HomeSort by: relevance | last modified time | path
    Searched refs:login (Results 1 - 25 of 81) sorted by relevancy

1 2 3 4

  /src/lib/libutil/compat/
compat_login.c 35 static char sccsid[] = "@(#)login.c 8.1 (Berkeley) 6/4/93";
56 __warn_references(login,
57 "warning: reference to compatibility login(); include <util.h> to generate correct reference")
60 login(const struct utmp50 *ut50) function
util.h 47 void login(const struct utmp50 *);
  /src/external/gpl3/gcc/dist/libgfortran/intrinsics/
getlog.c 63 /* GETLOG (LOGIN), g77 intrinsic for retrieving the login name for the
65 CHARACTER(len=*), INTENT(OUT) :: LOGIN */
71 PREFIX(getlog) (char * login, gfc_charlen_type login_len)
75 memset (login, ' ', login_len); /* Blank the string. */
112 memcpy (login, p, p_len);
  /src/external/gpl3/gcc.old/dist/libgfortran/intrinsics/
getlog.c 63 /* GETLOG (LOGIN), g77 intrinsic for retrieving the login name for the
65 CHARACTER(len=*), INTENT(OUT) :: LOGIN */
71 PREFIX(getlog) (char * login, gfc_charlen_type login_len)
75 memset (login, ' ', login_len); /* Blank the string. */
112 memcpy (login, p, p_len);
  /src/tests/usr.bin/id/
pwgr.c 45 char Login[16];
82 strcpy(Login, "test");
83 return Login;
150 getpwnam(const char *login)
155 if (strcmp(login, "root") == 0) {
159 } else if (strcmp(login, "test") == 0) {
  /src/distrib/utils/libhack/
utmp.c 14 login(ut) function
  /src/crypto/external/apache2/openssl/dist/apps/lib/
tlssrp_depr.c 158 if (p->login == NULL && p->user == NULL) {
159 p->login = SSL_get_srp_username(s);
160 BIO_printf(bio_err, "SRP username = \"%s\"\n", p->login);
165 BIO_printf(bio_err, "User %s doesn't exist\n", p->login);
177 p->login, p->user->info);
183 p->login = NULL;
194 srp_callback_parm->login = NULL;
219 srp_callback_parm->login);
  /src/crypto/external/bsd/heimdal/dist/tests/java/
KerberosInit.java 37 import javax.security.auth.login.*;
84 lc.login();
91 System.out.println("lc.login ok");
  /src/crypto/external/bsd/openssl/dist/apps/lib/
tlssrp_depr.c 163 if (p->login == NULL && p->user == NULL) {
164 p->login = SSL_get_srp_username(s);
165 BIO_printf(bio_err, "SRP username = \"%s\"\n", p->login);
170 BIO_printf(bio_err, "User %s doesn't exist\n", p->login);
182 p->login, p->user->info);
188 p->login = NULL;
199 srp_callback_parm->login = NULL;
224 srp_callback_parm->login);
  /src/lib/libutil/
login.c 1 /* $NetBSD: login.c,v 1.16 2003/08/07 16:44:58 agc Exp $ */
35 static char sccsid[] = "@(#)login.c 8.1 (Berkeley) 6/4/93";
37 __RCSID("$NetBSD: login.c,v 1.16 2003/08/07 16:44:58 agc Exp $");
53 login(const struct utmp *ut) function
  /src/usr.bin/write/
write.c 218 const char *login; local
224 /* Determine our login name before we re-open stdout */
225 if ((login = getlogin()) == NULL) {
227 login = pwd->pw_name;
228 else login = "???";
247 login, host, mytty, nows + 11);
  /src/external/bsd/libbind/dist/irs/
getpwent_r.c 55 __posix_getpwnam_r(const char *login, struct passwd *pwptr,
59 getpwnam_r(const char *login, struct passwd *pwptr,
62 struct passwd *pw = getpwnam(login);
77 getpwnam_r(const char *login, struct passwd *pwptr, char *buf, int buflen) {
78 struct passwd *pw = getpwnam(login);
266 /* copy login shell */
  /src/bin/sh/
option.list 64 loginsh login l # a login shell
  /src/external/gpl2/rcs/dist/src/
rcs.c 234 char const *login; member in struct:chaccess
352 getchaccess(str_save(AccessList->login),append);
708 getchaccess(login, command)
709 char const *login;
715 pt->login = login;
744 error("missing login name after option -a or -e");
982 if (!ch->login) {
989 if (strcmp(ch->login, t->login) == 0)
    [all...]
rlog.c 164 char const * login; /* lockerlist */ member in struct:rcslockers
173 struct authors { /* login names in author option; */
174 char const * login; /* stored in authorlist */ member in struct:authors
