/netbsd/external/bsd/tmux/usr.bin/tmux/ |
H A D | utempter.c | 68 (void)strncpy(ut.ut_name, username, sizeof(ut.ut_name)); in doutmpx() 91 doutmpx(username, "", tty, now, DEAD_PROCESS, 0); in logout_utmpx() 111 logout_utmp(const char *username __unused, in logout_utmp() 122 char username[LOGIN_NAME_MAX]; in utmp_create() local 125 if (getlogin_r(username, sizeof(username)) == -1) in utmp_create() 134 login_utmpx(username, host, ttyp, &tv); in utmp_create() 137 login_utmp(username, host, ttyp, &tv); in utmp_create() 146 char username[LOGIN_NAME_MAX]; in utmp_destroy() local 149 if (getlogin_r(username, sizeof(username)) == -1) in utmp_destroy() 158 logout_utmpx(username, ttyp, &tv); in utmp_destroy() [all …]
|
/netbsd/external/gpl3/binutils/dist/gprofng/src/ |
H A D | BaseMetric.cc | 39 username = NULL; in init() 189 username = dbe_strdup (_username); in hwc_init() 208 username = dbe_strdup (_username); in BaseMetric() 228 username = dbe_strdup (m.username); in BaseMetric() 284 free (username); in ~BaseMetric() 451 username = dbe_strdup (GTXT ("Size")); in specify() 456 username = dbe_strdup (GTXT ("PC Address")); in specify() 460 username = dbe_strdup (GTXT ("Name")); in specify() 626 username = dbe_strdup (GTXT ("Leaks")); in specify() 770 username = dbe_strdup (GTXT ("****")); in specify() [all …]
|
/netbsd/external/bsd/wpa/dist/src/eap_peer/ |
H A D | mschapv2.c | 26 if (username[i] == '\\') { in mschapv2_remove_domain() 28 return username + i + 1; in mschapv2_remove_domain() 32 return username; in mschapv2_remove_domain() 44 const u8 *username; in mschapv2_derive_response() local 51 username = mschapv2_remove_domain(identity, &username_len); in mschapv2_derive_response() 53 username, username_len); in mschapv2_derive_response() 60 username, username_len); in mschapv2_derive_response() 67 username, username_len, in mschapv2_derive_response() 71 username, username_len, nt_response, in mschapv2_derive_response() 78 username, username_len, in mschapv2_derive_response() [all …]
|
/netbsd/crypto/external/bsd/heimdal/dist/lib/krb5/ |
H A D | get_default_principal.c | 114 char username[1024]; in _krb5_get_default_principal_local() local 115 ULONG sz = sizeof(username); in _krb5_get_default_principal_local() 117 if (GetUserNameEx(NameUserPrincipal, username, &sz)) { in _krb5_get_default_principal_local() 118 return krb5_parse_name_flags(context, username, in _krb5_get_default_principal_local() 127 char username[1024]; in _krb5_get_default_principal_local() local 128 DWORD dsz = sizeof(username); in _krb5_get_default_principal_local() 130 if (GetUserName(username, &dsz)) { in _krb5_get_default_principal_local() 131 return krb5_make_principal(context, princ, NULL, username, NULL); in _krb5_get_default_principal_local() 137 const char * username = get_env_user(); in _krb5_get_default_principal_local() local 139 if (username == NULL) { in _krb5_get_default_principal_local() [all …]
|
/netbsd/external/bsd/am-utils/dist/hlfsd/ |
H A D | homedir.c | 71 char *homeof(char *username); 72 int uidof(char *username); 329 untab_index(char *username) argument 338 cmp = strcmp(untab[mid].username, username); 347 if (STREQ(untab[max].username, username)) 349 if (STREQ(untab[min].username, username)) 362 uidof(char *username) argument 377 homeof(char *username) argument 424 return strcmp(i->username, j->username); 613 if (untab[i].username) { [all …]
|
/netbsd/external/bsd/tmux/dist/ |
