Searched refs:username (Results 1 - 25 of 48) sorted by relevance

12

/osnet-11/usr/src/cmd/ldap/common/
H A Dldaptool-sasl.h15 void *ldaptool_set_sasl_defaults ( LDAP *ld, char *mech, char *authid, char *username, char *passwd, char *realm );
H A Dldaptool-sasl.c32 char *username; member in struct:__anon54
41 ldaptool_set_sasl_defaults ( LDAP *ld, char *mech, char *authid, char *username, argument
59 if (username)
60 defaults->username = username;
62 ldap_get_option(ld, LDAP_OPT_X_SASL_AUTHZID, &defaults->username);
108 defvalue = defaults->username;
/osnet-11/usr/src/lib/passwdutil/
H A D__failed_count.c30 __incr_failed_count(char *username, char *repname, int max_failures) argument
52 if ((ret = ops->getpwnam(username, items, NULL, &buf)) != PWU_SUCCESS) {
79 "locking account.", max_failures, username);
85 if (((ret = ops->putpwnam(username, NULL, NULL, buf)) ==
103 __rst_failed_count(char *username, char *repname) argument
125 if ((ret = ops->getpwnam(username, items, NULL, &buf)) != PWU_SUCCESS)
129 ret = ops->putpwnam(username, NULL, NULL, buf);
/osnet-11/usr/src/lib/pam_modules/roles/
H A Droles.c54 char *username; local
65 (void) pam_get_item(pamh, PAM_USER, (void **)&username);
90 allow_remote, (username) ? username : "not set",
95 if (username == NULL)
98 /* stop masquerades by mapping username to uid to username */
100 if ((pw_entry = getpwnam_r(username, &pwd, buf, sizeof (buf))) == NULL)
120 /* username is a role */
122 if (strcmp(username, pw_entr
[all...]
/osnet-11/usr/src/lib/libntsvcs/common/
H A Dsamlib.h87 char *username; member in struct:samr_user_info::info1
95 char *username; member in struct:samr_user_info::info6
100 char *username; member in struct:samr_user_info::info7
H A Dsmb_autohome.c78 char *username; local
85 username = (token->tkn_posix_name)
88 if (smb_autohome_add_private(username, uid, gid) != NERR_Success) {
89 if (!smb_isstrlwr(username)) {
90 (void) smb_strlwr(username);
91 (void) smb_autohome_add_private(username, uid, gid);
107 smb_autohome_add_private(const char *username, uid_t uid, gid_t gid) argument
115 (void) strlcpy(shr_name, username, sizeof (shr_name));
127 if ((ai = smb_autohome_lookup(username)) == NULL) {
134 si.shr_name = strdup(username);
[all...]
H A Dsamr_clnt.c75 * If username argument is NULL, an anonymous connection will be established.
81 samr_open(char *server, char *domain, char *username, DWORD access_mask, argument
95 rc = samr_connect(server, domain, username, access_mask, samr_handle);
116 samr_connect(char *server, char *domain, char *username, DWORD access_mask, argument
129 if (ndr_rpc_bind(samr_handle, server, domain, username, "SAMR") < 0)
133 status = (*samr_connop[i])(server, domain, username,
155 samr_connect1(char *server, char *domain, char *username, DWORD access_mask, argument
198 samr_connect2(char *server, char *domain, char *username, DWORD access_mask, argument
235 samr_connect4(char *server, char *domain, char *username, DWORD access_mask, argument
279 samr_connect5(char *server, char *domain, char *username, DWOR argument
542 samr_create_user(mlsvc_handle_t *domain_handle, char *username, DWORD account_flags, DWORD *rid, mlsvc_handle_t *user_handle) argument
[all...]
H A Dntsvcs_clnt.c239 * Returns 0 if username is anonymous, setting cred cache or kinit fails.
243 ndr_rpc_setup_kerberos(char *username, char *realm) argument
250 if (strcmp(username, "") == 0)
253 if (smb_is_samaccount(username)) {
266 if (asprintf(&principal, "%s@%s", username, realm) == -1)
283 ndr_rpc_setup_keychain(char *username, char *domain) argument
289 smbfs_set_default_user(username);
292 rc = smbfs_keychain_addhash((uid_t)-1, domain, username, NULL, nthash);
316 char *username, const char *service)
339 if (username
315 ndr_rpc_bind(mlsvc_handle_t *handle, char *server, char *domain, char *username, const char *service) argument
[all...]
H A Dsrvsvc_clnt.c55 * If username argument is NULL, an anonymous connection will be established.
