/osnet-11/usr/src/cmd/ldap/common/ |
H A D | ldaptool-sasl.h | 15 void *ldaptool_set_sasl_defaults ( LDAP *ld, char *mech, char *authid, char *username, char *passwd, char *realm );
|
H A D | ldaptool-sasl.c | 32 char *username; member in struct:__anon54 41 ldaptool_set_sasl_defaults ( LDAP *ld, char *mech, char *authid, char *username, argument 59 if (username) 60 defaults->username = username; 62 ldap_get_option(ld, LDAP_OPT_X_SASL_AUTHZID, &defaults->username); 108 defvalue = defaults->username;
|
/osnet-11/usr/src/lib/passwdutil/ |
H A D | __failed_count.c | 30 __incr_failed_count(char *username, char *repname, int max_failures) argument 52 if ((ret = ops->getpwnam(username, items, NULL, &buf)) != PWU_SUCCESS) { 79 "locking account.", max_failures, username); 85 if (((ret = ops->putpwnam(username, NULL, NULL, buf)) == 103 __rst_failed_count(char *username, char *repname) argument 125 if ((ret = ops->getpwnam(username, items, NULL, &buf)) != PWU_SUCCESS) 129 ret = ops->putpwnam(username, NULL, NULL, buf);
|
/osnet-11/usr/src/lib/pam_modules/roles/ |
H A D | roles.c | 54 char *username; local 65 (void) pam_get_item(pamh, PAM_USER, (void **)&username); 90 allow_remote, (username) ? username : "not set", 95 if (username == NULL) 98 /* stop masquerades by mapping username to uid to username */ 100 if ((pw_entry = getpwnam_r(username, &pwd, buf, sizeof (buf))) == NULL) 120 /* username is a role */ 122 if (strcmp(username, pw_entr [all...] |
/osnet-11/usr/src/lib/libntsvcs/common/ |
H A D | samlib.h | 87 char *username; member in struct:samr_user_info::info1 95 char *username; member in struct:samr_user_info::info6 100 char *username; member in struct:samr_user_info::info7
|
H A D | smb_autohome.c | 78 char *username; local 85 username = (token->tkn_posix_name) 88 if (smb_autohome_add_private(username, uid, gid) != NERR_Success) { 89 if (!smb_isstrlwr(username)) { 90 (void) smb_strlwr(username); 91 (void) smb_autohome_add_private(username, uid, gid); 107 smb_autohome_add_private(const char *username, uid_t uid, gid_t gid) argument 115 (void) strlcpy(shr_name, username, sizeof (shr_name)); 127 if ((ai = smb_autohome_lookup(username)) == NULL) { 134 si.shr_name = strdup(username); [all...] |
H A D | samr_clnt.c | 75 * If username argument is NULL, an anonymous connection will be established. 81 samr_open(char *server, char *domain, char *username, DWORD access_mask, argument 95 rc = samr_connect(server, domain, username, access_mask, samr_handle); 116 samr_connect(char *server, char *domain, char *username, DWORD access_mask, argument 129 if (ndr_rpc_bind(samr_handle, server, domain, username, "SAMR") < 0) 133 status = (*samr_connop[i])(server, domain, username, 155 samr_connect1(char *server, char *domain, char *username, DWORD access_mask, argument 198 samr_connect2(char *server, char *domain, char *username, DWORD access_mask, argument 235 samr_connect4(char *server, char *domain, char *username, DWORD access_mask, argument 279 samr_connect5(char *server, char *domain, char *username, DWOR argument 542 samr_create_user(mlsvc_handle_t *domain_handle, char *username, DWORD account_flags, DWORD *rid, mlsvc_handle_t *user_handle) argument [all...] |
H A D | ntsvcs_clnt.c | 239 * Returns 0 if username is anonymous, setting cred cache or kinit fails. 243 ndr_rpc_setup_kerberos(char *username, char *realm) argument 250 if (strcmp(username, "") == 0) 253 if (smb_is_samaccount(username)) { 266 if (asprintf(&principal, "%s@%s", username, realm) == -1) 283 ndr_rpc_setup_keychain(char *username, char *domain) argument 289 smbfs_set_default_user(username); 292 rc = smbfs_keychain_addhash((uid_t)-1, domain, username, NULL, nthash); 316 char *username, const char *service) 339 if (username 315 ndr_rpc_bind(mlsvc_handle_t *handle, char *server, char *domain, char *username, const char *service) argument [all...] |
