HomeSort by: relevance | last modified time | path
    Searched defs:luser (Results 1 - 8 of 8) sorted by relevancy

  /src/lib/libpam/modules/pam_self/
pam_self.c 64 const char *luser; local
69 pam_err = pam_get_user(pamh, &luser, NULL);
72 if (luser == NULL ||
73 getpwnam_r(luser, &pwres, pwbuf, sizeof(pwbuf), &pwd) != 0 ||
  /src/usr.sbin/lpr/lprm/
lprm.c 80 static char luser[16]; /* buffer for person */ variable
99 if (strlen(p->pw_name) >= sizeof(luser))
101 strlcpy(luser, p->pw_name, sizeof(luser));
102 person = luser;
  /src/crypto/external/bsd/openssh/dist/
ssh-keysign.c 72 char *pkalg, *luser; local
145 if ((r = sshbuf_get_cstring(b, &luser, NULL)) != 0)
146 fatal_fr(r, "parse luser");
148 if (strcmp(pw->pw_name, luser) != 0)
150 free(luser);
  /src/crypto/external/bsd/heimdal/dist/lib/krb5/
aname_to_localname.c 58 heim_string_t luser; member in struct:plctx
66 plctx->luser = heim_string_create(res);
67 if (plctx->luser == NULL)
79 if (plctx->luser)
94 ctx.luser = NULL;
104 heim_release(ctx.luser);
108 if (ctx.luser == NULL)
111 if (strlcpy(lname, heim_string_get_utf8(ctx.luser), lnsize) >= lnsize)
114 heim_release(ctx.luser);
kuserok.c 54 const char *luser; member in struct:plctx
67 plctx->k5login_dir, plctx->luser, plctx->principal,
384 const char *luser,
399 lname = malloc(strlen(luser) + 1);
402 ret = krb5_aname_to_localname(context, principal, strlen(luser)+1, lname);
405 if (strcmp(lname, luser) == 0)
440 * ie luser@@LOCAL-REALMS-IN-CONFIGURATION-FILES.
444 * @param luser local user id
454 const char *luser)
456 return _krb5_kuserok(context, principal, luser, TRUE)
    [all...]
  /src/external/cddl/osnet/dist/cmd/zfs/
zfs_iter.c 302 nvlist_t *luser, *ruser; local
305 luser = zfs_get_user_props(l);
308 lvalid = (nvlist_lookup_nvlist(luser,
  /src/dist/pf/usr.sbin/authpf/
authpf.c 60 char luser[MAXLOGNAME]; /* username */ variable
158 if (strlcpy(luser, pw->pw_name, sizeof(luser)) >= sizeof(luser)) {
164 luser, (long)getpid())) < 0 || (u_int)n >= sizeof(rulesetname)) {
166 luser, (long)getpid(), (long)getpid());
279 if (!check_luser(PATH_BAN_DIR, luser) || !allowed_luser(luser)) {
280 syslog(LOG_INFO, "user %s prohibited", luser);
296 fprintf(pidfp, "%ld\n%s\n", (long)getpid(), luser);
    [all...]
  /src/lib/libpam/modules/pam_krb5/
pam_krb5.c 133 char *principal, *princ_name, *ccache_name, luser[32], *srvdup; local
276 sizeof(luser), luser);
285 retval = pam_set_item(pamh, PAM_USER, luser);

Completed in 29 milliseconds