Searched refs:username (Results 1 - 25 of 136) sorted by relevance

123456

/openbsd-current/libexec/login_radius/
H A Dlogin_radius.h20 raddauth(char *username, char *class, char *style, char *challenge,
H A Dlogin_radius.c90 char *class, *service, *style, *username, *password, *emsg; local
130 username = argv[optind];
147 if (!cleanstring(username))
148 errx(1, "username contains non-printables");
182 c = raddauth(username, class, style,
/openbsd-current/usr.bin/passwd/
H A Dpasswd.c45 char *username; local
58 username = getlogin();
59 if (username == NULL) {
68 username = argv[0];
74 exit(local_passwd(username, 0));
/openbsd-current/libexec/login_yubikey/
H A Dlogin_yubikey.c69 char *username, *password = NULL; local
112 username = argv[0];
114 if (!strcmp(username, "NOUSER"))
116 if (!clean_string(username)) {
117 syslog(LOG_ERR, "clean_string username");
122 syslog(LOG_ERR, "user %s: fdopen: %m", username);
131 username);
154 "on back channel", username);
160 ret = yubikey_login(username, password);
163 syslog(LOG_INFO, "user %s: authorize", username);
185 yubikey_login(const char *username, const char *password) argument
[all...]
/openbsd-current/gnu/usr.bin/perl/cpan/CPAN/lib/CPAN/HTTP/
H A DCredentials.pm37 (Note: to permanently configure username and password run
51 if ( defined $CPAN::Config->{username} ) {
52 $USER = $CPAN::Config->{username};
57 (Note: to permanently configure username and password run
58 o conf username your_username
69 my ($username,$password);
72 $username = prompt($username_message);
87 return ($username,$password);
/openbsd-current/usr.sbin/npppctl/
H A Dparser.h48 const char *username; member in struct:parse_result
/openbsd-current/libexec/login_lchpass/
H A Dlogin_lchpass.c58 char *username = NULL, *hash = NULL; local
95 username = argv[optind];
102 pwd = getpwnam_shadow(username);
109 username);
119 (void)printf("Changing local password for %s.\n", username);
/openbsd-current/usr.sbin/tokenadm/
H A Dtokenadm.c269 process_record(char *username, unsigned and_mask, unsigned or_mask) argument
275 switch (tokendb_lockrec(username, &tokenrec, TOKEN_LOCKED)) {
280 if (!tokendb_putrec(username, &tokenrec))
288 if (force_unlock(username))
293 warnx("%s: nonexistent user", username);
301 process_modes(char *username, unsigned and_mask, unsigned or_mask) argument
307 switch (tokendb_lockrec(username, &tokenrec, TOKEN_LOCKED)) {
318 if (!tokendb_putrec(username, &tokenrec))
326 if (force_unlock(username))
331 warnx("%s: nonexistent user", username);
343 force_unlock(char *username) argument
[all...]
/openbsd-current/usr.sbin/cron/
H A Dclient.c67 /* int allowed(const char *username, const char *allow_file, const char *deny_file)
73 allowed(const char *username, const char *allow_file, const char *deny_file) argument
78 if (strcmp(username, "root") == 0)
82 isallowed = in_file(username, fp, FALSE);
85 isallowed = !in_file(username, fp, FALSE);
/openbsd-current/usr.sbin/radiusctl/
H A Dparser.h50 const char *username; member in struct:parse_result
/openbsd-current/libexec/login_token/
H A Dtokendb.c71 tokendb_getrec(char *username, TOKENDB_Rec *tokenrec) argument
77 key.data = username;
78 key.size = strlen(username) + 1;
105 tokendb_putrec(char *username, TOKENDB_Rec *tokenrec) argument
111 key.data = username;
112 key.size = strlen(username) + 1;
135 tokendb_delrec(char *username) argument
140 key.data = username;
141 key.size = strlen(username) + 1;
315 tokendb_lockrec(char *username, TOKENDB_Re argument
[all...]
H A Dlogin_token.c59 char *username = NULL; local
123 username = argv[optind];
151 tokenchallenge(username, challenge, sizeof(challenge),
182 if (tokenverify(username, challenge, pp) == 0) {
185 if ((instance = strchr(username, '.'))) {
H A Dtoken.c161 tokenverify(char *username, char *challenge, char *response) argument
188 if (tokendb_getrec(username, &tokenrec))
254 tokenuserinit(int flags, char *username, unsigned char *usecret, unsigned mode) argument
284 tokendb_getrec(username, &tokenrec) == 0)
288 strlcpy(tokenrec.uname, username, sizeof(tokenrec.uname));
296 if (tokendb_putrec(username, &tokenrec))
313 username, secret.cb[0], secret.cb[1], secret.cb[2], secret.cb[3],
/openbsd-current/usr.bin/login/
H A Dlogin.c134 char *username = NULL, *rusername = NULL; variable
258 "[-R remote-addr] [-u username]\n\t[user]\n");
