/freebsd-current/sys/contrib/openzfs/tests/zfs-tests/tests/functional/pam/ |
H A D | pam_short_password.ksh | 43 log_mustnot ismounted "$TESTPOOL/pam/${username}" 49 echo "testpass" | pamtester ${pamservice} ${username} open_session 51 log_must ismounted "$TESTPOOL/pam/${username}" 55 printf "testpass\nshort\nshort\n" | pamtester -v ${pamservice} ${username} chauthtok 58 log_must pamtester ${pamservice} ${username} close_session 60 log_mustnot ismounted "$TESTPOOL/pam/${username}" 64 echo "testpass" | pamtester ${pamservice} ${username} open_session 66 log_mustnot ismounted "$TESTPOOL/pam/${username}" 68 log_must pamtester ${pamservice} ${username} close_session 71 echo "short" | pamtester ${pamservice} ${username} open_sessio [all...] |
H A D | pam_nounmount.ksh | 29 log_mustnot ismounted "$TESTPOOL/pam/${username}" 33 echo "testpass" | pamtester ${pamservice} ${username} open_session 35 log_must ismounted "$TESTPOOL/pam/${username}" 38 echo "testpass" | pamtester ${pamservice} ${username} open_session 41 log_must ismounted "$TESTPOOL/pam/${username}" 43 log_must pamtester ${pamservice} ${username} close_session 46 log_must ismounted "$TESTPOOL/pam/${username}" 48 log_must pamtester ${pamservice} ${username} close_session 51 log_must ismounted "$TESTPOOL/pam/${username}" 52 log_must zfs unmount "$TESTPOOL/pam/${username}" [all...] |
H A D | pam_change_unmounted.ksh | 29 log_mustnot ismounted "$TESTPOOL/pam/${username}" 34 printf "testpass\nsecondpass\nsecondpass\n" | pamtester -v ${pamservice} ${username} chauthtok 36 log_mustnot ismounted "$TESTPOOL/pam/${username}" 39 echo "secondpass" | pamtester ${pamservice} ${username} open_session 41 log_must ismounted "$TESTPOOL/pam/${username}" 44 printf "secondpass\ntestpass\ntestpass\n" | pamtester -v ${pamservice} ${username} chauthtok 46 log_must ismounted "$TESTPOOL/pam/${username}" 47 log_must ismounted "$TESTPOOL/pam/${username}" 50 log_must pamtester ${pamservice} ${username} close_session 52 log_mustnot ismounted "$TESTPOOL/pam/${username}" [all...] |
H A D | pam_basic.ksh | 29 log_mustnot ismounted "$TESTPOOL/pam/${username}" 33 echo "testpass" | pamtester ${pamservice} ${username} open_session 35 log_must ismounted "$TESTPOOL/pam/${username}" 38 echo "testpass" | pamtester ${pamservice} ${username} open_session 40 log_must ismounted "$TESTPOOL/pam/${username}" 43 log_must pamtester ${pamservice} ${username} close_session 45 log_must ismounted "$TESTPOOL/pam/${username}" 48 log_must pamtester ${pamservice} ${username} close_session 50 log_mustnot ismounted "$TESTPOOL/pam/${username}"
|
H A D | pam_recursive.ksh | 29 username="${username}rec" 36 -o keylocation=prompt "$TESTPOOL/pampam/pam/${username}" 37 log_must zfs unmount "$TESTPOOL/pampam/pam/${username}" 38 log_must zfs unload-key "$TESTPOOL/pampam/pam/${username}" 39 log_must add_user pamtestgroup ${username} "$TESTDIR/rec" 42 log_must [ "$(get_prop keystatus "$TESTPOOL/pampam/pam/${username}")" = "$1" ] 45 log_mustnot ismounted "$TESTPOOL/pampam/pam/${username}" 49 echo "recurpass" | pamtester ${pamservice} ${username} open_session 51 log_must ismounted "$TESTPOOL/pampam/pam/${username}" [all...] |
H A D | utilities.kshlib.in | 25 username="pamtestuser" 32 log_must [ "$(get_prop keystatus "$TESTPOOL/pam/${username}")" = "$1" ] 47 log_must [ "$(<"${runstatedir}/$(id -u ${username})")" = "$1" ]
|
H A D | cleanup.ksh | 27 del_user ${username} 28 del_user ${username}rec
|
H A D | setup.ksh | 33 log_must add_user pamtestgroup ${username} 36 echo "testpass" | zfs create -o encryption=aes-256-gcm -o keyformat=passphrase -o keylocation=prompt "$TESTPOOL/pam/${username}" 37 log_must zfs unmount "$TESTPOOL/pam/${username}" 38 log_must zfs unload-key "$TESTPOOL/pam/${username}"
|
/freebsd-current/usr.bin/top/ |
H A D | username.h | 17 char *username(int uid); 18 int userid(char *username); 22 * username. The number of users in /etc/passwd CANNOT be greater than
|
H A D | Makefile | 6 username.c utils.c
|
/freebsd-current/contrib/netbsd-tests/usr.sbin/useradd/ |
H A D | t_useradd.sh | 30 username="test5678901234567" 41 atf_check -s exit:0 -o ignore -e ignore -x "useradd $username" 45 atf_check -s ignore -o ignore -e ignore -x "userdel $username"
|
/freebsd-current/contrib/wpa/src/eap_peer/ |
H A D | mschapv2.c | 15 const u8 * mschapv2_remove_domain(const u8 *username, size_t *len) argument 26 if (username[i] == '\\') { 28 return username + i + 1; 32 return username; 44 const u8 *username; local 51 username = mschapv2_remove_domain(identity, &username_len); 53 username, username_len); 59 wpa_hexdump_ascii(MSG_DEBUG, "MSCHAPV2: username", 60 username, username_len); 67 username, username_le [all...] |
H A D | mschapv2.h | 17 const u8 * mschapv2_remove_domain(const u8 *username, size_t *len); 18 int mschapv2_derive_response(const u8 *username, size_t username_len,