H A D | utmp.c | 71 login_utmpx(struct utmpx *utmpx, const char *username, const char *hostname, in login_utmpx() argument 78 (void)strncpy(utmpx->ut_name, username, sizeof(utmpx->ut_name)); in login_utmpx() 108 login_utmp(struct utmp *utmp, const char *username, const char *hostname, in login_utmp() argument 113 (void)strncpy(utmp->ut_name, username, sizeof(utmp->ut_name)); in login_utmp() 132 char username[LOGIN_NAME_MAX]; in utmp_create() local 134 if (getlogin_r(username, sizeof(username)) == -1) in utmp_create() 144 login_utmpx(&wu->utx, username, "tmux", tty, &tv); in utmp_create() 147 login_utmp(&wu->ut, username, "tmux", tty, &tv); in utmp_create()
|
/netbsd/usr.sbin/rpc.pcnfsd/ |
H A D | pcnfsd.x | 289 username user; 329 username user; 361 username user; 374 username user; 393 username user; 419 username user; 431 username user; 445 username user; 457 username user; 472 username name; [all …]
|
/netbsd/external/bsd/openldap/dist/build/ |
H A D | shtool | 558 username='' 560 username="`(id -un) 2>/dev/null`" 561 if [ ".$username" = . ]; then 566 if [ ".$username" = . ]; then 567 username="$LOGNAME" 568 if [ ".$username" = . ]; then 569 username="$USER" 570 if [ ".$username" = . ]; then 604 … userid=`(ypmatch "${username}" passwd; nismatch "${username}" passwd) 2>/dev/null | \ 636 … groupid=`(ypmatch "${username}" passwd; nismatch "${username}" passwd) 2>/dev/null | \ [all …]
|
/netbsd/external/bsd/pam-u2f/dist/tests/ |
H A D | get_devices.c | 37 char *username; in main() local 39 username = secure_getenv("USER"); in main() 40 if (username == NULL) { in main() 41 username = secure_getenv("LOGNAME"); in main() 43 assert(username != NULL); in main() 67 rc = get_devices_from_authfile(&cfg, username, dev, &n_devs); in main() 91 rc = get_devices_from_authfile(&cfg, username, dev, &n_devs); in main() 115 rc = get_devices_from_authfile(&cfg, username, dev, &n_devs); in main() 140 rc = get_devices_from_authfile(&cfg, username, dev, &n_devs); in main() 164 rc = get_devices_from_authfile(&cfg, username, dev, &n_devs); in main() [all …]
|
/netbsd/crypto/external/bsd/heimdal/dist/tests/kdc/ |
H A D | check-digest.in | 63 username=foo 85 ${kadmin} add -p $userpassword --use-defaults ${username}@${R} || exit 1 175 --username="$username" \ 192 --username="$username" \ 213 --username="$username" \ 243 --username="$username" \ 257 --username="$username" \
|
/netbsd/external/bsd/wpa/dist/src/eap_server/ |
H A D | eap_server_aka.c | 104 username); in eap_aka_check_identity_reauth() 135 char *username; in eap_aka_check_identity() local 140 if (username == NULL) in eap_aka_check_identity() 144 os_free(username); in eap_aka_check_identity() 158 username); in eap_aka_check_identity() 162 os_free(username); in eap_aka_check_identity() 177 os_free(username); in eap_aka_check_identity() 734 char *username; in eap_aka_determine_identity() local 768 username); in eap_aka_determine_identity() 785 username); in eap_aka_determine_identity() [all …]
|
/netbsd/usr.bin/su/ |
H A D | su.c | 114 char *username, **np; in main() local 185 username = getlogin(); in main() 186 if (username == NULL || (pwd = getpwnam(username)) == NULL || in main() 191 username = estrdup(pwd->pw_name); in main() 220 user = username; in main() 258 user = username; in main() 268 ok = check_ingroup(-1, SU_GROUP, username, 1); in main() 296 "BAD SU %s to %s%s", username, in main() 383 (void)setenv("SU_FROM", username, 1); in main() 434 username, pwd->pw_name, ontty()); in main() [all …]
|
