Searched refs:username (Results 26 - 50 of 146) sorted by relevance

123456

/netbsd-6-1-5-RELEASE/external/bsd/am-utils/dist/hlfsd/
H A Dhlfsd.h119 char *uname; /* an xref ptr to username2uid_t->username */
125 char *username; /* really allocated */ member in struct:username2uid_t
147 extern int untab_index(char *username);
/netbsd-6-1-5-RELEASE/games/battlestar/
H A Dinit.c58 username = getutmp();
75 wiz = wizard(username);
/netbsd-6-1-5-RELEASE/external/gpl3/gdb/dist/readline/
H A Dtilde.c115 the end of a username, instead of just "/". Bash sets this to
225 username. */
346 char *dirname, *expansion, *username; local
372 username = isolate_tilde_prefix (filename, &user_len);
376 expansion = (*tilde_expansion_preexpansion_hook) (username);
380 free (username);
390 user_entry = getpwnam (username);
400 expansion = (*tilde_expansion_failure_hook) (username);
407 free (username);
416 free (username);
[all...]
/netbsd-6-1-5-RELEASE/external/bsd/am-utils/dist/amq/
H A Dpawd.c96 char username[MAXPATHLEN]; local
118 /* Now the username */
120 to = username;
124 fprintf(stderr, "partition %s, username %s\n", partition, username);
128 "%s.homes-remote", username);
153 xstrlcat(transform, username, sizeof(transform));
/netbsd-6-1-5-RELEASE/lib/libskey/
H A Dskeylogin.c353 int skey_haskey(const char *username) argument
358 i = skeylookup(&skey, username);
371 const char *skey_keyinfo(const char *username) argument
377 i = skeychallenge(&skey, username, str, sizeof str);
395 int skey_passcheck(const char *username, char *passwd) argument
400 i = skeylookup (&skey, username);
443 int skey_authenticate(const char *username) argument
456 i = skeychallenge(&skey, username, skeyprompt, sizeof skeyprompt);
477 /* Hash the username if possible */
478 if ((up = SHA1Data(username, strle
[all...]
/netbsd-6-1-5-RELEASE/usr.bin/passwd/
H A Dkrb5_passwd.c78 pwkrb5_process(const char *username, int argc, char **argv) argument
110 username = optarg;
124 /* username already provided */
128 username = argv[0];
152 ret = krb5_parse_name(context, username, &principal);
274 krb5_chpw(const char *username) argument
301 if(username != NULL) {
302 ret = krb5_parse_name (context, username, &principal);
H A Dlocal_passwd.c132 pwlocal_process(const char *username, int argc, char **argv) argument
164 /* username already provided */
167 username = argv[0];
174 if (!(pw = getpwnam(username)))
175 errx(1, "unknown user %s", username);
219 if (pw_mkdb(username, old_change == pw->pw_change) < 0)
225 uid ? username : "root", (unsigned long)uid, username);
H A Dyp_passwd.c217 pwyp_process(const char *username, int argc, char **argv) argument
247 /* username already provided */
250 username = argv[0];
295 if (!ypgetpwnam(username, &pwb) ||
296 getpwnam_r(username, &pwb2, pwbuf, sizeof(pwbuf), &pw) ||
298 errx(EXIT_FAILURE, "NIS unknown user %s", username);
379 yp_chpw(const char *username) argument
428 if (!ypgetpwnam(username, pw = &pwb) ||
429 getpwnam_r(username, &pwb, pwbuf, sizeof(pwbuf), &pw) ||
431 warnx("NIS unknown user %s", username);
[all...]
/netbsd-6-1-5-RELEASE/external/ibm-public/postfix/dist/src/xsasl/
H A Dxsasl_cyrus_client.c144 char *username; member in struct:__anon2539
160 /* xsasl_cyrus_client_get_user - username lookup call-back routine */
170 msg_info("%s: %s", myname, client->username);
176 msg_panic("%s: no username looked up", myname);
178 *result = client->username;
180 *len = strlen(client->username);
372 client->username = 0;
429 const char *username,
446 * Save the username and password for the call-backs.
