/freebsd-10.0-release/lib/libpam/modules/pam_self/ |
H A D | pam_self.c | 59 const char *luser; local 63 pam_err = pam_get_user(pamh, &luser, NULL); 66 if (luser == NULL || (pwd = getpwnam(luser)) == NULL)
|
/freebsd-10.0-release/lib/libpam/modules/pam_opieaccess/ |
H A D | pam_opieaccess.c | 58 const void *luser, *rhost; local 61 r = pam_get_item(pamh, PAM_USER, &luser); 64 if (luser == NULL) 67 pwent = getpwnam(luser); 68 if (pwent == NULL || opielookup(&opie, __DECONST(char *, luser)) != 0)
|
/freebsd-10.0-release/usr.sbin/lpr/lprm/ |
H A D | lprm.c | 81 static char luser[16]; /* buffer for person */ variable 112 if (strlen(p->pw_name) >= sizeof(luser)) 114 strcpy(luser, p->pw_name); 115 person = luser;
|
/freebsd-10.0-release/libexec/rshd/ |
H A D | rshd.c | 60 * luser\0 198 char *cmdbuf, luser[16], ruser[16]; local 308 getstr(luser, sizeof(luser), "luser"); 312 pam_err = pam_start("rsh", luser, &pamc, &pamh); 329 strncpy(luser, cp, sizeof(luser)); 330 luser[sizeof(luser) [all...] |
/freebsd-10.0-release/crypto/heimdal/lib/roken/ |
H A D | iruserok.c | 89 __ivaliduser(FILE *hostf, unsigned raddr, const char *luser, argument 199 userok = !(strcmp(ruser,*user ? user : luser)); 218 iruserok(unsigned raddr, int superuser, const char *ruser, const char *luser) argument 232 if (__ivaliduser(hostf, raddr, luser, ruser) == 0) { 240 if ((pwd = k_getpwnam((char*)luser)) == NULL)
|
/freebsd-10.0-release/lib/libc/net/ |
H A D | rcmd.c | 382 ruserok(rhost, superuser, ruser, luser) 383 const char *rhost, *ruser, *luser; 398 luser) == 0) { 417 iruserok(raddr, superuser, ruser, luser) 420 const char *ruser, *luser; 429 ruser, luser); 438 iruserok_sa(ra, rlen, superuser, ruser, luser) 442 const char *ruser, *luser; 464 if (__ivaliduser_sa(hostf, raddr, rlen, luser, ruser) == 0) { 472 if ((pwd = getpwnam(luser)) [all...] |
/freebsd-10.0-release/crypto/heimdal/lib/krb5/ |
H A D | kuserok.c | 173 const char *luser) 192 luser) == 0) { 225 * ie luser@@LOCAL-REALMS-IN-CONFIGURATION-FILES. 229 * @param luser local user id 239 const char *luser) 255 if(getpwnam_r(luser, &pw, pwbuf, sizeof(pwbuf), &pwd) != 0) 258 pwd = getpwnam (luser); 294 return match_local_principals(context, principal, luser); 301 return match_local_principals(context, principal, luser); 171 match_local_principals(krb5_context context, krb5_principal principal, const char *luser) argument 237 krb5_kuserok(krb5_context context, krb5_principal principal, const char *luser) argument
|
/freebsd-10.0-release/contrib/pf/authpf/ |
H A D | authpf.c | 69 char luser[MAXLOGNAME]; /* username */ variable 186 if (strlcpy(luser, pw->pw_name, sizeof(luser)) >= sizeof(luser)) { 192 luser, (long)getpid())) < 0 || (u_int)n >= sizeof(rulesetname)) { 194 luser, (long)getpid(), (long)getpid()); 205 PATH_PIDFILE, user_ip ? ipsrc : luser); 311 if (!check_luser(PATH_BAN_DIR, luser) || !allowed_luser(pw)) { 312 syslog(LOG_INFO, "user %s prohibited", luser); 328 fprintf(pidfp, "%ld\n%s\n", (long)getpid(), luser); [all...] |
/freebsd-10.0-release/cddl/contrib/opensolaris/cmd/zfs/ |
H A D | zfs_iter.c | 295 nvlist_t *luser, *ruser; local 298 luser = zfs_get_user_props(l); 301 lvalid = (nvlist_lookup_nvlist(luser,
|
/freebsd-10.0-release/lib/libpam/modules/pam_krb5/ |
H A D | pam_krb5.c | 121 char *principal, *princ_name, *ccache_name, luser[32], *srvdup; local 206 sizeof(luser), luser); 215 retval = pam_set_item(pamh, PAM_USER, luser);
|
/freebsd-10.0-release/contrib/tnftp/src/ |
H A D | util.c | 379 ftp_login(const char *host, const char *luser, const char *lpass) argument 389 if (luser) 390 fuser = ftp_strdup(luser);
|