/netbsd-6-1-5-RELEASE/external/bsd/am-utils/dist/hlfsd/ |
H A D | hlfsd.h | 119 char *uname; /* an xref ptr to username2uid_t->username */ 125 char *username; /* really allocated */ member in struct:username2uid_t 147 extern int untab_index(char *username);
|
/netbsd-6-1-5-RELEASE/games/battlestar/ |
H A D | init.c | 58 username = getutmp(); 75 wiz = wizard(username);
|
/netbsd-6-1-5-RELEASE/external/gpl3/gdb/dist/readline/ |
H A D | tilde.c | 115 the end of a username, instead of just "/". Bash sets this to 225 username. */ 346 char *dirname, *expansion, *username; local 372 username = isolate_tilde_prefix (filename, &user_len); 376 expansion = (*tilde_expansion_preexpansion_hook) (username); 380 free (username); 390 user_entry = getpwnam (username); 400 expansion = (*tilde_expansion_failure_hook) (username); 407 free (username); 416 free (username); [all...] |
/netbsd-6-1-5-RELEASE/external/bsd/am-utils/dist/amq/ |
H A D | pawd.c | 96 char username[MAXPATHLEN]; local 118 /* Now the username */ 120 to = username; 124 fprintf(stderr, "partition %s, username %s\n", partition, username); 128 "%s.homes-remote", username); 153 xstrlcat(transform, username, sizeof(transform));
|
/netbsd-6-1-5-RELEASE/lib/libskey/ |
H A D | skeylogin.c | 353 int skey_haskey(const char *username) argument 358 i = skeylookup(&skey, username); 371 const char *skey_keyinfo(const char *username) argument 377 i = skeychallenge(&skey, username, str, sizeof str); 395 int skey_passcheck(const char *username, char *passwd) argument 400 i = skeylookup (&skey, username); 443 int skey_authenticate(const char *username) argument 456 i = skeychallenge(&skey, username, skeyprompt, sizeof skeyprompt); 477 /* Hash the username if possible */ 478 if ((up = SHA1Data(username, strle [all...] |
/netbsd-6-1-5-RELEASE/usr.bin/passwd/ |
H A D | krb5_passwd.c | 78 pwkrb5_process(const char *username, int argc, char **argv) argument 110 username = optarg; 124 /* username already provided */ 128 username = argv[0]; 152 ret = krb5_parse_name(context, username, &principal); 274 krb5_chpw(const char *username) argument 301 if(username != NULL) { 302 ret = krb5_parse_name (context, username, &principal);
|
H A D | local_passwd.c | 132 pwlocal_process(const char *username, int argc, char **argv) argument 164 /* username already provided */ 167 username = argv[0]; 174 if (!(pw = getpwnam(username))) 175 errx(1, "unknown user %s", username); 219 if (pw_mkdb(username, old_change == pw->pw_change) < 0) 225 uid ? username : "root", (unsigned long)uid, username);
|
H A D | yp_passwd.c | 217 pwyp_process(const char *username, int argc, char **argv) argument 247 /* username already provided */ 250 username = argv[0]; 295 if (!ypgetpwnam(username, &pwb) || 296 getpwnam_r(username, &pwb2, pwbuf, sizeof(pwbuf), &pw) || 298 errx(EXIT_FAILURE, "NIS unknown user %s", username); 379 yp_chpw(const char *username) argument 428 if (!ypgetpwnam(username, pw = &pwb) || 429 getpwnam_r(username, &pwb, pwbuf, sizeof(pwbuf), &pw) || 431 warnx("NIS unknown user %s", username); [all...] |
/netbsd-6-1-5-RELEASE/external/ibm-public/postfix/dist/src/xsasl/ |
H A D | xsasl_cyrus_client.c | 144 char *username; member in struct:__anon2539 160 /* xsasl_cyrus_client_get_user - username lookup call-back routine */ 170 msg_info("%s: %s", myname, client->username); 176 msg_panic("%s: no username looked up", myname); 178 *result = client->username; 180 *len = strlen(client->username); 372 client->username = 0; 429 const char *username, 446 * Save the username and password for the call-backs. 448 if (client->username) 427 xsasl_cyrus_client_first(XSASL_CLIENT *xp, const char *mechanism_list, const char *username, const char *password, const char **mechanism, VSTRING *init_resp) argument [all...] |
