/freebsd-13-stable/libexec/ulog-helper/ |
H A D | ulog-helper.c | 40 * This setuid helper utility writes user login records to disk. 55 const char *login; local 59 * Attempt to determine the username corresponding to this login 65 if ((login = getlogin()) != NULL && (pw = getpwnam(login)) != NULL && 67 return (login); 82 if ((argc == 2 || argc == 3) && strcmp(argv[1], "login") == 0) {
|
/freebsd-13-stable/contrib/opie/ |
H A D | opieinfo.c | 53 char *login; variable 55 login = getlogin(); 56 if (login == NULL) { 57 fprintf(stderr, "Cannot find login name\n"); 60 return login;
|
/freebsd-13-stable/usr.sbin/pw/ |
H A D | pw_nis.c | 92 chgnispwent(const char *path, char const * login, struct passwd * pwd) argument 94 return pw_nisupdate(path, pwd, login); 98 delnispwent(const char *path, const char *login) argument 100 return pw_nisupdate(path, NULL, login);
|
H A D | grupd.c | 101 chggrent(char const * login, struct group * grp) argument 103 return gr_update(grp, login);
|
H A D | pwupd.c | 143 chgpwent(char const * login, struct passwd * pwd) argument 146 return (pw_update(pwd, login));
|
H A D | pw.h | 96 int delnispwent(const char *path, const char *login); 97 int chgnispwent(const char *path, const char *login, struct passwd *pwd);
|
/freebsd-13-stable/sys/dev/firewire/ |
H A D | sbp_targ.c | 75 * BASE 0xffff f001 0020 command port for login id 0 76 * BASE 0xffff f001 0040 command port for login id 1 207 struct sbp_targ_login *login; member in struct:orb_info 264 sbp_targ_dealloc_login(struct sbp_targ_login *login) argument 268 if (login == NULL) { 269 printf("%s: login = NULL\n", __func__); 272 for (orbi = STAILQ_FIRST(&login->orbs); orbi != NULL; orbi = next) { 279 callout_stop(&login->hold_callout); 281 STAILQ_REMOVE(&login->lstate->logins, login, sbp_targ_logi 292 struct sbp_targ_login *login; local 312 struct sbp_targ_login *login; local 477 struct sbp_targ_login *login, *next; local 539 sbp_targ_remove_orb_info_locked(struct sbp_targ_login *login, struct orb_info *orbi) argument 545 sbp_targ_remove_orb_info(struct sbp_targ_login *login, struct orb_info *orbi) argument 569 struct sbp_targ_login *login; local 1280 struct sbp_targ_login *login; local 1535 struct sbp_targ_login *login; local 1576 struct sbp_targ_login *login; local 1720 sbp_targ_fetch_orb(struct sbp_targ_softc *sc, struct fw_device *fwdev, uint16_t orb_hi, uint32_t orb_lo, struct sbp_targ_login *login, int mode) argument 1808 struct sbp_targ_login *login; local [all...] |
/freebsd-13-stable/share/examples/printing/ |
H A D | psdfX | 19 n) login=$OPTARG ;; 27 [ "$login" ] || fail "No login name" 30 ( /u/kelly/freebsd/printing/filters/make-ps-header $login $host "DVI File"
|
/freebsd-13-stable/usr.sbin/adduser/ |
H A D | rmuser.sh | 54 # rm_files login 55 # Removes files or empty directories belonging to $login from various 60 [ -n $1 ] && login=$1 || return 69 verbose && echo -n "Removing files owned by ($login) in $_dir:" 70 filecount=`find 2>/dev/null "$_dir" -user "$login" -delete -print | 78 # rm_mail login 80 # specified in the $login argument. 84 [ -n $1 ] && login=$1 || return 86 verbose && echo -n "Removing mail spool(s) for ($login):" 87 if [ -f ${MAILSPOOL}/$login ]; the [all...] |
/freebsd-13-stable/contrib/netbsd-tests/usr.bin/id/ |
H A D | pwgr.c | 150 getpwnam(const char *login) argument 155 if (strcmp(login, "root") == 0) { 159 } else if (strcmp(login, "test") == 0) {
|
/freebsd-13-stable/usr.bin/write/ |
H A D | write.c | 90 const char *login; local 129 * Determine our login name before we reopen() stdout 133 if ((login = getlogin()) == NULL) { 135 login = pwd->pw_name; 137 login = "???"; 170 do_write(devfd, tty, mytty, login); 181 do_write(devfd, argv[1], mytty, login); 295 do_write(int devfd, char *tty, char *mytty, const char *login) argument 321 login, host, mytty, nows + 11);
