Searched refs:username (Results 51 - 75 of 136) sorted by relevance

123456

/openbsd-current/gnu/usr.bin/perl/cpan/libnet/lib/Net/
H A DPOP3.pm460 my ($self, $username, $password) = @_;
472 if (ref($username) and UNIVERSAL::isa($username, 'Authen::SASL')) {
473 $sasl = $username;
498 die "auth(username, password)" if not length $username;
502 user => $username,
504 authname => $username,
612 if ($pop->login($username, $password) > 0) {
701 =item C<auth($username,
[all...]
H A DSMTP.pm162 my ($self, $username, $password) = @_;
174 if (ref($username) and UNIVERSAL::isa($username, 'Authen::SASL')) {
175 $sasl = $username;
182 die "auth(username, password)" if not length $username;
186 user => $username,
188 authname => $username,
800 =item C<auth($username, $password)>
805 constructs a new Authen::SASL object using the given username an
[all...]
/openbsd-current/sbin/iked/
H A Dchap_ms.c154 uint8_t *username, int usernamelen, uint8_t *challenge)
161 if ((name = strrchr(username, '\\')) == NULL)
162 name = username;
181 uint8_t *username, int usernamelen, uint8_t *password, int passwordlen,
188 username, usernamelen, challenge);
197 uint8_t *username, int usernamelen, uint8_t *auth_response)
234 username, usernamelen, challenge);
153 mschap_challenge_hash(uint8_t *peer_challenge, uint8_t *auth_challenge, uint8_t *username, int usernamelen, uint8_t *challenge) argument
180 mschap_nt_response(uint8_t *auth_challenge, uint8_t *peer_challenge, uint8_t *username, int usernamelen, uint8_t *password, int passwordlen, uint8_t *response) argument
195 mschap_auth_response(uint8_t *password, int passwordlen, uint8_t *ntresponse, uint8_t *auth_challenge, uint8_t *peer_challenge, uint8_t *username, int usernamelen, uint8_t *auth_response) argument
/openbsd-current/usr.sbin/npppd/npppd/
H A Dchap_ms.c149 u_int8_t *username, int usernamelen, u_int8_t *challenge)
156 if ((name = strrchr(username, '\\')) == NULL)
157 name = username;
174 u_int8_t *username, int usernamelen, u_int8_t *password, int passwordlen,
181 username, usernamelen, challenge);
190 u_int8_t *username, int usernamelen, u_int8_t *auth_response)
225 username, usernamelen, challenge);
148 mschap_challenge_hash(u_int8_t *peer_challenge, u_int8_t *auth_challenge, u_int8_t *username, int usernamelen, u_int8_t *challenge) argument
173 mschap_nt_response(u_int8_t *auth_challenge, u_int8_t *peer_challenge, u_int8_t *username, int usernamelen, u_int8_t *password, int passwordlen, u_int8_t *response) argument
188 mschap_auth_response(u_int8_t *password, int passwordlen, u_int8_t *ntresponse, u_int8_t *auth_challenge, u_int8_t *peer_challenge, u_int8_t *username, int usernamelen, u_int8_t *auth_response) argument
H A Dnpppd_ctl.c271 strlcpy(_this->username, ppp->username, sizeof(_this->username));
H A Dprivsep.c90 char username[MAX_USERNAME_LENGTH]; member in struct:PRIVSEP_GET_USER_INFO_ARG
344 priv_get_user_info(const char *path, const char *username, argument
356 strlcpy(a.username, username, sizeof(a.username));
374 sz = strlen(username) + strlen(r->password) +
382 u->username = cp;
383 n = strlcpy(cp, username, sz);
689 else if ((retval = cgetent(&buf, db, a->username))
H A Dppp.c393 _this->username[0]? _this->username : "<unknown>",
