/titanic_52/usr/src/cmd/roles/ |
H A D | roles.c | 73 show_roles(char *username, int print_name) in show_roles() argument 79 if (username == NULL) { in show_roles() 85 username = pw->pw_name; in show_roles() 86 } else if (getpwnam(username) == NULL) { in show_roles() 87 (void) fprintf(stderr, "%s: %s : ", progname, username); in show_roles() 92 if ((user = getusernam(username)) != NULL) { in show_roles() 96 if (print_name && username != NULL) in show_roles() 97 (void) printf("%s : ", username); in show_roles() 101 if (print_name && username != NULL) in show_roles() 102 (void) printf("%s : ", username); in show_roles() [all...] |
/titanic_52/usr/src/cmd/vntsd/ |
H A D | auth.c | 110 * username The name of a user account to check authorization 118 auth_check_username(char *username, char *group_name) in auth_check_username() argument 125 if ((username == NULL) || (username[0] == '\0') || in auth_check_username() 137 auth_granted = chkauthattr(VNTSD_AUTH_ALLCONS, username); in auth_check_username() 141 auth_granted = chkauthattr(authname, username); in auth_check_username() 164 char *username = NULL; in auth_check_euid() local 176 username = passwdp->pw_name; in auth_check_euid() 179 return (auth_check_username(username, group_name)); in auth_check_euid()
|
/titanic_52/usr/src/cmd/keyserv/ |
H A D | newkey.c | 92 *username = NULL, *pk_service = NULL; in main() local 114 if (username || target_host) in main() 116 username = optarg; in main() 119 if (username || target_host) in main() 128 if (optind < argc || (username == 0 && target_host == 0)) { in main() 141 if (username) { in main() 142 pw = getpwnam(username); in main() 145 program_name, username); in main() 153 program_name, username); in main() 160 program_name, username); in main() 328 get_password(uid,target_host,username) get_password() argument [all...] |
/titanic_52/usr/src/lib/pam_modules/roles/ |
H A D | roles.c | 55 char *username; in pam_sm_acct_mgmt() local 66 (void) pam_get_item(pamh, PAM_USER, (void **)&username); in pam_sm_acct_mgmt() 91 allow_remote, (username) ? username : "not set", in pam_sm_acct_mgmt() 96 if (username == NULL) in pam_sm_acct_mgmt() 99 /* stop masquerades by mapping username to uid to username */ in pam_sm_acct_mgmt() 101 if ((pw_entry = getpwnam_r(username, &pwd, buf, sizeof (buf))) == NULL) in pam_sm_acct_mgmt() 121 /* username is a role */ in pam_sm_acct_mgmt() 123 if (strcmp(username, pw_entr in pam_sm_acct_mgmt() [all...] |
/titanic_52/usr/src/lib/smbsrv/libmlsvc/common/ |
H A D | smb_autohome.c | 80 char *username; in smb_autohome_add() local 93 username = token->tkn_account_name; in smb_autohome_add() 94 assert(username); in smb_autohome_add() 101 username = pw.pw_name; in smb_autohome_add() 104 if (smb_autohome_add_private(username, uid, gid) != NERR_Success) { in smb_autohome_add() 105 if (!smb_isstrlwr(username)) { in smb_autohome_add() 106 (void) smb_strlwr(username); in smb_autohome_add() 107 (void) smb_autohome_add_private(username, uid, gid); in smb_autohome_add() 116 smb_autohome_remove(const char *username) in smb_autohome_remove() argument 120 assert(username); in smb_autohome_remove() 139 smb_autohome_add_private(const char * username,uid_t uid,gid_t gid) smb_autohome_add_private() argument [all...] |
H A D | samr_clnt.c | 72 * If username argument is NULL, an anonymous connection will be established. 78 samr_open(char *server, char *domain, char *username, DWORD access_mask, in samr_open() argument 91 if (username == NULL) in samr_open() 92 username = MLSVC_ANON_USER; in samr_open() 94 status = samr_connect(server, domain, username, access_mask, in samr_open() 117 samr_connect(char *server, char *domain, char *username, DWORD access_mask, in samr_connect() argument 130 status = ndr_rpc_bind(samr_handle, server, domain, username, "SAMR"); in samr_connect() 135 status = (*samr_connop[i])(server, domain, username, in samr_connect() 158 samr_connect2(char *server, char *domain, char *username, DWORD access_mask, in samr_connect2() argument 198 samr_connect4(char *server, char *domain, char *username, DWOR argument 245 samr_connect5(char * server,char * domain,char * username,DWORD access_mask,mlsvc_handle_t * samr_handle) samr_connect5() argument 507 samr_create_user(mlsvc_handle_t * domain_handle,char * username,DWORD account_flags,DWORD * rid,mlsvc_handle_t * user_handle) samr_create_user() argument [all...] |
