Home
last modified time | relevance | path

Searched refs:login (Results 1 – 25 of 279) sorted by relevance

12345678910>>...12

/netbsd/external/cddl/dtracetoolkit/dist/Examples/
H A Dsetuids_example.txt6 0 100 3037 3040 in.telnetd login -p -h mars -d /dev/pts/12
10 0 100 3065 3067 in.rlogind login -d /dev/pts/12 -r mars
11 0 100 3071 3073 in.rlogind login -d /dev/pts/12 -r mars
12 0 102 3078 3081 in.telnetd login -p -h mars -d /dev/pts/12
15 The first line is a telnet login to the user brendan, UID 100. The parent
17 command that in.telnetd runs is "login".
23 The fourth line is an example of an ssh login.
27 The last line is another example of a telnet login for fred, UID 102.
/netbsd/external/cddl/dtracetoolkit/dist/Docs/Examples/
H A Dsetuids_example.txt6 0 100 3037 3040 in.telnetd login -p -h mars -d /dev/pts/12
10 0 100 3065 3067 in.rlogind login -d /dev/pts/12 -r mars
11 0 100 3071 3073 in.rlogind login -d /dev/pts/12 -r mars
12 0 102 3078 3081 in.telnetd login -p -h mars -d /dev/pts/12
15 The first line is a telnet login to the user brendan, UID 100. The parent
17 command that in.telnetd runs is "login".
23 The fourth line is an example of an ssh login.
27 The last line is another example of a telnet login for fred, UID 102.
/netbsd/etc/pam.d/
H A Dtelnetd7 # telnetd invokes login(1), which uses the "login" service.
15 account include login
18 session include login
21 password include login
H A Dlogin1 # $NetBSD: login,v 1.4 2005/02/27 03:40:14 thorpej Exp $
3 # PAM configuration for the "login" service
/netbsd/crypto/external/bsd/openssl/dist/apps/lib/
H A Dtlssrp_depr.c163 if (p->login == NULL && p->user == NULL) { in ssl_srp_server_param_cb()
164 p->login = SSL_get_srp_username(s); in ssl_srp_server_param_cb()
165 BIO_printf(bio_err, "SRP username = \"%s\"\n", p->login); in ssl_srp_server_param_cb()
170 BIO_printf(bio_err, "User %s doesn't exist\n", p->login); in ssl_srp_server_param_cb()
182 p->login, p->user->info); in ssl_srp_server_param_cb()
188 p->login = NULL; in ssl_srp_server_param_cb()
199 srp_callback_parm->login = NULL; in set_up_srp_verifier_file()
224 srp_callback_parm->login); in lookup_srp_user()
/netbsd/bin/sh/funcs/
H A Dlogin1 # $NetBSD: login,v 1.8 2016/02/29 23:50:59 christos Exp $
29 # @(#)login 8.2 (Berkeley) 5/4/95
31 # replaces the login builtin in the BSD shell
32 login () exec login "$@"
/netbsd/usr.bin/write/
H A Dwrite.c218 const char *login; in do_write() local
225 if ((login = getlogin()) == NULL) { in do_write()
227 login = pwd->pw_name; in do_write()
228 else login = "???"; in do_write()
247 login, host, mytty, nows + 11); in do_write()
/netbsd/crypto/external/bsd/openssl.old/dist/ssl/
H A Dtls_srp.c26 OPENSSL_free(ctx->srp_ctx.login); in SSL_CTX_SRP_CTX_free()
45 OPENSSL_free(s->srp_ctx.login); in SSL_SRP_CTX_free()
101 if ((ctx->srp_ctx.login != NULL) && in SSL_SRP_CTX_init()
102 ((s->srp_ctx.login = OPENSSL_strdup(ctx->srp_ctx.login)) == NULL)) { in SSL_SRP_CTX_init()
115 OPENSSL_free(s->srp_ctx.login); in SSL_SRP_CTX_init()
305 if ((x = SRP_Calc_x(s->srp_ctx.s, s->srp_ctx.login, passwd)) == NULL in srp_generate_client_master_secret()
399 if (s->srp_ctx.login != NULL) in SSL_get_srp_username()
400 return s->srp_ctx.login; in SSL_get_srp_username()
401 return s->ctx->srp_ctx.login; in SSL_get_srp_username()
/netbsd/external/bsd/libbind/dist/irs/
H A Dgetpwent_r.c55 __posix_getpwnam_r(const char *login, struct passwd *pwptr, argument
59 getpwnam_r(const char *login, struct passwd *pwptr,
62 struct passwd *pw = getpwnam(login);
77 getpwnam_r(const char *login, struct passwd *pwptr, char *buf, int buflen) { argument
78 struct passwd *pw = getpwnam(login);
/netbsd/external/gpl2/rcs/dist/src/
H A Drcs.c234 char const *login; member
708 getchaccess(login, command) in getchaccess() argument
709 char const *login; in getchaccess()
715 pt->login = login;
982 if (!ch->login) { in doaccess()
989 if (strcmp(ch->login, t->login) == 0) { in doaccess()
999 t->login = ch->login; in doaccess()
1003 } else if (strcmp(ch->login, t->login) == 0) in doaccess()
1095 strcmp(getcaller(),next->login) != 0
1096 && !sendmail(num, next->login)
[all …]
H A Drlog.c164 char const * login; /* lockerlist */ member
174 char const * login; /* stored in authorlist */ member
406 aprintf(out, symbolFormat, currlock->login,
416 aprintf(out, accessFormat, curaccess->login);
763 newlocker->login = argv;
791 authorlist->login = getusername(false);
