| /src/lib/libutil/compat/ |
| compat_login.c | 35 static char sccsid[] = "@(#)login.c 8.1 (Berkeley) 6/4/93"; 56 __warn_references(login, 57 "warning: reference to compatibility login(); include <util.h> to generate correct reference") 60 login(const struct utmp50 *ut50) function
|
| util.h | 47 void login(const struct utmp50 *);
|
| /src/external/gpl3/gcc/dist/libgfortran/intrinsics/ |
| getlog.c | 63 /* GETLOG (LOGIN), g77 intrinsic for retrieving the login name for the 65 CHARACTER(len=*), INTENT(OUT) :: LOGIN */ 71 PREFIX(getlog) (char * login, gfc_charlen_type login_len) 75 memset (login, ' ', login_len); /* Blank the string. */ 112 memcpy (login, p, p_len);
|
| /src/external/gpl3/gcc.old/dist/libgfortran/intrinsics/ |
| getlog.c | 63 /* GETLOG (LOGIN), g77 intrinsic for retrieving the login name for the 65 CHARACTER(len=*), INTENT(OUT) :: LOGIN */ 71 PREFIX(getlog) (char * login, gfc_charlen_type login_len) 75 memset (login, ' ', login_len); /* Blank the string. */ 112 memcpy (login, p, p_len);
|
| /src/tests/usr.bin/id/ |
| pwgr.c | 45 char Login[16]; 82 strcpy(Login, "test"); 83 return Login; 150 getpwnam(const char *login) 155 if (strcmp(login, "root") == 0) { 159 } else if (strcmp(login, "test") == 0) {
|
| /src/distrib/utils/libhack/ |
| utmp.c | 14 login(ut) function
|
| /src/crypto/external/apache2/openssl/dist/apps/lib/ |
| tlssrp_depr.c | 158 if (p->login == NULL && p->user == NULL) { 159 p->login = SSL_get_srp_username(s); 160 BIO_printf(bio_err, "SRP username = \"%s\"\n", p->login); 165 BIO_printf(bio_err, "User %s doesn't exist\n", p->login); 177 p->login, p->user->info); 183 p->login = NULL; 194 srp_callback_parm->login = NULL; 219 srp_callback_parm->login);
|
| /src/crypto/external/bsd/heimdal/dist/tests/java/ |
| KerberosInit.java | 37 import javax.security.auth.login.*; 84 lc.login(); 91 System.out.println("lc.login ok");
|
| /src/crypto/external/bsd/openssl/dist/apps/lib/ |
| tlssrp_depr.c | 163 if (p->login == NULL && p->user == NULL) { 164 p->login = SSL_get_srp_username(s); 165 BIO_printf(bio_err, "SRP username = \"%s\"\n", p->login); 170 BIO_printf(bio_err, "User %s doesn't exist\n", p->login); 182 p->login, p->user->info); 188 p->login = NULL; 199 srp_callback_parm->login = NULL; 224 srp_callback_parm->login);
|
| /src/lib/libutil/ |
| login.c | 1 /* $NetBSD: login.c,v 1.16 2003/08/07 16:44:58 agc Exp $ */ 35 static char sccsid[] = "@(#)login.c 8.1 (Berkeley) 6/4/93"; 37 __RCSID("$NetBSD: login.c,v 1.16 2003/08/07 16:44:58 agc Exp $"); 53 login(const struct utmp *ut) function
|
| /src/usr.bin/write/ |
| write.c | 218 const char *login; local 224 /* Determine our login name before we re-open stdout */ 225 if ((login = getlogin()) == NULL) { 227 login = pwd->pw_name; 228 else login = "???"; 247 login, host, mytty, nows + 11);
|
| /src/external/bsd/libbind/dist/irs/ |
| getpwent_r.c | 55 __posix_getpwnam_r(const char *login, struct passwd *pwptr, 59 getpwnam_r(const char *login, struct passwd *pwptr, 62 struct passwd *pw = getpwnam(login); 77 getpwnam_r(const char *login, struct passwd *pwptr, char *buf, int buflen) { 78 struct passwd *pw = getpwnam(login); 266 /* copy login shell */
|
| /src/bin/sh/ |
| option.list | 64 loginsh login l # a login shell
|
| /src/external/gpl2/rcs/dist/src/ |
| rcs.c | 234 char const *login; member in struct:chaccess 352 getchaccess(str_save(AccessList->login),append); 708 getchaccess(login, command) 709 char const *login; 715 pt->login = login; 744 error("missing login name after option -a or -e"); 982 if (!ch->login) { 989 if (strcmp(ch->login, t->login) == 0) [all...] |