448 if (client->username)
427 xsasl_cyrus_client_first(XSASL_CLIENT *xp, const char *mechanism_list, const char *username, const char *password, const char **mechanism, VSTRING *init_resp) argument
[all...]
H A Dxsasl_dovecot_server.c163 char *username; /* authenticated user */ member in struct:__anon2542
427 server->username = 0;
482 if (server->username)
483 myfree(server->username);
520 if (server->username) {
521 myfree(server->username);
522 server->username = 0;
532 server->username = mystrdup(line + 5);
533 printable(server->username, '?');
706 /* xsasl_dovecot_server_get_username - get authenticated username */
[all...]
H A Dxsasl_cyrus_server.c150 char *username; /* authenticated user */ member in struct:__anon2540
338 server->username = 0;
432 if (server->username)
433 myfree(server->username);
587 /* xsasl_cyrus_server_get_username - get authenticated username */
605 if (server->username)
606 myfree(server->username);
607 server->username = mystrdup(serverout);
608 printable(server->username, '?');
609 return (server->username);
[all...]
/netbsd-6-1-5-RELEASE/usr.bin/su/
H A Dsu_pam.c97 char *username, *class; local
167 username = getlogin();
168 if (username == NULL ||
169 getpwnam_r(username, &pwres, pwbuf, sizeof(pwbuf), &pwd) != 0 ||
176 username = estrdup(pwd->pw_name);
201 user = username;
228 * Fill hostname, username and tty
230 PAM_SET_ITEM(PAM_RUSER, username);
242 username, user, ontty(), pam_strerror(pamh, pam_err));
276 syslog(LOG_ERR, "unknown login: %s", username);
[all...]
/netbsd-6-1-5-RELEASE/external/gpl2/xcvs/dist/src/
H A Droot.h39 char *username; /* The username or NULL if method == local. */ member in struct:cvsroot_s
/netbsd-6-1-5-RELEASE/usr.bin/mail/
H A Dtemp.c79 if ((cp = username()) == NULL) {
/netbsd-6-1-5-RELEASE/usr.sbin/rpc.pcnfsd/
H A Dextern.h11 pirstat build_pr_queue __P((printername, username, int, int *, int *));
/netbsd-6-1-5-RELEASE/external/bsd/openldap/dist/build/
H A Dshtool558 username=''
560 username="`(id -un) 2>/dev/null`"
561 if [ ".$username" = . ]; then
564 username=`echo $str | sed -e 's/^uid[ ]*=[ ]*[0-9]*(//' -e 's/).*$//'`
566 if [ ".$username" = . ]; then
567 username="$LOGNAME"
568 if [ ".$username" = . ]; then
569 username="$USER"
570 if [ ".$username" = . ]; then
571 username
[all...]
/netbsd-6-1-5-RELEASE/gnu/dist/texinfo/info/
H A Dtilde.c57 the end of a username, instead of just "/". Bash sets this to
148 username. */
218 char *username = xmalloc (257); local
226 username[i - 1] = c;
228 username[i - 1] = 0;
230 if (!(user_entry = (struct passwd *) getpwnam (username)))
237 char *expansion = (*tilde_expansion_failure_hook) (username);
265 free (username);
/netbsd-6-1-5-RELEASE/usr.bin/login/
H A Dlogin.c246 username = loginname = *argv;
327 username = trimloginname(loginname);
331 * for nonexistent name (mistyped username).
333 if (failures && strcmp(tbuf, username)) {
338 (void)strlcpy(tbuf, username, sizeof(tbuf));
340 pwd = getpwnam(username);
364 k5_read_creds(username);
379 if (skey_haskey(username) == 0) {
381 const char *skinfo = skey_keyinfo(username);
409 if (skey_haskey(username)
[all...]
