/osnet-11/usr/src/lib/passwdutil/ |
H A D | __check_history.c | 34 * __check_history - check if a user's new password is in the user's 38 * user = username. 43 * PWU_SUCCESS, passwd found in user's old password history. 46 * PWU_NOT_FOUND, passwd not in user's old password history. 51 __check_history(char *user, char *passwd, pwu_repository_t *rep) argument 68 /* Loop over repositories until the user is found */ 72 res = rops[i]->checkhistory(user, passwd, rep);
|
/osnet-11/usr/src/lib/libresolv2/common/irs/ |
H A D | nul_ng.c | 92 ng_next(struct irs_ng *this, const char **host, const char **user, argument 97 UNUSED(user); 105 const char *user, const char *host, const char *domain) 109 UNUSED(user); 104 ng_test(struct irs_ng *this, const char *name, const char *user, const char *host, const char *domain) argument
|
H A D | gen_ng.c | 107 ng_next(struct irs_ng *this, const char **host, const char **user, argument 115 if ((*ng->next)(ng, host, user, domain) == 1) 130 const char *user, const char *host, const char *domain) 140 rval = (*ng->test)(ng, name, user, host, domain); 129 ng_test(struct irs_ng *this, const char *name, const char *user, const char *host, const char *domain) argument
|
H A D | getnetgrent.c | 69 const char *user, const char *domain 75 return (innetgr_p(netgroup, host, user, domain, net_data)); 79 getnetgrent(NGR_R_CONST char **host, NGR_R_CONST char **user, argument 91 DE_CONST(cu, *user); 119 const char *user, const char *domain, 125 return ((*ng->test)(ng, netgroup, host, user, domain)); 129 getnetgrent_p(const char **host, const char **user, const char **domain, argument 135 return ((*ng->next)(ng, host, user, domain)); 118 innetgr_p(const char *netgroup, const char *host, const char *user, const char *domain, struct net_data *net_data) argument
|
H A D | irp_ng.c | 158 ng_next(struct irs_ng *this, const char **host, const char **user, argument 182 if (irp_unmarshall_ng(host, user, domain, body) == 0) { 201 const char *host, const char *user, const char *domain) 216 if (irp_marshall_ng(host, user, domain, &body, &bodylen) != 0) { 200 ng_test(struct irs_ng *this, const char *name, const char *host, const char *user, const char *domain) argument
|
/osnet-11/usr/src/lib/libmail/common/ |
H A D | notifyu.c | 53 notify(char *user, char *msg, int check_mesg_y, char *etcdir) argument 55 /* search the utmp file for this user */ 64 if (strncmp(user, utmpx.ut_name,
|
H A D | maillock.c | 60 maillock(char *user, int retrycnt) argument 71 (void) strcat(file, user);
|
/osnet-11/usr/src/lib/libntsvcs/common/ |
H A D | wkssvc_clnt.c | 36 char user[SMB_USERNAME_MAXLEN]; local 43 smb_ipc_get_user(user, SMB_USERNAME_MAXLEN); 45 if (ndr_rpc_bind(&handle, server, domain, user, "Workstation") != 0)
|
H A D | dssetup_clnt.c | 43 char user[SMB_USERNAME_MAXLEN]; local 69 smb_ipc_get_user(user, SMB_USERNAME_MAXLEN); 72 di.d_primary.di_nbname, user, "DSSETUP"); 141 char user[SMB_USERNAME_MAXLEN]; local 151 smb_ipc_get_user(user, SMB_USERNAME_MAXLEN); 153 rc = ndr_rpc_bind(&handle, server, domain, user, "DSSETUP");
|
/osnet-11/usr/src/lib/libeti/panel/inc/ |
H A D | panel.h | 50 char *user; member in struct:PANEL
|
/osnet-11/usr/src/grub/grub2/grub-core/commands/ |
H A D | password.c | 34 check_password (const char *user, const char *entered, argument 40 grub_auth_authenticate (user); 46 grub_normal_set_password (const char *user, const char *password) argument 60 err = grub_auth_register_authentication (user, check_password, pass); 87 N_("Set user password (plaintext). "
|
H A D | password_pbkdf2.c | 43 check_password (const char *user, const char *entered, void *pin) argument 66 grub_auth_authenticate (user); 194 N_("Set user password (PBKDF2). "));
|
/osnet-11/usr/src/cmd/cmd-inet/usr.bin/pppd/plugins/ |
H A D | passprompt.c | 27 static int promptpass(char *user, char *passwd) argument 38 if (user != NULL && passwd == NULL) 71 argv[1] = user == NULL ? "" : user;
|
/osnet-11/usr/src/lib/libast/common/misc/ |
H A D | optjoin.c | 58 int user; local 75 user = (*fun)(argv, 0); 84 if (!user)
|
/osnet-11/usr/src/lib/libbsm/common/ |
