/osnet-11/usr/src/lib/passwdutil/ |
H A D | __failed_count.c | 30 __incr_failed_count(char *username, char *repname, int max_failures) argument 52 if ((ret = ops->getpwnam(username, items, NULL, &buf)) != PWU_SUCCESS) { 79 "locking account.", max_failures, username); 85 if (((ret = ops->putpwnam(username, NULL, NULL, buf)) == 103 __rst_failed_count(char *username, char *repname) argument 125 if ((ret = ops->getpwnam(username, items, NULL, &buf)) != PWU_SUCCESS) 129 ret = ops->putpwnam(username, NULL, NULL, buf);
|
/osnet-11/usr/src/lib/libntsvcs/common/ |
H A D | samlib.h | 87 char *username; member in struct:samr_user_info::info1 95 char *username; member in struct:samr_user_info::info6 100 char *username; member in struct:samr_user_info::info7
|
H A D | samr_clnt.c | 75 * If username argument is NULL, an anonymous connection will be established. 81 samr_open(char *server, char *domain, char *username, DWORD access_mask, argument 95 rc = samr_connect(server, domain, username, access_mask, samr_handle); 116 samr_connect(char *server, char *domain, char *username, DWORD access_mask, argument 129 if (ndr_rpc_bind(samr_handle, server, domain, username, "SAMR") < 0) 133 status = (*samr_connop[i])(server, domain, username, 155 samr_connect1(char *server, char *domain, char *username, DWORD access_mask, argument 198 samr_connect2(char *server, char *domain, char *username, DWORD access_mask, argument 235 samr_connect4(char *server, char *domain, char *username, DWORD access_mask, argument 279 samr_connect5(char *server, char *domain, char *username, DWOR argument 542 samr_create_user(mlsvc_handle_t *domain_handle, char *username, DWORD account_flags, DWORD *rid, mlsvc_handle_t *user_handle) argument [all...] |
H A D | smb_autohome.c | 78 char *username; local 85 username = (token->tkn_posix_name) 88 if (smb_autohome_add_private(username, uid, gid) != NERR_Success) { 89 if (!smb_isstrlwr(username)) { 90 (void) smb_strlwr(username); 91 (void) smb_autohome_add_private(username, uid, gid); 107 smb_autohome_add_private(const char *username, uid_t uid, gid_t gid) argument 115 (void) strlcpy(shr_name, username, sizeof (shr_name)); 127 if ((ai = smb_autohome_lookup(username)) == NULL) { 134 si.shr_name = strdup(username); [all...] |
H A D | lsar_clnt.c | 148 * If username is NULL, an anonymous connection will be established. 154 lsar_open(char *server, char *domain, char *username, argument 161 rc = ndr_rpc_bind(lsa_handle, server, domain, username, "LSARPC"); 491 * domain\username 492 * domain/username 493 * username 494 * username@domain 496 * Return a strdup'd copy of the username. The caller is responsible
|
H A D | srvsvc_clnt.c | 55 * If username argument is NULL, an anonymous connection will be established. 59 srvsvc_open(char *server, char *domain, char *username, mlsvc_handle_t *handle) argument 71 if (ndr_rpc_bind(handle, server, domain, username, "SRVSVC") < 0) 327 * If username parameter is specified, the server MUST limit the files returned 328 * to those that were opened by a session whose user name matches username. 332 char *username, uint32_t level, srvsvc_list_t *sl) 363 if (username != NULL) 364 arg.username = (LPTSTR)username; 575 * The username paramete 331 srvsvc_net_files_enum(char *server, char *domain, char *basepath, char *username, uint32_t level, srvsvc_list_t *sl) argument 580 srvsvc_net_session_enum(char *server, char *domain, char *clientname, char *username, uint32_t level, srvsvc_list_t *sl) argument [all...] |
H A D | ntsvcs_clnt.c | 239 * Returns 0 if username is anonymous, setting cred cache or kinit fails. 243 ndr_rpc_setup_kerberos(char *username, char *realm) argument 250 if (strcmp(username, "") == 0) 253 if (smb_is_samaccount(username)) { 266 if (asprintf(&principal, "%s@%s", username, realm) == -1) 283 ndr_rpc_setup_keychain(char *username, char *domain) argument 289 smbfs_set_default_user(username); 292 rc = smbfs_keychain_addhash((uid_t)-1, domain, username, NULL, nthash); 316 char *username, const char *service) 339 if (username 315 ndr_rpc_bind(mlsvc_handle_t *handle, char *server, char *domain, char *username, const char *service) argument [all...] |
