Symbol: username
bin/ps/extern.h
90
char *username(KINFO *, VARENT *);
bin/ps/keyword.c
223
{"user", {NULL}, "USER", "user", LJUST, username, 0, UNSPEC, NULL},
crypto/heimdal/appl/ftp/ftp/extern.h
166
extern char username[32];
crypto/heimdal/appl/ftp/ftp/ftp.c
208
strlcpy(username, userstr, sizeof(username));
crypto/heimdal/appl/ftp/ftp/globals.c
75
char username[32];
crypto/heimdal/appl/ftp/ftpd/ftpcmd.y
123
%type <s> pathstring pathname password username
crypto/heimdal/appl/ftp/ftpd/ftpcmd.y
140
: USER SP username CRLF check_secure
crypto/heimdal/appl/ftp/ftpd/ftpcmd.y
715
username
crypto/heimdal/appl/ftp/ftpd/gss_userok.c
49
gssapi_userok(void *app_data, char *username)
crypto/heimdal/appl/ftp/ftpd/gss_userok.c
54
return !gss_userok(data->client_name, username);
crypto/heimdal/appl/ftp/ftpd/gss_userok.c
58
gssapi_session(void *app_data, char *username)
crypto/heimdal/appl/gssmask/gssmaestro.c
107
const char *username,
crypto/heimdal/appl/gssmask/gssmaestro.c
114
putstring(client, username);
crypto/heimdal/appl/login/login.c
266
update_utmp(const char *username, const char *hostname,
crypto/heimdal/appl/login/login.c
272
if (utmpx_login(tty, username, hostname) != 0 && !f_flag) {
crypto/heimdal/appl/login/login.c
277
utmp_login(ttyn, username, hostname);
crypto/heimdal/appl/login/login.c
570
char username[32];
crypto/heimdal/appl/login/login.c
621
strlcpy (username, *argv, sizeof(username));
crypto/heimdal/appl/login/login.c
655
ret = read_string("login: ", username, sizeof(username), 1);
crypto/heimdal/appl/login/login.c
661
pwd = k_getpwnam(username);
crypto/heimdal/appl/login/login.c
672
otp_challenge(&otp_ctx, username,
crypto/heimdal/appl/login/login.c
675
username, otp_str);
crypto/heimdal/appl/login/utmp_login.c
127
void utmp_login(char *tty, const char *username, const char *hostname)
crypto/heimdal/appl/login/utmp_login.c
133
void utmp_login(char *tty, const char *username, const char *hostname)
crypto/heimdal/appl/login/utmp_login.c
138
prepare_utmp (&utmp, tty, username, hostname);
crypto/heimdal/appl/login/utmp_login.c
86
const char *username, const char *hostname)
crypto/heimdal/appl/login/utmp_login.c
93
strncpy(utmp->ut_name, username, sizeof(utmp->ut_name));
crypto/heimdal/appl/login/utmp_login.c
96
strncpy(utmp->ut_user, username, sizeof(utmp->ut_user));
crypto/heimdal/kcm/protocol.c
1488
type3.username = c->user;
crypto/heimdal/kcm/protocol.c
1569
type3.username,
crypto/heimdal/kcm/protocol.c
1650
free(type3.username);
crypto/heimdal/kdc/digest.c
1012
ireq.u.digestRequest.type, ireq.u.digestRequest.username);
crypto/heimdal/kdc/digest.c
1155
ireq.u.ntlmRequest.username,
crypto/heimdal/kdc/digest.c
1165
ireq.u.ntlmRequest.username);
crypto/heimdal/kdc/digest.c
1243
ireq.u.ntlmRequest.username,
crypto/heimdal/kdc/digest.c
1388
version, ireq.u.ntlmRequest.username);
crypto/heimdal/kdc/digest.c
166
const char *username,
crypto/heimdal/kdc/digest.c
175
ret = krb5_parse_name(context, username, &clientprincipal);
crypto/heimdal/kdc/digest.c
640
ireq.u.digestRequest.username,
crypto/heimdal/kdc/digest.c
671
ireq.u.digestRequest.username);
