Searched refs:login (Results 1 - 25 of 57) sorted by relevance

123

/freebsd-13-stable/libexec/ulog-helper/
H A Dulog-helper.c40 * This setuid helper utility writes user login records to disk.
55 const char *login; local
59 * Attempt to determine the username corresponding to this login
65 if ((login = getlogin()) != NULL && (pw = getpwnam(login)) != NULL &&
67 return (login);
82 if ((argc == 2 || argc == 3) && strcmp(argv[1], "login") == 0) {
/freebsd-13-stable/contrib/opie/
H A Dopieinfo.c53 char *login; variable
55 login = getlogin();
56 if (login == NULL) {
57 fprintf(stderr, "Cannot find login name\n");
60 return login;
/freebsd-13-stable/usr.sbin/pw/
H A Dpw_nis.c92 chgnispwent(const char *path, char const * login, struct passwd * pwd) argument
94 return pw_nisupdate(path, pwd, login);
98 delnispwent(const char *path, const char *login) argument
100 return pw_nisupdate(path, NULL, login);
H A Dgrupd.c101 chggrent(char const * login, struct group * grp) argument
103 return gr_update(grp, login);
H A Dpwupd.c143 chgpwent(char const * login, struct passwd * pwd) argument
146 return (pw_update(pwd, login));
H A Dpw.h96 int delnispwent(const char *path, const char *login);
97 int chgnispwent(const char *path, const char *login, struct passwd *pwd);
/freebsd-13-stable/sys/dev/firewire/
H A Dsbp_targ.c75 * BASE 0xffff f001 0020 command port for login id 0
76 * BASE 0xffff f001 0040 command port for login id 1
207 struct sbp_targ_login *login; member in struct:orb_info
264 sbp_targ_dealloc_login(struct sbp_targ_login *login) argument
268 if (login == NULL) {
269 printf("%s: login = NULL\n", __func__);
272 for (orbi = STAILQ_FIRST(&login->orbs); orbi != NULL; orbi = next) {
279 callout_stop(&login->hold_callout);
281 STAILQ_REMOVE(&login->lstate->logins, login, sbp_targ_logi
292 struct sbp_targ_login *login; local
312 struct sbp_targ_login *login; local
477 struct sbp_targ_login *login, *next; local
539 sbp_targ_remove_orb_info_locked(struct sbp_targ_login *login, struct orb_info *orbi) argument
545 sbp_targ_remove_orb_info(struct sbp_targ_login *login, struct orb_info *orbi) argument
569 struct sbp_targ_login *login; local
1280 struct sbp_targ_login *login; local
1535 struct sbp_targ_login *login; local
1576 struct sbp_targ_login *login; local
1720 sbp_targ_fetch_orb(struct sbp_targ_softc *sc, struct fw_device *fwdev, uint16_t orb_hi, uint32_t orb_lo, struct sbp_targ_login *login, int mode) argument
1808 struct sbp_targ_login *login; local
[all...]
/freebsd-13-stable/share/examples/printing/
H A DpsdfX19 n) login=$OPTARG ;;
27 [ "$login" ] || fail "No login name"
30 ( /u/kelly/freebsd/printing/filters/make-ps-header $login $host "DVI File"
/freebsd-13-stable/usr.sbin/adduser/
H A Drmuser.sh54 # rm_files login
55 # Removes files or empty directories belonging to $login from various
60 [ -n $1 ] && login=$1 || return
69 verbose && echo -n "Removing files owned by ($login) in $_dir:"
70 filecount=`find 2>/dev/null "$_dir" -user "$login" -delete -print |
78 # rm_mail login
80 # specified in the $login argument.
84 [ -n $1 ] && login=$1 || return
86 verbose && echo -n "Removing mail spool(s) for ($login):"
87 if [ -f ${MAILSPOOL}/$login ]; the
[all...]
/freebsd-13-stable/contrib/netbsd-tests/usr.bin/id/
H A Dpwgr.c150 getpwnam(const char *login) argument
155 if (strcmp(login, "root") == 0) {
159 } else if (strcmp(login, "test") == 0) {
/freebsd-13-stable/usr.bin/write/
H A Dwrite.c90 const char *login; local
129 * Determine our login name before we reopen() stdout
133 if ((login = getlogin()) == NULL) {
135 login = pwd->pw_name;
137 login = "???";
170 do_write(devfd, tty, mytty, login);
181 do_write(devfd, argv[1], mytty, login);
295 do_write(int devfd, char *tty, char *mytty, const char *login) argument
