/openbsd-current/gnu/usr.bin/perl/cpan/libnet/lib/Net/ |
H A D | POP3.pm | 460 my ($self, $username, $password) = @_; 472 if (ref($username) and UNIVERSAL::isa($username, 'Authen::SASL')) { 473 $sasl = $username; 498 die "auth(username, password)" if not length $username; 502 user => $username, 504 authname => $username, 612 if ($pop->login($username, $password) > 0) { 701 =item C<auth($username, [all...] |
H A D | SMTP.pm | 162 my ($self, $username, $password) = @_; 174 if (ref($username) and UNIVERSAL::isa($username, 'Authen::SASL')) { 175 $sasl = $username; 182 die "auth(username, password)" if not length $username; 186 user => $username, 188 authname => $username, 800 =item C<auth($username, $password)> 805 constructs a new Authen::SASL object using the given username an [all...] |
/openbsd-current/sbin/iked/ |
H A D | chap_ms.c | 154 uint8_t *username, int usernamelen, uint8_t *challenge) 161 if ((name = strrchr(username, '\\')) == NULL) 162 name = username; 181 uint8_t *username, int usernamelen, uint8_t *password, int passwordlen, 188 username, usernamelen, challenge); 197 uint8_t *username, int usernamelen, uint8_t *auth_response) 234 username, usernamelen, challenge); 153 mschap_challenge_hash(uint8_t *peer_challenge, uint8_t *auth_challenge, uint8_t *username, int usernamelen, uint8_t *challenge) argument 180 mschap_nt_response(uint8_t *auth_challenge, uint8_t *peer_challenge, uint8_t *username, int usernamelen, uint8_t *password, int passwordlen, uint8_t *response) argument 195 mschap_auth_response(uint8_t *password, int passwordlen, uint8_t *ntresponse, uint8_t *auth_challenge, uint8_t *peer_challenge, uint8_t *username, int usernamelen, uint8_t *auth_response) argument
|
/openbsd-current/usr.sbin/npppd/npppd/ |
H A D | chap_ms.c | 149 u_int8_t *username, int usernamelen, u_int8_t *challenge) 156 if ((name = strrchr(username, '\\')) == NULL) 157 name = username; 174 u_int8_t *username, int usernamelen, u_int8_t *password, int passwordlen, 181 username, usernamelen, challenge); 190 u_int8_t *username, int usernamelen, u_int8_t *auth_response) 225 username, usernamelen, challenge); 148 mschap_challenge_hash(u_int8_t *peer_challenge, u_int8_t *auth_challenge, u_int8_t *username, int usernamelen, u_int8_t *challenge) argument 173 mschap_nt_response(u_int8_t *auth_challenge, u_int8_t *peer_challenge, u_int8_t *username, int usernamelen, u_int8_t *password, int passwordlen, u_int8_t *response) argument 188 mschap_auth_response(u_int8_t *password, int passwordlen, u_int8_t *ntresponse, u_int8_t *auth_challenge, u_int8_t *peer_challenge, u_int8_t *username, int usernamelen, u_int8_t *auth_response) argument
|
H A D | npppd_ctl.c | 271 strlcpy(_this->username, ppp->username, sizeof(_this->username));
|
H A D | privsep.c | 90 char username[MAX_USERNAME_LENGTH]; member in struct:PRIVSEP_GET_USER_INFO_ARG 344 priv_get_user_info(const char *path, const char *username, argument 356 strlcpy(a.username, username, sizeof(a.username)); 374 sz = strlen(username) + strlen(r->password) + 382 u->username = cp; 383 n = strlcpy(cp, username, sz); 689 else if ((retval = cgetent(&buf, db, a->username))
|
H A D | ppp.c | 393 _this->username[0]? _this->username : "<unknown>", 396 _this->username[0]? ppp_peer_auth_string(_this) : "none", 570 _this->username, _this->username); 575 _this->username); 671 _this->username[0]? _this->username : "<unknown>", 674 _this->username[0]? ppp_peer_auth_string(_this) : "none",