406 aprintf(out, symbolFormat, currlock->login,
416 aprintf(out, accessFormat, curaccess->login);
746 /* function : get the login names of lockers from command line */
763 newlocker->login = argv;
791 authorlist->login = getusername(false);
799 newauthor->login = argv;
861 if (strcmp(plocker->login, p->login) == 0)
    [all...]
rcssyn.c 273 newaccess->login = id;
307 newlock->login=id;
468 currlock->delta->lockedby = currlock->login;
  /src/external/gpl2/xcvs/dist/contrib/
log.in 98 my $login;
111 $login = shift @ARGV;
141 # get a login name for the guy doing the commit....
143 if ($login eq '') {
144 $login = getlogin || (getpwuid($<))[0] || "nobody";
166 $logfh->print ("Author:\t$login\n\n");
171 $mailfh->print ("Author:\t$login\n\n");
  /src/crypto/external/apache2/openssl/dist/ssl/
tls_srp.c 37 OPENSSL_free(ctx->srp_ctx.login);
65 OPENSSL_free(s->srp_ctx.login);
102 /* set client Hello login callback */
115 if ((ctx->srp_ctx.login != NULL) && ((s->srp_ctx.login = OPENSSL_strdup(ctx->srp_ctx.login)) == NULL)) {
127 OPENSSL_free(s->srp_ctx.login);
359 if ((x = SRP_Calc_x_ex(s->srp_ctx.s, s->srp_ctx.login, passwd,
485 if (sc->srp_ctx.login != NULL)
486 return sc->srp_ctx.login;
    [all...]
  /src/crypto/external/bsd/openssl/dist/ssl/
tls_srp.c 36 OPENSSL_free(ctx->srp_ctx.login);
64 OPENSSL_free(s->srp_ctx.login);
98 /* set client Hello login callback */
129 if ((ctx->srp_ctx.login != NULL) &&
130 ((s->srp_ctx.login = OPENSSL_strdup(ctx->srp_ctx.login)) == NULL)) {
143 OPENSSL_free(s->srp_ctx.login);
355 if ((x = SRP_Calc_x_ex(s->srp_ctx.s, s->srp_ctx.login, passwd,
455 if (s->srp_ctx.login != NULL)
456 return s->srp_ctx.login;
    [all...]
  /src/crypto/external/bsd/openssl.old/dist/ssl/
tls_srp.c 26 OPENSSL_free(ctx->srp_ctx.login);
45 OPENSSL_free(s->srp_ctx.login);
70 /* set client Hello login callback */
101 if ((ctx->srp_ctx.login != NULL) &&
102 ((s->srp_ctx.login = OPENSSL_strdup(ctx->srp_ctx.login)) == NULL)) {
115 OPENSSL_free(s->srp_ctx.login);
305 if ((x = SRP_Calc_x(s->srp_ctx.s, s->srp_ctx.login, passwd)) == NULL
399 if (s->srp_ctx.login != NULL)
400 return s->srp_ctx.login;
    [all...]
  /src/lib/librmt/
rmtlib.c 210 * application designer be willing to have rexec prompt for login and
255 char login[BUFMAGIC]; local
263 user = login;
295 (void)strlcpy(user, host, sizeof(login));
325 READ(i) = WRITE(i) = _rmt_rexec(host, login);
357 if (*login) {
358 execl(rshpath, rsh, host, "-l", login, _PATH_RMT, NULL);
  /src/usr.bin/id/
id.c 181 char *login; local
188 if ((login = getlogin()) == NULL)
192 if (pw == NULL || strcmp(login, pw->pw_name))
193 (void)printf("login\t%s\n", login);
  /src/crypto/dist/ipsec-tools/src/racoon/
isakmp_xauth.h 84 vchar_t *login; /* xauth login */ member in struct:xauth_rmconf
isakmp_xauth.c 262 strncpy(iph1->mode_cfg->login, usr, LOGINLEN);
263 iph1->mode_cfg->login[LOGINLEN] = '\0';
380 "login failed for user \"%s\"\n", usr);
396 "login succeeded for user \"%s\"\n", usr);
1316 /* No root login. Ever. */
1509 if (!iph1->rmconf->xauth || !iph1->rmconf->xauth->login) {
1511 "with no login supplied\n");
1515 dlen = iph1->rmconf->xauth->login->l - 1;
1520 if (!iph1->rmconf->xauth || !iph1->rmconf->xauth->login)
1524 usr = vmalloc(iph1->rmconf->xauth->login->l - 1 + skip)
    [all...]
  /src/usr.bin/finger/
util.c 114 /* Ampersands get replaced by the login name. */
128 expandusername(const char *gecos, const char *login, char *buf, int buflen)
141 /* buffer overflow - just use login name */
142 snprintf(buf, buflen, "%s", login);
148 snprintf(bp, buflen - (bp - buf), "%s", login);
208 /* if last login is earlier than some current login */
215 * discrepancy since login calls time() twice
412 /* ampersands get replaced by the login name */

Completed in 38 milliseconds

1 2 3 4