| /src/lib/libpam/modules/pam_self/ |
| pam_self.c | 64 const char *luser; local 69 pam_err = pam_get_user(pamh, &luser, NULL); 72 if (luser == NULL || 73 getpwnam_r(luser, &pwres, pwbuf, sizeof(pwbuf), &pwd) != 0 ||
|
| /src/usr.sbin/lpr/lprm/ |
| lprm.c | 80 static char luser[16]; /* buffer for person */ variable 99 if (strlen(p->pw_name) >= sizeof(luser)) 101 strlcpy(luser, p->pw_name, sizeof(luser)); 102 person = luser;
|
| /src/crypto/external/bsd/openssh/dist/ |
| ssh-keysign.c | 72 char *pkalg, *luser; local 145 if ((r = sshbuf_get_cstring(b, &luser, NULL)) != 0) 146 fatal_fr(r, "parse luser"); 148 if (strcmp(pw->pw_name, luser) != 0) 150 free(luser);
|
| /src/crypto/external/bsd/heimdal/dist/lib/krb5/ |
| aname_to_localname.c | 58 heim_string_t luser; member in struct:plctx 66 plctx->luser = heim_string_create(res); 67 if (plctx->luser == NULL) 79 if (plctx->luser) 94 ctx.luser = NULL; 104 heim_release(ctx.luser); 108 if (ctx.luser == NULL) 111 if (strlcpy(lname, heim_string_get_utf8(ctx.luser), lnsize) >= lnsize) 114 heim_release(ctx.luser);
|
| kuserok.c | 54 const char *luser; member in struct:plctx 67 plctx->k5login_dir, plctx->luser, plctx->principal, 384 const char *luser, 399 lname = malloc(strlen(luser) + 1); 402 ret = krb5_aname_to_localname(context, principal, strlen(luser)+1, lname); 405 if (strcmp(lname, luser) == 0) 440 * ie luser@@LOCAL-REALMS-IN-CONFIGURATION-FILES. 444 * @param luser local user id 454 const char *luser) 456 return _krb5_kuserok(context, principal, luser, TRUE) [all...] |
| /src/external/cddl/osnet/dist/cmd/zfs/ |
| zfs_iter.c | 302 nvlist_t *luser, *ruser; local 305 luser = zfs_get_user_props(l); 308 lvalid = (nvlist_lookup_nvlist(luser,
|
| /src/dist/pf/usr.sbin/authpf/ |
| authpf.c | 60 char luser[MAXLOGNAME]; /* username */ variable 158 if (strlcpy(luser, pw->pw_name, sizeof(luser)) >= sizeof(luser)) { 164 luser, (long)getpid())) < 0 || (u_int)n >= sizeof(rulesetname)) { 166 luser, (long)getpid(), (long)getpid()); 279 if (!check_luser(PATH_BAN_DIR, luser) || !allowed_luser(luser)) { 280 syslog(LOG_INFO, "user %s prohibited", luser); 296 fprintf(pidfp, "%ld\n%s\n", (long)getpid(), luser); [all...] |
| /src/lib/libpam/modules/pam_krb5/ |
| pam_krb5.c | 133 char *principal, *princ_name, *ccache_name, luser[32], *srvdup; local 276 sizeof(luser), luser); 285 retval = pam_set_item(pamh, PAM_USER, luser);
|