/titanic_52/usr/src/lib/passwdutil/ |
H A D | __failed_count.c | 31 __incr_failed_count(char *username, char *repname, int max_failures) in __incr_failed_count() argument 53 if ((ret = ops->getpwnam(username, items, NULL, &buf)) != PWU_SUCCESS) { in __incr_failed_count() 66 max_failures, username); in __incr_failed_count() 72 if (((ret = ops->putpwnam(username, NULL, NULL, buf)) == in __incr_failed_count() 90 __rst_failed_count(char *username, char *repname) in __rst_failed_count() argument 112 if ((ret = ops->getpwnam(username, items, NULL, &buf)) != PWU_SUCCESS) in __rst_failed_count() 116 ret = ops->putpwnam(username, NULL, NULL, buf); in __rst_failed_count()
|
/titanic_52/usr/src/lib/print/libhttp-core/common/ |
H A D | http-support.c | 68 char *username, /* O - Username [1024] */ in httpSeparate() argument 73 httpSeparate2(uri, method, 32, username, HTTP_MAX_URI, host, HTTP_MAX_URI, in httpSeparate() 87 char *username, /* O - Username */ in httpSeparate2() argument 88 int usernamelen, /* I - Size of username buffer */ in httpSeparate2() 104 if (uri == NULL || method == NULL || username == NULL || host == NULL || in httpSeparate2() 161 username[0] = '\0'; in httpSeparate2() 176 username[0] = '\0'; in httpSeparate2() 183 * Grab the username, if any... in httpSeparate2() 194 * Got a username:password combo... in httpSeparate2() 197 uri = http_copy_decode(username, ur in httpSeparate2() [all...] |
/titanic_52/usr/src/cmd/profiles/ |
H A D | profiles.c | 126 show_profs(char *username, int print_flag) in show_profs() argument 132 if (username == NULL) { in show_profs() 139 username = pw->pw_name; in show_profs() 140 } else if (getpwnam(username) == NULL) { in show_profs() 142 (void) fprintf(stderr, "%s: %s: ", progname, username); in show_profs() 148 exec = getexecuser(username, KV_COMMAND, NULL, in show_profs() 158 (void) _enum_profs(username, show_profs_callback, &print_flag, in show_profs() 166 (void) fprintf(stderr, "%s: %s: ", progname, username); in show_profs()
|
/titanic_52/usr/src/cmd/auths/ |
H A D | auths.c | 90 show_auths(char *username, int print_name) in show_auths() argument 97 if (username == NULL) { in show_auths() 104 username = pw->pw_name; in show_auths() 105 } else if (getpwnam(username) == NULL) { in show_auths() 107 (void) fprintf(stderr, "%s: %s : ", progname, username); in show_auths() 112 (void) _enum_auths(username, add_auth, NULL, &cbs); in show_auths() 118 (void) fprintf(stderr, "%s: %s: ", progname, username); in show_auths() 124 (void) printf("%s: ", username); in show_auths()
|
/titanic_52/usr/src/lib/libsecdb/common/ |
H A D | chkauthattr.c | 146 * Enumerate all attributes associated with a username and the profiles 150 _enum_common(const char *username, in _enum_common() argument 163 ua = getusernam(username); in _enum_common() 182 (kattrs = get_default_attrs(username)) != NULL) { in _enum_common() 204 * Enumerate profiles with a username argument. 207 _enum_profs(const char *username, in _enum_profs() argument 211 return (_enum_common(username, cb, ctxt, pres, B_FALSE)); in _enum_profs() 215 * Enumerate attributes with a username argument. 218 _enum_attrs(const char *username, in _enum_attrs() argument 222 return (_enum_common(username, c in _enum_attrs() 277 _enum_auths(const char * username,int (* cb)(const char *,void *,void *),void * ctxt,void * pres) _enum_auths() argument 383 chkauthattr(const char * authname,const char * username) chkauthattr() argument [all...] |
/titanic_52/usr/src/cmd/fs.d/ufs/repquota/ |