|
/freebsd-current/crypto/heimdal/lib/krb5/ |
H A D | get_default_principal.c | 110 char username[1024]; local 111 ULONG sz = sizeof(username); 113 if (GetUserNameEx(NameUserPrincipal, username, &sz)) { 114 return krb5_parse_name_flags(context, username, 120 /* Just get the Windows username. This should pretty much always 123 char username[1024]; local 124 DWORD dsz = sizeof(username); 126 if (GetUserName(username, &dsz)) { 127 return krb5_make_principal(context, princ, NULL, username, NULL); 133 const char * username local [all...] |
/freebsd-current/crypto/heimdal/appl/ftp/ftpd/ |
H A D | gss_userok.c | 49 gssapi_userok(void *app_data, char *username) argument 54 return !gss_userok(data->client_name, username); 58 gssapi_session(void *app_data, char *username) argument
|
/freebsd-current/usr.sbin/jexec/ |
H A D | jexec.c | 52 static void get_user_info(const char *username, const struct passwd **pwdp, 64 const char *username, *shell, *term; local 67 username = NULL; 78 username = optarg; 82 username = optarg; 97 get_user_info(username, &pwd, &lcap); 109 if (clean || username != NULL) { 112 get_user_info(username, &pwd, &lcap); 123 if (setusercontext(lcap, pwd, pwd->pw_uid, username 151 get_user_info(const char *username, cons argument [all...] |
/freebsd-current/crypto/heimdal/lib/gssapi/ntlm/ |
H A D | release_cred.c | 52 if (cred->username) 53 free(cred->username);
|
H A D | init_sec_context.c | 38 char **username, struct ntlm_buf *key) 64 *username = strdup(u); 79 char **username, struct ntlm_buf *key) 89 if (from_file(fn, target_name->domain, username, key) == 0) 100 get_user_ccache(const ntlm_name name, char **username, struct ntlm_buf *key) argument 109 *username = NULL; 128 username); 174 ret = get_user_file(target_name, &cred->username, &cred->key); 176 ret = get_user_ccache(target_name, &cred->username, &cred->key); 194 (*to)->username 37 from_file(const char *fn, const char *target_domain, char **username, struct ntlm_buf *key) argument 78 get_user_file(const ntlm_name target_name, char **username, struct ntlm_buf *key) argument [all...] |
/freebsd-current/crypto/openssh/ |
H A D | audit-linux.c | 42 linux_audit_record_event(int uid, const char *username, const char *hostname, argument 55 NULL, "login", username ? username : "(unknown)", 56 username == NULL ? uid : -1, hostname, ip, ttyn, success);
|
H A D | loginrec.h | 71 char username[LINFO_NAMESIZE]; /* login username */ member in struct:logininfo 91 struct logininfo *login_alloc_entry(pid_t pid, const char *username, 96 int login_init_entry(struct logininfo *li, pid_t pid, const char *username,
|
/freebsd-current/contrib/wpa/src/crypto/ |
H A D | ms_funcs.h | 13 const u8 *username, size_t username_len, 18 const u8 *username, size_t username_len, 24 const u8 *username, size_t username_len, 29 const u8 *username, size_t username_len, 37 const u8 *username, size_t username_len, u8 *challenge);
|
/freebsd-current/crypto/heimdal/appl/login/ |
H A D | utmp_login.c | 86 const char *username, const char *hostname) 93 strncpy(utmp->ut_name, username, sizeof(utmp->ut_name)); 96 strncpy(utmp->ut_user, username, sizeof(utmp->ut_user)); 127 void utmp_login(char *tty, const char *username, const char *hostname) argument 133 void utmp_login(char *tty, const char *username, const char *hostname) argument 138 prepare_utmp (&utmp, tty, username, hostname); 85 prepare_utmp(struct utmp *utmp, char *tty, const char *username, const char *hostname) argument
|
/freebsd-current/contrib/openbsm/libbsm/ |
H A D | bsm_user.c | 64 char *username, *always, *never; local 67 username = strtok_r(str, user_delim, &last); 71 if ((username == NULL) || (always == NULL) || (never == NULL)) 74 if (strlen(username) >= AU_USER_NAME_MAX) 77 strlcpy(u->au_name, username, AU_USER_NAME_MAX); 240 au_user_mask(char *username, au_mask_t *mask_p) argument 251 if ((up = getauusernam_r(&u, username)) != NULL) {
|
/freebsd-current/usr.sbin/adduser/ |
H A D | adduser.sh | 160 err "Invalid shell ($_sh) for user $username." 207 _name="-n '$username'" 266 err "There was an error adding user ($username)." 277 err "There was an error adding user ($username)." 280 info "Successfully added ($username) to the user database." 283 info "Password for ($username) is: $randompass" 288 if ${PWCMD} lock $username ; then 289 info "Account ($username) is locked." 291 info "Account ($username) could NOT be locked." 321 done <"$msgfile" | ${MAILCMD} -s"Welcome" ${username} [all...] |
/freebsd-current/contrib/wpa/src/eap_server/ |
H A D | eap_sim_db.h | 41 const char *username, int max_chal, 69 char *permanent; /* Permanent username */ 70 char *reauth_id; /* Fast re-authentication username */ 85 int eap_sim_db_get_aka_auth(struct eap_sim_db_data *data, const char *username, 90 const char *username, const u8 *auts,
|