396 _this->username[0]? ppp_peer_auth_string(_this) : "none",
570 _this->username, _this->username);
575 _this->username);
671 _this->username[0]? _this->username : "<unknown>",
674 _this->username[0]? ppp_peer_auth_string(_this) : "none",
/openbsd-current/usr.sbin/radiusctl/
H A Dchap_ms.c149 u_int8_t *username, int usernamelen, u_int8_t *challenge)
156 if ((name = strrchr(username, '\\')) == NULL)
157 name = username;
174 u_int8_t *username, int usernamelen, u_int8_t *password, int passwordlen,
181 username, usernamelen, challenge);
190 u_int8_t *username, int usernamelen, u_int8_t *auth_response)
225 username, usernamelen, challenge);
148 mschap_challenge_hash(u_int8_t *peer_challenge, u_int8_t *auth_challenge, u_int8_t *username, int usernamelen, u_int8_t *challenge) argument
173 mschap_nt_response(u_int8_t *auth_challenge, u_int8_t *peer_challenge, u_int8_t *username, int usernamelen, u_int8_t *password, int passwordlen, u_int8_t *response) argument
188 mschap_auth_response(u_int8_t *password, int passwordlen, u_int8_t *ntresponse, u_int8_t *auth_challenge, u_int8_t *peer_challenge, u_int8_t *username, int usernamelen, u_int8_t *auth_response) argument
H A Dradiusctl.c160 res->username);
219 (char *)res->username, strlen(res->username), pass,
/openbsd-current/usr.bin/ftp/
H A Dfetch.c1251 char *username, *pass, *pathstart; local
1276 username = pass = NULL;
1281 free(username);
1283 host = dir = file = portnum = username = pass = NULL;
1336 username = host;
1344 username = pass = NULL;
1348 if (EMPTYSTRING(username)) {
1352 username = pass = NULL;
1355 username = urldecode(username);
[all...]
/openbsd-current/usr.bin/ssh/
H A Dauth2-pubkey.c350 char *tmp, *username = NULL, *command = NULL, **av = NULL; local
372 username = percent_expand(options.authorized_principals_command_user,
374 runas_pw = getpwnam(username);
377 username, strerror(errno));
468 free(username);
508 * against the username.
623 char *username = NULL, *key_fp = NULL, *keytext = NULL; local
643 username = percent_expand(options.authorized_keys_command_user,
645 runas_pw = getpwnam(username);
648 username, strerro
[all...]
/openbsd-current/usr.bin/rcs/
H A Dci.c73 char fpath[PATH_MAX], *rcs_msg, *username, *filename; member in struct:checkin_params
121 pb.rcs_msg = pb.username = pb.author = pb.state = NULL;
236 if ((pb.username = getlogin()) == NULL)
517 if ((rcs_lock_remove(pb->file, pb->username, pb->frev) < 0) &&
578 pb->username, pb->author, NULL, NULL);
698 pb->username, pb->author, NULL, NULL);
783 pb->flags, pb->username, pb->author, NULL, NULL);
803 if (!strcmp(lkp->rl_name, pb->username) &&
808 warnx("%s: no lock set by %s", pb->file->rf_path, pb->username);
H A Dco.c54 char *rev_str, *username; local
153 if ((username = getlogin()) == NULL)
200 username, author, state, date) < 0) {
/openbsd-current/usr.sbin/radiusd/
H A Dradiusd.c314 for (i = 0; authen->username[i] != NULL; i++)
315 free(authen->username[i]);
316 free(authen->username);
387 static char username[256]; local
467 if (radius_get_string_attr(packet, RADIUS_TYPE_USER_NAME, username,
468 sizeof(username)) != 0) {
473 strlcpy(q->username, username, sizeof(q->username));
492 for (i = 0; authen->username[
[all...]
