Home
last modified time | relevance | path

Searched refs:username (Results 1 – 25 of 102) sorted by relevance

12345

/titanic_52/usr/src/cmd/roles/
H A Droles.c73 show_roles(char *username, int print_name) in show_roles() argument
79 if (username == NULL) { in show_roles()
85 username = pw->pw_name; in show_roles()
86 } else if (getpwnam(username) == NULL) { in show_roles()
87 (void) fprintf(stderr, "%s: %s : ", progname, username); in show_roles()
92 if ((user = getusernam(username)) != NULL) { in show_roles()
96 if (print_name && username != NULL) in show_roles()
97 (void) printf("%s : ", username); in show_roles()
101 if (print_name && username != NULL) in show_roles()
102 (void) printf("%s : ", username); in show_roles()
[all...]
/titanic_52/usr/src/cmd/vntsd/
H A Dauth.c110 * username The name of a user account to check authorization
118 auth_check_username(char *username, char *group_name) in auth_check_username() argument
125 if ((username == NULL) || (username[0] == '\0') || in auth_check_username()
137 auth_granted = chkauthattr(VNTSD_AUTH_ALLCONS, username); in auth_check_username()
141 auth_granted = chkauthattr(authname, username); in auth_check_username()
164 char *username = NULL; in auth_check_euid() local
176 username = passwdp->pw_name; in auth_check_euid()
179 return (auth_check_username(username, group_name)); in auth_check_euid()
/titanic_52/usr/src/cmd/keyserv/
H A Dnewkey.c92 *username = NULL, *pk_service = NULL; in main() local
114 if (username || target_host) in main()
116 username = optarg; in main()
119 if (username || target_host) in main()
128 if (optind < argc || (username == 0 && target_host == 0)) { in main()
141 if (username) { in main()
142 pw = getpwnam(username); in main()
145 program_name, username); in main()
153 program_name, username); in main()
160 program_name, username); in main()
328 get_password(uid,target_host,username) get_password() argument
[all...]
/titanic_52/usr/src/lib/pam_modules/roles/
H A Droles.c55 char *username; in pam_sm_acct_mgmt() local
66 (void) pam_get_item(pamh, PAM_USER, (void **)&username); in pam_sm_acct_mgmt()
91 allow_remote, (username) ? username : "not set", in pam_sm_acct_mgmt()
96 if (username == NULL) in pam_sm_acct_mgmt()
99 /* stop masquerades by mapping username to uid to username */ in pam_sm_acct_mgmt()
101 if ((pw_entry = getpwnam_r(username, &pwd, buf, sizeof (buf))) == NULL) in pam_sm_acct_mgmt()
121 /* username is a role */ in pam_sm_acct_mgmt()
123 if (strcmp(username, pw_entr in pam_sm_acct_mgmt()
[all...]
/titanic_52/usr/src/lib/smbsrv/libmlsvc/common/
H A Dsmb_autohome.c80 char *username; in smb_autohome_add() local
93 username = token->tkn_account_name; in smb_autohome_add()
94 assert(username); in smb_autohome_add()
101 username = pw.pw_name; in smb_autohome_add()
104 if (smb_autohome_add_private(username, uid, gid) != NERR_Success) { in smb_autohome_add()
105 if (!smb_isstrlwr(username)) { in smb_autohome_add()
106 (void) smb_strlwr(username); in smb_autohome_add()
107 (void) smb_autohome_add_private(username, uid, gid); in smb_autohome_add()
116 smb_autohome_remove(const char *username) in smb_autohome_remove() argument
120 assert(username); in smb_autohome_remove()
139 smb_autohome_add_private(const char * username,uid_t uid,gid_t gid) smb_autohome_add_private() argument
[all...]
H A Dsamr_clnt.c72 * If username argument is NULL, an anonymous connection will be established.
78 samr_open(char *server, char *domain, char *username, DWORD access_mask, in samr_open() argument
91 if (username == NULL) in samr_open()
92 username = MLSVC_ANON_USER; in samr_open()
94 status = samr_connect(server, domain, username, access_mask, in samr_open()
117 samr_connect(char *server, char *domain, char *username, DWORD access_mask, in samr_connect() argument
130 status = ndr_rpc_bind(samr_handle, server, domain, username, "SAMR"); in samr_connect()
135 status = (*samr_connop[i])(server, domain, username, in samr_connect()
158 samr_connect2(char *server, char *domain, char *username, DWORD access_mask, in samr_connect2() argument
198 samr_connect4(char *server, char *domain, char *username, DWOR argument
245 samr_connect5(char * server,char * domain,char * username,DWORD access_mask,mlsvc_handle_t * samr_handle) samr_connect5() argument
507 samr_create_user(mlsvc_handle_t * domain_handle,char * username,DWORD account_flags,DWORD * rid,mlsvc_handle_t * user_handle) samr_create_user() argument
[all...]