799 newauthor->login = argv;
861 if (strcmp(plocker->login, p->login) == 0) { in trunclocks()
970 while (strcmp(pauthor->login, pdelta->author) != 0)
/netbsd/external/gpl3/gcc.old/dist/libgfortran/intrinsics/
H A Dgetlog.c71 PREFIX(getlog) (char * login, gfc_charlen_type login_len) in PREFIX()
75 memset (login, ' ', login_len); /* Blank the string. */ in PREFIX()
112 memcpy (login, p, p_len); in PREFIX()
/netbsd/external/gpl3/gcc/dist/libgfortran/intrinsics/
H A Dgetlog.c71 PREFIX(getlog) (char * login, gfc_charlen_type login_len) in PREFIX()
75 memset (login, ' ', login_len); /* Blank the string. */ in PREFIX()
112 memcpy (login, p, p_len); in PREFIX()
/netbsd/crypto/external/bsd/openssl/dist/ssl/
H A Dtls_srp.c36 OPENSSL_free(ctx->srp_ctx.login); in ssl_ctx_srp_ctx_free_intern()
64 OPENSSL_free(s->srp_ctx.login); in ssl_srp_ctx_free_intern()
129 if ((ctx->srp_ctx.login != NULL) && in ssl_srp_ctx_init_intern()
130 ((s->srp_ctx.login = OPENSSL_strdup(ctx->srp_ctx.login)) == NULL)) { in ssl_srp_ctx_init_intern()
143 OPENSSL_free(s->srp_ctx.login); in ssl_srp_ctx_init_intern()
355 if ((x = SRP_Calc_x_ex(s->srp_ctx.s, s->srp_ctx.login, passwd, in srp_generate_client_master_secret()
455 if (s->srp_ctx.login != NULL) in SSL_get_srp_username()
456 return s->srp_ctx.login; in SSL_get_srp_username()
457 return s->ctx->srp_ctx.login; in SSL_get_srp_username()
/netbsd/tests/usr.bin/id/
H A Dpwgr.c150 getpwnam(const char *login) in getpwnam() argument
155 if (strcmp(login, "root") == 0) { in getpwnam()
159 } else if (strcmp(login, "test") == 0) { in getpwnam()
/netbsd/etc/
H A Dcsh.login1 # $NetBSD: csh.login,v 1.2 1996/05/08 17:19:28 thorpej Exp $
3 # System-wide .login file for csh(1).
/netbsd/crypto/dist/ipsec-tools/src/racoon/
H A Disakmp_xauth.c267 iph1->mode_cfg->login[LOGINLEN] = '\0';
1572 iph1->rmconf->xauth->login->v,
1573 iph1->rmconf->xauth->login->l - 1);
1582 iph1->rmconf->xauth->login->v);
1803 (*xauth_rmconf)->login = NULL;
1816 if ((*xauth_rmconf)->login != NULL)
1817 vfree((*xauth_rmconf)->login);
1844 if (xauth_rmconf->login != NULL) {
1845 new->login = vdup(xauth_rmconf->login);
1846 if (new->login == NULL) {
[all …]
/netbsd/lib/libutil/compat/
H A Dcompat_login.c56 __warn_references(login,
60 login(const struct utmp50 *ut50) in login() function
/netbsd/lib/librmt/
H A Drmtlib.c255 char login[BUFMAGIC]; in _rmt_open() local
263 user = login; in _rmt_open()
295 (void)strlcpy(user, host, sizeof(login)); in _rmt_open()
325 READ(i) = WRITE(i) = _rmt_rexec(host, login); in _rmt_open()
357 if (*login) { in _rmt_open()
358 execl(rshpath, rsh, host, "-l", login, _PATH_RMT, NULL); in _rmt_open()
/netbsd/crypto/external/bsd/heimdal/dist/cf/
H A Dtelnet.m467 /* Used with login -p */
70 /* set this to a sensible login */
72 #define LOGIN_PATH BINDIR "/login"
/netbsd/etc/skel/
H A Ddot.login1 # $NetBSD: dot.login,v 1.4 2016/03/08 09:51:15 mlelstv Exp $
3 # This is the default .login file.
/netbsd/crypto/dist/ipsec-tools/src/racoon/samples/roadwarrior/
H A DREADME4 authenticates to the VPN gateway using a login and a password.
7 the client. After a successful login, the client will receive an
51 Where username is your login, and vpn-gateway.example.net is
58 where username is your login.
/netbsd/crypto/external/bsd/heimdal/dist/doc/
H A Dmisc.texi11 you login (boring), and by using Kerberos authenticated telnet to access
22 aaa authentication login default krb5-telnet krb5 enable
35 specify the `login default' authentication mechanism, you might not be
36 able to login at all. The `instance map' and `authorization exec' lines
/netbsd/crypto/external/bsd/libsaslc/dist/ref/
H A Drfc2245.txt32 password. As plaintext login commands are not permitted in new IETF
33 protocols, a new way to provide anonymous login is needed within the
86 Here is a sample anonymous login between an IMAP client and server.
164 Protocols which fail to require an explicit anonymous login are more
166 techniques. Specifically, Unix servers which offer user login may
176 after an explicit login command. Normally such servers refuse all
177 data access commands prior to explicit login and may enter a
183 anonymous data access without an explicit login step.
/netbsd/usr.bin/id/
H A Did.c181 char *login; in pretty() local
188 if ((login = getlogin()) == NULL) in pretty()
192 if (pw == NULL || strcmp(login, pw->pw_name)) in pretty()
193 (void)printf("login\t%s\n", login); in pretty()

12345678910>>...12