H A D | repquota.c | 63 struct username { struct 64 struct username *u_next; argument 69 static struct username *uhead[UHASH]; argument 71 static struct username *lookup(uid_t); 72 static struct username *adduid(uid_t); 290 struct username *up; in prquota() 385 static struct username * 389 struct username *up; in lookup() 395 return ((struct username *)0); in lookup() 405 static struct username * [all...] |
/titanic_52/usr/src/lib/smbsrv/libsmb/common/ |
H A D | smb_auth.c | 248 * The NTLM v2 hash will be created from the given NTLM hash, username, 256 char *username, in smb_auth_ntlmv2_hash() argument 265 if (username == NULL || ntdomain == NULL) in smb_auth_ntlmv2_hash() 268 (void) smb_strupr(username); in smb_auth_ntlmv2_hash() 270 data_len = strlen(username) + strlen(ntdomain); in smb_auth_ntlmv2_hash() 275 (void) snprintf((char *)buf, data_len + 1, "%s%s", username, ntdomain); in smb_auth_ntlmv2_hash() 382 char *username, in smb_ntlmv2_password_ok() argument 407 * - user's username, and in smb_ntlmv2_password_ok() 426 if (smb_auth_ntlmv2_hash(ntlm_hash, username, dest[i], in smb_ntlmv2_password_ok() 457 char *username) in smb_lmv2_password_ok() argument 521 smb_auth_validate(smb_passwd_t * smbpw,char * domain,char * username,unsigned char * challenge,uint_t clen,unsigned char * nt_resp,uint_t nt_len,unsigned char * lm_resp,uint_t lm_len,uchar_t * session_key) smb_auth_validate() argument [all...] |
/titanic_52/usr/src/lib/pam_modules/list/ |
H A D | list.c | 70 char *username = NULL; in pam_sm_acct_mgmt() local 166 (void) pam_get_item(pamh, PAM_USER, (void**)&username); in pam_sm_acct_mgmt() 168 if ((check_user || check_exact) && ((username == NULL) || in pam_sm_acct_mgmt() 169 (*username == '\0'))) { in pam_sm_acct_mgmt() 171 "pam_list: username not supplied, critical error"); in pam_sm_acct_mgmt() 191 (rhost != NULL) ? rhost : "", username); in pam_sm_acct_mgmt() 291 if (innetgr(bufp, rhost, username, in pam_sm_acct_mgmt() 298 userok = innetgr(bufp, NULL, username, in pam_sm_acct_mgmt() 316 if (strcmp(bufp, username) == 0) { in pam_sm_acct_mgmt()
|
/titanic_52/usr/src/cmd/ldap/common/ |
H A D | ldaptool-sasl.c | 32 char *username; member 41 ldaptool_set_sasl_defaults ( LDAP *ld, char *mech, char *authid, char *username, in ldaptool_set_sasl_defaults() argument 59 if (username) in ldaptool_set_sasl_defaults() 60 defaults->username = username; in ldaptool_set_sasl_defaults() 62 ldap_get_option(ld, LDAP_OPT_X_SASL_AUTHZID, &defaults->username); in ldaptool_set_sasl_defaults() 108 defvalue = defaults->username; in get_default()
|
/titanic_52/usr/src/lib/pam_modules/krb5/ |
H A D | krb5_setcred.c | 371 char *username = NULL; in krb5_renew_tgt() local 480 username = strdup(client_name); in krb5_renew_tgt() 481 if (username == NULL) { in krb5_renew_tgt() 487 if ((tmpname = strchr(username, '@'))) in krb5_renew_tgt() 490 if (get_pw_uid(username, &uuid) == 0 || in krb5_renew_tgt() 491 get_pw_gid(username, &ugid) == 0) { in krb5_renew_tgt() 495 username); in krb5_renew_tgt() 541 username); in krb5_renew_tgt() 550 username, filepath); in krb5_renew_tgt() 587 if (username) in krb5_renew_tgt() [all...] |
/titanic_52/usr/src/cmd/smbsrv/smbd/ |
H A D | smbd_logon.c | 91 char *username; in smbd_user_auth_logon() local 118 username = tmp_user.lg_e_username; in smbd_user_auth_logon() 127 username = token->tkn_account_name; in smbd_user_auth_logon() 169 event->adt_smbd_session.username = username; in smbd_user_auth_logon() 188 entry->sa_username = strdup(username); in smbd_user_auth_logon() 256 event->adt_smbd_logoff.username = entry->sa_username; in smbd_user_auth_logoff()
|
/titanic_52/usr/src/cmd/lp/model/netpr/ |
H A D | bsd_misc.c | 54 if ((injob->request_id == NULL) || (injob->username == NULL) || in create_bsd_job() 94 if ((id = strchr(injob->username, '@')) != NULL) { in create_bsd_job() 96 job->np_username = strdup(injob->username); in create_bsd_job() 99 } else if ((id = strrchr(injob->username, '!')) != NULL) { in create_bsd_job() 102 job->np_host = strdup(injob->username); in create_bsd_job() 106 injob->username); in create_bsd_job() 107 job->np_username = strdup(injob->username); in create_bsd_job()