/openbsd-current/gnu/llvm/lldb/third_party/Python/module/pexpect-4.6/pexpect/
H A Dpxssh.py72 username = raw_input('username: ')
74 s.login(hostname, username, password)
109 username = raw_input('username: ')
111 s.login (hostname, username, password)
256 def login (self, server, username, password='', terminal_type='ansi',
357 cmd = "ssh %s -l %s %s" % (ssh_options, username, server)
/openbsd-current/usr.sbin/unbound/
H A DMakefile.bsd-wrapper19 --with-username=_unbound \
/openbsd-current/usr.sbin/smtpd/
H A Druleset.c156 service = strchr(evp->username, '@') ?
159 ret = table_match(table, service, evp->username);
H A Dtable.c584 if (strlcpy(lk->creds.username, key, sizeof (lk->creds.username))
585 >= sizeof (lk->creds.username))
596 memmove(lk->creds.username, line, p - line);
597 lk->creds.username[p - line] = '\0';
H A Dlka_filter.c72 char *username; member in struct:filter_session
522 free(fs->username);
1081 filter_check_auth(struct filter *filter, const char *username) argument
1088 ret = username ? 1 : 0;
1223 filter_check_auth(filter, fs->username) ||
1224 filter_check_auth_table(filter, K_STRING, fs->username) ||
1225 filter_check_auth_table(filter, K_CREDENTIALS, fs->username) ||
1226 filter_check_auth_regex(filter, fs->username) ||
1439 const char *username, const char *result)
1445 fs->username
1438 lka_report_smtp_link_auth(const char *direction, struct timeval *tv, uint64_t reqid, const char *username, const char *result) argument
[all...]
H A Dsmtp_session.c136 char username[SMTPD_MAXMAILADDRSIZE]; member in struct:smtp_session
949 strnvis(user, s->username, sizeof user, VIS_WHITE | VIS_SAFE);
1962 if (strlcpy(s->username, user, sizeof(s->username))
1963 >= sizeof(s->username))
2007 memset(s->username, 0, sizeof(s->username));
2008 if (base64_decode(arg, (unsigned char *)s->username,
2009 sizeof(s->username) - 1) == -1)
2025 m_add_string(p_lka, s->username);
[all...]
/openbsd-current/gnu/usr.bin/perl/cpan/CPAN/lib/CPAN/HTTP/
H A DClient.pm184 @resp{qw(username uri response algorithm)} = ($user, $path, $digest, "MD5");
191 qw(username realm qop algorithm uri nonce nc cnonce response opaque);
/openbsd-current/gnu/usr.bin/cvs/src/
H A Dserver.c104 /* The cvs username sent by the client, which might or might not be
105 the same as the system username the server eventually switches to
5451 switch_to_user (username)
5452 const char *username;
5456 pw = getpwnam (username);
5463 error 0 %s: no such user\n", username);
5535 CVS_Username = xstrdup (username);
5547 env = xmalloc (sizeof "LOGNAME=" + strlen (username));
5548 (void) sprintf (env, "LOGNAME=%s", username);
5551 env = xmalloc (sizeof "USER=" + strlen (username));
5832 char *username = NULL; local
[all...]
/openbsd-current/regress/usr.sbin/snmpd/
H A Dsnmp.c68 char username[33]; member in struct:usm
146 .usm.username = "noauthpriv"
417 sp.usm.username[0] = '\0';
497 params->username, strlen(params->username), "", "")) == NULL)
562 char *engineid, *username, *authparams, *privparams; local
576 &engineboots, &enginetime, &username, &usernamelen, &authparams,
614 if (strcmp(username, usm->username) != 0)
615 errx(1, "unexpected username");
[all...]
/openbsd-current/lib/libutil/
H A Dpasswd.c113 pw_mkdb(char *username, int flags) argument
137 if (username) {
139 av[ac++] = username;
/openbsd-current/libexec/login_radius/
H A Draddauth.c92 #define MAXPWNETNAM 64 /* longest username */
146 raddauth(char *username, char *class, char *style, char *challenge, argument
253 if (asprintf(&userstyle, "%s:%s", username, style) == -1)
256 userstyle = username;

Completed in 345 milliseconds

123456