/titanic_52/usr/src/lib/passwdutil/
H A D__failed_count.c31 __incr_failed_count(char *username, char *repname, int max_failures) in __incr_failed_count() argument
53 if ((ret = ops->getpwnam(username, items, NULL, &buf)) != PWU_SUCCESS) { in __incr_failed_count()
66 max_failures, username); in __incr_failed_count()
72 if (((ret = ops->putpwnam(username, NULL, NULL, buf)) == in __incr_failed_count()
90 __rst_failed_count(char *username, char *repname) in __rst_failed_count() argument
112 if ((ret = ops->getpwnam(username, items, NULL, &buf)) != PWU_SUCCESS) in __rst_failed_count()
116 ret = ops->putpwnam(username, NULL, NULL, buf); in __rst_failed_count()
/titanic_52/usr/src/lib/print/libhttp-core/common/
H A Dhttp-support.c68 char *username, /* O - Username [1024] */ in httpSeparate() argument
73 httpSeparate2(uri, method, 32, username, HTTP_MAX_URI, host, HTTP_MAX_URI, in httpSeparate()
87 char *username, /* O - Username */ in httpSeparate2() argument
88 int usernamelen, /* I - Size of username buffer */ in httpSeparate2()
104 if (uri == NULL || method == NULL || username == NULL || host == NULL || in httpSeparate2()
161 username[0] = '\0'; in httpSeparate2()
176 username[0] = '\0'; in httpSeparate2()
183 * Grab the username, if any... in httpSeparate2()
194 * Got a username:password combo... in httpSeparate2()
197 uri = http_copy_decode(username, ur in httpSeparate2()
[all...]
/titanic_52/usr/src/cmd/profiles/
H A Dprofiles.c126 show_profs(char *username, int print_flag) in show_profs() argument
132 if (username == NULL) { in show_profs()
139 username = pw->pw_name; in show_profs()
140 } else if (getpwnam(username) == NULL) { in show_profs()
142 (void) fprintf(stderr, "%s: %s: ", progname, username); in show_profs()
148 exec = getexecuser(username, KV_COMMAND, NULL, in show_profs()
158 (void) _enum_profs(username, show_profs_callback, &print_flag, in show_profs()
166 (void) fprintf(stderr, "%s: %s: ", progname, username); in show_profs()
/titanic_52/usr/src/cmd/auths/
H A Dauths.c90 show_auths(char *username, int print_name) in show_auths() argument
97 if (username == NULL) { in show_auths()
104 username = pw->pw_name; in show_auths()
105 } else if (getpwnam(username) == NULL) { in show_auths()
107 (void) fprintf(stderr, "%s: %s : ", progname, username); in show_auths()
112 (void) _enum_auths(username, add_auth, NULL, &cbs); in show_auths()
118 (void) fprintf(stderr, "%s: %s: ", progname, username); in show_auths()
124 (void) printf("%s: ", username); in show_auths()
/titanic_52/usr/src/lib/libsecdb/common/
H A Dchkauthattr.c146 * Enumerate all attributes associated with a username and the profiles
150 _enum_common(const char *username, in _enum_common() argument
163 ua = getusernam(username); in _enum_common()
182 (kattrs = get_default_attrs(username)) != NULL) { in _enum_common()
204 * Enumerate profiles with a username argument.
207 _enum_profs(const char *username, in _enum_profs() argument
211 return (_enum_common(username, cb, ctxt, pres, B_FALSE)); in _enum_profs()
215 * Enumerate attributes with a username argument.
218 _enum_attrs(const char *username, in _enum_attrs() argument
222 return (_enum_common(username, c in _enum_attrs()
277 _enum_auths(const char * username,int (* cb)(const char *,void *,void *),void * ctxt,void * pres) _enum_auths() argument
383 chkauthattr(const char * authname,const char * username) chkauthattr() argument
[all...]
/titanic_52/usr/src/cmd/fs.d/ufs/repquota/
H A Drepquota.c63 struct username { struct
64 struct username *u_next; argument
69 static struct username *uhead[UHASH]; argument
71 static struct username *lookup(uid_t);
72 static struct username *adduid(uid_t);
290 struct username *up; in prquota()
385 static struct username *
389 struct username *up; in lookup()
395 return ((struct username *)0); in lookup()
405 static struct username *
[all...]