H A D | srvsvc_clnt.c | 55 * If username argument is NULL, an anonymous connection will be established. 59 srvsvc_open(char *server, char *domain, char *username, mlsvc_handle_t *handle) argument 71 if (ndr_rpc_bind(handle, server, domain, username, "SRVSVC") < 0) 327 * If username parameter is specified, the server MUST limit the files returned 328 * to those that were opened by a session whose user name matches username. 332 char *username, uint32_t level, srvsvc_list_t *sl) 363 if (username != NULL) 364 arg.username = (LPTSTR)username; 575 * The username paramete 331 srvsvc_net_files_enum(char *server, char *domain, char *basepath, char *username, uint32_t level, srvsvc_list_t *sl) argument 580 srvsvc_net_session_enum(char *server, char *domain, char *clientname, char *username, uint32_t level, srvsvc_list_t *sl) argument [all...] |
/osnet-11/usr/src/lib/pam_modules/list/ |
H A D | list.c | 64 is_role(const char *username) argument 70 if ((ue = getusernam(username)) != NULL) { 90 char *username = NULL; local 192 (void) pam_get_item(pamh, PAM_USER, (void**)&username); 194 if ((check_user || check_exact) && ((username == NULL) || 195 (*username == '\0'))) { 197 "pam_list: username not supplied, critical error"); 202 * If roles should be ignored and username is role then do not 205 if ((check_role == B_FALSE) && (is_role(username))) { 208 "pam_list: %s is role, ignoring", username); [all...] |
/osnet-11/usr/src/lib/libc/port/gen/ |
H A D | chkauthattr.c | 150 * Enumerate all attributes associated with a username and the profiles 154 _enum_common(const char *username, argument 169 ua = getusernam(username); 191 if (username != NULL && 193 getpwnam_r(username, &pw, pwbuf, sizeof (pwbuf)) != NULL && 218 * Enumerate profiles with a username argument. 221 _enum_profs(const char *username, argument 225 return (_enum_common(username, cb, ctxt, pres, B_FALSE)); 229 * Enumerate attributes with a username argument. 232 _enum_attrs(const char *username, argument 291 _enum_auths(const char *username, int (*cb)(const char *, void *, void *), void *ctxt, void *pres) argument 398 chkauthattr(const char *authname, const char *username) argument [all...] |
H A D | getgrnam_r.c | 220 * username Username of the putative member 241 _getgroupsbymember(const char *username, gid_t gid_array[], argument 247 arg.username = username; 423 const char *username = gbm->username; local 447 if (strcmp(mem, username) == 0) {
|
H A D | getexecattr.c | 555 getexecuser(const char *username, const char *type, const char *id, argument 570 if (username == NULL) { 605 head = userprof(username, type, id, search_flag); 693 userprof(const char *username, const char *type, const char *id, argument 703 * Check if specified username is valid user 705 if (getpwnam_r(username, &pwd, pwdb, sizeof (pwdb)) == NULL) { 714 (void) _enum_profs(username, findexecattr, &call, &result);
|
/osnet-11/usr/src/lib/pam_modules/krb5/ |
H A D | krb5_setcred.c | 371 char *username = NULL; local 480 username = strdup(client_name); 481 if (username == NULL) { 487 if ((tmpname = strchr(username, '@'))) 490 if (get_pw_uid(username, &uuid) == 0 || 491 get_pw_gid(username, &ugid) == 0) { 495 username); 541 username); 550 username, filepath); 587 if (username) [all...] |
/osnet-11/usr/src/lib/libsmb/common/ |
H A D | smb_auth.c | 323 * The NTLM v2 hash will be created from the given NTLM hash, username, 331 char *username, 340 if (username == NULL || ntdomain == NULL) 343 (void) smb_strupr(username); 345 data_len = strlen(username) + strlen(ntdomain); 350 (void) snprintf((char *)buf, data_len + 1, "%s%s", username, ntdomain); 425 smb_auth_set_info(char *username, argument 470 if (smb_auth_ntlmv2_hash(auth->hash, username, 601 char *username, 626 * - user's username, an 330 smb_auth_ntlmv2_hash(unsigned char *ntlm_hash, char *username, char *ntdomain, unsigned char *ntlmv2_hash) argument 594 smb_ntlmv2_password_ok( unsigned char *challenge, uint32_t clen, unsigned char *ntlm_hash, unsigned char *passwd, int pwdlen, char *domain, char *username, uchar_t *session_key) argument 726 smb_lmv2_password_ok( unsigned char *challenge, uint32_t clen, unsigned char *ntlm_hash, unsigned char *passwd, char *domain, char *username) argument 793 smb_auth_validate_lm( unsigned char *challenge, uint32_t clen, smb_passwd_t *smbpw, unsigned char *passwd, int pwdlen, char *domain, char *username) argument 832 smb_auth_validate_nt( unsigned char *challenge, uint32_t clen, smb_passwd_t *smbpw, unsigned char *passwd, int pwdlen, char *domain, char *username, unsigned char *nonce, int nlen, uchar_t *session_key) argument [all...] |