crypto/heimdal/kdc/digest.c
696
ireq.u.digestRequest.username,
crypto/heimdal/kdc/digest.c
704
EVP_DigestUpdate(ctx, ireq.u.digestRequest.username,
crypto/heimdal/kdc/digest.c
705
strlen(ireq.u.digestRequest.username));
crypto/heimdal/kdc/digest.c
796
ireq.u.digestRequest.username);
crypto/heimdal/kdc/digest.c
804
const char *username;
crypto/heimdal/kdc/digest.c
828
username = strchr(ireq.u.digestRequest.username, '\\');
crypto/heimdal/kdc/digest.c
829
if (username == NULL)
crypto/heimdal/kdc/digest.c
830
username = ireq.u.digestRequest.username;
crypto/heimdal/kdc/digest.c
832
username++;
crypto/heimdal/kdc/digest.c
865
EVP_DigestUpdate(ctp, username, strlen(username));
crypto/heimdal/kdc/digest.c
872
ret = krb5_parse_name(context, username, &clientprincipal);
crypto/heimdal/kdc/digest.c
882
username);
crypto/heimdal/kdc/digest.c
891
username);
crypto/heimdal/kdc/digest.c
919
ireq.u.digestRequest.username);
crypto/heimdal/kuser/kdigest.c
272
const char *username,
crypto/heimdal/kuser/kdigest.c
287
EVP_DigestUpdate(ctx, username, strlen(username));
crypto/heimdal/kuser/kdigest.c
327
EVP_DigestUpdate(ctx, username, strlen(username));
crypto/heimdal/lib/gssapi/ntlm/accept_sec_context.c
206
n->user = strdup(type3.username);
crypto/heimdal/lib/gssapi/ntlm/creds.c
117
ret = krb5_store_stringz(request, cred->username);
crypto/heimdal/lib/gssapi/ntlm/creds.c
59
n->user = strdup(c->username);
crypto/heimdal/lib/gssapi/ntlm/init_sec_context.c
100
get_user_ccache(const ntlm_name name, char **username, struct ntlm_buf *key)
crypto/heimdal/lib/gssapi/ntlm/init_sec_context.c
109
*username = NULL;
crypto/heimdal/lib/gssapi/ntlm/init_sec_context.c
128
username);
crypto/heimdal/lib/gssapi/ntlm/init_sec_context.c
174
ret = get_user_file(target_name, &cred->username, &cred->key);
crypto/heimdal/lib/gssapi/ntlm/init_sec_context.c
176
ret = get_user_ccache(target_name, &cred->username, &cred->key);
crypto/heimdal/lib/gssapi/ntlm/init_sec_context.c
194
(*to)->username = strdup(from->username);
crypto/heimdal/lib/gssapi/ntlm/init_sec_context.c
195
if ((*to)->username == NULL) {
crypto/heimdal/lib/gssapi/ntlm/init_sec_context.c
201
free((*to)->username);
crypto/heimdal/lib/gssapi/ntlm/init_sec_context.c
208
free((*to)->username);
crypto/heimdal/lib/gssapi/ntlm/init_sec_context.c
328
type3.username = ctx->client->username;
crypto/heimdal/lib/gssapi/ntlm/init_sec_context.c
38
char **username, struct ntlm_buf *key)
crypto/heimdal/lib/gssapi/ntlm/init_sec_context.c
420
ctx->client->username,
crypto/heimdal/lib/gssapi/ntlm/init_sec_context.c
64
*username = strdup(u);
crypto/heimdal/lib/gssapi/ntlm/init_sec_context.c
79
char **username, struct ntlm_buf *key)
crypto/heimdal/lib/gssapi/ntlm/init_sec_context.c
89
if (from_file(fn, target_name->domain, username, key) == 0)
crypto/heimdal/lib/gssapi/ntlm/iter_cred.c
86
dn->username = user;
crypto/heimdal/lib/gssapi/ntlm/kdc.c
358
ret = krb5_ntlm_req_set_username(c->context, c->ntlm, type3->username);
crypto/heimdal/lib/gssapi/ntlm/ntlm.h
104
char *username;
crypto/heimdal/lib/gssapi/ntlm/release_cred.c
52