|
/openbsd-current/usr.sbin/radiusctl/ |
H A D | chap_ms.c | 149 u_int8_t *username, int usernamelen, u_int8_t *challenge) 156 if ((name = strrchr(username, '\\')) == NULL) 157 name = username; 174 u_int8_t *username, int usernamelen, u_int8_t *password, int passwordlen, 181 username, usernamelen, challenge); 190 u_int8_t *username, int usernamelen, u_int8_t *auth_response) 225 username, usernamelen, challenge); 148 mschap_challenge_hash(u_int8_t *peer_challenge, u_int8_t *auth_challenge, u_int8_t *username, int usernamelen, u_int8_t *challenge) argument 173 mschap_nt_response(u_int8_t *auth_challenge, u_int8_t *peer_challenge, u_int8_t *username, int usernamelen, u_int8_t *password, int passwordlen, u_int8_t *response) argument 188 mschap_auth_response(u_int8_t *password, int passwordlen, u_int8_t *ntresponse, u_int8_t *auth_challenge, u_int8_t *peer_challenge, u_int8_t *username, int usernamelen, u_int8_t *auth_response) argument
|
H A D | radiusctl.c | 160 res->username); 219 (char *)res->username, strlen(res->username), pass,
|
/openbsd-current/usr.bin/ftp/ |
H A D | fetch.c | 1251 char *username, *pass, *pathstart; local 1276 username = pass = NULL; 1281 free(username); 1283 host = dir = file = portnum = username = pass = NULL; 1336 username = host; 1344 username = pass = NULL; 1348 if (EMPTYSTRING(username)) { 1352 username = pass = NULL; 1355 username = urldecode(username); [all...] |
/openbsd-current/usr.bin/ssh/ |
H A D | auth2-pubkey.c | 350 char *tmp, *username = NULL, *command = NULL, **av = NULL; local 372 username = percent_expand(options.authorized_principals_command_user, 374 runas_pw = getpwnam(username); 377 username, strerror(errno)); 468 free(username); 508 * against the username. 623 char *username = NULL, *key_fp = NULL, *keytext = NULL; local 643 username = percent_expand(options.authorized_keys_command_user, 645 runas_pw = getpwnam(username); 648 username, strerro [all...] |
/openbsd-current/usr.bin/rcs/ |
H A D | ci.c | 73 char fpath[PATH_MAX], *rcs_msg, *username, *filename; member in struct:checkin_params 121 pb.rcs_msg = pb.username = pb.author = pb.state = NULL; 236 if ((pb.username = getlogin()) == NULL) 517 if ((rcs_lock_remove(pb->file, pb->username, pb->frev) < 0) && 578 pb->username, pb->author, NULL, NULL); 698 pb->username, pb->author, NULL, NULL); 783 pb->flags, pb->username, pb->author, NULL, NULL); 803 if (!strcmp(lkp->rl_name, pb->username) && 808 warnx("%s: no lock set by %s", pb->file->rf_path, pb->username);
|
H A D | co.c | 54 char *rev_str, *username; local 153 if ((username = getlogin()) == NULL) 200 username, author, state, date) < 0) {
|
/openbsd-current/usr.sbin/radiusd/ |
H A D | radiusd.c | 314 for (i = 0; authen->username[i] != NULL; i++) 315 free(authen->username[i]); 316 free(authen->username); 387 static char username[256]; local 467 if (radius_get_string_attr(packet, RADIUS_TYPE_USER_NAME, username, 468 sizeof(username)) != 0) { 473 strlcpy(q->username, username, sizeof(q->username)); 492 for (i = 0; authen->username[ [all...] |
/openbsd-current/gnu/llvm/lldb/third_party/Python/module/pexpect-4.6/pexpect/ |
H A D | pxssh.py | 72 username = raw_input('username: ') 74 s.login(hostname, username, password) 109 username = raw_input('username: ') 111 s.login (hostname, username, password) 256 def login (self, server, username, password='', terminal_type='ansi', 357 cmd = "ssh %s -l %s %s" % (ssh_options, username, server)
