/src/lib/libpam/modules/pam_self/ |
pam_self.c | 64 const char *luser; local in function:pam_sm_authenticate 69 pam_err = pam_get_user(pamh, &luser, NULL); 72 if (luser == NULL || 73 getpwnam_r(luser, &pwres, pwbuf, sizeof(pwbuf), &pwd) != 0 ||
|
/src/usr.sbin/lpr/lprm/ |
lprm.c | 80 static char luser[16]; /* buffer for person */ variable in typeref:typename:char[16] 99 if (strlen(p->pw_name) >= sizeof(luser)) 101 strlcpy(luser, p->pw_name, sizeof(luser)); 102 person = luser;
|
/src/dist/pf/usr.sbin/authpf/ |
authpf.c | 60 char luser[MAXLOGNAME]; /* username */ variable in typeref:typename:char[] 158 if (strlcpy(luser, pw->pw_name, sizeof(luser)) >= sizeof(luser)) { 164 luser, (long)getpid())) < 0 || (u_int)n >= sizeof(rulesetname)) { 166 luser, (long)getpid(), (long)getpid()); 279 if (!check_luser(PATH_BAN_DIR, luser) || !allowed_luser(luser)) { 280 syslog(LOG_INFO, "user %s prohibited", luser); 296 fprintf(pidfp, "%ld\n%s\n", (long)getpid(), luser); [all...] |
/src/lib/libc/net/ |
rcmd.c | 599 ruserok(const char *rhost, int superuser, const char *ruser, const char *luser) 606 _DIAGASSERT(luser != NULL); 617 ruser, luser) == 0) { 636 iruserok(u_int32_t raddr, int superuser, const char *ruser, const char *luser) 647 luser); 656 const char *luser) 670 _DIAGASSERT(luser != NULL); 679 if (__ivaliduser_sa(hostf, sa, (socklen_t)rlen, luser, 690 if (getpwnam_r(luser, &pwres, pwbuf, sizeof(pwbuf), &pwd) != 0 728 luser, ruser) [all...] |
/src/lib/libpam/modules/pam_krb5/ |
pam_krb5.c | 133 char *principal, *princ_name, *ccache_name, luser[32], *srvdup; local in function:pam_sm_authenticate 276 sizeof(luser), luser); 285 retval = pam_set_item(pamh, PAM_USER, luser);
|
/src/usr.bin/ftp/ |
util.c | 372 ftp_login(const char *host, const char *luser, const char *lpass) 382 if (luser) 383 fuser = ftp_strdup(luser);
|