H A Dcommon.c81 const char *username; variable
104 badlogin(username);
186 "passed %s != actual %s", username, tty,
205 " %s", username, tty, hname, assbuf);
208 username, tty);
245 (void)strncpy(utmpx.ut_name, username, sizeof(utmpx.ut_name));
305 (void)strncpy(utmp.ut_name, username, sizeof(utmp.ut_name));
H A Dlogin_pam.c197 username = trimloginname(*argv);
243 username = trimloginname(getloginname());
251 * for nonexistent name (mistyped username).
253 if (failures && strcmp(tbuf, username)) {
266 pam_err = pam_start("login", username, &pamc, &pamh);
297 (void)getpwnam_r(username, &pwres, pwbuf, sizeof(pwbuf), &pwd);
329 * username, pwd, and lc.
335 username = newuser;
341 (void)getpwnam_r(username, &pwres, pwbuf, sizeof(pwbuf),
401 badlogin(username);
[all...]
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/crypto/
H A Dms_funcs.c27 * @username: 0-to-256-char UserName (IN)
28 * @username_len: Length of username
33 const u8 *username, size_t username_len,
44 addr[2] = username;
118 * @username: 0-to-256-char UserName (IN)
119 * @username_len: Length of username
126 const u8 *username, size_t username_len,
133 challenge_hash(peer_challenge, auth_challenge, username, username_len,
146 * @username: 0-to-256-char UserName (IN)
147 * @username_len: Length of username
32 challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, u8 *challenge) argument
125 generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password, size_t password_len, u8 *response) argument
152 generate_nt_response_pwhash(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password_hash, u8 *response) argument
181 generate_authenticator_response_pwhash( const u8 *password_hash, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument
239 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument
[all...]
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/eap_server/
H A Deap_server_mschapv2.c296 const u8 *username, *user; local
341 username = sm->identity;
344 if (username[i] == '\\') {
346 username += i + 1;
362 os_memcmp(username, user, username_len) != 0) {
365 "name", username, username_len);
373 username, username_len);
378 username, username_len,
384 username, username_len,
402 * calculate it here so that peer_challenge and username nee
[all...]
/netbsd-6-1-5-RELEASE/usr.sbin/pwd_mkdb/
H A Dpwd_mkdb.c206 opendb(struct pwddb *db, const char *dbname, const char *username, argument
214 if (username != NULL) {
237 if (username != NULL) {
260 char *username; local
272 username = NULL;
308 username = optarg;
332 if (username != NULL)
333 if (username[0] == '+' || username[0] == '-')
353 if (username
[all...]
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/ntlm/
H A Dntlm.c820 if (data->username)
821 free(data->username);
841 struct sec_buffer lm, ntlm, target, username, sessionkey, ws; local
867 CHECK(ret_sec_buffer(in, &username), 0);
868 if (username.allocated)
869 min_offset = min(min_offset, username.offset);
886 CHECK(ret_sec_string(in, ucs2, &username, &type3->username), 0);
916 struct sec_buffer lm, ntlm, target, username, sessionkey, ws; local
925 memset(&username,
1353 heim_ntlm_ntlmv2_key(const void *key, size_t len, const char *username, const char *target, unsigned char ntlmv2[16]) argument
1427 heim_ntlm_calculate_lm2(const void *key, size_t len, const char *username, const char *target, const unsigned char serverchallenge[8], unsigned char ntlmv2[16], struct ntlm_buf *answer) argument
1476 heim_ntlm_calculate_ntlm2(const void *key, size_t len, const char *username, const char *target, const unsigned char serverchallenge[8], const struct ntlm_buf *infotarget, unsigned char ntlmv2[16], struct ntlm_buf *answer) argument
1572 heim_ntlm_verify_ntlm2(const void *key, size_t len, const char *username, const char *target, time_t now, const unsigned char serverchallenge[8], const struct ntlm_buf *answer, struct ntlm_buf *infotarget, unsigned char ntlmv2[16]) argument
[all...]
H A Dtest_ntlm.c114 type3.username = rk_UNCONST(user);
147 if (strcmp(user, type3.username) != 0)
148 errx(1, "type3 username wrong");
187 *username = "test", local
212 username,
223 username,

Completed in 165 milliseconds

123456