Searched refs:luser (Results 1 - 10 of 10) sorted by relevance

/freebsd-current/lib/libpam/modules/pam_self/
H A Dpam_self.c59 const char *luser; local
63 pam_err = pam_get_user(pamh, &luser, NULL);
66 if (luser == NULL || (pwd = getpwnam(luser)) == NULL)
/freebsd-current/usr.sbin/lpr/lprm/
H A Dlprm.c69 static char luser[16]; /* buffer for person */ variable
100 if (strlen(p->pw_name) >= sizeof(luser))
102 strcpy(luser, p->pw_name);
103 person = luser;
/freebsd-current/crypto/heimdal/lib/roken/
H A Diruserok.c89 __ivaliduser(FILE *hostf, unsigned raddr, const char *luser, argument
199 userok = !(strcmp(ruser,*user ? user : luser));
218 iruserok(unsigned raddr, int superuser, const char *ruser, const char *luser) argument
232 if (__ivaliduser(hostf, raddr, luser, ruser) == 0) {
240 if ((pwd = k_getpwnam((char*)luser)) == NULL)
/freebsd-current/crypto/heimdal/lib/krb5/
H A Dkuserok.c173 const char *luser)
192 luser) == 0) {
225 * ie luser@@LOCAL-REALMS-IN-CONFIGURATION-FILES.
229 * @param luser local user id
239 const char *luser)
255 if(getpwnam_r(luser, &pw, pwbuf, sizeof(pwbuf), &pwd) != 0)
258 pwd = getpwnam (luser);
294 return match_local_principals(context, principal, luser);
301 return match_local_principals(context, principal, luser);
171 match_local_principals(krb5_context context, krb5_principal principal, const char *luser) argument
237 krb5_kuserok(krb5_context context, krb5_principal principal, const char *luser) argument
/freebsd-current/contrib/pf/authpf/
H A Dauthpf.c67 char luser[MAXLOGNAME]; /* username */ variable
184 if (strlcpy(luser, pw->pw_name, sizeof(luser)) >= sizeof(luser)) {
190 luser, (long)getpid())) < 0 || (u_int)n >= sizeof(rulesetname)) {
192 luser, (long)getpid(), (long)getpid());
203 PATH_PIDFILE, user_ip ? ipsrc : luser);
309 if (!check_luser(PATH_BAN_DIR, luser) || !allowed_luser(pw)) {
310 syslog(LOG_INFO, "user %s prohibited", luser);
326 fprintf(pidfp, "%ld\n%s\n", (long)getpid(), luser);
[all...]
/freebsd-current/lib/libc/net/
H A Drcmd.c370 ruserok(const char *rhost, int superuser, const char *ruser, const char *luser) argument
384 luser) == 0) {
403 iruserok(unsigned long raddr, int superuser, const char *ruser, const char *luser) argument
412 ruser, luser);
422 const char *luser)
444 if (__ivaliduser_sa(hostf, raddr, rlen, luser, ruser) == 0) {
452 if ((pwd = getpwnam(luser)) == NULL)
502 __ivaliduser(FILE *hostf, u_int32_t raddr, const char *luser, const char *ruser) argument
511 luser, ruser);
520 __ivaliduser_af(FILE *hostf, const void *raddr, const char *luser, argument
421 iruserok_sa(const void *ra, int rlen, int superuser, const char *ruser, const char *luser) argument
560 __ivaliduser_sa(FILE *hostf, const struct sockaddr *raddr, socklen_t salen, const char *luser, const char *ruser) argument
[all...]
/freebsd-current/crypto/openssh/
H A Dssh-keysign.c73 char *pkalg, *luser; local
144 if ((r = sshbuf_get_cstring(b, &luser, NULL)) != 0)
145 fatal_fr(r, "parse luser");
147 if (strcmp(pw->pw_name, luser) != 0)
149 free(luser);
/freebsd-current/sys/contrib/openzfs/cmd/zfs/
H A Dzfs_iter.c363 nvlist_t *luser, *ruser; local
366 luser = zfs_get_user_props(l);
369 lvalid = (nvlist_lookup_nvlist(luser,
/freebsd-current/lib/libpam/modules/pam_krb5/
H A Dpam_krb5.c128 char *principal, *princ_name, *ccache_name, luser[32], *srvdup; local
236 sizeof(luser), luser);
245 retval = pam_set_item(pamh, PAM_USER, luser);
/freebsd-current/contrib/tnftp/src/
H A Dutil.c379 ftp_login(const char *host, const char *luser, const char *lpass) argument
389 if (luser)
390 fuser = ftp_strdup(luser);

Completed in 207 milliseconds