/titanic_41/usr/src/lib/libbsm/common/ |
H A D | audit_ftpd.c | 55 static char luser[LOGNAME_MAX + 1]; variable 66 (void) strncpy(luser, uname, LOGNAME_MAX); in audit_ftpd_bad_pw() 67 generate_record(luser, BAD_PASSWD, dgettext(bsm_dom, "bad password")); in audit_ftpd_bad_pw() 77 (void) strncpy(luser, uname, LOGNAME_MAX); in audit_ftpd_unknown() 78 generate_record(luser, UNKNOWN_USER, dgettext(bsm_dom, "unknown user")); in audit_ftpd_unknown() 88 (void) strncpy(luser, uname, LOGNAME_MAX); in audit_ftpd_excluded() 89 generate_record(luser, EXCLUDED_USER, dgettext(bsm_dom, in audit_ftpd_excluded() 118 (void) strncpy(luser, uname, LOGNAME_MAX); in audit_ftpd_success() 119 generate_record(luser, 0, ""); in audit_ftpd_success()
|
/titanic_41/usr/src/lib/gss_mechs/mech_krb5/krb5/os/ |
H A D | kuserok.c | 265 krb5_kuserok(krb5_context context, krb5_principal principal, const char *luser) in krb5_kuserok() argument 283 if (k5_getpwnam_r(luser, &pwx, pwbuf, sizeof(pwbuf), &pwd) != 0) in krb5_kuserok() 298 && (strcmp(kuser, luser) == 0)) { in krb5_kuserok() 311 princname, uid, pwd->pw_uid, luser); in krb5_kuserok() 415 krb5_kuserok(context, principal, luser) in krb5_kuserok() argument 418 const char *luser; 425 if (strcmp(kuser, luser) == 0)
|
/titanic_41/usr/src/lib/libbc/libc/net/ |
H A D | rcmd.c | 201 const char *luser) in ruserok() argument 230 if (!_validuser(hostf, fhost, luser, ruser, baselen)) { in ruserok() 240 if ((pwd = getpwnam(luser)) == NULL) in ruserok() 264 if (!_validuser(hostf, fhost, luser, ruser, baselen)) { in ruserok() 278 _validuser(FILE *hostf, char *rhost, char *luser, char *ruser, int baselen) in _validuser() argument 339 usermatch = !strcmp(ruser, luser); in _validuser()
|
/titanic_41/usr/src/lib/libast/common/uwin/ |
H A D | rcmd.c | 319 extern int ruserok(const char *rhost, int superuser, const char *ruser, const char *luser) in ruserok() argument 345 if (!_validuser(hostf, fhost, luser, ruser, baselen)) { in ruserok() 358 if ((pwd = getpwnam(luser)) == NULL) in ruserok() 380 _validuser(FILE *hostf, const char *rhost, const char *luser, in _validuser() argument 454 uservalid = !strcmp(ruser, *user ? user : luser); in _validuser() 460 uservalid = uservalid ? 1 : !stricmp(ruser,*user ? user : luser); in _validuser()
|
/titanic_41/usr/src/lib/libsocket/inet/ |
H A D | rcmd.c | 79 static int _validuser(FILE *hostf, char *rhost, const char *luser, 554 ruserok(const char *rhost, int superuser, const char *ruser, const char *luser) in ruserok() argument 587 if (!_validuser(hostf, fhost, luser, ruser, baselen)) { in ruserok() 597 if ((pwd = getpwnam(luser)) == NULL) in ruserok() 633 if (!_validuser(hostf, fhost, luser, ruser, baselen)) { in ruserok() 653 _validuser(FILE *hostf, char *rhost, const char *luser, in _validuser() argument 758 usermatch = (strcmp(ruser, luser) == 0); in _validuser()
|
/titanic_41/usr/src/lib/libresolv/ |
H A D | netdb.h | 142 const char *luser, const char *ruser, const char *cmd, int *fd2p); 146 int ruserok(const char *rhost, int suser, const char *ruser, const char *luser);
|
/titanic_41/usr/src/cmd/zfs/ |
H A D | zfs_iter.c | 285 nvlist_t *luser, *ruser; in zfs_sort() local 288 luser = zfs_get_user_props(l); in zfs_sort() 291 lvalid = (nvlist_lookup_nvlist(luser, in zfs_sort()
|
/titanic_41/usr/src/cmd/bnu/ |
H A D | uucleanup.c | 991 static char luser[BUFSIZ], lsystem[MAXBASENAME+1]; /* from other From */ local 1000 if (!analFrom(buf, luser, lsystem)) 1003 (void) strcpy(fuser, luser); 1007 *user = luser;
|
/titanic_41/usr/src/cmd/krb5/kadmin/cli/ |
H A D | kadmin.c | 203 char *luser, *canon, *cp; local 452 } else if ((luser = getenv("USER"))) { 453 princstr = (char *) malloc(strlen(luser) + 7 /* "/admin@" */ 461 strcpy(princstr, luser);
|