Searched defs:username (Results 1 - 25 of 68) sorted by relevance

123

/illumos-gate/usr/src/lib/passwdutil/
H A D__failed_count.c31 __incr_failed_count(char *username, char *repname, int max_failures) argument
53 if ((ret = ops->getpwnam(username, items, NULL, &buf)) != PWU_SUCCESS) {
66 max_failures, username);
72 if (((ret = ops->putpwnam(username, NULL, NULL, buf)) ==
90 __rst_failed_count(char *username, char *repname) argument
112 if ((ret = ops->getpwnam(username, items, NULL, &buf)) != PWU_SUCCESS)
116 ret = ops->putpwnam(username, NULL, NULL, buf);
/illumos-gate/usr/src/uts/common/fs/smbclnt/netsmb/
H A Dsmb_pass.h46 char *username; /* Windows User name */ member in struct:smb_passid
/illumos-gate/usr/src/cmd/roles/
H A Droles.c73 show_roles(char *username, int print_name) argument
79 if (username == NULL) {
85 username = pw->pw_name;
86 } else if (getpwnam(username) == NULL) {
87 (void) fprintf(stderr, "%s: %s : ", progname, username);
92 if ((user = getusernam(username)) != NULL) {
96 if (print_name && username != NULL)
97 (void) printf("%s : ", username);
101 if (print_name && username != NULL)
102 (void) printf("%s : ", username);
[all...]
/illumos-gate/usr/src/cmd/vntsd/
H A Dauth.c110 * username The name of a user account to check authorization
118 auth_check_username(char *username, char *group_name) argument
125 if ((username == NULL) || (username[0] == '\0') ||
137 auth_granted = chkauthattr(VNTSD_AUTH_ALLCONS, username);
141 auth_granted = chkauthattr(authname, username);
164 char *username = NULL; local
176 username = passwdp->pw_name;
179 return (auth_check_username(username, group_name));
/illumos-gate/usr/src/lib/pam_modules/roles/
H A Droles.c55 char *username; local
66 (void) pam_get_item(pamh, PAM_USER, (void **)&username);
91 allow_remote, (username) ? username : "not set",
96 if (username == NULL)
99 /* stop masquerades by mapping username to uid to username */
101 if ((pw_entry = getpwnam_r(username, &pwd, buf, sizeof (buf))) == NULL)
121 /* username is a role */
123 if (strcmp(username, pw_entr
[all...]
/illumos-gate/usr/src/lib/print/libhttp-core/common/
H A Dhttp-support.c68 char *username, /* O - Username [1024] */
73 httpSeparate2(uri, method, 32, username, HTTP_MAX_URI, host, HTTP_MAX_URI,
87 char *username, /* O - Username */
88 int usernamelen, /* I - Size of username buffer */
104 if (uri == NULL || method == NULL || username == NULL || host == NULL ||
161 username[0] = '\0';
176 username[0] = '\0';
183 * Grab the username, if any...
194 * Got a username:password combo...
197 uri = http_copy_decode(username, ur
66 httpSeparate(const char *uri, char *method, char *username, char *host, int *port, char *resource) argument
84 httpSeparate2(const char *uri, char *method, int methodlen, char *username, int usernamelen, char *host, int hostlen, int *port, char *resource, int resourcelen) argument
[all...]
/illumos-gate/usr/src/lib/smbsrv/libmlsvc/common/
H A Dsamlib.h91 char *username; member in struct:samr_user_info::info1
99 char *username; member in struct:samr_user_info::info6
104 char *username; member in struct:samr_user_info::info7
H A Dsrvsvc_clnt.c54 * If username argument is NULL, an anonymous connection will be established.
