/netbsd/external/cddl/dtracetoolkit/dist/Examples/ |
H A D | setuids_example.txt | 6 0 100 3037 3040 in.telnetd login -p -h mars -d /dev/pts/12 10 0 100 3065 3067 in.rlogind login -d /dev/pts/12 -r mars 11 0 100 3071 3073 in.rlogind login -d /dev/pts/12 -r mars 12 0 102 3078 3081 in.telnetd login -p -h mars -d /dev/pts/12 15 The first line is a telnet login to the user brendan, UID 100. The parent 17 command that in.telnetd runs is "login". 23 The fourth line is an example of an ssh login. 27 The last line is another example of a telnet login for fred, UID 102.
|
/netbsd/external/cddl/dtracetoolkit/dist/Docs/Examples/ |
H A D | setuids_example.txt | 6 0 100 3037 3040 in.telnetd login -p -h mars -d /dev/pts/12 10 0 100 3065 3067 in.rlogind login -d /dev/pts/12 -r mars 11 0 100 3071 3073 in.rlogind login -d /dev/pts/12 -r mars 12 0 102 3078 3081 in.telnetd login -p -h mars -d /dev/pts/12 15 The first line is a telnet login to the user brendan, UID 100. The parent 17 command that in.telnetd runs is "login". 23 The fourth line is an example of an ssh login. 27 The last line is another example of a telnet login for fred, UID 102.
|
/netbsd/etc/pam.d/ |
H A D | telnetd | 7 # telnetd invokes login(1), which uses the "login" service. 15 account include login 18 session include login 21 password include login
|
H A D | login | 1 # $NetBSD: login,v 1.4 2005/02/27 03:40:14 thorpej Exp $ 3 # PAM configuration for the "login" service
|
/netbsd/crypto/external/bsd/openssl/dist/apps/lib/ |
H A D | tlssrp_depr.c | 163 if (p->login == NULL && p->user == NULL) { in ssl_srp_server_param_cb() 164 p->login = SSL_get_srp_username(s); in ssl_srp_server_param_cb() 165 BIO_printf(bio_err, "SRP username = \"%s\"\n", p->login); in ssl_srp_server_param_cb() 170 BIO_printf(bio_err, "User %s doesn't exist\n", p->login); in ssl_srp_server_param_cb() 182 p->login, p->user->info); in ssl_srp_server_param_cb() 188 p->login = NULL; in ssl_srp_server_param_cb() 199 srp_callback_parm->login = NULL; in set_up_srp_verifier_file() 224 srp_callback_parm->login); in lookup_srp_user()
|
/netbsd/bin/sh/funcs/ |
H A D | login | 1 # $NetBSD: login,v 1.8 2016/02/29 23:50:59 christos Exp $ 29 # @(#)login 8.2 (Berkeley) 5/4/95 31 # replaces the login builtin in the BSD shell 32 login () exec login "$@"
|
/netbsd/usr.bin/write/ |
H A D | write.c | 218 const char *login; in do_write() local 225 if ((login = getlogin()) == NULL) { in do_write() 227 login = pwd->pw_name; in do_write() 228 else login = "???"; in do_write() 247 login, host, mytty, nows + 11); in do_write()
|
/netbsd/crypto/external/bsd/openssl.old/dist/ssl/ |
H A D | tls_srp.c | 26 OPENSSL_free(ctx->srp_ctx.login); in SSL_CTX_SRP_CTX_free() 45 OPENSSL_free(s->srp_ctx.login); in SSL_SRP_CTX_free() 101 if ((ctx->srp_ctx.login != NULL) && in SSL_SRP_CTX_init() 102 ((s->srp_ctx.login = OPENSSL_strdup(ctx->srp_ctx.login)) == NULL)) { in SSL_SRP_CTX_init() 115 OPENSSL_free(s->srp_ctx.login); in SSL_SRP_CTX_init() 305 if ((x = SRP_Calc_x(s->srp_ctx.s, s->srp_ctx.login, passwd)) == NULL in srp_generate_client_master_secret() 399 if (s->srp_ctx.login != NULL) in SSL_get_srp_username() 400 return s->srp_ctx.login; in SSL_get_srp_username() 401 return s->ctx->srp_ctx.login; in SSL_get_srp_username()
|
/netbsd/external/bsd/libbind/dist/irs/ |
H A D | getpwent_r.c | 55 __posix_getpwnam_r(const char *login, struct passwd *pwptr, argument 59 getpwnam_r(const char *login, struct passwd *pwptr, 62 struct passwd *pw = getpwnam(login); 77 getpwnam_r(const char *login, struct passwd *pwptr, char *buf, int buflen) { argument 78 struct passwd *pw = getpwnam(login);
|
/netbsd/external/gpl2/rcs/dist/src/ |
H A D | rcs.c | 234 char const *login; member 708 getchaccess(login, command) in getchaccess() argument 709 char const *login; in getchaccess() 715 pt->login = login; 982 if (!ch->login) { in doaccess() 989 if (strcmp(ch->login, t->login) == 0) { in doaccess() 999 t->login = ch->login; in doaccess() 1003 } else if (strcmp(ch->login, t->login) == 0) in doaccess() 1095 strcmp(getcaller(),next->login) != 0 1096 && !sendmail(num, next->login) [all …]
|
H A D | rlog.c | 164 char const * login; /* lockerlist */ member 174 char const * login; /* stored in authorlist */ member 406 aprintf(out, symbolFormat, currlock->login, 416 aprintf(out, accessFormat, curaccess->login); 763 newlocker->login = argv; 791 authorlist->login = getusername(false); 799 newauthor->login = argv; 861 if (strcmp(plocker->login, p->login) == 0) { in trunclocks() 970 while (strcmp(pauthor->login, pdelta->author) != 0)