|
/titanic_52/usr/src/cmd/cmd-inet/usr.sbin/kssl/ksslcfg/ |
H A D | ksslcfg_create.c | 57 "\t[-u <username>]\n" in usage_create() 301 const char *username, char *inaddr_any_name) in create_instance() argument 339 command, username) != SUCCESS) || in create_instance() 341 command, username) != SUCCESS) || in create_instance() 343 "", username) != SUCCESS)) { in create_instance() 377 const char *command, const char *username, char *inaddr_any_name) in create_service() argument 428 command, username, inaddr_any_name); in create_service() 458 const char *username = NULL; in do_create() local 499 username = optarg; in do_create() 616 if (username in do_create() [all...] |
/titanic_52/usr/src/cmd/ndmpadm/ |
H A D | ndmpadm_main.c | 117 const char *username; member 122 { "cram-md5", "cram-md5-username", "cram-md5-password" }, 123 { "cleartext", "cleartext-username", "cleartext-password" } 148 return ("\tenable <-a auth-type> <-u username>\n"); in get_usage() 561 char *auth_type, *username, *password; in ndmp_enable_auth() local 565 /* enable <-a auth-type> <-u username> */ in ndmp_enable_auth() 576 username = strdup(optarg); in ndmp_enable_auth() 590 if ((auth_type) && (username)) { in ndmp_enable_auth() 595 free(username); in ndmp_enable_auth() 600 "'auth-type'", "'username'"); in ndmp_enable_auth() [all...] |
/titanic_52/usr/src/uts/common/fs/smbclnt/netsmb/ |
H A D | smb_pass.c | 106 * uid/zoneid/username/domainname. 118 * The nodes are added sorted on the uid/zoneid/domainname/username in smb_pkey_cmp() 139 duser = u8_strcmp(pa->username, pb->username, 0, in smb_pkey_cmp() 196 strfree(tmp->username); in smb_pkey_delete() 222 tmp->username = pk->pk_usr; in smb_pkey_del() 295 cpid->username = strdup(pk->pk_usr); in smb_pkey_add() 317 strfree(cpid->username); in smb_pkey_add() 349 cpid->username = pk->pk_usr; in smb_pkey_check()
|
/titanic_52/usr/src/cmd/sgs/error/common/ |
H A D | errorfilter.c | 62 char *username; in getignored() local 67 if ((username = (char *)getlogin()) == NULL) { in getignored() 68 username = "Unknown"; in getignored() 74 if ((passwdentry = getpwnam(username)) == NULL) in getignored()
|
/titanic_52/usr/src/lib/sasl_plugins/login/ |
H A D | login.c | 79 char *username; member 131 /* demand username */ in login_server_mech_step() 145 "username too long (>1024 characters)"); in login_server_mech_step() 147 SETERROR(params->utils, "username too long (>1024 characters)"); in login_server_mech_step() 152 /* get username */ in login_server_mech_step() 153 text->username = in login_server_mech_step() 155 if (!text->username) { in login_server_mech_step() 160 strncpy(text->username, clientin, clientinlen); in login_server_mech_step() 162 text->username[clientinlen] = '\0'; in login_server_mech_step() 201 /* canonicalize username firs in login_server_mech_step() [all...] |
/titanic_52/usr/src/cmd/cron/ |
H A D | permit.c | 95 within(username, filename) in within() argument 96 char *username, *filename; in within() 110 if (strcmp(line, username) == 0) {
|
/titanic_52/usr/src/lib/nsswitch/ldap/common/ |
H A D | getgrent.c | 45 * Group membership can be defined by either username or DN, so when searching 47 * filter is replaced by username, the second by DN. 160 * a DN, otherwise as a username. in _nss_ldap_group2str() 164 /* Fail if we can't pull a username out of the RDN */ in _nss_ldap_group2str() 277 * (const char *)argp->username; (size_t)strlen(argp->username); 296 char *username, **dn_attr, *dn; in getbymember() local 300 if (strcmp(argp->username, "") == 0 || in getbymember() 301 strcmp(argp->username, "root") == 0) in getbymember() 304 if (_ldap_filter_name(name, argp->username, sizeo in getbymember() [all...] |