/titanic_52/usr/src/lib/smbsrv/libsmb/common/
H A Dsmb_auth.c248 * The NTLM v2 hash will be created from the given NTLM hash, username,
256 char *username, in smb_auth_ntlmv2_hash() argument
265 if (username == NULL || ntdomain == NULL) in smb_auth_ntlmv2_hash()
268 (void) smb_strupr(username); in smb_auth_ntlmv2_hash()
270 data_len = strlen(username) + strlen(ntdomain); in smb_auth_ntlmv2_hash()
275 (void) snprintf((char *)buf, data_len + 1, "%s%s", username, ntdomain); in smb_auth_ntlmv2_hash()
382 char *username, in smb_ntlmv2_password_ok() argument
407 * - user's username, and in smb_ntlmv2_password_ok()
426 if (smb_auth_ntlmv2_hash(ntlm_hash, username, dest[i], in smb_ntlmv2_password_ok()
457 char *username) in smb_lmv2_password_ok() argument
521 smb_auth_validate(smb_passwd_t * smbpw,char * domain,char * username,unsigned char * challenge,uint_t clen,unsigned char * nt_resp,uint_t nt_len,unsigned char * lm_resp,uint_t lm_len,uchar_t * session_key) smb_auth_validate() argument
[all...]
/titanic_52/usr/src/lib/pam_modules/list/
H A Dlist.c70 char *username = NULL; in pam_sm_acct_mgmt() local
166 (void) pam_get_item(pamh, PAM_USER, (void**)&username); in pam_sm_acct_mgmt()
168 if ((check_user || check_exact) && ((username == NULL) || in pam_sm_acct_mgmt()
169 (*username == '\0'))) { in pam_sm_acct_mgmt()
171 "pam_list: username not supplied, critical error"); in pam_sm_acct_mgmt()
191 (rhost != NULL) ? rhost : "", username); in pam_sm_acct_mgmt()
291 if (innetgr(bufp, rhost, username, in pam_sm_acct_mgmt()
298 userok = innetgr(bufp, NULL, username, in pam_sm_acct_mgmt()
316 if (strcmp(bufp, username) == 0) { in pam_sm_acct_mgmt()
/titanic_52/usr/src/cmd/ldap/common/
H A Dldaptool-sasl.c32 char *username; member
41 ldaptool_set_sasl_defaults ( LDAP *ld, char *mech, char *authid, char *username, in ldaptool_set_sasl_defaults() argument
59 if (username) in ldaptool_set_sasl_defaults()
60 defaults->username = username; in ldaptool_set_sasl_defaults()
62 ldap_get_option(ld, LDAP_OPT_X_SASL_AUTHZID, &defaults->username); in ldaptool_set_sasl_defaults()
108 defvalue = defaults->username; in get_default()
/titanic_52/usr/src/lib/pam_modules/krb5/
H A Dkrb5_setcred.c371 char *username = NULL; in krb5_renew_tgt() local
480 username = strdup(client_name); in krb5_renew_tgt()
481 if (username == NULL) { in krb5_renew_tgt()
487 if ((tmpname = strchr(username, '@'))) in krb5_renew_tgt()
490 if (get_pw_uid(username, &uuid) == 0 || in krb5_renew_tgt()
491 get_pw_gid(username, &ugid) == 0) { in krb5_renew_tgt()
495 username); in krb5_renew_tgt()
541 username); in krb5_renew_tgt()
550 username, filepath); in krb5_renew_tgt()
587 if (username) in krb5_renew_tgt()
[all...]