|
/netbsd/external/gpl3/gcc.old/dist/libgfortran/intrinsics/ |
H A D | getlog.c | 71 PREFIX(getlog) (char * login, gfc_charlen_type login_len) in PREFIX() 75 memset (login, ' ', login_len); /* Blank the string. */ in PREFIX() 112 memcpy (login, p, p_len); in PREFIX()
|
/netbsd/external/gpl3/gcc/dist/libgfortran/intrinsics/ |
H A D | getlog.c | 71 PREFIX(getlog) (char * login, gfc_charlen_type login_len) in PREFIX() 75 memset (login, ' ', login_len); /* Blank the string. */ in PREFIX() 112 memcpy (login, p, p_len); in PREFIX()
|
/netbsd/crypto/external/bsd/openssl/dist/ssl/ |
H A D | tls_srp.c | 36 OPENSSL_free(ctx->srp_ctx.login); in ssl_ctx_srp_ctx_free_intern() 64 OPENSSL_free(s->srp_ctx.login); in ssl_srp_ctx_free_intern() 129 if ((ctx->srp_ctx.login != NULL) && in ssl_srp_ctx_init_intern() 130 ((s->srp_ctx.login = OPENSSL_strdup(ctx->srp_ctx.login)) == NULL)) { in ssl_srp_ctx_init_intern() 143 OPENSSL_free(s->srp_ctx.login); in ssl_srp_ctx_init_intern() 355 if ((x = SRP_Calc_x_ex(s->srp_ctx.s, s->srp_ctx.login, passwd, in srp_generate_client_master_secret() 455 if (s->srp_ctx.login != NULL) in SSL_get_srp_username() 456 return s->srp_ctx.login; in SSL_get_srp_username() 457 return s->ctx->srp_ctx.login; in SSL_get_srp_username()
|
/netbsd/tests/usr.bin/id/ |
H A D | pwgr.c | 150 getpwnam(const char *login) in getpwnam() argument 155 if (strcmp(login, "root") == 0) { in getpwnam() 159 } else if (strcmp(login, "test") == 0) { in getpwnam()
|
/netbsd/etc/ |
H A D | csh.login | 1 # $NetBSD: csh.login,v 1.2 1996/05/08 17:19:28 thorpej Exp $ 3 # System-wide .login file for csh(1).
|
/netbsd/crypto/dist/ipsec-tools/src/racoon/ |
H A D | isakmp_xauth.c | 267 iph1->mode_cfg->login[LOGINLEN] = '\0'; 1572 iph1->rmconf->xauth->login->v, 1573 iph1->rmconf->xauth->login->l - 1); 1582 iph1->rmconf->xauth->login->v); 1803 (*xauth_rmconf)->login = NULL; 1816 if ((*xauth_rmconf)->login != NULL) 1817 vfree((*xauth_rmconf)->login); 1844 if (xauth_rmconf->login != NULL) { 1845 new->login = vdup(xauth_rmconf->login); 1846 if (new->login == NULL) { [all …]
|
/netbsd/lib/libutil/compat/ |
H A D | compat_login.c | 56 __warn_references(login, 60 login(const struct utmp50 *ut50) in login() function
|
/netbsd/lib/librmt/ |
H A D | rmtlib.c | 255 char login[BUFMAGIC]; in _rmt_open() local 263 user = login; in _rmt_open() 295 (void)strlcpy(user, host, sizeof(login)); in _rmt_open() 325 READ(i) = WRITE(i) = _rmt_rexec(host, login); in _rmt_open() 357 if (*login) { in _rmt_open() 358 execl(rshpath, rsh, host, "-l", login, _PATH_RMT, NULL); in _rmt_open()
|
/netbsd/crypto/external/bsd/heimdal/dist/cf/ |
H A D | telnet.m4 | 67 /* Used with login -p */ 70 /* set this to a sensible login */ 72 #define LOGIN_PATH BINDIR "/login"
|
/netbsd/etc/skel/ |
H A D | dot.login | 1 # $NetBSD: dot.login,v 1.4 2016/03/08 09:51:15 mlelstv Exp $ 3 # This is the default .login file.
|
/netbsd/crypto/dist/ipsec-tools/src/racoon/samples/roadwarrior/ |
H A D | README | 4 authenticates to the VPN gateway using a login and a password. 7 the client. After a successful login, the client will receive an 51 Where username is your login, and vpn-gateway.example.net is 58 where username is your login.
|
/netbsd/crypto/external/bsd/heimdal/dist/doc/ |
H A D | misc.texi | 11 you login (boring), and by using Kerberos authenticated telnet to access 22 aaa authentication login default krb5-telnet krb5 enable 35 specify the `login default' authentication mechanism, you might not be 36 able to login at all. The `instance map' and `authorization exec' lines
|
/netbsd/crypto/external/bsd/libsaslc/dist/ref/ |
H A D | rfc2245.txt | 32 password. As plaintext login commands are not permitted in new IETF 33 protocols, a new way to provide anonymous login is needed within the 86 Here is a sample anonymous login between an IMAP client and server. 164 Protocols which fail to require an explicit anonymous login are more 166 techniques. Specifically, Unix servers which offer user login may 176 after an explicit login command. Normally such servers refuse all 177 data access commands prior to explicit login and may enter a 183 anonymous data access without an explicit login step.
|
/netbsd/usr.bin/id/ |
H A D | id.c | 181 char *login; in pretty() local 188 if ((login = getlogin()) == NULL) in pretty() 192 if (pw == NULL || strcmp(login, pw->pw_name)) in pretty() 193 (void)printf("login\t%s\n", login); in pretty()
|