| /src/lib/libpam/modules/pam_self/ | 
| pam_self.c | 64 	const char *luser;  local in function:pam_sm_authenticate 69 	pam_err = pam_get_user(pamh, &luser, NULL);
 72 	if (luser == NULL ||
 73 	    getpwnam_r(luser, &pwres, pwbuf, sizeof(pwbuf), &pwd) != 0 ||
 
 | 
| /src/usr.sbin/lpr/lprm/ | 
| lprm.c | 80 static char	luser[16];	/* buffer for person */  variable in typeref:typename:char[16] 99 	if (strlen(p->pw_name) >= sizeof(luser))
 101 	strlcpy(luser, p->pw_name, sizeof(luser));
 102 	person = luser;
 
 | 
| /src/dist/pf/usr.sbin/authpf/ | 
| authpf.c | 60 char	 luser[MAXLOGNAME];	/* username */  variable in typeref:typename:char[] 158 	if (strlcpy(luser, pw->pw_name, sizeof(luser)) >= sizeof(luser)) {
 164 	    luser, (long)getpid())) < 0 || (u_int)n >= sizeof(rulesetname)) {
 166 		    luser, (long)getpid(), (long)getpid());
 279 	if (!check_luser(PATH_BAN_DIR, luser) || !allowed_luser(luser)) {
 280 		syslog(LOG_INFO, "user %s prohibited", luser);
 296 	fprintf(pidfp, "%ld\n%s\n", (long)getpid(), luser);
 [all...]
 | 
| /src/lib/libc/net/ | 
| rcmd.c | 599 ruserok(const char *rhost, int superuser, const char *ruser, const char *luser) 606 	_DIAGASSERT(luser != NULL);
 617 		    ruser, luser) == 0) {
 636 iruserok(u_int32_t raddr, int superuser, const char *ruser, const char *luser)
 647 	    luser);
 656     const char *luser)
 670 	_DIAGASSERT(luser != NULL);
 679 		if (__ivaliduser_sa(hostf, sa, (socklen_t)rlen, luser,
 690 		if (getpwnam_r(luser, &pwres, pwbuf, sizeof(pwbuf), &pwd) != 0
 728 						    luser, ruser)
 [all...]
 | 
| /src/lib/libpam/modules/pam_krb5/ | 
| pam_krb5.c | 133 	char *principal, *princ_name, *ccache_name, luser[32], *srvdup;  local in function:pam_sm_authenticate 276 		    sizeof(luser), luser);
 285 		retval = pam_set_item(pamh, PAM_USER, luser);
 
 | 
| /src/usr.bin/ftp/ | 
| util.c | 372 ftp_login(const char *host, const char *luser, const char *lpass) 382 	if (luser)
 383 		fuser = ftp_strdup(luser);
 
 |