/src/tests/usr.sbin/useradd/ |
t_useradd.sh | 30 username="test5678901234567" 41 atf_check -s exit:0 -o ignore -e ignore -x "useradd $username" 45 atf_check -s ignore -o ignore -e ignore -x "userdel $username"
|
/src/usr.bin/passwd/ |
pam_passwd.c | 73 pwpam_process(const char *username, int argc, char **argv) 97 /* username already provided */ 100 username = argv[0]; 107 (void)printf("Changing password for %s.\n", username); 110 pam_err = pam_start("passwd", username, &pamc, &pamh); 132 i_username, (unsigned long)i_uid, username, 141 i_username, (unsigned long)i_uid, username);
|
passwd.c | 114 const char *username; local in function:main 189 username = getlogin(); 190 if (username == NULL) 193 (*personality->pw_process)(username, argc, argv); 251 char *username; local in function:main 374 username = getlogin(); 375 if (username == NULL) 382 username = argv[0]; 395 valid = (*pw_modules[i].pw_chpw)(username);
|
krb5_passwd.c | 78 pwkrb5_process(const char *username, int argc, char **argv) 110 username = optarg; 124 /* username already provided */ 128 username = argv[0]; 152 ret = krb5_parse_name(context, username, &principal); 274 krb5_chpw(const char *username) 301 if(username != NULL) { 302 ret = krb5_parse_name (context, username, &principal);
|
local_passwd.c | 132 pwlocal_process(const char *username, int argc, char **argv) 164 /* username already provided */ 167 username = argv[0]; 174 if (!(pw = getpwnam(username))) 175 errx(1, "unknown user %s", username); 219 if (pw_mkdb(username, old_change == pw->pw_change) < 0) 225 uid ? username : "root", (unsigned long)uid, username);
|
yp_passwd.c | 217 pwyp_process(const char *username, int argc, char **argv) 247 /* username already provided */ 250 username = argv[0]; 295 if (!ypgetpwnam(username, &pwb) || 296 getpwnam_r(username, &pwb2, pwbuf, sizeof(pwbuf), &pw) || 298 errx(EXIT_FAILURE, "NIS unknown user %s", username); 378 yp_chpw(const char *username) 427 if (!ypgetpwnam(username, pw = &pwb) || 428 getpwnam_r(username, &pwb, pwbuf, sizeof(pwbuf), &pw) || 430 warnx("NIS unknown user %s", username); [all...] |
/src/usr.sbin/rpc.pcnfsd/ |
pcnfsd.x | 72 typedef string username<USERNAMELEN>; 74 ** The type username is used for passing the user name for a print job. 76 ** the effective identity with which it is running to username or may 243 ** id field as a uid and return the corresponding username in name. 247 ** name field as a username and return the corresponding uid in id. 289 username user; 329 username user; 361 username user; 374 username user; 393 username user [all...] |
extern.h | 11 pirstat build_pr_queue(printername, username, int, int *, int *);
|
/src/usr.bin/chpass/ |
chpass.c | 89 char *arg, *username = NULL; local in function:main 135 username = argv[0]; 157 if (username != NULL) 158 pw = getpwnam(username); 186 if (username != NULL) { 187 pw = getpwnam(username); 189 errx(1, "unknown user: %s", username); 287 if (pw_mkdb(username, 0) < 0)
|
/src/usr.bin/login/ |
common.h | 50 extern const char *username;
|
login.c | 254 username = loginname = *argv; 335 username = trimloginname(loginname); 339 * for nonexistent name (mistyped username). 341 if (failures && strcmp(tbuf, username)) { 346 (void)strlcpy(tbuf, username, sizeof(tbuf)); 348 pwd = getpwnam(username); 372 k5_read_creds(username); 387 if (skey_haskey(username) == 0) { 389 const char *skinfo = skey_keyinfo(username); 417 if (skey_haskey(username) == 0 & [all...] |
common.c | 81 const char *username; variable in typeref:typename:const char * 104 badlogin(username); 187 "passed %s != actual %s", username, tty, 206 " %s", username, tty, hname, assbuf); 209 username, tty); 246 (void)strncpy(utmpx.ut_name, username, sizeof(utmpx.ut_name)); 306 (void)strncpy(utmp.ut_name, username, sizeof(utmp.ut_name));
