Searched refs:username (Results 51 - 75 of 146) sorted by relevance

123456

/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/srp/
H A Dsrptest.c28 static int run_srp(const char *username, const char *client_pass, const char *server_pass) argument
51 if(!SRP_create_verifier_BN(username, server_pass, &s, &v, GN->N, GN->g))
98 x = SRP_Calc_x(s, username, client_pass);
/netbsd-6-1-5-RELEASE/usr.sbin/ypserv/mknetid/
H A Dmknetid.c167 add_user(const char *username, const char *uid, const char *gid) argument
172 idx = hashidx(username[0]);
179 u->usr_name = strdup(username);
192 add_group(const char *username, const char *gid) argument
198 idx = hashidx(username[0]);
202 if (strcmp(username, u->usr_name) == 0) {
/netbsd-6-1-5-RELEASE/external/bsd/am-utils/dist/fsinfo/
H A Dfsinfo.c63 char *username; variable
198 * Determine username of caller
243 * Get the username
245 username = find_username();
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/lib/isc/win32/
H A Dntgroups.c53 isc_ntsecurity_getaccountgroups(char *username, char **GroupList, argument
71 retlen = mbstowcs(user, username, MAX_NAME_LENGTH);
H A Dfsaccess.c52 static char username[255] = "\0"; variable
293 namelen = sizeof(username);
294 if (GetUserName(username, &namelen) == 0)
297 return (NTFS_Access_Control(path, username, access, isdir));
/netbsd-6-1-5-RELEASE/external/bsd/ntp/dist/lib/isc/win32/
H A Dntgroups.c53 isc_ntsecurity_getaccountgroups(char *username, char **GroupList, argument
71 retlen = mbstowcs(user, username, MAX_NAME_LENGTH);
H A Dfsaccess.c52 static char username[255] = "\0"; variable
293 namelen = sizeof(username);
294 if (GetUserName(username, &namelen) == 0)
297 return (NTFS_Access_Control(path, username, access, isdir));
/netbsd-6-1-5-RELEASE/games/rogue/
H A Dscore.c224 char username[80]; member in struct:score_entry
300 strlcpy(se->username, score_block+15, sizeof(se->username));
321 rank+1, se->gold, se->username, se->death);
365 if (!strcmp(scores[i].username, login_name)) {
438 name = scores[i].username;
465 strlcpy(se->username, login_name, sizeof(se->username));
/netbsd-6-1-5-RELEASE/external/gpl2/xcvs/dist/src/
H A Droot.c387 newroot->username = NULL;
418 if (root->username != NULL)
419 free (root->username);
663 /* Check to see if there is a username[:password] in the string. */
680 /* copy the username */
682 /* a blank username is impossible, so leave it NULL in that
683 * case so we know to use the default username
685 newroot->username = xstrdup (cvsroot_copy);
751 if (newroot->username && ! newroot->hostname)
769 if (newroot->username || newroo
[all...]
H A Dsanity.sh1004 # Now test the username to make sure it contains only valid characters
1005 username=`$ID -un`
1006 if $EXPR "${username}" : "${username}" >/dev/null; then
1009 echo "Test suite does not work correctly when run by a username" >&2
1014 # Only 8 characters of $username appear in some output.
1015 if test `echo $username |wc -c` -gt 8; then
1016 username8=`echo $username |sed 's/^\(........\).*/\1/'`
1018 username8=$username
1021 # Rarely, we need to match any username, no
[all...]
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/gssapi/ntlm/
H A Diter_cred.c87 dn->username = user;
H A Dcreds.c115 ret = krb5_store_stringz(request, cred->username);
H A Dntlm.h106 char *username; member in struct:ntlm_cred
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/ntlm/
H A Dheimntlm.h147 char *username; /**< */ member in struct:ntlm_type3
/netbsd-6-1-5-RELEASE/dist/pppd/pppd/
H A Dchap_ms.h105 u_char *rchallenge, char *username,
/netbsd-6-1-5-RELEASE/external/bsd/tmux/dist/
H A Dcmd-string.c327 char *home, *path, *username; local
338 if ((username = cmd_string_string(s, p, '/', 0)) == NULL)
340 if ((pw = getpwnam(username)) != NULL)
342 xfree(username);
/netbsd-6-1-5-RELEASE/external/bsd/top/dist/
H A Dusername.c41 * These routines handle uid to username mapping. They use a hash table to