/osnet-11/usr/src/cmd/ldap/common/ |
H A D | ldaptool-sasl.c | 32 char *username; member in struct:__anon54 41 ldaptool_set_sasl_defaults ( LDAP *ld, char *mech, char *authid, char *username, argument 59 if (username) 60 defaults->username = username; 62 ldap_get_option(ld, LDAP_OPT_X_SASL_AUTHZID, &defaults->username); 108 defvalue = defaults->username;
|
/osnet-11/usr/src/lib/pam_modules/roles/ |
H A D | roles.c | 54 char *username; local 65 (void) pam_get_item(pamh, PAM_USER, (void **)&username); 90 allow_remote, (username) ? username : "not set", 95 if (username == NULL) 98 /* stop masquerades by mapping username to uid to username */ 100 if ((pw_entry = getpwnam_r(username, &pwd, buf, sizeof (buf))) == NULL) 120 /* username is a role */ 122 if (strcmp(username, pw_entr [all...] |
/osnet-11/usr/src/lib/libsmbfs/common/ |
H A D | smbfs_print.c | 68 * username. If username is NULL, then the Solaris username and the SMB 83 smbfs_print(const char *username, const char *share_unc, const char *filename) argument 99 if (username != NULL) { 100 (void) strlcpy(tmp_arg, username, sizeof (tmp_arg));
|
/osnet-11/usr/src/lib/pam_modules/krb5/ |
H A D | krb5_setcred.c | 371 char *username = NULL; local 480 username = strdup(client_name); 481 if (username == NULL) { 487 if ((tmpname = strchr(username, '@'))) 490 if (get_pw_uid(username, &uuid) == 0 || 491 get_pw_gid(username, &ugid) == 0) { 495 username); 541 username); 550 username, filepath); 587 if (username) [all...] |
/osnet-11/usr/src/lib/pam_modules/list/ |
H A D | list.c | 64 is_role(const char *username) argument 70 if ((ue = getusernam(username)) != NULL) { 90 char *username = NULL; local 192 (void) pam_get_item(pamh, PAM_USER, (void**)&username); 194 if ((check_user || check_exact) && ((username == NULL) || 195 (*username == '\0'))) { 197 "pam_list: username not supplied, critical error"); 202 * If roles should be ignored and username is role then do not 205 if ((check_role == B_FALSE) && (is_role(username))) { 208 "pam_list: %s is role, ignoring", username); [all...] |
/osnet-11/usr/src/lib/libsmb/common/ |
H A D | smb_kmod.c | 359 smb_kmod_session_close(const char *client, const char *username) argument 368 if (username != NULL) 369 (void) strlcpy(ioc.username, username, MAXNAMELEN);
|
H A D | smb_auth.c | 323 * The NTLM v2 hash will be created from the given NTLM hash, username, 331 char *username, 340 if (username == NULL || ntdomain == NULL) 343 (void) smb_strupr(username); 345 data_len = strlen(username) + strlen(ntdomain); 350 (void) snprintf((char *)buf, data_len + 1, "%s%s", username, ntdomain); 425 smb_auth_set_info(char *username, argument 470 if (smb_auth_ntlmv2_hash(auth->hash, username, 601 char *username, 626 * - user's username, an 330 smb_auth_ntlmv2_hash(unsigned char *ntlm_hash, char *username, char *ntdomain, unsigned char *ntlmv2_hash) argument 594 smb_ntlmv2_password_ok( unsigned char *challenge, uint32_t clen, unsigned char *ntlm_hash, unsigned char *passwd, int pwdlen, char *domain, char *username, uchar_t *session_key) argument 726 smb_lmv2_password_ok( unsigned char *challenge, uint32_t clen, unsigned char *ntlm_hash, unsigned char *passwd, char *domain, char *username) argument 793 smb_auth_validate_lm( unsigned char *challenge, uint32_t clen, smb_passwd_t *smbpw, unsigned char *passwd, int pwdlen, char *domain, char *username) argument 832 smb_auth_validate_nt( unsigned char *challenge, uint32_t clen, smb_passwd_t *smbpw, unsigned char *passwd, int pwdlen, char *domain, char *username, unsigned char *nonce, int nlen, uchar_t *session_key) argument [all...] |
/osnet-11/usr/src/lib/libsmbns/common/ |