| rlog.c | 164 char const * login; /* lockerlist */ member in struct:rcslockers 173 struct authors { /* login names in author option; */ 174 char const * login; /* stored in authorlist */ member in struct:authors 406 aprintf(out, symbolFormat, currlock->login, 416 aprintf(out, accessFormat, curaccess->login); 746 /* function : get the login names of lockers from command line */ 763 newlocker->login = argv; 791 authorlist->login = getusername(false); 799 newauthor->login = argv; 861 if (strcmp(plocker->login, p->login) == 0) [all...] |
| rcssyn.c | 273 newaccess->login = id; 307 newlock->login=id; 468 currlock->delta->lockedby = currlock->login;
|
| /src/external/gpl2/xcvs/dist/contrib/ |
| log.in | 98 my $login; 111 $login = shift @ARGV; 141 # get a login name for the guy doing the commit.... 143 if ($login eq '') { 144 $login = getlogin || (getpwuid($<))[0] || "nobody"; 166 $logfh->print ("Author:\t$login\n\n"); 171 $mailfh->print ("Author:\t$login\n\n");
|
| /src/crypto/external/apache2/openssl/dist/ssl/ |
| tls_srp.c | 37 OPENSSL_free(ctx->srp_ctx.login); 65 OPENSSL_free(s->srp_ctx.login); 102 /* set client Hello login callback */ 115 if ((ctx->srp_ctx.login != NULL) && ((s->srp_ctx.login = OPENSSL_strdup(ctx->srp_ctx.login)) == NULL)) { 127 OPENSSL_free(s->srp_ctx.login); 359 if ((x = SRP_Calc_x_ex(s->srp_ctx.s, s->srp_ctx.login, passwd, 485 if (sc->srp_ctx.login != NULL) 486 return sc->srp_ctx.login; [all...] |
| /src/crypto/external/bsd/openssl/dist/ssl/ |
| tls_srp.c | 36 OPENSSL_free(ctx->srp_ctx.login); 64 OPENSSL_free(s->srp_ctx.login); 98 /* set client Hello login callback */ 129 if ((ctx->srp_ctx.login != NULL) && 130 ((s->srp_ctx.login = OPENSSL_strdup(ctx->srp_ctx.login)) == NULL)) { 143 OPENSSL_free(s->srp_ctx.login); 355 if ((x = SRP_Calc_x_ex(s->srp_ctx.s, s->srp_ctx.login, passwd, 455 if (s->srp_ctx.login != NULL) 456 return s->srp_ctx.login; [all...] |
| /src/crypto/external/bsd/openssl.old/dist/ssl/ |
| tls_srp.c | 26 OPENSSL_free(ctx->srp_ctx.login); 45 OPENSSL_free(s->srp_ctx.login); 70 /* set client Hello login callback */ 101 if ((ctx->srp_ctx.login != NULL) && 102 ((s->srp_ctx.login = OPENSSL_strdup(ctx->srp_ctx.login)) == NULL)) { 115 OPENSSL_free(s->srp_ctx.login); 305 if ((x = SRP_Calc_x(s->srp_ctx.s, s->srp_ctx.login, passwd)) == NULL 399 if (s->srp_ctx.login != NULL) 400 return s->srp_ctx.login; [all...] |
| /src/lib/librmt/ |
| rmtlib.c | 210 * application designer be willing to have rexec prompt for login and 255 char login[BUFMAGIC]; local 263 user = login; 295 (void)strlcpy(user, host, sizeof(login)); 325 READ(i) = WRITE(i) = _rmt_rexec(host, login); 357 if (*login) { 358 execl(rshpath, rsh, host, "-l", login, _PATH_RMT, NULL);
|
| /src/usr.bin/id/ |
| id.c | 181 char *login; local 188 if ((login = getlogin()) == NULL) 192 if (pw == NULL || strcmp(login, pw->pw_name)) 193 (void)printf("login\t%s\n", login);
|
| /src/crypto/dist/ipsec-tools/src/racoon/ |
| isakmp_xauth.h | 84 vchar_t *login; /* xauth login */ member in struct:xauth_rmconf
|
| isakmp_xauth.c | 262 strncpy(iph1->mode_cfg->login, usr, LOGINLEN); 263 iph1->mode_cfg->login[LOGINLEN] = '\0'; 380 "login failed for user \"%s\"\n", usr); 396 "login succeeded for user \"%s\"\n", usr); 1316 /* No root login. Ever. */ 1509 if (!iph1->rmconf->xauth || !iph1->rmconf->xauth->login) { 1511 "with no login supplied\n"); 1515 dlen = iph1->rmconf->xauth->login->l - 1; 1520 if (!iph1->rmconf->xauth || !iph1->rmconf->xauth->login) 1524 usr = vmalloc(iph1->rmconf->xauth->login->l - 1 + skip) [all...] |
| /src/usr.bin/finger/ |
| util.c | 114 /* Ampersands get replaced by the login name. */ 128 expandusername(const char *gecos, const char *login, char *buf, int buflen) 141 /* buffer overflow - just use login name */ 142 snprintf(buf, buflen, "%s", login); 148 snprintf(bp, buflen - (bp - buf), "%s", login); 208 /* if last login is earlier than some current login */ 215 * discrepancy since login calls time() twice 412 /* ampersands get replaced by the login name */
|