|
/freebsd-13-stable/lib/libcasper/services/cap_pwd/ |
H A D | cap_pwd.h | 45 struct passwd *cap_getpwnam(cap_channel_t *chan, const char *login); 78 cap_getpwnam(cap_channel_t *chan __unused, const char *login) 81 return (getpwnam(login));
|
H A D | cap_pwd.c | 139 cap_getpwcommon_r(cap_channel_t *chan, const char *cmd, const char *login, argument 153 nvlist_add_string(nvl, "name", login); 208 cap_getpwcommon(cap_channel_t *chan, const char *cmd, const char *login, argument 216 error = cap_getpwcommon_r(chan, cmd, login, uid, &gpwd, gbuffer, 236 cap_getpwnam(cap_channel_t *chan, const char *login) argument 239 return (cap_getpwcommon(chan, "getpwnam", login, 0));
|
/freebsd-13-stable/usr.sbin/nscd/agents/ |
H A D | passwd.c | 134 char *login; local 153 login = calloc(1, size); 154 assert(login != NULL); 155 memcpy(login, key + sizeof(enum nss_lookup_type), size - 1); 173 result = getpwnam(login); 174 free(login);
|
/freebsd-13-stable/contrib/apr-util/dbd/unsupported/ |
H A D | apr_dbd_freetds.c | 544 LOGINREC *login; local 556 login = dblogin(); 557 if (login == NULL) { 560 /* now set login properties */ 580 DBSETLUSER(login, buf); 583 DBSETLPWD(login, buf); 586 DBSETLAPP(login, buf); 592 DBSETLHOST(login, buf); 595 DBSETLCHARSET(login, buf); 598 DBSETLNATLANG(login, bu [all...] |
/freebsd-13-stable/usr.bin/newgrp/ |
H A D | newgrp.c | 75 int ch, login; local 85 login = 0; 90 login = 1; 115 if (login)
|
/freebsd-13-stable/crypto/openssl/ssl/ |
H A D | tls_srp.c | 26 OPENSSL_free(ctx->srp_ctx.login); 45 OPENSSL_free(s->srp_ctx.login); 70 /* set client Hello login callback */ 101 if ((ctx->srp_ctx.login != NULL) && 102 ((s->srp_ctx.login = OPENSSL_strdup(ctx->srp_ctx.login)) == NULL)) { 115 OPENSSL_free(s->srp_ctx.login); 305 if ((x = SRP_Calc_x(s->srp_ctx.s, s->srp_ctx.login, passwd)) == NULL 399 if (s->srp_ctx.login != NULL) 400 return s->srp_ctx.login; [all...] |
/freebsd-13-stable/contrib/dma/ |
H A D | net.c | 251 smtp_login(int fd, char *login, char* password) argument 256 res = smtp_auth_md5(fd, login, password); 261 * If the return code is -2, then then the login attempt failed, 262 * do not try other login mechanisms 273 " AUTH login not available: %s", 278 len = base64_encode(login, strlen(login), &temp); 289 syslog(LOG_NOTICE, "remote delivery %s: AUTH login failed: %s", 307 syslog(LOG_WARNING, "non-encrypted SMTP login is disabled in config, so skipping it. "); 423 * Check if the user wants plain text login withou [all...] |
H A D | conf.c | 127 au->login = strsep(&data, "|"); 131 if (au->login == NULL ||
|
/freebsd-13-stable/crypto/heimdal/appl/ftp/ftp/ |
H A D | extern.h | 89 int login (char *);
|
/freebsd-13-stable/crypto/openssh/ |
H A D | includes.h | 61 # include <login.h>
|
/freebsd-13-stable/usr.sbin/ppp/ |
H A D | datalink.h | 66 unsigned packetmode : 1; /* Go into packet mode after login ? */ 72 char login[SCRIPT_LEN]; member in struct:datalink::__anon16637::__anon16638
|
/freebsd-13-stable/usr.bin/id/ |
H A D | id.c | 233 char *login; local 240 if ((login = getlogin()) == NULL) 244 if (pw == NULL || strcmp(login, pw->pw_name)) 245 (void)printf("login\t%s\n", login);
|
/freebsd-13-stable/crypto/heimdal/appl/su/ |
H A D | su.c | 87 "simulate full login" }, 105 "[login [shell arguments]]"); 290 verify_unix(struct passwd *login, struct passwd *su) argument 305 login->pw_name, su->pw_name); 316 int gs = group_member_p(ROOT_GROUP, login->pw_name); 319 login->pw_name, su->pw_name, ROOT_GROUP); 368 errx (1, "unknown login %s", su_user); 371 errx (1, "unknown login %s", su_user);
|
/freebsd-13-stable/sys/security/audit/ |
H A D | audit.h | 104 void audit_arg_login(char *login); 239 #define AUDIT_ARG_LOGIN(login) do { \ 241 audit_arg_login((login)); \ 439 #define AUDIT_ARG_LOGIN(login)
|