58 srvsvc_open(char *server, char *domain, char *username, mlsvc_handle_t *handle) argument
70 if (username == NULL)
71 username = MLSVC_ANON_USER;
73 if (ndr_rpc_bind(handle, server, domain, username, "SRVSVC") != 0)
H A Dmlsvc_client.c86 char *username, const char *service)
97 domain == NULL || username == NULL)
121 if (strcmp(username, MLSVC_ANON_USER) == 0)
122 username = "";
133 status = smbrdr_ctx_new(&ctx, server, domain, username);
137 server, domain, username,
85 ndr_rpc_bind(mlsvc_handle_t *handle, char *server, char *domain, char *username, const char *service) argument
/illumos-gate/usr/src/cmd/sgs/error/common/
H A Derrorfilter.c62 char *username; local
67 if ((username = (char *)getlogin()) == NULL) {
68 username = "Unknown";
74 if ((passwdentry = getpwnam(username)) == NULL)
/illumos-gate/usr/src/cmd/ldap/common/
H A Dldaptool-sasl.c32 char *username; member in struct:__anon728
41 ldaptool_set_sasl_defaults ( LDAP *ld, char *mech, char *authid, char *username, argument
59 if (username)
60 defaults->username = username;
62 ldap_get_option(ld, LDAP_OPT_X_SASL_AUTHZID, &defaults->username);
108 defvalue = defaults->username;
/illumos-gate/usr/src/lib/pam_modules/krb5/
H A Dkrb5_setcred.c371 char *username = NULL; local
480 username = strdup(client_name);
481 if (username == NULL) {
487 if ((tmpname = strchr(username, '@')))
490 if (get_pw_uid(username, &uuid) == 0 ||
491 get_pw_gid(username, &ugid) == 0) {
495 username);
541 username);
550 username, filepath);
587 if (username)
[all...]
/illumos-gate/usr/src/lib/pam_modules/list/
H A Dlist.c70 char *username = NULL; local
166 (void) pam_get_item(pamh, PAM_USER, (void**)&username);
168 if ((check_user || check_exact) && ((username == NULL) ||
169 (*username == '\0'))) {
171 "pam_list: username not supplied, critical error");
191 (rhost != NULL) ? rhost : "", username);
291 if (innetgr(bufp, rhost, username,
298 userok = innetgr(bufp, NULL, username,
316 if (strcmp(bufp, username) == 0) {
/illumos-gate/usr/src/cmd/profiles/
H A Dprofiles.c126 show_profs(char *username, int print_flag) argument
132 if (username == NULL) {
139 username = pw->pw_name;
140 } else if (getpwnam(username) == NULL) {
142 (void) fprintf(stderr, "%s: %s: ", progname, username);
148 exec = getexecuser(username, KV_COMMAND, NULL,
158 (void) _enum_profs(username, show_profs_callback, &print_flag,
166 (void) fprintf(stderr, "%s: %s: ", progname, username);
/illumos-gate/usr/src/cmd/auths/
H A Dauths.c90 show_auths(char *username, int print_name) argument
97 if (username == NULL) {
104 username = pw->pw_name;
105 } else if (getpwnam(username) == NULL) {
107 (void) fprintf(stderr, "%s: %s : ", progname, username);
112 (void) _enum_auths(username, add_auth, NULL, &cbs);
118 (void) fprintf(stderr, "%s: %s: ", progname, username);
124 (void) printf("%s: ", username);
/illumos-gate/usr/src/uts/common/io/scsi/adapters/iscsi/
H A DiscsiAuthClientGlue.c40 * username - Incoming username from the the target.
45 char *username, unsigned int id, uchar_t *challengeData,
63 "no incoming username configured to authenticate target",
67 if (strcmp(username, isp->sess_auth.username_in) != 0) {
69 "received incorrect username from target",
116 isp->sess_auth.username,
44 iscsiAuthClientChapAuthRequest(IscsiAuthClient *client, char *username, unsigned int id, uchar_t *challengeData, unsigned int challengeLength, uchar_t *responseData, unsigned int responseLength) argument
/illumos-gate/usr/src/cmd/smbsrv/smbd/
H A Dsmbd_logon.c91 char *username; local
118 username = tmp_user.lg_e_username;
127 username = token->tkn_account_name;
169 event->adt_smbd_session.username = username;
188 entry->sa_username = strdup(username);
256 event->adt_smbd_logoff.username = entry->sa_username;
/illumos-gate/usr/src/lib/nsswitch/ldap/common/
H A Dgetgrent.c45 * Group membership can be defined by either username or DN, so when searching
47 * filter is replaced by username, the second by DN.
