/openbsd-current/libexec/login_radius/ |
H A D | login_radius.h | 20 raddauth(char *username, char *class, char *style, char *challenge,
|
H A D | login_radius.c | 90 char *class, *service, *style, *username, *password, *emsg; local 130 username = argv[optind]; 147 if (!cleanstring(username)) 148 errx(1, "username contains non-printables"); 182 c = raddauth(username, class, style,
|
/openbsd-current/usr.bin/passwd/ |
H A D | passwd.c | 45 char *username; local 58 username = getlogin(); 59 if (username == NULL) { 68 username = argv[0]; 74 exit(local_passwd(username, 0));
|
/openbsd-current/libexec/login_yubikey/ |
H A D | login_yubikey.c | 69 char *username, *password = NULL; local 112 username = argv[0]; 114 if (!strcmp(username, "NOUSER")) 116 if (!clean_string(username)) { 117 syslog(LOG_ERR, "clean_string username"); 122 syslog(LOG_ERR, "user %s: fdopen: %m", username); 131 username); 154 "on back channel", username); 160 ret = yubikey_login(username, password); 163 syslog(LOG_INFO, "user %s: authorize", username); 185 yubikey_login(const char *username, const char *password) argument [all...] |
/openbsd-current/gnu/usr.bin/perl/cpan/CPAN/lib/CPAN/HTTP/ |
H A D | Credentials.pm | 37 (Note: to permanently configure username and password run 51 if ( defined $CPAN::Config->{username} ) { 52 $USER = $CPAN::Config->{username}; 57 (Note: to permanently configure username and password run 58 o conf username your_username 69 my ($username,$password); 72 $username = prompt($username_message); 87 return ($username,$password);
|
/openbsd-current/usr.sbin/npppctl/ |
H A D | parser.h | 48 const char *username; member in struct:parse_result
|
/openbsd-current/libexec/login_lchpass/ |
H A D | login_lchpass.c | 58 char *username = NULL, *hash = NULL; local 95 username = argv[optind]; 102 pwd = getpwnam_shadow(username); 109 username); 119 (void)printf("Changing local password for %s.\n", username);
|
/openbsd-current/usr.sbin/tokenadm/ |
H A D | tokenadm.c | 269 process_record(char *username, unsigned and_mask, unsigned or_mask) argument 275 switch (tokendb_lockrec(username, &tokenrec, TOKEN_LOCKED)) { 280 if (!tokendb_putrec(username, &tokenrec)) 288 if (force_unlock(username)) 293 warnx("%s: nonexistent user", username); 301 process_modes(char *username, unsigned and_mask, unsigned or_mask) argument 307 switch (tokendb_lockrec(username, &tokenrec, TOKEN_LOCKED)) { 318 if (!tokendb_putrec(username, &tokenrec)) 326 if (force_unlock(username)) 331 warnx("%s: nonexistent user", username); 343 force_unlock(char *username) argument [all...] |
/openbsd-current/usr.sbin/cron/ |
H A D | client.c | 67 /* int allowed(const char *username, const char *allow_file, const char *deny_file) 73 allowed(const char *username, const char *allow_file, const char *deny_file) argument 78 if (strcmp(username, "root") == 0) 82 isallowed = in_file(username, fp, FALSE); 85 isallowed = !in_file(username, fp, FALSE);
|
/openbsd-current/usr.sbin/radiusctl/ |
H A D | parser.h | 50 const char *username; member in struct:parse_result
|
/openbsd-current/libexec/login_token/ |
H A D | tokendb.c | 71 tokendb_getrec(char *username, TOKENDB_Rec *tokenrec) argument 77 key.data = username; 78 key.size = strlen(username) + 1; 105 tokendb_putrec(char *username, TOKENDB_Rec *tokenrec) argument 111 key.data = username; 112 key.size = strlen(username) + 1; 135 tokendb_delrec(char *username) argument 140 key.data = username; 141 key.size = strlen(username) + 1; 315 tokendb_lockrec(char *username, TOKENDB_Re argument [all...] |
H A D | login_token.c | 59 char *username = NULL; local 123 username = argv[optind]; 151 tokenchallenge(username, challenge, sizeof(challenge), 182 if (tokenverify(username, challenge, pp) == 0) { 185 if ((instance = strchr(username, '.'))) {
|
H A D | token.c | 161 tokenverify(char *username, char *challenge, char *response) argument 188 if (tokendb_getrec(username, &tokenrec)) 254 tokenuserinit(int flags, char *username, unsigned char *usecret, unsigned mode) argument 284 tokendb_getrec(username, &tokenrec) == 0) 288 strlcpy(tokenrec.uname, username, sizeof(tokenrec.uname)); 296 if (tokendb_putrec(username, &tokenrec)) 313 username, secret.cb[0], secret.cb[1], secret.cb[2], secret.cb[3],
|
/openbsd-current/usr.bin/login/ |
