/freebsd-current/lib/libpam/modules/pam_self/ |
H A D | pam_self.c | 59 const char *luser; local 63 pam_err = pam_get_user(pamh, &luser, NULL); 66 if (luser == NULL || (pwd = getpwnam(luser)) == NULL)
|
/freebsd-current/usr.sbin/lpr/lprm/ |
H A D | lprm.c | 69 static char luser[16]; /* buffer for person */ variable 100 if (strlen(p->pw_name) >= sizeof(luser)) 102 strcpy(luser, p->pw_name); 103 person = luser;
|
/freebsd-current/crypto/heimdal/lib/roken/ |
H A D | iruserok.c | 89 __ivaliduser(FILE *hostf, unsigned raddr, const char *luser, argument 199 userok = !(strcmp(ruser,*user ? user : luser)); 218 iruserok(unsigned raddr, int superuser, const char *ruser, const char *luser) argument 232 if (__ivaliduser(hostf, raddr, luser, ruser) == 0) { 240 if ((pwd = k_getpwnam((char*)luser)) == NULL)
|
/freebsd-current/crypto/heimdal/lib/krb5/ |
H A D | kuserok.c | 173 const char *luser) 192 luser) == 0) { 225 * ie luser@@LOCAL-REALMS-IN-CONFIGURATION-FILES. 229 * @param luser local user id 239 const char *luser) 255 if(getpwnam_r(luser, &pw, pwbuf, sizeof(pwbuf), &pwd) != 0) 258 pwd = getpwnam (luser); 294 return match_local_principals(context, principal, luser); 301 return match_local_principals(context, principal, luser); 171 match_local_principals(krb5_context context, krb5_principal principal, const char *luser) argument 237 krb5_kuserok(krb5_context context, krb5_principal principal, const char *luser) argument
|
/freebsd-current/contrib/pf/authpf/ |
H A D | authpf.c | 67 char luser[MAXLOGNAME]; /* username */ variable 184 if (strlcpy(luser, pw->pw_name, sizeof(luser)) >= sizeof(luser)) { 190 luser, (long)getpid())) < 0 || (u_int)n >= sizeof(rulesetname)) { 192 luser, (long)getpid(), (long)getpid()); 203 PATH_PIDFILE, user_ip ? ipsrc : luser); 309 if (!check_luser(PATH_BAN_DIR, luser) || !allowed_luser(pw)) { 310 syslog(LOG_INFO, "user %s prohibited", luser); 326 fprintf(pidfp, "%ld\n%s\n", (long)getpid(), luser); [all...] |
/freebsd-current/lib/libc/net/ |
H A D | rcmd.c | 370 ruserok(const char *rhost, int superuser, const char *ruser, const char *luser) argument 384 luser) == 0) { 403 iruserok(unsigned long raddr, int superuser, const char *ruser, const char *luser) argument 412 ruser, luser); 422 const char *luser) 444 if (__ivaliduser_sa(hostf, raddr, rlen, luser, ruser) == 0) { 452 if ((pwd = getpwnam(luser)) == NULL) 502 __ivaliduser(FILE *hostf, u_int32_t raddr, const char *luser, const char *ruser) argument 511 luser, ruser); 520 __ivaliduser_af(FILE *hostf, const void *raddr, const char *luser, argument 421 iruserok_sa(const void *ra, int rlen, int superuser, const char *ruser, const char *luser) argument 560 __ivaliduser_sa(FILE *hostf, const struct sockaddr *raddr, socklen_t salen, const char *luser, const char *ruser) argument [all...] |
/freebsd-current/crypto/openssh/ |
H A D | ssh-keysign.c | 73 char *pkalg, *luser; local 144 if ((r = sshbuf_get_cstring(b, &luser, NULL)) != 0) 145 fatal_fr(r, "parse luser"); 147 if (strcmp(pw->pw_name, luser) != 0) 149 free(luser);
|
/freebsd-current/sys/contrib/openzfs/cmd/zfs/ |
H A D | zfs_iter.c | 363 nvlist_t *luser, *ruser; local 366 luser = zfs_get_user_props(l); 369 lvalid = (nvlist_lookup_nvlist(luser,
|
/freebsd-current/lib/libpam/modules/pam_krb5/ |
H A D | pam_krb5.c | 128 char *principal, *princ_name, *ccache_name, luser[32], *srvdup; local 236 sizeof(luser), luser); 245 retval = pam_set_item(pamh, PAM_USER, luser);
|
/freebsd-current/contrib/tnftp/src/ |
H A D | util.c | 379 ftp_login(const char *host, const char *luser, const char *lpass) argument 389 if (luser) 390 fuser = ftp_strdup(luser);
|