H A D | smbns_netlogon.c | 326 * netr authentication. The trust account username is the hostname with a 353 char *username; local 367 * The username will be the trust account name on the PDC. 370 username = alloca(name_length); 371 (void) snprintf(username, name_length, "%s$", hostname); 383 + smb_wcequiv_strlen(username) + 2 409 username, /* UnicodeUserName */
|
/osnet-11/usr/src/lib/libc/port/gen/ |
H A D | getgrnam_r.c | 220 * username Username of the putative member 241 _getgroupsbymember(const char *username, gid_t gid_array[], argument 247 arg.username = username; 423 const char *username = gbm->username; local 447 if (strcmp(mem, username) == 0) {
|
H A D | chkauthattr.c | 150 * Enumerate all attributes associated with a username and the profiles 154 _enum_common(const char *username, argument 169 ua = getusernam(username); 191 if (username != NULL && 193 getpwnam_r(username, &pw, pwbuf, sizeof (pwbuf)) != NULL && 218 * Enumerate profiles with a username argument. 221 _enum_profs(const char *username, argument 225 return (_enum_common(username, cb, ctxt, pres, B_FALSE)); 229 * Enumerate attributes with a username argument. 232 _enum_attrs(const char *username, argument 291 _enum_auths(const char *username, int (*cb)(const char *, void *, void *), void *ctxt, void *pres) argument 398 chkauthattr(const char *authname, const char *username) argument [all...] |
H A D | getexecattr.c | 555 getexecuser(const char *username, const char *type, const char *id, argument 570 if (username == NULL) { 605 head = userprof(username, type, id, search_flag); 693 userprof(const char *username, const char *type, const char *id, argument 703 * Check if specified username is valid user 705 if (getpwnam_r(username, &pwd, pwdb, sizeof (pwdb)) == NULL) { 714 (void) _enum_profs(username, findexecattr, &call, &result);
|
/osnet-11/usr/src/lib/libtsol/common/ |
H A D | misc.c | 417 * Entry username of user 427 getuserrange(const char *username) argument 454 if ((userp = getusernam(username)) != NULL) {
|
/osnet-11/usr/src/lib/pam_modules/unix_auth/ |
H A D | unix_auth.c | 158 role_auth_as_user(char *username) argument 163 if (username == NULL || *username == '\0') 166 ue = getusernam(username);
|
/osnet-11/usr/src/lib/nsswitch/ldap/common/ |
H A D | getnetgrent.c | 236 split_triple(char *triple, char **hostname, char **username, char **domain) argument 298 *username = splittriple[1]; 397 /* limit username to COMMA */ 406 /* compare size of username */ 766 char *hostname, *username, *domain; local 877 rc = split_triple(buffer, &hostname, &username, 886 args->retp[NSS_NETGR_USER] = username; 894 username ? username : "",
|
/osnet-11/usr/src/lib/libldap5/sources/ldap/common/ |
H A D | digest_md5.c | 350 "username=\"%.*s\",realm=\"%.*s\",nonce=\"%.*s\",nc=%.*s,cnonce=\""; 460 static const char ustr[] = "username"; 599 const char *username, 611 if (challenge == NULL || username == NULL || passwd == NULL) { 631 attrs.user = username; 641 digest_hash_pass(username, 0, attrs.realm, attrs.rlen, 597 ldap_digest_md5_encode( const char *challenge, const char *username, const char *passwd, char **digest ) argument
|
/osnet-11/usr/src/lib/libbsm/common/ |
H A D | adt_token.c | 885 char *username; local 892 username = ((union convert *)p_data)->tcharstar; 894 if (username == NULL) { 896 username = empty; 901 DPRINTF((" username=%s\n", username)); 902 (void) au_write(event->ae_event_handle, au_to_user(uid, username));
|
H A D | au_to.c | 1182 au_to_user(uid_t uid, char *username) argument 1189 bytes = (short)strlen(username) + 1; 1199 adr_char(&adr, username, bytes);
|
/osnet-11/usr/src/lib/pkcs11/pkcs11_kms/common/ |
H A D | kmsKeystoreUtil.c | 88 get_username(char *username, int len) argument 94 bzero(username, len); 98 return (username); /* should not happen */ 102 return (username); /* zero-ed earlier */ 107 (void) strlcpy(username, user_info->pw_name, len); 110 return (username); 117 char username[sizeof (((struct utmpx *)0)->ut_user)]; local 137 get_username(username, sizeof (username)));
|