59 srvsvc_open(char *server, char *domain, char *username, mlsvc_handle_t *handle) argument
71 if (ndr_rpc_bind(handle, server, domain, username, "SRVSVC") < 0)
327 * If username parameter is specified, the server MUST limit the files returned
328 * to those that were opened by a session whose user name matches username.
332 char *username, uint32_t level, srvsvc_list_t *sl)
363 if (username != NULL)
364 arg.username = (LPTSTR)username;
575 * The username paramete
331 srvsvc_net_files_enum(char *server, char *domain, char *basepath, char *username, uint32_t level, srvsvc_list_t *sl) argument
580 srvsvc_net_session_enum(char *server, char *domain, char *clientname, char *username, uint32_t level, srvsvc_list_t *sl) argument
[all...]
/osnet-11/usr/src/lib/pam_modules/list/
H A Dlist.c64 is_role(const char *username) argument
70 if ((ue = getusernam(username)) != NULL) {
90 char *username = NULL; local
192 (void) pam_get_item(pamh, PAM_USER, (void**)&username);
194 if ((check_user || check_exact) && ((username == NULL) ||
195 (*username == '\0'))) {
197 "pam_list: username not supplied, critical error");
202 * If roles should be ignored and username is role then do not
205 if ((check_role == B_FALSE) && (is_role(username))) {
208 "pam_list: %s is role, ignoring", username);
[all...]
/osnet-11/usr/src/lib/libc/port/gen/
H A Dchkauthattr.c150 * Enumerate all attributes associated with a username and the profiles
154 _enum_common(const char *username, argument
169 ua = getusernam(username);
191 if (username != NULL &&
193 getpwnam_r(username, &pw, pwbuf, sizeof (pwbuf)) != NULL &&
218 * Enumerate profiles with a username argument.
221 _enum_profs(const char *username, argument
225 return (_enum_common(username, cb, ctxt, pres, B_FALSE));
229 * Enumerate attributes with a username argument.
232 _enum_attrs(const char *username, argument
291 _enum_auths(const char *username, int (*cb)(const char *, void *, void *), void *ctxt, void *pres) argument
398 chkauthattr(const char *authname, const char *username) argument
[all...]
H A Dgetgrnam_r.c220 * username Username of the putative member
241 _getgroupsbymember(const char *username, gid_t gid_array[], argument
247 arg.username = username;
423 const char *username = gbm->username; local
447 if (strcmp(mem, username) == 0) {
H A Dgetexecattr.c555 getexecuser(const char *username, const char *type, const char *id, argument
570 if (username == NULL) {
605 head = userprof(username, type, id, search_flag);
693 userprof(const char *username, const char *type, const char *id, argument
703 * Check if specified username is valid user
705 if (getpwnam_r(username, &pwd, pwdb, sizeof (pwdb)) == NULL) {
714 (void) _enum_profs(username, findexecattr, &call, &result);
/osnet-11/usr/src/lib/pam_modules/krb5/
H A Dkrb5_setcred.c371 char *username = NULL; local
480 username = strdup(client_name);
481 if (username == NULL) {
487 if ((tmpname = strchr(username, '@')))
490 if (get_pw_uid(username, &uuid) == 0 ||
491 get_pw_gid(username, &ugid) == 0) {
495 username);
541 username);
550 username, filepath);
587 if (username)
[all...]
/osnet-11/usr/src/lib/libsmb/common/
H A Dsmb_auth.c323 * The NTLM v2 hash will be created from the given NTLM hash, username,
331 char *username,
340 if (username == NULL || ntdomain == NULL)
343 (void) smb_strupr(username);
345 data_len = strlen(username) + strlen(ntdomain);
350 (void) snprintf((char *)buf, data_len + 1, "%s%s", username, ntdomain);
425 smb_auth_set_info(char *username, argument
470 if (smb_auth_ntlmv2_hash(auth->hash, username,
601 char *username,
626 * - user's username, an
330 smb_auth_ntlmv2_hash(unsigned char *ntlm_hash, char *username, char *ntdomain, unsigned char *ntlmv2_hash) argument
594 smb_ntlmv2_password_ok( unsigned char *challenge, uint32_t clen, unsigned char *ntlm_hash, unsigned char *passwd, int pwdlen, char *domain, char *username, uchar_t *session_key) argument
726 smb_lmv2_password_ok( unsigned char *challenge, uint32_t clen, unsigned char *ntlm_hash, unsigned char *passwd, char *domain, char *username) argument
793 smb_auth_validate_lm( unsigned char *challenge, uint32_t clen, smb_passwd_t *smbpw, unsigned char *passwd, int pwdlen, char *domain, char *username) argument
832 smb_auth_validate_nt( unsigned char *challenge, uint32_t clen, smb_passwd_t *smbpw, unsigned char *passwd, int pwdlen, char *domain, char *username, unsigned char *nonce, int nlen, uchar_t *session_key) argument
[all...]