H A D | smb_kmod.c | 359 smb_kmod_session_close(const char *client, const char *username) argument 368 if (username != NULL) 369 (void) strlcpy(ioc.username, username, MAXNAMELEN);
|
/osnet-11/usr/src/lib/libsmbfs/common/ |
H A D | smbfs_print.c | 68 * username. If username is NULL, then the Solaris username and the SMB 83 smbfs_print(const char *username, const char *share_unc, const char *filename) argument 99 if (username != NULL) { 100 (void) strlcpy(tmp_arg, username, sizeof (tmp_arg));
|
/osnet-11/usr/src/lib/libsmbns/common/ |
H A D | smbns_netlogon.c | 326 * netr authentication. The trust account username is the hostname with a 353 char *username; local 367 * The username will be the trust account name on the PDC. 370 username = alloca(name_length); 371 (void) snprintf(username, name_length, "%s$", hostname); 383 + smb_wcequiv_strlen(username) + 2 409 username, /* UnicodeUserName */
|
/osnet-11/usr/src/lib/pam_modules/unix_auth/ |
H A D | unix_auth.c | 158 role_auth_as_user(char *username) argument 163 if (username == NULL || *username == '\0') 166 ue = getusernam(username);
|
/osnet-11/usr/src/lib/nsswitch/nis/common/ |
H A D | getgrent.c | 130 if (strcmp(argp->username, "root") == 0) { 161 return (_nss_nis_do_all(be, argp, argp->username, 276 if ((getpwnam_r(argp->username, &pw, pwbuf, sizeof (pwbuf)) == NULL) ||
|
/osnet-11/usr/src/lib/pkcs11/pkcs11_kms/common/ |
H A D | kmsKeystoreUtil.c | 88 get_username(char *username, int len) argument 94 bzero(username, len); 98 return (username); /* should not happen */ 102 return (username); /* zero-ed earlier */ 107 (void) strlcpy(username, user_info->pw_name, len); 110 return (username); 117 char username[sizeof (((struct utmpx *)0)->ut_user)]; local 137 get_username(username, sizeof (username)));
|
/osnet-11/usr/src/lib/libbrand/common/ |
H A D | libbrand.c | 353 const char *zonename, const char *zonepath, const char *username, 400 if (username == NULL) 402 dst += strlcpy(dbuf + dst, username, dbuf_size - dst); 440 const char *zonepath, const char *username, const char *curr_zone, 490 zonename, zonepath, username, curr_zone) != 0) 569 brand_get_login_cmd(brand_handle_t bh, const char *username, argument 574 return (brand_get_value(bhp, NULL, NULL, username, curr_zone, 579 brand_get_forcedlogin_cmd(brand_handle_t bh, const char *username, argument 584 return (brand_get_value(bhp, NULL, NULL, username, curr_zone, 589 brand_get_user_cmd(brand_handle_t bh, const char *username, argument 352 i_substitute_tokens(const char *sbuf, char *dbuf, int dbuf_size, const char *zonename, const char *zonepath, const char *username, const char *curr_zone) argument 439 brand_get_value(struct brand_handle *bhp, const char *zonename, const char *zonepath, const char *username, const char *curr_zone, char *buf, size_t len, const xmlChar *tagname, boolean_t substitute, boolean_t optional) argument [all...] |
/osnet-11/usr/src/lib/nsswitch/ldap/common/ |
H A D | getgrent.c | 828 ns_ldap_attr_t *members, *oc, *username; local 935 username = __ns_ldap_getAttrStruct(result->entry, _G_UID); 936 if (username != NULL && username->attrvalue != NULL) { 937 user = username->attrvalue[0]; 1429 char **username; local 1447 username = __ns_ldap_getAttr(entry, _G_UID); 1448 if (username == NULL || username[0] == NULL) { 1453 if (_mlist_add(tc->listpp, username[ [all...] |
H A D | getnetgrent.c | 236 split_triple(char *triple, char **hostname, char **username, char **domain) argument 298 *username = splittriple[1]; 397 /* limit username to COMMA */ 406 /* compare size of username */ 766 char *hostname, *username, *domain; local 877 rc = split_triple(buffer, &hostname, &username, 886 args->retp[NSS_NETGR_USER] = username; 894 username ? username : "",
|
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/lib/Net/ |
H A D | SMTP.pm | 99 my ($self, $username, $password) = @_; 109 if (ref($username) and UNIVERSAL::isa($username,'Authen::SASL')) { 110 $sasl = $username; 114 die "auth(username, password)" if not length $username; 116 callback => { user => $username, 118 authname => $username,
|