H A D | login.c | 134 char *username = NULL, *rusername = NULL; variable 258 "[-R remote-addr] [-u username]\n\t[user]\n"); 265 username = *argv; 286 *ap++ = username; 344 auth_call(as, script, shell, "-f", "--", username, 347 auth_call(as, script, shell, "--", username, 400 if ((style = strchr(username, ':')) != NULL) 403 if (auth_setitem(as, AUTHV_NAME, username) < 0 || 404 (fullname = strdup(username)) == NULL) { 410 if ((instance = strchr(username, '/')) ! [all...] |
/openbsd-current/usr.bin/mail/ |
H A D | temp.c | 71 if ((myname = username()) == NULL) {
|
/openbsd-current/usr.sbin/npppd/npppd/ |
H A D | npppd_auth.c | 234 * @param username username which gets the password 246 const char *username, char *password, int *plpassword) 252 NPPPD_AUTH_DBG((base, LOG_DEBUG, "%s(%s)", __func__, username)); 260 if ((user = npppd_auth_get_user(base, username)) == NULL) { 298 * @param username username which gets the password 305 npppd_auth_get_framed_ip(npppd_auth_base *base, const char *username, argument 311 NPPPD_AUTH_DBG((base, LOG_DEBUG, "%s(%s)", __func__, username)); 315 if ((user = npppd_auth_get_user(base, username)) 245 npppd_auth_get_user_password(npppd_auth_base *base, const char *username, char *password, int *plpassword) argument 345 npppd_auth_get_calling_number(npppd_auth_base *base, const char *username, char *number, int *plnumber) argument 440 npppd_auth_username_for_auth(npppd_auth_base *base, const char *username, char *username_buffer) argument 485 npppd_auth_get_user(npppd_auth_base *base, const char *username) argument [all...] |
H A D | npppd_auth.h | 51 /** username */ 52 char *username; member in struct:_npppd_auth_user
|
/openbsd-current/gnu/usr.bin/cvs/src/ |
H A D | root.c | 279 * username, hostname, directory. The prototypical CVSROOT variable 311 newroot->username = NULL; 332 if (root->username != NULL) 333 free (root->username); 461 /* Check to see if there is a username[:password] in the string. */ 477 /* copy the username */ 479 /* a blank username is impossible, so leave it NULL in that 480 * case so we know to use the default username 482 newroot->username = xstrdup (cvsroot_copy); 581 if (newroot->username 717 char *p, *hostname, *username; local [all...] |
/openbsd-current/gnu/lib/libreadline/ |
H A D | tilde.c | 121 the end of a username, instead of just "/". Bash sets this to 231 username. */ 320 char *dirname, *expansion, *username; local 346 username = isolate_tilde_prefix (filename, &user_len); 350 expansion = (*tilde_expansion_preexpansion_hook) (username); 354 free (username); 363 user_entry = getpwnam (username); 370 expansion = (*tilde_expansion_failure_hook) (username); 377 free (username); 385 free (username); [all...] |
/openbsd-current/usr.sbin/smtpd/ |
H A D | mda_mbox.c | 52 sender, deliver->userinfo.username, (char *)NULL, envp); 65 _PATH_MAILDIR, deliver->userinfo.username);
|
/openbsd-current/games/battlestar/ |
H A D | init.c | 54 username = getutmp(); 55 if (username == NULL)
|
/openbsd-current/lib/libskey/ |
H A D | skeylogin.c | 327 skey_haskey(char *username) argument 332 i = skeylookup(&skey, username); 348 skey_keyinfo(char *username) argument 354 i = skeychallenge(&skey, username, str); 375 skey_passcheck(char *username, char *passwd) argument 380 i = skeylookup(&skey, username); 420 skey_fakeprompt(char *username, char *skeyprompt) argument 443 /* Hash the username if possible */ 444 if ((up = SHA1Data(username, strlen(username), NUL 515 skey_authenticate(char *username) argument [all...] |
/openbsd-current/usr.sbin/pwd_mkdb/ |
H A D | pwd_mkdb.c | 110 char *username, buf[MAXIMUM(PATH_MAX, LINE_MAX * 2)]; local 113 username = NULL; 131 username = optarg; 132 if (strlen(username) > _PW_NAME_LEN) 133 errx(1, "username too long"); 144 (username && (*username == '+' || *username == '-'))) 196 if (username) { 201 strlcpy(buf + 1, username, sizeo 515 db_store(FILE *fp, FILE *oldfp, DB *edp, DB *dp, struct passwd *pw, int keytype, char *username, uid_t olduid) argument [all...] |
/openbsd-current/usr.sbin/radiusd/ |
H A D | radiusd_standard.c | 196 char *ch, *username, buf[256]; local 207 username = buf; 209 username, sizeof(buf)) != 0) { 217 (ch = strrchr(username, '@')) != NULL) { 222 (ch = strchr(username, '\\')) != NULL) { 223 username = ch + 1; 229 RADIUS_TYPE_USER_NAME, username);
|
/openbsd-current/libexec/login_passwd/ |
H A D | login_passwd.c | 57 char *class = NULL, *username = NULL, *wheel = NULL; local 102 username = argv[optind]; 110 pwd = getpwnam_shadow(username);
|