/freebsd/lib/libpam/modules/pam_self/ |
H A D | pam_self.c | 59 const char *luser; in pam_sm_authenticate() local 63 pam_err = pam_get_user(pamh, &luser, NULL); in pam_sm_authenticate() 66 if (luser == NULL || (pwd = getpwnam(luser)) == NULL) in pam_sm_authenticate()
|
/freebsd/crypto/heimdal/lib/krb5/ |
H A D | kuserok.c | 173 const char *luser) in match_local_principals() argument 192 luser) == 0) { in match_local_principals() 239 const char *luser) in krb5_kuserok() argument 255 if(getpwnam_r(luser, &pw, pwbuf, sizeof(pwbuf), &pwd) != 0) in krb5_kuserok() 258 pwd = getpwnam (luser); in krb5_kuserok() 294 return match_local_principals(context, principal, luser); in krb5_kuserok() 301 return match_local_principals(context, principal, luser); in krb5_kuserok()
|
/freebsd/usr.sbin/lpr/lprm/ |
H A D | lprm.c | 69 static char luser[16]; /* buffer for person */ variable 100 if (strlen(p->pw_name) >= sizeof(luser)) in main() 102 strcpy(luser, p->pw_name); in main() 103 person = luser; in main()
|
/freebsd/contrib/pf/authpf/ |
H A D | authpf.c | 67 char luser[MAXLOGNAME]; /* username */ 184 if (strlcpy(luser, pw->pw_name, sizeof(luser)) >= sizeof(luser)) { in main() 190 luser, (long)getpid())) < 0 || (u_int)n >= sizeof(rulesetname)) { in main() 192 luser, (long)getpid(), (long)getpid()); in main() 203 PATH_PIDFILE, user_ip ? ipsrc : luser); in main() 309 if (!check_luser(PATH_BAN_DIR, luser) || !allowed_luser(pw)) { in main() 310 syslog(LOG_INFO, "user %s prohibited", luser); in main() 326 fprintf(pidfp, "%ld\n%s\n", (long)getpid(), luser); in main() 68 char luser[MAXLOGNAME]; /* username */ global() variable [all...] |
/freebsd/lib/libc/net/ |
H A D | rcmd.c | 370 ruserok(const char *rhost, int superuser, const char *ruser, const char *luser) in ruserok() argument 384 luser) == 0) { in ruserok() 403 iruserok(unsigned long raddr, int superuser, const char *ruser, const char *luser) in iruserok() argument 412 ruser, luser); in iruserok() 422 const char *luser) in iruserok_sa() argument 444 if (__ivaliduser_sa(hostf, raddr, rlen, luser, ruser) == 0) { in iruserok_sa() 452 if ((pwd = getpwnam(luser)) == NULL) in iruserok_sa() 502 __ivaliduser(FILE *hostf, u_int32_t raddr, const char *luser, const char *ruser) in __ivaliduser() argument 511 luser, ruser); in __ivaliduser() 520 __ivaliduser_af(FILE *hostf, const void *raddr, const char *luser, in __ivaliduser_af() argument [all …]
|
/freebsd/crypto/heimdal/lib/roken/ |
H A D | iruserok.c | 89 __ivaliduser(FILE *hostf, unsigned raddr, const char *luser, in __ivaliduser() argument 199 userok = !(strcmp(ruser,*user ? user : luser)); in __ivaliduser() 218 iruserok(unsigned raddr, int superuser, const char *ruser, const char *luser) in iruserok() argument 232 if (__ivaliduser(hostf, raddr, luser, ruser) == 0) { in iruserok() 240 if ((pwd = k_getpwnam((char*)luser)) == NULL) in iruserok()
|
/freebsd/crypto/openssh/ |
H A D | ssh-keysign.c | 73 char *pkalg, *luser; in valid_request() local 144 if ((r = sshbuf_get_cstring(b, &luser, NULL)) != 0) in valid_request() 147 if (strcmp(pw->pw_name, luser) != 0) in valid_request() 149 free(luser); in valid_request()
|
/freebsd/sys/contrib/openzfs/cmd/zfs/ |
H A D | zfs_iter.c | 363 nvlist_t *luser, *ruser; in zfs_sort() local 366 luser = zfs_get_user_props(l); in zfs_sort() 369 lvalid = (nvlist_lookup_nvlist(luser, in zfs_sort()
|
/freebsd/lib/libpam/modules/pam_krb5/ |
H A D | pam_krb5.c | 128 char *principal, *princ_name, *ccache_name, luser[32], *srvdup; in pam_sm_authenticate() local 236 sizeof(luser), luser); in pam_sm_authenticate() 245 retval = pam_set_item(pamh, PAM_USER, luser); in pam_sm_authenticate()
|
/freebsd/contrib/tnftp/src/ |
H A D | util.c | 379 ftp_login(const char *host, const char *luser, const char *lpass) in ftp_login() argument 389 if (luser) in ftp_login() 390 fuser = ftp_strdup(luser); in ftp_login()
|
/freebsd/crypto/heimdal/ |
H A D | ChangeLog.2003 | 1561 `luser'.
|