/dragonfly/libexec/telnetd/ |
H A D | telnetd.c | 117 char user_name[256]; variable 682 *user_name = 0; in doit() 683 level = getterminaltype(user_name); in doit() 903 startslave(host, level, user_name); in telnet()
|
/dragonfly/contrib/wpa_supplicant/src/radius/ |
H A D | radius_das.h | 31 const u8 *user_name; member
|
H A D | radius_das.c | 125 attrs.user_name = buf; in radius_das_disconnect() 290 attrs.user_name = buf; in radius_das_coa()
|
/dragonfly/contrib/cvs-1.12/lib/ |
H A D | glob.c | 612 const char *user_name; local 616 user_name = dirname + 1; 623 user_name = newp; 643 while (getpwnam_r (user_name, &pwbuf, pwtmpbuf, buflen, &p) != 0) 659 p = getpwnam (user_name);
|
/dragonfly/usr.sbin/ppp/ |
H A D | radius.h | 70 char user_name[AUTHLEN]; /* Session User-Name */ member
|
H A D | radius.c | 931 strncpy(ac->user_name, dl->peer.authname, sizeof ac->user_name); in radius_Account() 932 ac->user_name[AUTHLEN-1] = '\0'; in radius_Account() 951 if (rad_put_string(r->cx.rad, RAD_USER_NAME, ac->user_name) != 0 || in radius_Account()
|
/dragonfly/contrib/wpa_supplicant/src/eap_server/ |
H A D | eap_server_ttls.c | 161 u8 *user_name; member 256 parse->user_name = dpos; in eap_ttls_avp_parse() 1044 if (parse.user_name) { in eap_ttls_process_phase2() 1049 parse.user_name, in eap_ttls_process_phase2() 1056 sm->identity = os_memdup(parse.user_name, parse.user_name_len); in eap_ttls_process_phase2() 1062 if (eap_user_get(sm, parse.user_name, parse.user_name_len, 1) in eap_ttls_process_phase2()
|
/dragonfly/lib/libalias/ |
H A D | alias_cuseeme.c | 58 char user_name[20]; member
|
/dragonfly/contrib/gdb-7/gdb/ |
H A D | tracepoint.h | 127 char *user_name; member
|
H A D | tracepoint.c | 2050 if (ts->user_name && strlen (ts->user_name) > 0) in trace_status_command() 2051 printf_filtered (_("Trace user is %s.\n"), ts->user_name); in trace_status_command() 2196 ui_out_field_string (uiout, "user-name", ts->user_name); in trace_status_mi() 3907 xfree (ts->user_name); in parse_trace_status() 3908 ts->user_name = NULL; in parse_trace_status() 4023 ts->user_name = xmalloc (strlen (p) / 2); in parse_trace_status() 4024 end = hex2bin (p1, ts->user_name, (p3 - p1) / 2); in parse_trace_status() 4025 ts->user_name[end] = '\0'; in parse_trace_status()
|
/dragonfly/contrib/wpa_supplicant/src/ap/ |
H A D | pmksa_cache_auth.c | 582 if (attr->user_name) { in das_attr_match() 585 os_memcmp(attr->user_name, entry->identity, in das_attr_match()
|
H A D | hostapd.c | 887 if (attr->user_name) { in hostapd_das_find_sta() 901 os_memcmp(identity, attr->user_name, identity_len) in hostapd_das_find_sta()
|
/dragonfly/contrib/tcsh-6/ |
H A D | tw.parse.c | 1624 Char *user_name; in t_search() local 1736 user_name = word->s + 1; in t_search() 1741 user_name = word->s; in t_search() 1747 if (command == SPELL && xgetpwnam(short2str(user_name)) != NULL) { in t_search() 1755 target = name = Strsave(user_name); in t_search()
|
/dragonfly/contrib/cvs-1.12/contrib/ |
H A D | cvs_acls.in | 714 print("**** Access denied: Insufficient authority for user: '$user_name\' " . 934 $user_name, $commitfile, $branch{$commitfile};
|
/dragonfly/nrelease/gui/root/.irssi/ |
H A D | config | 185 user_name = "LiveDVD";
|