H A D | au_usermask.c | 54 * Build user's audit preselection mask. 56 * per-user audit flags are optional and may be missing. 60 * success flags = (system default success flags + per-user always success) - 61 * per-user never success flags 62 * failure flags = (system default failure flags + per-user always failure) - 63 * per-user never failure flags 67 au_user_mask(char *user, au_mask_t *mask) argument 80 * now and don't bother trying to get the user specific flags. 89 * Get per-user audit flags. 91 (void) _enum_attrs(user, audit_flag [all...] |
/osnet-11/usr/src/lib/pam_modules/allow/ |
H A D | allow.c | 49 char *user = NULL; local 56 (void) pam_get_item(pamh, PAM_USER, (void **)&user); 60 user ? user : "No User Specified");
|
/osnet-11/usr/src/lib/pam_modules/deny/ |
H A D | deny.c | 49 char *user; local 56 (void) pam_get_item(pamh, PAM_USER, (void **)&user); 60 user ? user : "No User Specified");
|
/osnet-11/usr/src/lib/pam_modules/ldap/ |
H A D | ldap_authenticate.c | 43 * Authenticate user. 54 char *user = NULL; local 63 /* Get the service and user */ 66 (err = pam_get_item(pamh, PAM_USER, (void **)&user)) != PAM_SUCCESS) 89 service, (user && *user != '\0')?user:"no-user", flags, 92 if (!user || *user [all...] |
/osnet-11/usr/src/lib/pam_modules/tsol_acct/ |
H A D | tsol_acct.c | 42 * Validates that the user's label range contains 62 char *user; local 83 (void) pam_get_item(pamh, PAM_USER, (void **)&user); 89 "pam_tsol_account: allowed_unlabeled = %d, user %s, " 92 (user == NULL) ? "NULL" : (user == '\0') ? "ZERO" : 93 user, 97 if (user == NULL || *user == '\0') { 99 "pam_tsol_account: no user"); [all...] |
/osnet-11/usr/src/lib/libgss/ |
H A D | g_userok.c | 39 const char *user, 51 gss_user.value = (void *)user; 81 *user_ok = 1; /* remote user is a-ok */ 92 const char *user, 104 if (name == NULL || user == NULL) 124 user, user_ok); 127 name, user, user_ok); 36 compare_names(OM_uint32 *minor, const gss_OID mech_type, const gss_name_t name, const char *user, int *user_ok) argument 90 __gss_userok(OM_uint32 *minor, const gss_name_t name, const char *user, int *user_ok) argument
|
/osnet-11/usr/src/cmd/policykit/ |
H A D | polkit-is-privileged.c | 4 * polkit-is-privileged.c : Determine if a user has privileges 48 " -u, --user Username or user id\n" 56 "Queries system policy whether a given user is allowed for a given\n" 65 char *user = NULL; local 70 {"user", required_argument, NULL, 'u'}, 103 user = g_strdup (optarg); 134 if (user == NULL || privilege == NULL) { 140 printf ("user = '%s'\n", user); [all...] |
/osnet-11/usr/src/lib/pam_modules/sample/ |
H A D | sample_acct_mgmt.c | 39 * It may need to force the user to change his/her 50 char *user; local 62 if (pam_get_item(pamh, PAM_USER, (void **)&user) != PAM_SUCCESS) 70 * we want to use the policy of the current user not the "destination" 71 * user. This will enable us to prevent su to root but not to rlogin, 74 * description of problem: user name is the "destination" name. not 76 * current name in the case of su. user is "root" in this case and 77 * we will be getting the root policy instead of the user policy. 86 user = pw->pw_name; 89 if (user [all...] |
/osnet-11/usr/src/lib/pam_modules/smb/ |
H A D | smb_passwd.c | 83 char *user, *local_user; local 111 (void) pam_get_item(pamh, PAM_USER, (void **)&user); 113 if (user == NULL || *user == '\0') { 127 /* Check to see if this is a local user */ 131 res = __user_to_authenticate(user, &files_rep, &local_user, 136 /* if not a local user, ignore */ 139 "pam_smb_passwd: %s is not local", user); 150 res = smb_pwd_setpasswd(user, newpw); 155 * now map the various return states to user message [all...] |
/osnet-11/usr/src/lib/pam_modules/smbfs/ |
H A D | smbfs_login.c | 57 char *user; local 81 (void) pam_get_item(pamh, PAM_USER, (void **)&user); 83 if (user == NULL || *user == '\0') { 88 if (getpwnam_r(user, &pwbuf, buf, sizeof (buf)) == NULL) { 90 "pam_smbfs_login: username %s can't be found", user); 109 "pam_smbfs_login: service %s, dom %s, user %s", 110 service, dom, user); 113 res = smbfs_keychain_add(uid, dom, user, pw, B_FALSE); 116 res = smbfs_keychain_del(uid, dom, user, B_FALS [all...] |
/osnet-11/usr/src/lib/pam_modules/unix_session/ |
H A D | unix_session.c | 90 char *ttyn, *rhost, *user; local 113 (error = pam_get_item(pamh, PAM_USER, (void **)&user)) 120 if (user == NULL || *user == '\0') 127 if (getpwnam_r(user, &pwd, buffer, sizeof (buffer)) == NULL) { 177 "user = %s, time = %s, tty = %s, host = %s.", 178 user, buf, newll.ll_line, newll.ll_host);
|