H A Dsmb_kmod.c359 smb_kmod_session_close(const char *client, const char *username) argument
368 if (username != NULL)
369 (void) strlcpy(ioc.username, username, MAXNAMELEN);
/osnet-11/usr/src/lib/libsmbfs/common/
H A Dsmbfs_print.c68 * username. If username is NULL, then the Solaris username and the SMB
83 smbfs_print(const char *username, const char *share_unc, const char *filename) argument
99 if (username != NULL) {
100 (void) strlcpy(tmp_arg, username, sizeof (tmp_arg));
/osnet-11/usr/src/lib/libsmbns/common/
H A Dsmbns_netlogon.c326 * netr authentication. The trust account username is the hostname with a
353 char *username; local
367 * The username will be the trust account name on the PDC.
370 username = alloca(name_length);
371 (void) snprintf(username, name_length, "%s$", hostname);
383 + smb_wcequiv_strlen(username) + 2
409 username, /* UnicodeUserName */
/osnet-11/usr/src/lib/pam_modules/unix_auth/
H A Dunix_auth.c158 role_auth_as_user(char *username) argument
163 if (username == NULL || *username == '\0')
166 ue = getusernam(username);
/osnet-11/usr/src/lib/nsswitch/nis/common/
H A Dgetgrent.c130 if (strcmp(argp->username, "root") == 0) {
161 return (_nss_nis_do_all(be, argp, argp->username,
276 if ((getpwnam_r(argp->username, &pw, pwbuf, sizeof (pwbuf)) == NULL) ||
/osnet-11/usr/src/lib/pkcs11/pkcs11_kms/common/
H A DkmsKeystoreUtil.c88 get_username(char *username, int len) argument
94 bzero(username, len);
98 return (username); /* should not happen */
102 return (username); /* zero-ed earlier */
107 (void) strlcpy(username, user_info->pw_name, len);
110 return (username);
117 char username[sizeof (((struct utmpx *)0)->ut_user)]; local
137 get_username(username, sizeof (username)));
/osnet-11/usr/src/lib/libbrand/common/
H A Dlibbrand.c353 const char *zonename, const char *zonepath, const char *username,
400 if (username == NULL)
402 dst += strlcpy(dbuf + dst, username, dbuf_size - dst);
440 const char *zonepath, const char *username, const char *curr_zone,
490 zonename, zonepath, username, curr_zone) != 0)
569 brand_get_login_cmd(brand_handle_t bh, const char *username, argument
574 return (brand_get_value(bhp, NULL, NULL, username, curr_zone,
579 brand_get_forcedlogin_cmd(brand_handle_t bh, const char *username, argument
584 return (brand_get_value(bhp, NULL, NULL, username, curr_zone,
589 brand_get_user_cmd(brand_handle_t bh, const char *username, argument
352 i_substitute_tokens(const char *sbuf, char *dbuf, int dbuf_size, const char *zonename, const char *zonepath, const char *username, const char *curr_zone) argument
439 brand_get_value(struct brand_handle *bhp, const char *zonename, const char *zonepath, const char *username, const char *curr_zone, char *buf, size_t len, const xmlChar *tagname, boolean_t substitute, boolean_t optional) argument
[all...]
/osnet-11/usr/src/lib/nsswitch/ldap/common/
H A Dgetgrent.c828 ns_ldap_attr_t *members, *oc, *username; local
935 username = __ns_ldap_getAttrStruct(result->entry, _G_UID);
936 if (username != NULL && username->attrvalue != NULL) {
937 user = username->attrvalue[0];
1429 char **username; local
1447 username = __ns_ldap_getAttr(entry, _G_UID);
1448 if (username == NULL || username[0] == NULL) {
1453 if (_mlist_add(tc->listpp, username[
[all...]
H A Dgetnetgrent.c236 split_triple(char *triple, char **hostname, char **username, char **domain) argument
298 *username = splittriple[1];
397 /* limit username to COMMA */
406 /* compare size of username */
766 char *hostname, *username, *domain; local
877 rc = split_triple(buffer, &hostname, &username,
886 args->retp[NSS_NETGR_USER] = username;
894 username ? username : "",
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/lib/Net/
H A DSMTP.pm99 my ($self, $username, $password) = @_;
109 if (ref($username) and UNIVERSAL::isa($username,'Authen::SASL')) {
110 $sasl = $username;
114 die "auth(username, password)" if not length $username;
116 callback => { user => $username,
118 authname => $username,

Completed in 95 milliseconds

12