160 * a DN, otherwise as a username.
164 /* Fail if we can't pull a username out of the RDN */
277 * (const char *)argp->username; (size_t)strlen(argp->username);
296 char *username, **dn_attr, *dn; local
300 if (strcmp(argp->username, "") == 0 ||
301 strcmp(argp->username, "root") == 0)
304 if (_ldap_filter_name(name, argp->username, sizeo
[all...]
/illumos-gate/usr/src/lib/sasl_plugins/login/
H A Dlogin.c79 char *username; member in struct:context
131 /* demand username */
145 "username too long (>1024 characters)");
147 SETERROR(params->utils, "username too long (>1024 characters)");
152 /* get username */
153 text->username =
155 if (!text->username) {
160 strncpy(text->username, clientin, clientinlen);
162 text->username[clientinlen] = '\0';
201 /* canonicalize username firs
[all...]
/illumos-gate/usr/src/lib/libsecdb/common/
H A Dgetexecattr.c117 getexecuser(const char *username, const char *type, const char *id, argument
132 if (username == NULL) {
167 head = userprof(username, type, id, search_flag);
260 userprof(const char *username, const char *type, const char *id, argument
270 * Check if specified username is valid user
272 if (getpwnam_r(username, &pwd, pwdb, sizeof (pwdb)) == NULL) {
281 (void) _enum_profs(username, findexecattr, &call, &result);
/illumos-gate/usr/src/lib/libtsol/common/
H A Dmisc.c417 * Entry username of user
427 getuserrange(const char *username) argument
454 if ((userp = getusernam(username)) != NULL) {
/illumos-gate/usr/src/lib/libc/port/gen/
H A Dgetgrnam_r.c221 * username Username of the putative member
242 _getgroupsbymember(const char *username, gid_t gid_array[], argument
248 arg.username = username;
424 const char *username = gbm->username; local
448 if (strcmp(mem, username) == 0) {
/illumos-gate/usr/src/cmd/cmd-inet/usr.sbin/kssl/ksslcfg/
H A Dksslcfg_create.c57 "\t[-u <username>]\n"
301 const char *username, char *inaddr_any_name)
339 command, username) != SUCCESS) ||
341 command, username) != SUCCESS) ||
343 "", username) != SUCCESS)) {
377 const char *command, const char *username, char *inaddr_any_name)
428 command, username, inaddr_any_name);
458 const char *username = NULL; local
499 username = optarg;
616 if (username
299 create_instance(scf_handle_t *handle, scf_service_t *svc, const char *instance_name, const char *kssl_entry, const char *command, const char *username, char *inaddr_any_name) argument
376 create_service(const char *instance_name, const char *kssl_entry, const char *command, const char *username, char *inaddr_any_name) argument
[all...]
/illumos-gate/usr/src/cmd/keyserv/
H A Dnewkey.c92 *username = NULL, *pk_service = NULL; local
114 if (username || target_host)
116 username = optarg;
119 if (username || target_host)
128 if (optind < argc || (username == 0 && target_host == 0)) {
141 if (username) {
142 pw = getpwnam(username);
145 program_name, username);
153 program_name, username);
160 program_name, username);
[all...]
/illumos-gate/usr/src/lib/smbsrv/libsmbns/common/
H A Dsmbns_netlogon.c327 * netr authentication. The trust account username is the hostname with a
354 char *username; local
368 * The username will be the trust account name on the PDC.
371 username = alloca(name_length);
372 (void) snprintf(username, name_length, "%s$", hostname);
384 + smb_wcequiv_strlen(username) + 2
410 username, /* UnicodeUserName */

Completed in 115 milliseconds

123