265 username = *argv;
286 *ap++ = username;
344 auth_call(as, script, shell, "-f", "--", username,
347 auth_call(as, script, shell, "--", username,
400 if ((style = strchr(username, ':')) != NULL)
403 if (auth_setitem(as, AUTHV_NAME, username) < 0 ||
404 (fullname = strdup(username)) == NULL) {
410 if ((instance = strchr(username, '/')) !
[all...]
/openbsd-current/usr.bin/mail/
H A Dtemp.c71 if ((myname = username()) == NULL) {
/openbsd-current/usr.sbin/npppd/npppd/
H A Dnpppd_auth.c234 * @param username username which gets the password
246 const char *username, char *password, int *plpassword)
252 NPPPD_AUTH_DBG((base, LOG_DEBUG, "%s(%s)", __func__, username));
260 if ((user = npppd_auth_get_user(base, username)) == NULL) {
298 * @param username username which gets the password
305 npppd_auth_get_framed_ip(npppd_auth_base *base, const char *username, argument
311 NPPPD_AUTH_DBG((base, LOG_DEBUG, "%s(%s)", __func__, username));
315 if ((user = npppd_auth_get_user(base, username))
245 npppd_auth_get_user_password(npppd_auth_base *base, const char *username, char *password, int *plpassword) argument
345 npppd_auth_get_calling_number(npppd_auth_base *base, const char *username, char *number, int *plnumber) argument
440 npppd_auth_username_for_auth(npppd_auth_base *base, const char *username, char *username_buffer) argument
485 npppd_auth_get_user(npppd_auth_base *base, const char *username) argument
[all...]
H A Dnpppd_auth.h51 /** username */
52 char *username; member in struct:_npppd_auth_user
/openbsd-current/gnu/usr.bin/cvs/src/
H A Droot.c279 * username, hostname, directory. The prototypical CVSROOT variable
311 newroot->username = NULL;
332 if (root->username != NULL)
333 free (root->username);
461 /* Check to see if there is a username[:password] in the string. */
477 /* copy the username */
479 /* a blank username is impossible, so leave it NULL in that
480 * case so we know to use the default username
482 newroot->username = xstrdup (cvsroot_copy);
581 if (newroot->username
717 char *p, *hostname, *username; local
[all...]
/openbsd-current/gnu/lib/libreadline/
H A Dtilde.c121 the end of a username, instead of just "/". Bash sets this to
231 username. */
320 char *dirname, *expansion, *username; local
346 username = isolate_tilde_prefix (filename, &user_len);
350 expansion = (*tilde_expansion_preexpansion_hook) (username);
354 free (username);
363 user_entry = getpwnam (username);
370 expansion = (*tilde_expansion_failure_hook) (username);
377 free (username);
385 free (username);
[all...]
/openbsd-current/usr.sbin/smtpd/
H A Dmda_mbox.c52 sender, deliver->userinfo.username, (char *)NULL, envp);
65 _PATH_MAILDIR, deliver->userinfo.username);
/openbsd-current/games/battlestar/
H A Dinit.c54 username = getutmp();
55 if (username == NULL)
/openbsd-current/lib/libskey/
H A Dskeylogin.c327 skey_haskey(char *username) argument
332 i = skeylookup(&skey, username);
348 skey_keyinfo(char *username) argument
354 i = skeychallenge(&skey, username, str);
375 skey_passcheck(char *username, char *passwd) argument
380 i = skeylookup(&skey, username);
420 skey_fakeprompt(char *username, char *skeyprompt) argument
443 /* Hash the username if possible */
444 if ((up = SHA1Data(username, strlen(username), NUL
515 skey_authenticate(char *username) argument
[all...]
/openbsd-current/usr.sbin/pwd_mkdb/
H A Dpwd_mkdb.c110 char *username, buf[MAXIMUM(PATH_MAX, LINE_MAX * 2)]; local
113 username = NULL;
131 username = optarg;
132 if (strlen(username) > _PW_NAME_LEN)
133 errx(1, "username too long");
144 (username && (*username == '+' || *username == '-')))
196 if (username) {
201 strlcpy(buf + 1, username, sizeo
515 db_store(FILE *fp, FILE *oldfp, DB *edp, DB *dp, struct passwd *pw, int keytype, char *username, uid_t olduid) argument
[all...]
/openbsd-current/usr.sbin/radiusd/
H A Dradiusd_standard.c196 char *ch, *username, buf[256]; local
207 username = buf;
209 username, sizeof(buf)) != 0) {
217 (ch = strrchr(username, '@')) != NULL) {
222 (ch = strchr(username, '\\')) != NULL) {
223 username = ch + 1;
229 RADIUS_TYPE_USER_NAME, username);
/openbsd-current/libexec/login_passwd/
H A Dlogin_passwd.c57 char *class = NULL, *username = NULL, *wheel = NULL; local
102 username = argv[optind];
110 pwd = getpwnam_shadow(username);

Completed in 336 milliseconds

123456