Searched defs:user (Results 1 - 25 of 139) sorted by relevance

123456

/osnet-11/usr/src/lib/passwdutil/
H A D__check_history.c34 * __check_history - check if a user's new password is in the user's
38 * user = username.
43 * PWU_SUCCESS, passwd found in user's old password history.
46 * PWU_NOT_FOUND, passwd not in user's old password history.
51 __check_history(char *user, char *passwd, pwu_repository_t *rep) argument
68 /* Loop over repositories until the user is found */
72 res = rops[i]->checkhistory(user, passwd, rep);
/osnet-11/usr/src/lib/libresolv2/common/irs/
H A Dnul_ng.c92 ng_next(struct irs_ng *this, const char **host, const char **user, argument
97 UNUSED(user);
105 const char *user, const char *host, const char *domain)
109 UNUSED(user);
104 ng_test(struct irs_ng *this, const char *name, const char *user, const char *host, const char *domain) argument
H A Dgen_ng.c107 ng_next(struct irs_ng *this, const char **host, const char **user, argument
115 if ((*ng->next)(ng, host, user, domain) == 1)
130 const char *user, const char *host, const char *domain)
140 rval = (*ng->test)(ng, name, user, host, domain);
129 ng_test(struct irs_ng *this, const char *name, const char *user, const char *host, const char *domain) argument
H A Dgetnetgrent.c69 const char *user, const char *domain
75 return (innetgr_p(netgroup, host, user, domain, net_data));
79 getnetgrent(NGR_R_CONST char **host, NGR_R_CONST char **user, argument
91 DE_CONST(cu, *user);
119 const char *user, const char *domain,
125 return ((*ng->test)(ng, netgroup, host, user, domain));
129 getnetgrent_p(const char **host, const char **user, const char **domain, argument
135 return ((*ng->next)(ng, host, user, domain));
118 innetgr_p(const char *netgroup, const char *host, const char *user, const char *domain, struct net_data *net_data) argument
H A Dirp_ng.c158 ng_next(struct irs_ng *this, const char **host, const char **user, argument
182 if (irp_unmarshall_ng(host, user, domain, body) == 0) {
201 const char *host, const char *user, const char *domain)
216 if (irp_marshall_ng(host, user, domain, &body, &bodylen) != 0) {
200 ng_test(struct irs_ng *this, const char *name, const char *host, const char *user, const char *domain) argument
/osnet-11/usr/src/lib/libmail/common/
H A Dnotifyu.c53 notify(char *user, char *msg, int check_mesg_y, char *etcdir) argument
55 /* search the utmp file for this user */
64 if (strncmp(user, utmpx.ut_name,
H A Dmaillock.c60 maillock(char *user, int retrycnt) argument
71 (void) strcat(file, user);
/osnet-11/usr/src/lib/libntsvcs/common/
H A Dwkssvc_clnt.c36 char user[SMB_USERNAME_MAXLEN]; local
43 smb_ipc_get_user(user, SMB_USERNAME_MAXLEN);
45 if (ndr_rpc_bind(&handle, server, domain, user, "Workstation") != 0)
H A Ddssetup_clnt.c43 char user[SMB_USERNAME_MAXLEN]; local
69 smb_ipc_get_user(user, SMB_USERNAME_MAXLEN);
72 di.d_primary.di_nbname, user, "DSSETUP");
141 char user[SMB_USERNAME_MAXLEN]; local
151 smb_ipc_get_user(user, SMB_USERNAME_MAXLEN);
153 rc = ndr_rpc_bind(&handle, server, domain, user, "DSSETUP");
/osnet-11/usr/src/lib/libeti/panel/inc/
H A Dpanel.h50 char *user; member in struct:PANEL
/osnet-11/usr/src/grub/grub2/grub-core/commands/
H A Dpassword.c34 check_password (const char *user, const char *entered, argument
40 grub_auth_authenticate (user);
46 grub_normal_set_password (const char *user, const char *password) argument
60 err = grub_auth_register_authentication (user, check_password, pass);
87 N_("Set user password (plaintext). "
H A Dpassword_pbkdf2.c43 check_password (const char *user, const char *entered, void *pin) argument
66 grub_auth_authenticate (user);
194 N_("Set user password (PBKDF2). "));
/osnet-11/usr/src/cmd/cmd-inet/usr.bin/pppd/plugins/
H A Dpassprompt.c27 static int promptpass(char *user, char *passwd) argument
38 if (user != NULL && passwd == NULL)
71 argv[1] = user == NULL ? "" : user;
/osnet-11/usr/src/lib/libast/common/misc/
H A Doptjoin.c58 int user; local
75 user = (*fun)(argv, 0);
84 if (!user)
/osnet-11/usr/src/lib/libbsm/common/
H A Dau_usermask.c54 * Build user's audit preselection mask.
56 * per-user audit flags are optional and may be missing.
60 * success flags = (system default success flags + per-user always success) -