|
/openbsd-current/usr.sbin/unbound/ |
H A D | Makefile.bsd-wrapper | 19 --with-username=_unbound \
|
/openbsd-current/usr.sbin/smtpd/ |
H A D | ruleset.c | 156 service = strchr(evp->username, '@') ? 159 ret = table_match(table, service, evp->username);
|
H A D | table.c | 584 if (strlcpy(lk->creds.username, key, sizeof (lk->creds.username)) 585 >= sizeof (lk->creds.username)) 596 memmove(lk->creds.username, line, p - line); 597 lk->creds.username[p - line] = '\0';
|
H A D | lka_filter.c | 72 char *username; member in struct:filter_session 522 free(fs->username); 1081 filter_check_auth(struct filter *filter, const char *username) argument 1088 ret = username ? 1 : 0; 1223 filter_check_auth(filter, fs->username) || 1224 filter_check_auth_table(filter, K_STRING, fs->username) || 1225 filter_check_auth_table(filter, K_CREDENTIALS, fs->username) || 1226 filter_check_auth_regex(filter, fs->username) || 1439 const char *username, const char *result) 1445 fs->username 1438 lka_report_smtp_link_auth(const char *direction, struct timeval *tv, uint64_t reqid, const char *username, const char *result) argument [all...] |
H A D | smtp_session.c | 136 char username[SMTPD_MAXMAILADDRSIZE]; member in struct:smtp_session 949 strnvis(user, s->username, sizeof user, VIS_WHITE | VIS_SAFE); 1962 if (strlcpy(s->username, user, sizeof(s->username)) 1963 >= sizeof(s->username)) 2007 memset(s->username, 0, sizeof(s->username)); 2008 if (base64_decode(arg, (unsigned char *)s->username, 2009 sizeof(s->username) - 1) == -1) 2025 m_add_string(p_lka, s->username); [all...] |
/openbsd-current/gnu/usr.bin/perl/cpan/CPAN/lib/CPAN/HTTP/ |
H A D | Client.pm | 184 @resp{qw(username uri response algorithm)} = ($user, $path, $digest, "MD5"); 191 qw(username realm qop algorithm uri nonce nc cnonce response opaque);
|
/openbsd-current/gnu/usr.bin/cvs/src/ |
H A D | server.c | 104 /* The cvs username sent by the client, which might or might not be 105 the same as the system username the server eventually switches to 5451 switch_to_user (username) 5452 const char *username; 5456 pw = getpwnam (username); 5463 error 0 %s: no such user\n", username); 5535 CVS_Username = xstrdup (username); 5547 env = xmalloc (sizeof "LOGNAME=" + strlen (username)); 5548 (void) sprintf (env, "LOGNAME=%s", username); 5551 env = xmalloc (sizeof "USER=" + strlen (username)); 5832 char *username = NULL; local [all...] |
/openbsd-current/regress/usr.sbin/snmpd/ |
H A D | snmp.c | 68 char username[33]; member in struct:usm 146 .usm.username = "noauthpriv" 417 sp.usm.username[0] = '\0'; 497 params->username, strlen(params->username), "", "")) == NULL) 562 char *engineid, *username, *authparams, *privparams; local 576 &engineboots, &enginetime, &username, &usernamelen, &authparams, 614 if (strcmp(username, usm->username) != 0) 615 errx(1, "unexpected username"); [all...] |
/openbsd-current/lib/libutil/ |
H A D | passwd.c | 113 pw_mkdb(char *username, int flags) argument 137 if (username) { 139 av[ac++] = username;
|
/openbsd-current/libexec/login_radius/ |
H A D | raddauth.c | 92 #define MAXPWNETNAM 64 /* longest username */ 146 raddauth(char *username, char *class, char *style, char *challenge, argument 253 if (asprintf(&userstyle, "%s:%s", username, style) == -1) 256 userstyle = username;
|