H A D | xsasl_dovecot_server.c | 163 char *username; /* authenticated user */ member in struct:__anon2542 427 server->username = 0; 482 if (server->username) 483 myfree(server->username); 520 if (server->username) { 521 myfree(server->username); 522 server->username = 0; 532 server->username = mystrdup(line + 5); 533 printable(server->username, '?'); 706 /* xsasl_dovecot_server_get_username - get authenticated username */ [all...] |
H A D | xsasl_cyrus_server.c | 150 char *username; /* authenticated user */ member in struct:__anon2540 338 server->username = 0; 432 if (server->username) 433 myfree(server->username); 587 /* xsasl_cyrus_server_get_username - get authenticated username */ 605 if (server->username) 606 myfree(server->username); 607 server->username = mystrdup(serverout); 608 printable(server->username, '?'); 609 return (server->username); [all...] |
/netbsd-6-1-5-RELEASE/usr.bin/su/ |
H A D | su_pam.c | 97 char *username, *class; local 167 username = getlogin(); 168 if (username == NULL || 169 getpwnam_r(username, &pwres, pwbuf, sizeof(pwbuf), &pwd) != 0 || 176 username = estrdup(pwd->pw_name); 201 user = username; 228 * Fill hostname, username and tty 230 PAM_SET_ITEM(PAM_RUSER, username); 242 username, user, ontty(), pam_strerror(pamh, pam_err)); 276 syslog(LOG_ERR, "unknown login: %s", username); [all...] |
/netbsd-6-1-5-RELEASE/external/gpl2/xcvs/dist/src/ |
H A D | root.h | 39 char *username; /* The username or NULL if method == local. */ member in struct:cvsroot_s
|
/netbsd-6-1-5-RELEASE/usr.bin/mail/ |
H A D | temp.c | 79 if ((cp = username()) == NULL) {
|
/netbsd-6-1-5-RELEASE/usr.sbin/rpc.pcnfsd/ |
H A D | extern.h | 11 pirstat build_pr_queue __P((printername, username, int, int *, int *));
|
/netbsd-6-1-5-RELEASE/external/bsd/openldap/dist/build/ |
H A D | shtool | 558 username='' 560 username="`(id -un) 2>/dev/null`" 561 if [ ".$username" = . ]; then 564 username=`echo $str | sed -e 's/^uid[ ]*=[ ]*[0-9]*(//' -e 's/).*$//'` 566 if [ ".$username" = . ]; then 567 username="$LOGNAME" 568 if [ ".$username" = . ]; then 569 username="$USER" 570 if [ ".$username" = . ]; then 571 username [all...] |
/netbsd-6-1-5-RELEASE/gnu/dist/texinfo/info/ |
H A D | tilde.c | 57 the end of a username, instead of just "/". Bash sets this to 148 username. */ 218 char *username = xmalloc (257); local 226 username[i - 1] = c; 228 username[i - 1] = 0; 230 if (!(user_entry = (struct passwd *) getpwnam (username))) 237 char *expansion = (*tilde_expansion_failure_hook) (username); 265 free (username);
|
/netbsd-6-1-5-RELEASE/usr.bin/login/ |
H A D | login.c | 246 username = loginname = *argv; 327 username = trimloginname(loginname); 331 * for nonexistent name (mistyped username). 333 if (failures && strcmp(tbuf, username)) { 338 (void)strlcpy(tbuf, username, sizeof(tbuf)); 340 pwd = getpwnam(username); 364 k5_read_creds(username); 379 if (skey_haskey(username) == 0) { 381 const char *skinfo = skey_keyinfo(username); 409 if (skey_haskey(username) [all...] |
H A D | common.c | 81 const char *username; variable 104 badlogin(username); 186 "passed %s != actual %s", username, tty, 205 " %s", username, tty, hname, assbuf); 208 username, tty); 245 (void)strncpy(utmpx.ut_name, username, sizeof(utmpx.ut_name)); 305 (void)strncpy(utmp.ut_name, username, sizeof(utmp.ut_name));
|
