Lines Matching defs:user

167 	 * determine user who started uuxqt (in principle)
715 * return stuff to user
716 * user -> user to notify
717 * rmt -> system name where user resides
720 * buf -> user friendly face saving uplifting edifying missive
726 retosndr(user, rmt, file, cmd, buf, errfile)
727 char *user, *rmt, *file, *cmd, *buf, *errfile;
738 (void) strlcpy(ruser, user, sizeof (ruser));
740 (void) snprintf(ruser, sizeof (ruser), "%s!%s", rmt, user);
842 char buf[BUFSIZ], user[BUFSIZ], retaddr[BUFSIZ], retuser[BUFSIZ],
863 (void) strlcpy(user, User, sizeof (user));
883 * user name
888 (void) sscanf(&buf[1], "%32s%14s", user, origsys);
889 (void) strlcpy(origuser, user, sizeof (origuser));
966 * return address -- is user's name
973 * Creates string of Rmtname!Rmtname!user which
999 DEBUG(4, "user - %s\n", user);
1005 (void) strlcpy(user, retuser, sizeof (user)); /* pick on this guy */
1008 if ((p = strpbrk(user, Shchar)) != NULL) {
1064 /* and remote user name if available from R line */
1072 * It is true that a user can spoof this using uux, but in reality
1079 PATH, LOGNAME, Rmtname, user);
1084 PATH, LOGNAME, Rmtname, user);
1096 Rmtname, user);
1098 "execution permission denied to %s!%s", Rmtname, user);
1102 Rmtname, user);
1104 "file access denied to %s!%s", Rmtname, user);
1112 retosndr(user, Rmtname, return_stdin ? fin : "",
1119 (void) snprintf(lbuf, sizeof (lbuf), "%s!%s XQT", Rmtname, user);
1218 bname, fout, user, bname);
1265 bname, ferr, user, bname);
1283 retosndr(user, Rmtname, "", incmd, msgbuf, "");
1288 retosndr(user, Rmtname, return_stdin ? fin : "",