if (cred->username)
crypto/heimdal/lib/gssapi/ntlm/release_cred.c
53
free(cred->username);
crypto/heimdal/lib/gssapi/test_ntlm.c
111
type3.username = rk_UNCONST(user);
crypto/heimdal/lib/gssapi/test_ntlm.c
235
type3.username = rk_UNCONST(user);
crypto/heimdal/lib/krb5/digest.c
1060
const char *username)
crypto/heimdal/lib/krb5/digest.c
1062
ntlm->request.username = strdup(username);
crypto/heimdal/lib/krb5/digest.c
1063
if (ntlm->request.username == NULL) {
crypto/heimdal/lib/krb5/digest.c
511
const char *username)
crypto/heimdal/lib/krb5/digest.c
513
if (digest->request.username) {
crypto/heimdal/lib/krb5/digest.c
517
digest->request.username = strdup(username);
crypto/heimdal/lib/krb5/digest.c
518
if (digest->request.username == NULL) {
crypto/heimdal/lib/krb5/get_default_principal.c
110
char username[1024];
crypto/heimdal/lib/krb5/get_default_principal.c
111
ULONG sz = sizeof(username);
crypto/heimdal/lib/krb5/get_default_principal.c
113
if (GetUserNameEx(NameUserPrincipal, username, &sz)) {
crypto/heimdal/lib/krb5/get_default_principal.c
114
return krb5_parse_name_flags(context, username,
crypto/heimdal/lib/krb5/get_default_principal.c
123
char username[1024];
crypto/heimdal/lib/krb5/get_default_principal.c
124
DWORD dsz = sizeof(username);
crypto/heimdal/lib/krb5/get_default_principal.c
126
if (GetUserName(username, &dsz)) {
crypto/heimdal/lib/krb5/get_default_principal.c
127
return krb5_make_principal(context, princ, NULL, username, NULL);
crypto/heimdal/lib/krb5/get_default_principal.c
133
const char * username = get_env_user();
crypto/heimdal/lib/krb5/get_default_principal.c
135
if (username == NULL) {
crypto/heimdal/lib/krb5/get_default_principal.c
141
return krb5_make_principal(context, princ, NULL, username, NULL);
crypto/heimdal/lib/ntlm/heimntlm.h
145
char *username; /**< */
crypto/heimdal/lib/ntlm/ntlm.c
1383
const char *username,
crypto/heimdal/lib/ntlm/ntlm.c
1398
ret = ascii2ucs2le(username, 1, &buf);
crypto/heimdal/lib/ntlm/ntlm.c
1459
const char *username,
crypto/heimdal/lib/ntlm/ntlm.c
1473
heim_ntlm_ntlmv2_key(key, len, username, target, ntlmv2);
crypto/heimdal/lib/ntlm/ntlm.c
1511
const char *username,
crypto/heimdal/lib/ntlm/ntlm.c
1533
heim_ntlm_ntlmv2_key(key, len, username, target, ntlmv2);
crypto/heimdal/lib/ntlm/ntlm.c
1612
const char *username,
crypto/heimdal/lib/ntlm/ntlm.c
1641
heim_ntlm_ntlmv2_key(key, len, username, target, ntlmv2);
crypto/heimdal/lib/ntlm/ntlm.c
822
if (data->username)
crypto/heimdal/lib/ntlm/ntlm.c
823
free(data->username);
crypto/heimdal/lib/ntlm/ntlm.c
843
struct sec_buffer lm, ntlm, target, username, sessionkey, ws;
crypto/heimdal/lib/ntlm/ntlm.c
869
CHECK(ret_sec_buffer(in, &username), 0);
crypto/heimdal/lib/ntlm/ntlm.c
870
if (username.allocated)
crypto/heimdal/lib/ntlm/ntlm.c
871
min_offset = min(min_offset, username.offset);
crypto/heimdal/lib/ntlm/ntlm.c
888
CHECK(ret_sec_string(in, ucs2, &username, &type3->username), 0);
crypto/heimdal/lib/ntlm/ntlm.c
918
struct sec_buffer lm, ntlm, target, username, sessionkey, ws;
crypto/heimdal/lib/ntlm/ntlm.c
927
memset(&username, 0, sizeof(username));