/titanic_52/usr/src/cmd/smbsrv/smbd/
H A Dsmbd_logon.c91 char *username; in smbd_user_auth_logon() local
118 username = tmp_user.lg_e_username; in smbd_user_auth_logon()
127 username = token->tkn_account_name; in smbd_user_auth_logon()
169 event->adt_smbd_session.username = username; in smbd_user_auth_logon()
188 entry->sa_username = strdup(username); in smbd_user_auth_logon()
256 event->adt_smbd_logoff.username = entry->sa_username; in smbd_user_auth_logoff()
/titanic_52/usr/src/cmd/lp/model/netpr/
H A Dbsd_misc.c54 if ((injob->request_id == NULL) || (injob->username == NULL) || in create_bsd_job()
94 if ((id = strchr(injob->username, '@')) != NULL) { in create_bsd_job()
96 job->np_username = strdup(injob->username); in create_bsd_job()
99 } else if ((id = strrchr(injob->username, '!')) != NULL) { in create_bsd_job()
102 job->np_host = strdup(injob->username); in create_bsd_job()
106 injob->username); in create_bsd_job()
107 job->np_username = strdup(injob->username); in create_bsd_job()
/titanic_52/usr/src/cmd/cmd-inet/usr.sbin/kssl/ksslcfg/
H A Dksslcfg_create.c57 "\t[-u <username>]\n" in usage_create()
301 const char *username, char *inaddr_any_name) in create_instance() argument
339 command, username) != SUCCESS) || in create_instance()
341 command, username) != SUCCESS) || in create_instance()
343 "", username) != SUCCESS)) { in create_instance()
377 const char *command, const char *username, char *inaddr_any_name) in create_service() argument
428 command, username, inaddr_any_name); in create_service()
458 const char *username = NULL; in do_create() local
499 username = optarg; in do_create()
616 if (username in do_create()
[all...]
/titanic_52/usr/src/cmd/ndmpadm/
H A Dndmpadm_main.c117 const char *username; member
122 { "cram-md5", "cram-md5-username", "cram-md5-password" },
123 { "cleartext", "cleartext-username", "cleartext-password" }
148 return ("\tenable <-a auth-type> <-u username>\n"); in get_usage()
561 char *auth_type, *username, *password; in ndmp_enable_auth() local
565 /* enable <-a auth-type> <-u username> */ in ndmp_enable_auth()
576 username = strdup(optarg); in ndmp_enable_auth()
590 if ((auth_type) && (username)) { in ndmp_enable_auth()
595 free(username); in ndmp_enable_auth()
600 "'auth-type'", "'username'"); in ndmp_enable_auth()
[all...]
/titanic_52/usr/src/uts/common/fs/smbclnt/netsmb/
H A Dsmb_pass.c106 * uid/zoneid/username/domainname.
118 * The nodes are added sorted on the uid/zoneid/domainname/username in smb_pkey_cmp()
139 duser = u8_strcmp(pa->username, pb->username, 0, in smb_pkey_cmp()
196 strfree(tmp->username); in smb_pkey_delete()
222 tmp->username = pk->pk_usr; in smb_pkey_del()
295 cpid->username = strdup(pk->pk_usr); in smb_pkey_add()
317 strfree(cpid->username); in smb_pkey_add()
349 cpid->username = pk->pk_usr; in smb_pkey_check()
/titanic_52/usr/src/cmd/sgs/error/common/
H A Derrorfilter.c62 char *username; in getignored() local
67 if ((username = (char *)getlogin()) == NULL) { in getignored()
68 username = "Unknown"; in getignored()
74 if ((passwdentry = getpwnam(username)) == NULL) in getignored()
/titanic_52/usr/src/lib/sasl_plugins/login/
H A Dlogin.c79 char *username; member
131 /* demand username */ in login_server_mech_step()
145 "username too long (>1024 characters)"); in login_server_mech_step()
147 SETERROR(params->utils, "username too long (>1024 characters)"); in login_server_mech_step()
152 /* get username */ in login_server_mech_step()
153 text->username = in login_server_mech_step()
155 if (!text->username) { in login_server_mech_step()
160 strncpy(text->username, clientin, clientinlen); in login_server_mech_step()
162 text->username[clientinlen] = '\0'; in login_server_mech_step()
201 /* canonicalize username firs in login_server_mech_step()
[all...]
/titanic_52/usr/src/cmd/cron/
H A Dpermit.c95 within(username, filename) in within() argument
96 char *username, *filename; in within()
110 if (strcmp(line, username) == 0) {
/titanic_52/usr/src/lib/nsswitch/ldap/common/
H A Dgetgrent.c45 * Group membership can be defined by either username or DN, so when searching
47 * filter is replaced by username, the second by DN.
160 * a DN, otherwise as a username. in _nss_ldap_group2str()
164 /* Fail if we can't pull a username out of the RDN */ in _nss_ldap_group2str()
277 * (const char *)argp->username; (size_t)strlen(argp->username);
296 char *username, **dn_attr, *dn; in getbymember() local
300 if (strcmp(argp->username, "") == 0 || in getbymember()
301 strcmp(argp->username, "root") == 0) in getbymember()
304 if (_ldap_filter_name(name, argp->username, sizeo in getbymember()
[all...]

12345