H A D | su_pam.c | 109 char *username, *class; in main() local 179 username = getlogin(); in main() 180 if (username == NULL || in main() 188 username = estrdup(pwd->pw_name); in main() 214 user = username; in main() 243 PAM_SET_ITEM(PAM_RUSER, username); in main() 255 username, user, ontty(), safe_pam_strerror(pamh, pam_err)); in main() 289 syslog(LOG_ERR, "unknown login: %s", username); in main() 290 errx(EXIT_FAILURE, "unknown login: %s", username); in main() 506 (void)setenv("SU_FROM", username, 1); in main() [all …]
|
/netbsd/usr.bin/passwd/ |
H A D | pam_passwd.c | 73 pwpam_process(const char *username, int argc, char **argv) in pwpam_process() argument 100 username = argv[0]; in pwpam_process() 107 (void)printf("Changing password for %s.\n", username); in pwpam_process() 110 pam_err = pam_start("passwd", username, &pamc, &pamh); in pwpam_process() 132 i_username, (unsigned long)i_uid, username, in pwpam_process() 141 i_username, (unsigned long)i_uid, username); in pwpam_process()
|
H A D | passwd.c | 114 const char *username; in main() local 189 username = getlogin(); in main() 190 if (username == NULL) in main() 193 (*personality->pw_process)(username, argc, argv); in main() 251 char *username; in main() local 374 username = getlogin(); in main() 375 if (username == NULL) in main() 382 username = argv[0]; in main() 395 valid = (*pw_modules[i].pw_chpw)(username); in main()
|
H A D | yp_passwd.c | 217 pwyp_process(const char *username, int argc, char **argv) in pwyp_process() argument 250 username = argv[0]; in pwyp_process() 295 if (!ypgetpwnam(username, &pwb) || in pwyp_process() 296 getpwnam_r(username, &pwb2, pwbuf, sizeof(pwbuf), &pw) || in pwyp_process() 298 errx(EXIT_FAILURE, "NIS unknown user %s", username); in pwyp_process() 378 yp_chpw(const char *username) in yp_chpw() argument 427 if (!ypgetpwnam(username, pw = &pwb) || in yp_chpw() 428 getpwnam_r(username, &pwb, pwbuf, sizeof(pwbuf), &pw) || in yp_chpw() 430 warnx("NIS unknown user %s", username); in yp_chpw()
|
H A D | local_passwd.c | 132 pwlocal_process(const char *username, int argc, char **argv) in pwlocal_process() argument 167 username = argv[0]; in pwlocal_process() 174 if (!(pw = getpwnam(username))) in pwlocal_process() 175 errx(1, "unknown user %s", username); in pwlocal_process() 219 if (pw_mkdb(username, old_change == pw->pw_change) < 0) in pwlocal_process() 225 uid ? username : "root", (unsigned long)uid, username); in pwlocal_process()
|
/netbsd/usr.bin/chpass/ |
H A D | chpass.c | 89 char *arg, *username = NULL; in main() local 135 username = argv[0]; in main() 157 if (username != NULL) in main() 158 pw = getpwnam(username); in main() 186 if (username != NULL) { in main() 187 pw = getpwnam(username); in main() 189 errx(1, "unknown user: %s", username); in main() 287 if (pw_mkdb(username, 0) < 0) in main()
|
/netbsd/usr.bin/login/ |
H A D | login.c | 254 username = loginname = *argv; in main() 335 username = trimloginname(loginname); in main() 348 pwd = getpwnam(username); in main() 372 k5_read_creds(username); in main() 387 if (skey_haskey(username) == 0) { in main() 417 if (skey_haskey(username) == 0 && in main() 469 badlogin(username); in main() 503 initgroups(username, pwd->pw_gid); in main() 590 initgroups(username, pwd->pw_gid); in main() 644 username, tty, hostname); in main() [all …]
|
/netbsd/usr.sbin/pwd_mkdb/ |
H A D | pwd_mkdb.c | 216 if (username != NULL) { in opendb() 239 if (username != NULL) { in opendb() 262 char *username; in main() local 274 username = NULL; in main() 310 username = optarg; in main() 334 if (username != NULL) in main() 335 if (username[0] == '+' || username[0] == '-') in main() 355 if (username == NULL) in main() 412 if (username != NULL) { in main() 475 username); in main() [all …]
