/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/srp/ |
H A D | srptest.c | 28 static int run_srp(const char *username, const char *client_pass, const char *server_pass) argument 51 if(!SRP_create_verifier_BN(username, server_pass, &s, &v, GN->N, GN->g)) 98 x = SRP_Calc_x(s, username, client_pass);
|
/netbsd-6-1-5-RELEASE/usr.sbin/ypserv/mknetid/ |
H A D | mknetid.c | 167 add_user(const char *username, const char *uid, const char *gid) argument 172 idx = hashidx(username[0]); 179 u->usr_name = strdup(username); 192 add_group(const char *username, const char *gid) argument 198 idx = hashidx(username[0]); 202 if (strcmp(username, u->usr_name) == 0) {
|
/netbsd-6-1-5-RELEASE/external/bsd/am-utils/dist/fsinfo/ |
H A D | fsinfo.c | 63 char *username; variable 198 * Determine username of caller 243 * Get the username 245 username = find_username();
|
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/lib/isc/win32/ |
H A D | ntgroups.c | 53 isc_ntsecurity_getaccountgroups(char *username, char **GroupList, argument 71 retlen = mbstowcs(user, username, MAX_NAME_LENGTH);
|
H A D | fsaccess.c | 52 static char username[255] = "\0"; variable 293 namelen = sizeof(username); 294 if (GetUserName(username, &namelen) == 0) 297 return (NTFS_Access_Control(path, username, access, isdir));
|
/netbsd-6-1-5-RELEASE/external/bsd/ntp/dist/lib/isc/win32/ |
H A D | ntgroups.c | 53 isc_ntsecurity_getaccountgroups(char *username, char **GroupList, argument 71 retlen = mbstowcs(user, username, MAX_NAME_LENGTH);
|
H A D | fsaccess.c | 52 static char username[255] = "\0"; variable 293 namelen = sizeof(username); 294 if (GetUserName(username, &namelen) == 0) 297 return (NTFS_Access_Control(path, username, access, isdir));
|
/netbsd-6-1-5-RELEASE/games/rogue/ |
H A D | score.c | 224 char username[80]; member in struct:score_entry 300 strlcpy(se->username, score_block+15, sizeof(se->username)); 321 rank+1, se->gold, se->username, se->death); 365 if (!strcmp(scores[i].username, login_name)) { 438 name = scores[i].username; 465 strlcpy(se->username, login_name, sizeof(se->username));
|
/netbsd-6-1-5-RELEASE/external/gpl2/xcvs/dist/src/ |
H A D | root.c | 387 newroot->username = NULL; 418 if (root->username != NULL) 419 free (root->username); 663 /* Check to see if there is a username[:password] in the string. */ 680 /* copy the username */ 682 /* a blank username is impossible, so leave it NULL in that 683 * case so we know to use the default username 685 newroot->username = xstrdup (cvsroot_copy); 751 if (newroot->username && ! newroot->hostname) 769 if (newroot->username || newroo [all...] |
H A D | sanity.sh | 1004 # Now test the username to make sure it contains only valid characters 1005 username=`$ID -un` 1006 if $EXPR "${username}" : "${username}" >/dev/null; then 1009 echo "Test suite does not work correctly when run by a username" >&2 1014 # Only 8 characters of $username appear in some output. 1015 if test `echo $username |wc -c` -gt 8; then 1016 username8=`echo $username |sed 's/^\(........\).*/\1/'` 1018 username8=$username 1021 # Rarely, we need to match any username, no [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/gssapi/ntlm/ |
H A D | iter_cred.c | 87 dn->username = user;
|
H A D | creds.c | 115 ret = krb5_store_stringz(request, cred->username);
|
H A D | ntlm.h | 106 char *username; member in struct:ntlm_cred
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/ntlm/ |
H A D | heimntlm.h | 147 char *username; /**< */ member in struct:ntlm_type3
|
/netbsd-6-1-5-RELEASE/dist/pppd/pppd/ |
H A D | chap_ms.h | 105 u_char *rchallenge, char *username,
|
/netbsd-6-1-5-RELEASE/external/bsd/tmux/dist/ |
H A D | cmd-string.c | 327 char *home, *path, *username; local 338 if ((username = cmd_string_string(s, p, '/', 0)) == NULL) 340 if ((pw = getpwnam(username)) != NULL) 342 xfree(username);
|
/netbsd-6-1-5-RELEASE/external/bsd/top/dist/ |