321 login, host, mytty, nows + 11);
/freebsd-13-stable/lib/libcasper/services/cap_pwd/
H A Dcap_pwd.h45 struct passwd *cap_getpwnam(cap_channel_t *chan, const char *login);
78 cap_getpwnam(cap_channel_t *chan __unused, const char *login)
81 return (getpwnam(login));
H A Dcap_pwd.c139 cap_getpwcommon_r(cap_channel_t *chan, const char *cmd, const char *login, argument
153 nvlist_add_string(nvl, "name", login);
208 cap_getpwcommon(cap_channel_t *chan, const char *cmd, const char *login, argument
216 error = cap_getpwcommon_r(chan, cmd, login, uid, &gpwd, gbuffer,
236 cap_getpwnam(cap_channel_t *chan, const char *login) argument
239 return (cap_getpwcommon(chan, "getpwnam", login, 0));
/freebsd-13-stable/usr.sbin/nscd/agents/
H A Dpasswd.c134 char *login; local
153 login = calloc(1, size);
154 assert(login != NULL);
155 memcpy(login, key + sizeof(enum nss_lookup_type), size - 1);
173 result = getpwnam(login);
174 free(login);
/freebsd-13-stable/contrib/apr-util/dbd/unsupported/
H A Dapr_dbd_freetds.c544 LOGINREC *login; local
556 login = dblogin();
557 if (login == NULL) {
560 /* now set login properties */
580 DBSETLUSER(login, buf);
583 DBSETLPWD(login, buf);
586 DBSETLAPP(login, buf);
592 DBSETLHOST(login, buf);
595 DBSETLCHARSET(login, buf);
598 DBSETLNATLANG(login, bu
[all...]
/freebsd-13-stable/usr.bin/newgrp/
H A Dnewgrp.c75 int ch, login; local
85 login = 0;
90 login = 1;
115 if (login)
/freebsd-13-stable/crypto/openssl/ssl/
H A Dtls_srp.c26 OPENSSL_free(ctx->srp_ctx.login);
45 OPENSSL_free(s->srp_ctx.login);
70 /* set client Hello login callback */
101 if ((ctx->srp_ctx.login != NULL) &&
102 ((s->srp_ctx.login = OPENSSL_strdup(ctx->srp_ctx.login)) == NULL)) {
115 OPENSSL_free(s->srp_ctx.login);
305 if ((x = SRP_Calc_x(s->srp_ctx.s, s->srp_ctx.login, passwd)) == NULL
399 if (s->srp_ctx.login != NULL)
400 return s->srp_ctx.login;
[all...]
/freebsd-13-stable/contrib/dma/
H A Dnet.c251 smtp_login(int fd, char *login, char* password) argument
256 res = smtp_auth_md5(fd, login, password);
261 * If the return code is -2, then then the login attempt failed,
262 * do not try other login mechanisms
273 " AUTH login not available: %s",
278 len = base64_encode(login, strlen(login), &temp);
289 syslog(LOG_NOTICE, "remote delivery %s: AUTH login failed: %s",
307 syslog(LOG_WARNING, "non-encrypted SMTP login is disabled in config, so skipping it. ");
423 * Check if the user wants plain text login withou
[all...]
H A Dconf.c127 au->login = strsep(&data, "|");
131 if (au->login == NULL ||
/freebsd-13-stable/crypto/heimdal/appl/ftp/ftp/
H A Dextern.h89 int login (char *);
/freebsd-13-stable/crypto/openssh/
H A Dincludes.h61 # include <login.h>
/freebsd-13-stable/usr.sbin/ppp/
H A Ddatalink.h66 unsigned packetmode : 1; /* Go into packet mode after login ? */
72 char login[SCRIPT_LEN]; member in struct:datalink::__anon16637::__anon16638
/freebsd-13-stable/usr.bin/id/
H A Did.c233 char *login; local
240 if ((login = getlogin()) == NULL)
244 if (pw == NULL || strcmp(login, pw->pw_name))
245 (void)printf("login\t%s\n", login);
/freebsd-13-stable/crypto/heimdal/appl/su/
H A Dsu.c87 "simulate full login" },
105 "[login [shell arguments]]");
290 verify_unix(struct passwd *login, struct passwd *su) argument
305 login->pw_name, su->pw_name);
316 int gs = group_member_p(ROOT_GROUP, login->pw_name);
319 login->pw_name, su->pw_name, ROOT_GROUP);
368 errx (1, "unknown login %s", su_user);
371 errx (1, "unknown login %s", su_user);
/freebsd-13-stable/sys/security/audit/
H A Daudit.h104 void audit_arg_login(char *login);
239 #define AUDIT_ARG_LOGIN(login) do { \
241 audit_arg_login((login)); \
439 #define AUDIT_ARG_LOGIN(login)

Completed in 222 milliseconds

123