55 #include "username.h"
85 username(int xuid) function
120 dprintf("username: updating %d with %s, expires %d\n",
125 /* username doesnt exist ... so invent one */
128 dprintf("username: updating %d with %s, expires %d\n",
/netbsd-6-1-5-RELEASE/games/battlestar/
H A Dglobals.c276 const char *username; variable
/netbsd-6-1-5-RELEASE/external/ibm-public/postfix/dist/src/global/
H A Ddict_mysql.c99 /* forw_addr from aliases where alias like '<some username>'
126 /* forw_addr from aliases where alias like '<some username>'
224 char *username; member in struct:__anon2393
354 dict_mysql->username,
434 char *username, char *password)
462 plmysql_connect_single(host, dbname, username, password);
492 char *username,
499 while ((host = dict_mysql_get_active(PLDB, dbname, username, password)) != NULL) {
538 static void plmysql_connect_single(HOST *host, char *dbname, char *username, char *password) argument
544 username,
433 dict_mysql_get_active(PLMYSQL *PLDB, char *dbname, char *username, char *password) argument
488 plmysql_query(DICT_MYSQL *dict_mysql, const char *name, VSTRING *query, char *dbname, char *username, char *password) argument
[all...]
H A Ddict_pgsql.c102 /* forw_addr from aliases where alias like '<some username>'
212 char *username; member in struct:__anon2396
385 dict_pgsql->username,
464 char *username, char *password)
492 plpgsql_connect_single(host, dbname, username, password);
522 char *username,
530 while ((host = dict_pgsql_get_active(PLDB, dbname, username, password)) != NULL) {
623 static void plpgsql_connect_single(HOST *host, char *dbname, char *username, char *password) argument
626 dbname, username, password)) == NULL
690 dict_pgsql->username
463 dict_pgsql_get_active(PLPGSQL *PLDB, char *dbname, char *username, char *password) argument
518 plpgsql_query(DICT_PGSQL *dict_pgsql, const char *name, VSTRING *query, char *dbname, char *username, char *password) argument
[all...]
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/kdc/
H A Ddigest.c168 const char *username,
176 /* get username */
177 ret = krb5_parse_name(context, username, &clientprincipal);
642 ireq.u.digestRequest.username,
673 ireq.u.digestRequest.username);
698 ireq.u.digestRequest.username,
706 EVP_DigestUpdate(ctx, ireq.u.digestRequest.username,
707 strlen(ireq.u.digestRequest.username));
798 ireq.u.digestRequest.username);
806 const char *username; local
166 get_password_entry(krb5_context context, krb5_kdc_configuration *config, const char *username, char **password) argument
[all...]
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/eap_peer/
H A Deap_mschapv2.c493 /* TODO: prevent retries using same username/password */
507 const u8 *username, *password, *new_password; local
514 username = eap_get_config_identity(sm, &username_len);
517 if (username == NULL || password == NULL || new_password == NULL)
520 username = mschapv2_remove_domain(username, &username_len);
578 wpa_hexdump_ascii(MSG_DEBUG, "EAP-MSCHAPV2: username",
579 username, username_len);
583 username, username_len,
594 username, username_le
[all...]
/netbsd-6-1-5-RELEASE/external/bsd/top/bin/
H A DMakefile16 top.c username.c utils.c version.c m_netbsd.c
/netbsd-6-1-5-RELEASE/libexec/rexecd/
H A Drexecd.c90 static char username[32 + 1] = "USER="; variable
95 static char *envinit[] = { homedir, shell, path, username, logname, 0 };
100 * username\0
218 getstr(user, sizeof(user), "username");
360 (void)strlcat(username, pwd->pw_name, sizeof(username));
/netbsd-6-1-5-RELEASE/lib/libpam/modules/pam_lastlog/
H A Dpam_lastlog.c270 doutmpx(const char *username, const char *hostname, const char *tty, argument
278 (void)strncpy(utmpx.ut_name, username, sizeof(utmpx.ut_name));
334 doutmp(const char *username, const char *hostname, const char *tty, argument
341 (void)strncpy(utmp.ut_name, username, sizeof(utmp.ut_name));

Completed in 443 milliseconds

123456