61 * per-user never success flags
62 * failure flags = (system default failure flags + per-user always failure) -
63 * per-user never failure flags
67 au_user_mask(char *user, au_mask_t *mask) argument
80 * now and don't bother trying to get the user specific flags.
89 * Get per-user audit flags.
91 (void) _enum_attrs(user, audit_flag
[all...]
/osnet-11/usr/src/lib/pam_modules/allow/
H A Dallow.c49 char *user = NULL; local
56 (void) pam_get_item(pamh, PAM_USER, (void **)&user);
60 user ? user : "No User Specified");
/osnet-11/usr/src/lib/pam_modules/deny/
H A Ddeny.c49 char *user; local
56 (void) pam_get_item(pamh, PAM_USER, (void **)&user);
60 user ? user : "No User Specified");
/osnet-11/usr/src/lib/pam_modules/ldap/
H A Dldap_authenticate.c43 * Authenticate user.
54 char *user = NULL; local
63 /* Get the service and user */
66 (err = pam_get_item(pamh, PAM_USER, (void **)&user)) != PAM_SUCCESS)
89 service, (user && *user != '\0')?user:"no-user", flags,
92 if (!user || *user
[all...]
/osnet-11/usr/src/lib/pam_modules/tsol_acct/
H A Dtsol_acct.c42 * Validates that the user's label range contains
62 char *user; local
83 (void) pam_get_item(pamh, PAM_USER, (void **)&user);
89 "pam_tsol_account: allowed_unlabeled = %d, user %s, "
92 (user == NULL) ? "NULL" : (user == '\0') ? "ZERO" :
93 user,
97 if (user == NULL || *user == '\0') {
99 "pam_tsol_account: no user");
[all...]
/osnet-11/usr/src/lib/libgss/
H A Dg_userok.c39 const char *user,
51 gss_user.value = (void *)user;
81 *user_ok = 1; /* remote user is a-ok */
92 const char *user,
104 if (name == NULL || user == NULL)
124 user, user_ok);
127 name, user, user_ok);
36 compare_names(OM_uint32 *minor, const gss_OID mech_type, const gss_name_t name, const char *user, int *user_ok) argument
90 __gss_userok(OM_uint32 *minor, const gss_name_t name, const char *user, int *user_ok) argument
/osnet-11/usr/src/cmd/policykit/
H A Dpolkit-is-privileged.c4 * polkit-is-privileged.c : Determine if a user has privileges
48 " -u, --user Username or user id\n"
56 "Queries system policy whether a given user is allowed for a given\n"
65 char *user = NULL; local
70 {"user", required_argument, NULL, 'u'},
103 user = g_strdup (optarg);
134 if (user == NULL || privilege == NULL) {
140 printf ("user = '%s'\n", user);
[all...]
/osnet-11/usr/src/lib/pam_modules/sample/
H A Dsample_acct_mgmt.c39 * It may need to force the user to change his/her
50 char *user; local
62 if (pam_get_item(pamh, PAM_USER, (void **)&user) != PAM_SUCCESS)
70 * we want to use the policy of the current user not the "destination"
71 * user. This will enable us to prevent su to root but not to rlogin,
74 * description of problem: user name is the "destination" name. not
76 * current name in the case of su. user is "root" in this case and
77 * we will be getting the root policy instead of the user policy.
86 user = pw->pw_name;
89 if (user
[all...]
/osnet-11/usr/src/lib/pam_modules/smb/
H A Dsmb_passwd.c83 char *user, *local_user; local
111 (void) pam_get_item(pamh, PAM_USER, (void **)&user);
113 if (user == NULL || *user == '\0') {
127 /* Check to see if this is a local user */
131 res = __user_to_authenticate(user, &files_rep, &local_user,
136 /* if not a local user, ignore */
139 "pam_smb_passwd: %s is not local", user);
150 res = smb_pwd_setpasswd(user, newpw);
155 * now map the various return states to user message
[all...]
/osnet-11/usr/src/lib/pam_modules/smbfs/
H A Dsmbfs_login.c57 char *user; local
81 (void) pam_get_item(pamh, PAM_USER, (void **)&user);
83 if (user == NULL || *user == '\0') {
88 if (getpwnam_r(user, &pwbuf, buf, sizeof (buf)) == NULL) {
90 "pam_smbfs_login: username %s can't be found", user);
109 "pam_smbfs_login: service %s, dom %s, user %s",
110 service, dom, user);
113 res = smbfs_keychain_add(uid, dom, user, pw, B_FALSE);
116 res = smbfs_keychain_del(uid, dom, user, B_FALS
[all...]
/osnet-11/usr/src/lib/pam_modules/unix_session/
H A Dunix_session.c90 char *ttyn, *rhost, *user; local
113 (error = pam_get_item(pamh, PAM_USER, (void **)&user))
120 if (user == NULL || *user == '\0')
127 if (getpwnam_r(user, &pwd, buffer, sizeof (buffer)) == NULL) {
177 "user = %s, time = %s, tty = %s, host = %s.",
178 user, buf, newll.ll_line, newll.ll_host);

Completed in 80 milliseconds

123456