Home
last modified time | relevance | path

Searched refs:luser (Results 1 – 15 of 15) sorted by relevance

/src/lib/libpam/modules/pam_self/
H A Dpam_self.c59 const char *luser; in pam_sm_authenticate() local
63 pam_err = pam_get_user(pamh, &luser, NULL); in pam_sm_authenticate()
66 if (luser == NULL || (pwd = getpwnam(luser)) == NULL) in pam_sm_authenticate()
/src/crypto/heimdal/lib/krb5/
H A Dkuserok.c173 const char *luser) in match_local_principals() argument
192 luser) == 0) { in match_local_principals()
239 const char *luser) in krb5_kuserok() argument
255 if(getpwnam_r(luser, &pw, pwbuf, sizeof(pwbuf), &pwd) != 0) in krb5_kuserok()
258 pwd = getpwnam (luser); in krb5_kuserok()
294 return match_local_principals(context, principal, luser); in krb5_kuserok()
301 return match_local_principals(context, principal, luser); in krb5_kuserok()
/src/usr.sbin/lpr/lprm/
H A Dlprm.c69 static char luser[16]; /* buffer for person */ variable
100 if (strlen(p->pw_name) >= sizeof(luser)) in main()
102 strcpy(luser, p->pw_name); in main()
103 person = luser; in main()
/src/contrib/pf/authpf/
H A Dauthpf.c67 char luser[MAXLOGNAME]; /* username */ variable
184 if (strlcpy(luser, pw->pw_name, sizeof(luser)) >= sizeof(luser)) { in main()
190 luser, (long)getpid())) < 0 || (u_int)n >= sizeof(rulesetname)) { in main()
192 luser, (long)getpid(), (long)getpid()); in main()
203 PATH_PIDFILE, user_ip ? ipsrc : luser); in main()
309 if (!check_luser(PATH_BAN_DIR, luser) || !allowed_luser(pw)) { in main()
310 syslog(LOG_INFO, "user %s prohibited", luser); in main()
326 fprintf(pidfp, "%ld\n%s\n", (long)getpid(), luser); in main()
330 if (change_filter(1, luser, ipsrc) == -1) { in main()
336 change_filter(0, luser, ipsrc); in main()
[all …]
/src/lib/libc/net/
H A Drcmd.c370 ruserok(const char *rhost, int superuser, const char *ruser, const char *luser) in ruserok() argument
384 luser) == 0) { in ruserok()
403 iruserok(unsigned long raddr, int superuser, const char *ruser, const char *luser) in iruserok() argument
412 ruser, luser); in iruserok()
422 const char *luser) in iruserok_sa() argument
444 if (__ivaliduser_sa(hostf, raddr, rlen, luser, ruser) == 0) { in iruserok_sa()
452 if ((pwd = getpwnam(luser)) == NULL) in iruserok_sa()
502 __ivaliduser(FILE *hostf, u_int32_t raddr, const char *luser, const char *ruser) in __ivaliduser() argument
511 luser, ruser); in __ivaliduser()
520 __ivaliduser_af(FILE *hostf, const void *raddr, const char *luser, in __ivaliduser_af() argument
[all …]
/src/crypto/heimdal/lib/roken/
H A Diruserok.c89 __ivaliduser(FILE *hostf, unsigned raddr, const char *luser, in __ivaliduser() argument
199 userok = !(strcmp(ruser,*user ? user : luser)); in __ivaliduser()
218 iruserok(unsigned raddr, int superuser, const char *ruser, const char *luser) in iruserok() argument
232 if (__ivaliduser(hostf, raddr, luser, ruser) == 0) { in iruserok()
240 if ((pwd = k_getpwnam((char*)luser)) == NULL) in iruserok()
/src/crypto/openssh/
H A Dssh-keysign.c73 char *pkalg, *luser; in valid_request() local
144 if ((r = sshbuf_get_cstring(b, &luser, NULL)) != 0) in valid_request()
147 if (strcmp(pw->pw_name, luser) != 0) in valid_request()
149 free(luser); in valid_request()
/src/crypto/krb5/src/clients/ksu/
H A Dauthorization.c73 const char *luser, char *cmd, krb5_boolean *ok, in krb5_authorization() argument
88 if ((pwd = getpwnam(luser)) == NULL) in krb5_authorization()
157 && (strcmp(kuser, luser) == 0)) { in krb5_authorization()
H A Dheuristic.c197 get_authorized_princ_names(const char *luser, char *cmd, char ***princ_list) in get_authorized_princ_names() argument
214 if ((pwd = getpwnam(luser)) == NULL) in get_authorized_princ_names()
/src/sys/contrib/openzfs/cmd/zfs/
H A Dzfs_iter.c362 nvlist_t *luser, *ruser; in zfs_sort() local
365 luser = zfs_get_user_props(l); in zfs_sort()
368 lvalid = (nvlist_lookup_nvlist(luser, in zfs_sort()
/src/lib/libpam/modules/pam_krb5/
H A Dpam_krb5.c132 char *principal, *princ_name, *ccache_name, luser[32], *srvdup; in pam_sm_authenticate() local
240 sizeof(luser), luser); in pam_sm_authenticate()
249 retval = pam_set_item(pamh, PAM_USER, luser); in pam_sm_authenticate()
/src/contrib/tnftp/src/
H A Dutil.c379 ftp_login(const char *host, const char *luser, const char *lpass) in ftp_login() argument
389 if (luser) in ftp_login()
390 fuser = ftp_strdup(luser); in ftp_login()
/src/crypto/krb5/src/kadmin/cli/
H A Dkadmin.c293 char *luser, *canon, *cp; in kadmin_startup() local
519 } else if ((luser = getenv("USER"))) { in kadmin_startup()
520 if (asprintf(&princstr, "%s/admin@%s", luser, def_realm) < 0) { in kadmin_startup()
/src/crypto/heimdal/
H A DChangeLog.20031561 `luser'.
/src/crypto/krb5/src/include/krb5/
H A Dkrb5.hin6220 * @param [in] luser Local username
6223 * luser.
6229 krb5_kuserok(krb5_context context, krb5_principal principal, const char *luser);