Searched refs:username (Results 1 - 25 of 146) sorted by relevance

123456

/freebsd-current/sys/contrib/openzfs/tests/zfs-tests/tests/functional/pam/
H A Dpam_short_password.ksh43 log_mustnot ismounted "$TESTPOOL/pam/${username}"
49 echo "testpass" | pamtester ${pamservice} ${username} open_session
51 log_must ismounted "$TESTPOOL/pam/${username}"
55 printf "testpass\nshort\nshort\n" | pamtester -v ${pamservice} ${username} chauthtok
58 log_must pamtester ${pamservice} ${username} close_session
60 log_mustnot ismounted "$TESTPOOL/pam/${username}"
64 echo "testpass" | pamtester ${pamservice} ${username} open_session
66 log_mustnot ismounted "$TESTPOOL/pam/${username}"
68 log_must pamtester ${pamservice} ${username} close_session
71 echo "short" | pamtester ${pamservice} ${username} open_sessio
[all...]
H A Dpam_nounmount.ksh29 log_mustnot ismounted "$TESTPOOL/pam/${username}"
33 echo "testpass" | pamtester ${pamservice} ${username} open_session
35 log_must ismounted "$TESTPOOL/pam/${username}"
38 echo "testpass" | pamtester ${pamservice} ${username} open_session
41 log_must ismounted "$TESTPOOL/pam/${username}"
43 log_must pamtester ${pamservice} ${username} close_session
46 log_must ismounted "$TESTPOOL/pam/${username}"
48 log_must pamtester ${pamservice} ${username} close_session
51 log_must ismounted "$TESTPOOL/pam/${username}"
52 log_must zfs unmount "$TESTPOOL/pam/${username}"
[all...]
H A Dpam_change_unmounted.ksh29 log_mustnot ismounted "$TESTPOOL/pam/${username}"
34 printf "testpass\nsecondpass\nsecondpass\n" | pamtester -v ${pamservice} ${username} chauthtok
36 log_mustnot ismounted "$TESTPOOL/pam/${username}"
39 echo "secondpass" | pamtester ${pamservice} ${username} open_session
41 log_must ismounted "$TESTPOOL/pam/${username}"
44 printf "secondpass\ntestpass\ntestpass\n" | pamtester -v ${pamservice} ${username} chauthtok
46 log_must ismounted "$TESTPOOL/pam/${username}"
47 log_must ismounted "$TESTPOOL/pam/${username}"
50 log_must pamtester ${pamservice} ${username} close_session
52 log_mustnot ismounted "$TESTPOOL/pam/${username}"
[all...]
H A Dpam_basic.ksh29 log_mustnot ismounted "$TESTPOOL/pam/${username}"
33 echo "testpass" | pamtester ${pamservice} ${username} open_session
35 log_must ismounted "$TESTPOOL/pam/${username}"
38 echo "testpass" | pamtester ${pamservice} ${username} open_session
40 log_must ismounted "$TESTPOOL/pam/${username}"
43 log_must pamtester ${pamservice} ${username} close_session
45 log_must ismounted "$TESTPOOL/pam/${username}"
48 log_must pamtester ${pamservice} ${username} close_session
50 log_mustnot ismounted "$TESTPOOL/pam/${username}"
H A Dpam_recursive.ksh29 username="${username}rec"
36 -o keylocation=prompt "$TESTPOOL/pampam/pam/${username}"
37 log_must zfs unmount "$TESTPOOL/pampam/pam/${username}"
38 log_must zfs unload-key "$TESTPOOL/pampam/pam/${username}"
39 log_must add_user pamtestgroup ${username} "$TESTDIR/rec"
42 log_must [ "$(get_prop keystatus "$TESTPOOL/pampam/pam/${username}")" = "$1" ]
45 log_mustnot ismounted "$TESTPOOL/pampam/pam/${username}"
49 echo "recurpass" | pamtester ${pamservice} ${username} open_session
51 log_must ismounted "$TESTPOOL/pampam/pam/${username}"
[all...]
H A Dutilities.kshlib.in25 username="pamtestuser"
32 log_must [ "$(get_prop keystatus "$TESTPOOL/pam/${username}")" = "$1" ]
47 log_must [ "$(<"${runstatedir}/$(id -u ${username})")" = "$1" ]
H A Dcleanup.ksh27 del_user ${username}
28 del_user ${username}rec
H A Dsetup.ksh33 log_must add_user pamtestgroup ${username}
36 echo "testpass" | zfs create -o encryption=aes-256-gcm -o keyformat=passphrase -o keylocation=prompt "$TESTPOOL/pam/${username}"
37 log_must zfs unmount "$TESTPOOL/pam/${username}"
38 log_must zfs unload-key "$TESTPOOL/pam/${username}"
/freebsd-current/usr.bin/top/
H A Dusername.h17 char *username(int uid);
18 int userid(char *username);
22 * username. The number of users in /etc/passwd CANNOT be greater than
H A DMakefile6 username.c utils.c
/freebsd-current/contrib/netbsd-tests/usr.sbin/useradd/
H A Dt_useradd.sh30 username="test5678901234567"
41 atf_check -s exit:0 -o ignore -e ignore -x "useradd $username"
45 atf_check -s ignore -o ignore -e ignore -x "userdel $username"
/freebsd-current/contrib/wpa/src/eap_peer/
H A Dmschapv2.c15 const u8 * mschapv2_remove_domain(const u8 *username, size_t *len) argument
26 if (username[i] == '\\') {
28 return username + i + 1;
32 return username;
44 const u8 *username; local
51 username = mschapv2_remove_domain(identity, &username_len);
53 username, username_len);
59 wpa_hexdump_ascii(MSG_DEBUG, "MSCHAPV2: username",
60 username, username_len);
67 username, username_le
[all...]
H A Dmschapv2.h17 const u8 * mschapv2_remove_domain(const u8 *username, size_t *len);