crypto/heimdal/lib/ntlm/ntlm.c
947
username.offset = target.offset + target.allocated;
crypto/heimdal/lib/ntlm/ntlm.c
948
username.length = len_string(ucs2, type3->username);
crypto/heimdal/lib/ntlm/ntlm.c
949
username.allocated = username.length;
crypto/heimdal/lib/ntlm/ntlm.c
951
ws.offset = username.offset + username.allocated;
crypto/heimdal/lib/ntlm/ntlm.c
979
CHECK(store_sec_buffer(out, &username), 0);
crypto/heimdal/lib/ntlm/ntlm.c
990
CHECK(put_string(out, ucs2, type3->username), 0);
crypto/heimdal/lib/ntlm/test_ntlm.c
112
type3.username = rk_UNCONST(user);
crypto/heimdal/lib/ntlm/test_ntlm.c
145
if (strcmp(user, type3.username) != 0)
crypto/heimdal/lib/ntlm/test_ntlm.c
185
*username = "test",
crypto/heimdal/lib/ntlm/test_ntlm.c
210
username,
crypto/heimdal/lib/ntlm/test_ntlm.c
221
username,
crypto/krb5/src/appl/gss-sample/gss-client.c
182
char *username, char *password,
crypto/krb5/src/appl/gss-sample/gss-client.c
209
if (username != NULL) {
crypto/krb5/src/appl/gss-sample/gss-client.c
210
send_tok.value = username;
crypto/krb5/src/appl/gss-sample/gss-client.c
211
send_tok.length = strlen(username);
crypto/krb5/src/appl/gss-sample/gss-client.c
403
int use_file, int mcount, char *username, char *password)
crypto/krb5/src/appl/gss-sample/gss-client.c
429
v1_format, oid, username, password,
crypto/krb5/src/appl/gss-sample/gss-client.c
689
static char *username = NULL;
crypto/krb5/src/appl/gss-sample/gss-client.c
697
v1_format, msg, use_file, mcount, username, password) < 0)
crypto/krb5/src/appl/gss-sample/gss-client.c
736
username = *argv;
crypto/krb5/src/ccapi/server/win/ccs_os_server.cpp
732
WCHAR* username = (WCHAR*)authz_handle;
crypto/krb5/src/ccapi/server/win/ccs_os_server.cpp
733
int len = lstrlenW(username) + 1;
crypto/krb5/src/ccapi/server/win/ccs_os_server.cpp
736
_snprintf(client_id, max_len, "%S", username);
crypto/krb5/src/lib/gssapi/generic/gssapi_ext.h
79
const char *username);
crypto/krb5/src/lib/krad/t_attrset.c
46
const char *username = "testUser", *password = "accept";
crypto/krb5/src/lib/krad/t_attrset.c
57
tmp = string2data((char *)username);
crypto/krb5/src/lib/krad/t_attrset.c
70
encoded[len + 1] = strlen(username) + 2;
crypto/krb5/src/lib/krad/t_attrset.c
71
memcpy(encoded + len + 2, username, strlen(username));
crypto/krb5/src/lib/krad/t_attrset.c
89
tmp = string2data((char *)username);
crypto/krb5/src/lib/krad/t_packet.c
170
krb5_data username, password;
crypto/krb5/src/lib/krad/t_packet.c
177
username = string2data("testUser");
crypto/krb5/src/lib/krad/t_packet.c
187
noerror(make_packet(ctx, &username, &password, &packets[ACCEPT_PACKET]));
crypto/krb5/src/lib/krad/t_packet.c
194
noerror(make_packet(ctx, &username, &password, &packets[REJECT_PACKET]));
crypto/krb5/src/lib/krad/t_packet.c
52
make_packet(krb5_context ctx, const krb5_data *username,
crypto/krb5/src/lib/krad/t_packet.c
73
retval = krad_attrset_add(set, KRAD_ATTR_USER_NAME, username);
crypto/krb5/src/lib/krad/t_packet.c
97
if (data->length != username->length ||
crypto/krb5/src/lib/krad/t_packet.c
98
memcmp(data->data, username->data, data->length) != 0) {