H A D | login_pam.c | 197 username = trimloginname(*argv); 243 username = trimloginname(getloginname()); 251 * for nonexistent name (mistyped username). 253 if (failures && strcmp(tbuf, username)) { 266 pam_err = pam_start("login", username, &pamc, &pamh); 297 (void)getpwnam_r(username, &pwres, pwbuf, sizeof(pwbuf), &pwd); 329 * username, pwd, and lc. 335 username = newuser; 341 (void)getpwnam_r(username, &pwres, pwbuf, sizeof(pwbuf), 401 badlogin(username); [all...] |
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/crypto/ |
H A D | ms_funcs.c | 27 * @username: 0-to-256-char UserName (IN) 28 * @username_len: Length of username 33 const u8 *username, size_t username_len, 44 addr[2] = username; 118 * @username: 0-to-256-char UserName (IN) 119 * @username_len: Length of username 126 const u8 *username, size_t username_len, 133 challenge_hash(peer_challenge, auth_challenge, username, username_len, 146 * @username: 0-to-256-char UserName (IN) 147 * @username_len: Length of username 32 challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, u8 *challenge) argument 125 generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password, size_t password_len, u8 *response) argument 152 generate_nt_response_pwhash(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password_hash, u8 *response) argument 181 generate_authenticator_response_pwhash( const u8 *password_hash, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument 239 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument [all...] |
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/eap_server/ |
H A D | eap_server_mschapv2.c | 296 const u8 *username, *user; local 341 username = sm->identity; 344 if (username[i] == '\\') { 346 username += i + 1; 362 os_memcmp(username, user, username_len) != 0) { 365 "name", username, username_len); 373 username, username_len); 378 username, username_len, 384 username, username_len, 402 * calculate it here so that peer_challenge and username nee [all...] |
/netbsd-6-1-5-RELEASE/usr.sbin/pwd_mkdb/ |
H A D | pwd_mkdb.c | 206 opendb(struct pwddb *db, const char *dbname, const char *username, argument 214 if (username != NULL) { 237 if (username != NULL) { 260 char *username; local 272 username = NULL; 308 username = optarg; 332 if (username != NULL) 333 if (username[0] == '+' || username[0] == '-') 353 if (username [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/ntlm/ |
H A D | ntlm.c | 820 if (data->username) 821 free(data->username); 841 struct sec_buffer lm, ntlm, target, username, sessionkey, ws; local 867 CHECK(ret_sec_buffer(in, &username), 0); 868 if (username.allocated) 869 min_offset = min(min_offset, username.offset); 886 CHECK(ret_sec_string(in, ucs2, &username, &type3->username), 0); 916 struct sec_buffer lm, ntlm, target, username, sessionkey, ws; local 925 memset(&username, 1353 heim_ntlm_ntlmv2_key(const void *key, size_t len, const char *username, const char *target, unsigned char ntlmv2[16]) argument 1427 heim_ntlm_calculate_lm2(const void *key, size_t len, const char *username, const char *target, const unsigned char serverchallenge[8], unsigned char ntlmv2[16], struct ntlm_buf *answer) argument 1476 heim_ntlm_calculate_ntlm2(const void *key, size_t len, const char *username, const char *target, const unsigned char serverchallenge[8], const struct ntlm_buf *infotarget, unsigned char ntlmv2[16], struct ntlm_buf *answer) argument 1572 heim_ntlm_verify_ntlm2(const void *key, size_t len, const char *username, const char *target, time_t now, const unsigned char serverchallenge[8], const struct ntlm_buf *answer, struct ntlm_buf *infotarget, unsigned char ntlmv2[16]) argument [all...] |
H A D | test_ntlm.c | 114 type3.username = rk_UNCONST(user); 147 if (strcmp(user, type3.username) != 0) 148 errx(1, "type3 username wrong"); 187 *username = "test", local 212 username, 223 username,
|