18 int mschapv2_derive_response(const u8 *username, size_t username_len,
/freebsd-current/crypto/heimdal/lib/krb5/
H A Dget_default_principal.c110 char username[1024]; local
111 ULONG sz = sizeof(username);
113 if (GetUserNameEx(NameUserPrincipal, username, &sz)) {
114 return krb5_parse_name_flags(context, username,
120 /* Just get the Windows username. This should pretty much always
123 char username[1024]; local
124 DWORD dsz = sizeof(username);
126 if (GetUserName(username, &dsz)) {
127 return krb5_make_principal(context, princ, NULL, username, NULL);
133 const char * username local
[all...]
/freebsd-current/crypto/heimdal/appl/ftp/ftpd/
H A Dgss_userok.c49 gssapi_userok(void *app_data, char *username) argument
54 return !gss_userok(data->client_name, username);
58 gssapi_session(void *app_data, char *username) argument
/freebsd-current/usr.sbin/jexec/
H A Djexec.c52 static void get_user_info(const char *username, const struct passwd **pwdp,
64 const char *username, *shell, *term; local
67 username = NULL;
78 username = optarg;
82 username = optarg;
97 get_user_info(username, &pwd, &lcap);
109 if (clean || username != NULL) {
112 get_user_info(username, &pwd, &lcap);
123 if (setusercontext(lcap, pwd, pwd->pw_uid, username
151 get_user_info(const char *username, cons argument
[all...]
/freebsd-current/crypto/heimdal/lib/gssapi/ntlm/
H A Drelease_cred.c52 if (cred->username)
53 free(cred->username);
H A Dinit_sec_context.c38 char **username, struct ntlm_buf *key)
64 *username = strdup(u);
79 char **username, struct ntlm_buf *key)
89 if (from_file(fn, target_name->domain, username, key) == 0)
100 get_user_ccache(const ntlm_name name, char **username, struct ntlm_buf *key) argument
109 *username = NULL;
128 username);
174 ret = get_user_file(target_name, &cred->username, &cred->key);
176 ret = get_user_ccache(target_name, &cred->username, &cred->key);
194 (*to)->username
37 from_file(const char *fn, const char *target_domain, char **username, struct ntlm_buf *key) argument
78 get_user_file(const ntlm_name target_name, char **username, struct ntlm_buf *key) argument
[all...]
/freebsd-current/crypto/openssh/
H A Daudit-linux.c42 linux_audit_record_event(int uid, const char *username, const char *hostname, argument
55 NULL, "login", username ? username : "(unknown)",
56 username == NULL ? uid : -1, hostname, ip, ttyn, success);
H A Dloginrec.h71 char username[LINFO_NAMESIZE]; /* login username */ member in struct:logininfo
91 struct logininfo *login_alloc_entry(pid_t pid, const char *username,
96 int login_init_entry(struct logininfo *li, pid_t pid, const char *username,
/freebsd-current/contrib/wpa/src/crypto/
H A Dms_funcs.h13 const u8 *username, size_t username_len,
18 const u8 *username, size_t username_len,
24 const u8 *username, size_t username_len,
29 const u8 *username, size_t username_len,
37 const u8 *username, size_t username_len, u8 *challenge);
/freebsd-current/crypto/heimdal/appl/login/
H A Dutmp_login.c86 const char *username, const char *hostname)
93 strncpy(utmp->ut_name, username, sizeof(utmp->ut_name));
96 strncpy(utmp->ut_user, username, sizeof(utmp->ut_user));
127 void utmp_login(char *tty, const char *username, const char *hostname) argument
133 void utmp_login(char *tty, const char *username, const char *hostname) argument
138 prepare_utmp (&utmp, tty, username, hostname);
85 prepare_utmp(struct utmp *utmp, char *tty, const char *username, const char *hostname) argument
/freebsd-current/contrib/openbsm/libbsm/
H A Dbsm_user.c64 char *username, *always, *never; local
67 username = strtok_r(str, user_delim, &last);
71 if ((username == NULL) || (always == NULL) || (never == NULL))
74 if (strlen(username) >= AU_USER_NAME_MAX)
77 strlcpy(u->au_name, username, AU_USER_NAME_MAX);
240 au_user_mask(char *username, au_mask_t *mask_p) argument
251 if ((up = getauusernam_r(&u, username)) != NULL) {
/freebsd-current/usr.sbin/adduser/
H A Dadduser.sh160 err "Invalid shell ($_sh) for user $username."
207 _name="-n '$username'"
266 err "There was an error adding user ($username)."
277 err "There was an error adding user ($username)."
280 info "Successfully added ($username) to the user database."
283 info "Password for ($username) is: $randompass"
288 if ${PWCMD} lock $username ; then
289 info "Account ($username) is locked."
291 info "Account ($username) could NOT be locked."
321 done <"$msgfile" | ${MAILCMD} -s"Welcome" ${username}
[all...]
/freebsd-current/contrib/wpa/src/eap_server/
H A Deap_sim_db.h41 const char *username, int max_chal,
69 char *permanent; /* Permanent username */
70 char *reauth_id; /* Fast re-authentication username */
85 int eap_sim_db_get_aka_auth(struct eap_sim_db_data *data, const char *username,
90 const char *username, const u8 *auts,

Completed in 172 milliseconds

123456