H A D | username.c | 41 * These routines handle uid to username mapping. They use a hash table to 55 #include "username.h" 85 username(int xuid) function 120 dprintf("username: updating %d with %s, expires %d\n", 125 /* username doesnt exist ... so invent one */ 128 dprintf("username: updating %d with %s, expires %d\n",
|
/netbsd-6-1-5-RELEASE/games/battlestar/ |
H A D | globals.c | 276 const char *username; variable
|
/netbsd-6-1-5-RELEASE/external/ibm-public/postfix/dist/src/global/ |
H A D | dict_mysql.c | 99 /* forw_addr from aliases where alias like '<some username>' 126 /* forw_addr from aliases where alias like '<some username>' 224 char *username; member in struct:__anon2393 354 dict_mysql->username, 434 char *username, char *password) 462 plmysql_connect_single(host, dbname, username, password); 492 char *username, 499 while ((host = dict_mysql_get_active(PLDB, dbname, username, password)) != NULL) { 538 static void plmysql_connect_single(HOST *host, char *dbname, char *username, char *password) argument 544 username, 433 dict_mysql_get_active(PLMYSQL *PLDB, char *dbname, char *username, char *password) argument 488 plmysql_query(DICT_MYSQL *dict_mysql, const char *name, VSTRING *query, char *dbname, char *username, char *password) argument [all...] |
H A D | dict_pgsql.c | 102 /* forw_addr from aliases where alias like '<some username>' 212 char *username; member in struct:__anon2396 385 dict_pgsql->username, 464 char *username, char *password) 492 plpgsql_connect_single(host, dbname, username, password); 522 char *username, 530 while ((host = dict_pgsql_get_active(PLDB, dbname, username, password)) != NULL) { 623 static void plpgsql_connect_single(HOST *host, char *dbname, char *username, char *password) argument 626 dbname, username, password)) == NULL 690 dict_pgsql->username 463 dict_pgsql_get_active(PLPGSQL *PLDB, char *dbname, char *username, char *password) argument 518 plpgsql_query(DICT_PGSQL *dict_pgsql, const char *name, VSTRING *query, char *dbname, char *username, char *password) argument [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/kdc/ |
H A D | digest.c | 168 const char *username, 176 /* get username */ 177 ret = krb5_parse_name(context, username, &clientprincipal); 642 ireq.u.digestRequest.username, 673 ireq.u.digestRequest.username); 698 ireq.u.digestRequest.username, 706 EVP_DigestUpdate(ctx, ireq.u.digestRequest.username, 707 strlen(ireq.u.digestRequest.username)); 798 ireq.u.digestRequest.username); 806 const char *username; local 166 get_password_entry(krb5_context context, krb5_kdc_configuration *config, const char *username, char **password) argument [all...] |
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/eap_peer/ |
H A D | eap_mschapv2.c | 493 /* TODO: prevent retries using same username/password */ 507 const u8 *username, *password, *new_password; local 514 username = eap_get_config_identity(sm, &username_len); 517 if (username == NULL || password == NULL || new_password == NULL) 520 username = mschapv2_remove_domain(username, &username_len); 578 wpa_hexdump_ascii(MSG_DEBUG, "EAP-MSCHAPV2: username", 579 username, username_len); 583 username, username_len, 594 username, username_le [all...] |
/netbsd-6-1-5-RELEASE/external/bsd/top/bin/ |
H A D | Makefile | 16 top.c username.c utils.c version.c m_netbsd.c
|
/netbsd-6-1-5-RELEASE/libexec/rexecd/ |
H A D | rexecd.c | 90 static char username[32 + 1] = "USER="; variable 95 static char *envinit[] = { homedir, shell, path, username, logname, 0 }; 100 * username\0 218 getstr(user, sizeof(user), "username"); 360 (void)strlcat(username, pwd->pw_name, sizeof(username));
|
/netbsd-6-1-5-RELEASE/lib/libpam/modules/pam_lastlog/ |
H A D | pam_lastlog.c | 270 doutmpx(const char *username, const char *hostname, const char *tty, argument 278 (void)strncpy(utmpx.ut_name, username, sizeof(utmpx.ut_name)); 334 doutmp(const char *username, const char *hostname, const char *tty, argument 341 (void)strncpy(utmp.ut_name, username, sizeof(utmp.ut_name));
|