|
/netbsd/external/ibm-public/postfix/dist/src/xsasl/ |
H A D | xsasl_cyrus_client.c | 149 char *username; member 175 msg_info("%s: %s", myname, client->username); in xsasl_cyrus_client_get_user() 183 *result = client->username; in xsasl_cyrus_client_get_user() 185 *len = strlen(client->username); in xsasl_cyrus_client_get_user() 377 client->username = 0; in xsasl_cyrus_client_create() 434 const char *username, in xsasl_cyrus_client_first() argument 453 if (client->username) in xsasl_cyrus_client_first() 454 myfree(client->username); in xsasl_cyrus_client_first() 455 client->username = mystrdup(username); in xsasl_cyrus_client_first() 576 if (client->username) in xsasl_cyrus_client_free() [all …]
|
/netbsd/external/bsd/wpa/dist/src/crypto/ |
H A D | ms_funcs.c | 82 const u8 *username, size_t username_len, u8 *challenge) in challenge_hash() argument 92 addr[2] = username; in challenge_hash() 172 const u8 *username, size_t username_len, in generate_nt_response() argument 179 if (challenge_hash(peer_challenge, auth_challenge, username, in generate_nt_response() 200 const u8 *username, size_t username_len, in generate_nt_response_pwhash() argument 207 username, username_len, in generate_nt_response_pwhash() 230 const u8 *username, size_t username_len, in generate_authenticator_response_pwhash() argument 263 challenge_hash(peer_challenge, auth_challenge, username, in generate_authenticator_response_pwhash() 286 const u8 *username, size_t username_len, in generate_authenticator_response() argument 294 username, username_len, nt_response, response); in generate_authenticator_response()
|
H A D | ms_funcs.h | 13 const u8 *username, size_t username_len, 18 const u8 *username, size_t username_len, 24 const u8 *username, size_t username_len, 29 const u8 *username, size_t username_len, 37 const u8 *username, size_t username_len, u8 *challenge);
|
/netbsd/lib/libskey/ |
H A D | skeylogin.c | 353 int skey_haskey(const char *username) in skey_haskey() argument 358 i = skeylookup(&skey, username); in skey_haskey() 371 const char *skey_keyinfo(const char *username) in skey_keyinfo() argument 377 i = skeychallenge(&skey, username, str, sizeof str); in skey_keyinfo() 395 int skey_passcheck(const char *username, char *passwd) in skey_passcheck() argument 400 i = skeylookup (&skey, username); in skey_passcheck() 443 int skey_authenticate(const char *username) in skey_authenticate() argument 456 i = skeychallenge(&skey, username, skeyprompt, sizeof skeyprompt); in skey_authenticate() 478 if ((up = SHA1Data(username, strlen(username), NULL)) != NULL) { in skey_authenticate() 514 SHA1Update(&ctx, username, strlen(username)); in skey_authenticate() [all …]
|
/netbsd/external/bsd/unbound/dist/daemon/ |
H A D | unbound.c | 479 if(cfg->username && cfg->username[0]) { in perform_setup() 480 if((pwd = getpwnam(cfg->username)) == NULL) in perform_setup() 561 if(cfg->username && cfg->username[0] && cfg_uid != (uid_t)-1 && in perform_setup() 580 if(cfg->username && cfg->username[0] && cfg_uid != (uid_t)-1) { in perform_setup() 588 cfg->username, strerror(errno)); in perform_setup() 649 if(cfg->username && cfg->username[0] && cfg_uid != (uid_t)-1) { in perform_setup() 651 if(initgroups(cfg->username, cfg_gid) != 0) in perform_setup() 653 cfg->username, strerror(errno)); in perform_setup() 667 cfg->username, strerror(errno)); in perform_setup() 676 cfg->username, strerror(errno)); in perform_setup() [all …]
|