|
login_pam.c | 194 username = trimloginname(*argv); 240 username = trimloginname(getloginname()); 248 * for nonexistent name (mistyped username). 250 if (failures && strcmp(tbuf, username)) { 263 pam_err = pam_start("login", username, &pamc, &pamh); 294 (void)getpwnam_r(username, &pwres, pwbuf, sizeof(pwbuf), &pwd); 326 * username, pwd, and lc. 332 username = newuser; 338 (void)getpwnam_r(username, &pwres, pwbuf, sizeof(pwbuf), 398 badlogin(username); [all...] |
/src/usr.bin/mail/ |
v7.local.c | 89 username(void) function in typeref:typename:PUBLIC const char *
|
temp.c | 79 if ((cp = username()) == NULL) {
|
/src/usr.bin/error/ |
filter.c | 73 const char *username; local in function:getignored 78 if ((username = getlogin()) == NULL) { 79 username = "Unknown"; 85 if ((passwdentry = getpwnam(username)) == NULL)
|
/src/usr.bin/su/ |
su.c | 114 char *username, **np; local in function:main 185 username = getlogin(); 186 if (username == NULL || (pwd = getpwnam(username)) == NULL || 191 username = estrdup(pwd->pw_name); 220 user = username; 244 && (!use_kerberos || kerberos5(username, user, pwd->pw_uid)) 256 if ((ok = check_ingroup(-1, SU_ROOTAUTH, username, 0))) { 258 user = username; 268 ok = check_ingroup(-1, SU_GROUP, username, 1) [all...] |
su_pam.c | 109 char *username, *class; local in function:main 179 username = getlogin(); 180 if (username == NULL || 181 getpwnam_r(username, &pwres, pwbuf, sizeof(pwbuf), &pwd) != 0 || 188 username = estrdup(pwd->pw_name); 214 user = username; 241 * Fill hostname, username and tty 243 PAM_SET_ITEM(PAM_RUSER, username); 255 username, user, ontty(), safe_pam_strerror(pamh, pam_err)); 289 syslog(LOG_ERR, "unknown login: %s", username); [all...] |
/src/games/battlestar/ |
init.c | 58 username = getutmp(); 75 wiz = wizard(username);
|
globals.c | 291 const char *username; variable in typeref:typename:const char *
|
/src/lib/libskey/ |
skeylogin.c | 353 int skey_haskey(const char *username) 358 i = skeylookup(&skey, username); 371 const char *skey_keyinfo(const char *username) 377 i = skeychallenge(&skey, username, str, sizeof str); 395 int skey_passcheck(const char *username, char *passwd) 400 i = skeylookup (&skey, username); 443 int skey_authenticate(const char *username) 456 i = skeychallenge(&skey, username, skeyprompt, sizeof skeyprompt); 477 /* Hash the username if possible */ 478 if ((up = SHA1Data(username, strlen(username), NULL)) != NULL) [all...] |
/src/sys/external/bsd/drm2/dist/drm/i915/gt/uc/ |
intel_uc_fw_abi.h | 68 char username[8]; member in struct:uc_css_header
|
/src/usr.sbin/pwd_mkdb/ |
pwd_mkdb.c | 204 opendb(struct pwddb *db, const char *dbname, const char *username, 212 if (username != NULL) { 235 if (username != NULL) { 258 char *username; local in function:main 270 username = NULL; 306 username = optarg; 330 if (username != NULL) 331 if (username[0] == '+' || username[0] == '-') 351 if (username == NULL [all...] |
/src/usr.sbin/ypserv/mknetid/ |
mknetid.c | 167 add_user(const char *username, const char *uid, const char *gid) 172 idx = hashidx(username[0]); 179 u->usr_name = strdup(username); 192 add_group(const char *username, const char *gid) 198 idx = hashidx(username[0]); 202 if (strcmp(username, u->usr_name) == 0) {
|
/src/games/rogue/ |
score.c | 224 char username[80]; member in struct:score_entry 300 strlcpy(se->username, score_block+15, sizeof(se->username)); 321 rank+1, se->gold, se->username, se->death); 365 if (!strcmp(scores[i].username, login_name)) { 438 name = scores[i].username; 465 strlcpy(se->username, login_name, sizeof(se->username));
|