| /src/lib/libpam/modules/pam_self/ |
| pam_self.c | 64 const char *luser; local 69 pam_err = pam_get_user(pamh, &luser, NULL); 72 if (luser == NULL || 73 getpwnam_r(luser, &pwres, pwbuf, sizeof(pwbuf), &pwd) != 0 ||
|
| /src/usr.sbin/lpr/lprm/ |
| lprm.c | 80 static char luser[16]; /* buffer for person */ variable 99 if (strlen(p->pw_name) >= sizeof(luser)) 101 strlcpy(luser, p->pw_name, sizeof(luser)); 102 person = luser;
|
| /src/external/cddl/osnet/dist/cmd/zfs/ |
| zfs_iter.c | 302 nvlist_t *luser, *ruser; local 305 luser = zfs_get_user_props(l); 308 lvalid = (nvlist_lookup_nvlist(luser,
|
| /src/dist/pf/usr.sbin/authpf/ |
| authpf.c | 60 char luser[MAXLOGNAME]; /* username */ variable 158 if (strlcpy(luser, pw->pw_name, sizeof(luser)) >= sizeof(luser)) { 164 luser, (long)getpid())) < 0 || (u_int)n >= sizeof(rulesetname)) { 166 luser, (long)getpid(), (long)getpid()); 279 if (!check_luser(PATH_BAN_DIR, luser) || !allowed_luser(luser)) { 280 syslog(LOG_INFO, "user %s prohibited", luser); 296 fprintf(pidfp, "%ld\n%s\n", (long)getpid(), luser); [all...] |
| /src/lib/libpam/modules/pam_krb5/ |
| pam_krb5.c | 133 char *principal, *princ_name, *ccache_name, luser[32], *srvdup; local 276 sizeof(luser), luser); 285 retval = pam_set_item(pamh, PAM_USER, luser);
|