/illumos-gate/usr/src/lib/libbsm/common/ |
H A D | audit_ftpd.c | 55 static char luser[LOGNAME_MAX + 1]; variable 66 (void) strncpy(luser, uname, LOGNAME_MAX); 67 generate_record(luser, BAD_PASSWD, dgettext(bsm_dom, "bad password")); 77 (void) strncpy(luser, uname, LOGNAME_MAX); 78 generate_record(luser, UNKNOWN_USER, dgettext(bsm_dom, "unknown user")); 88 (void) strncpy(luser, uname, LOGNAME_MAX); 89 generate_record(luser, EXCLUDED_USER, dgettext(bsm_dom, 118 (void) strncpy(luser, uname, LOGNAME_MAX); 119 generate_record(luser, 0, "");
|
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/os/ |
H A D | kuserok.c | 246 * Given a Kerberos principal "principal", and a local username "luser", 248 * authorization file ("~luser/.k5login" by default). Returns TRUE 251 * If there is no account for "luser" on the local machine, returns 253 * name "server" translates to the same name as "luser" (using 265 krb5_kuserok(krb5_context context, krb5_principal principal, const char *luser) argument 283 if (k5_getpwnam_r(luser, &pwx, pwbuf, sizeof(pwbuf), &pwd) != 0) 298 && (strcmp(kuser, luser) == 0)) { 311 princname, uid, pwd->pw_uid, luser); 411 * If the given Kerberos name "server" translates to the same name as "luser" 415 krb5_kuserok(context, principal, luser) [all...] |
/illumos-gate/usr/src/lib/libbc/libc/net/ |
H A D | rcmd.c | 201 const char *luser) 230 if (!_validuser(hostf, fhost, luser, ruser, baselen)) { 240 if ((pwd = getpwnam(luser)) == NULL) 264 if (!_validuser(hostf, fhost, luser, ruser, baselen)) { 278 _validuser(FILE *hostf, char *rhost, char *luser, char *ruser, int baselen) argument 339 usermatch = !strcmp(ruser, luser); 197 ruserok( const char *rhost, int superuser, const char *ruser, const char *luser) argument
|
/illumos-gate/usr/src/lib/libresolv/ |
H A D | netdb.h | 142 const char *luser, const char *ruser, const char *cmd, int *fd2p); 146 int ruserok(const char *rhost, int suser, const char *ruser, const char *luser);
|
/illumos-gate/usr/src/lib/libast/common/uwin/ |
H A D | rcmd.c | 319 extern int ruserok(const char *rhost, int superuser, const char *ruser, const char *luser) argument 345 if (!_validuser(hostf, fhost, luser, ruser, baselen)) { 358 if ((pwd = getpwnam(luser)) == NULL) 380 _validuser(FILE *hostf, const char *rhost, const char *luser, argument 454 uservalid = !strcmp(ruser, *user ? user : luser); 460 uservalid = uservalid ? 1 : !stricmp(ruser,*user ? user : luser);
|
/illumos-gate/usr/src/lib/libsocket/inet/ |
H A D | rcmd.c | 79 static int _validuser(FILE *hostf, char *rhost, const char *luser, 554 ruserok(const char *rhost, int superuser, const char *ruser, const char *luser) argument 587 if (!_validuser(hostf, fhost, luser, ruser, baselen)) { 597 if ((pwd = getpwnam(luser)) == NULL) 633 if (!_validuser(hostf, fhost, luser, ruser, baselen)) { 653 _validuser(FILE *hostf, char *rhost, const char *luser, argument 758 usermatch = (strcmp(ruser, luser) == 0);
|
/illumos-gate/usr/src/cmd/zfs/ |
H A D | zfs_iter.c | 302 nvlist_t *luser, *ruser; local 305 luser = zfs_get_user_props(l); 308 lvalid = (nvlist_lookup_nvlist(luser,
|
/illumos-gate/usr/src/cmd/bnu/ |
H A D | uucleanup.c | 991 static char luser[BUFSIZ], lsystem[MAXBASENAME+1]; /* from other From */ local 1000 if (!analFrom(buf, luser, lsystem)) 1003 (void) strcpy(fuser, luser); 1007 *user = luser;
|
/illumos-gate/usr/src/cmd/krb5/kadmin/cli/ |
H A D | kadmin.c | 203 char *luser, *canon, *cp; local 452 } else if ((luser = getenv("USER"))) { 453 princstr = (char *) malloc(strlen(luser) + 7 /* "/admin@" */ 461 strcpy(princstr, luser);
|