_active(PLPGSQL *PLDB, char *dbname, char *username, char *password) argument
518 plpgsql_query(DICT_PGSQL *dict_pgsql, const char *name, VSTRING *query, char *dbname, char *username, char *password) argument
[all...]
/macosx-10.10.1/apache-793/httpd/os/unix/
H A Dunixd.c509 char username[USER_LEN+1]; local
518 apr_cpystrn(username, user, sizeof username);
521 ap_str_toupper(username);
523 pid = ufork(username);
/macosx-10.10.1/Heimdal-398.1.2/kdc/
H A Ddigest.c166 const char *username,
174 /* get username */
175 ret = krb5_parse_name(context, username, &clientprincipal);
640 ireq.u.digestRequest.username,
671 ireq.u.digestRequest.username);
696 ireq.u.digestRequest.username,
704 EVP_DigestUpdate(ctx, ireq.u.digestRequest.username,
705 strlen(ireq.u.digestRequest.username));
796 ireq.u.digestRequest.username);
804 const char *username; local
164 get_password_entry(krb5_context context, krb5_kdc_configuration *config, const char *username, char **password) argument
[all...]
/macosx-10.10.1/eap8021x-198/EAP8021X.fproj/
H A Dmschap.c122 const uint8_t * username,
130 user = (const uint8_t *)strrchr((const char *)username, '\\');
132 user = username;
166 const uint8_t * username,
184 ChallengeHash(peer_challenge, auth_challenge, username,
284 const uint8_t * username,
291 ChallengeHash(peer_challenge, auth_challenge, username,
304 const uint8_t * username,
316 username,
120 ChallengeHash(const uint8_t peer_challenge[MSCHAP2_CHALLENGE_SIZE], const uint8_t auth_challenge[MSCHAP2_CHALLENGE_SIZE], const uint8_t * username, uint8_t challenge[MSCHAP_NT_CHALLENGE_SIZE]) argument
162 GenerateAuthResponse(uint8_t * password, uint32_t password_len, const uint8_t nt_response[MSCHAP_NT_RESPONSE_SIZE], const uint8_t peer_challenge[MSCHAP2_CHALLENGE_SIZE], const uint8_t auth_challenge[MSCHAP2_CHALLENGE_SIZE], const uint8_t * username, uint8_t auth_response[MSCHAP2_AUTH_RESPONSE_SIZE]) argument
282 MSChap2(const uint8_t auth_challenge[MSCHAP2_CHALLENGE_SIZE], const uint8_t peer_challenge[MSCHAP2_CHALLENGE_SIZE], const uint8_t * username, const uint8_t * password, uint32_t password_len, uint8_t response[MSCHAP_NT_RESPONSE_SIZE]) argument
300 MSChap2AuthResponseValid(const uint8_t * password, uint32_t password_len, const uint8_t nt_response[MSCHAP_NT_RESPONSE_SIZE], const uint8_t peer_challenge[MSCHAP2_CHALLENGE_SIZE], const uint8_t auth_challenge[MSCHAP2_CHALLENGE_SIZE], const uint8_t * username, const uint8_t response[MSCHAP2_AUTH_RESPONSE_SIZE]) argument
/macosx-10.10.1/emacs-93/emacs/lisp/mh-e/
H A Dmh-alias.el115 (defun mh-alias-gecos-name (gecos-name username comma-separator)
124 ;; Replace "&" with capitalized username
126 (setq res (mh-replace-regexp-in-string "&" (capitalize username) res)))
130 ;; If empty string, use username instead
132 (setq res username))
157 (let* ((username (match-string 1))
160 gecos-name username
165 username))
167 (if (string-equal username realname)
168 (concat "<" username ">")
[all...]
/macosx-10.10.1/apache-793/httpd/modules/aaa/
H A Dmod_auth_form.c58 const char *username; member in struct:__anon5832
96 conf->username = "httpd_username";
117 new->username = (add->username_set == 0) ? base->username : add->username;
233 static const char *set_cookie_form_username(cmd_parms * cmd, void *config, const char *username) argument
236 conf->username = username;
238 return check_string(cmd, username);
377 "The field of the login form carrying the username"),
608 get_form_auth(request_rec * r, const char *username, const char *password, const char *location, const char *method, const char *mimetype, const char *body, const char **sent_user, const char **sent_pw, const char **sent_loc, const char **sent_method, const char **sent_mimetype, apr_bucket_brigade **sent_body, auth_form_config_rec * conf) argument
[all...]
/macosx-10.10.1/ppp-786.1.1/Helpers/pppd/
H A Deap.c167 if (username[0] == 0) {
176 && (eap->identity(username, sizeof(username)) == EAP_NO_ERROR))
181 cstate->our_identity = username;
182 cstate->username = username;
212 cstate->username = 0;
659 cstate->client_ext_input->username = cstate->username;
803 cstate->server_ext_input->username
[all...]

Completed in 488 milliseconds

1234567891011>>