crypto/krb5/src/plugins/kdb/ldap/libkdb_ldap/ldap_principal.c
614
krb5_ldap_parse_name(krb5_context context, const char *username,
crypto/krb5/src/plugins/kdb/ldap/libkdb_ldap/ldap_principal.c
626
at_realm = strrchr(username, '@');
crypto/krb5/src/plugins/kdb/ldap/libkdb_ldap/ldap_principal.c
628
princstr = strdup(username);
crypto/krb5/src/plugins/kdb/ldap/libkdb_ldap/ldap_principal.c
631
for (p = username; p < at_realm; p++) {
crypto/krb5/src/plugins/kdb/ldap/libkdb_ldap/ldap_principal.h
131
krb5_ldap_parse_name(krb5_context context, const char *username,
crypto/krb5/src/plugins/preauth/otp/otp_state.c
363
free(t->username.data);
crypto/krb5/src/plugins/preauth/otp/otp_state.c
410
char *username = NULL, **indicators = NULL;
crypto/krb5/src/plugins/preauth/otp/otp_state.c
432
username = strdup(k5_json_string_utf8(val));
crypto/krb5/src/plugins/preauth/otp/otp_state.c
433
if (username == NULL)
crypto/krb5/src/plugins/preauth/otp/otp_state.c
437
retval = krb5_unparse_name_flags(ctx, princ, flags, &username);
crypto/krb5/src/plugins/preauth/otp/otp_state.c
447
free(username);
crypto/krb5/src/plugins/preauth/otp/otp_state.c
453
out->username = string2data(username);
crypto/krb5/src/plugins/preauth/otp/otp_state.c
60
krb5_data username;
crypto/krb5/src/plugins/preauth/otp/otp_state.c
667
retval = krad_attrset_add(req->attrs, KRAD_ATTR_USER_NAME, &tok->username);
crypto/krb5/src/windows/include/leashwin.h
37
LPSTR username; // in v3, set to in.username
crypto/krb5/src/windows/include/leashwin.h
48
char username[LEASH_USERNAME_SZ];
crypto/krb5/src/windows/include/leashwin.h
55
char username[LEASH_USERNAME_SZ];
crypto/krb5/src/windows/include/leashwin.h
79
WCHAR username[NETID_USERNAME_SZ];
crypto/krb5/src/windows/include/leashwin.h
92
WCHAR username[NETID_USERNAME_SZ];
crypto/krb5/src/windows/kfwlogon/kfwcommon.c
648
KFW_get_cred( char * username,
crypto/krb5/src/windows/kfwlogon/kfwcommon.c
660
if (!pkrb5_init_context || !username || !password || !password[0])
crypto/krb5/src/windows/kfwlogon/kfwcommon.c
663
DebugEvent0(username);
crypto/krb5/src/windows/kfwlogon/kfwcommon.c
671
pname = malloc(strlen(username) + strlen(realm) + 2);
crypto/krb5/src/windows/kfwlogon/kfwcommon.c
674
strcpy(pname, username);
crypto/krb5/src/windows/kfwlogon/kfwlogon.h
203
int KFW_get_cred( char * username, char * password, int lifetime, char ** reasonP );
crypto/krb5/src/windows/leash/Leash.cpp
1082
ldi.username = NULL;
crypto/krb5/src/windows/leash/Leash.cpp
1167
ldi.username = NULL;
crypto/krb5/src/windows/leash/Leash.cpp
198
char username[64]="";
crypto/krb5/src/windows/leash/Leash.cpp
209
username[i] = ticketinfo.Krb5.principal[i];
crypto/krb5/src/windows/leash/Leash.cpp
211
username[i] = '\0';
crypto/krb5/src/windows/leash/Leash.cpp
228
ldi.username = username;
crypto/krb5/src/windows/leash/LeashView.cpp
2287
ldi.username = ldi.in.username;
crypto/krb5/src/windows/leash/LeashView.cpp
2302
strcpy_s(ldi.in.username,param);
crypto/krb5/src/windows/leash/LeashView.cpp
2313
if (strlen(ldi.username) > 0 && strlen(ldi.realm) > 0)
crypto/krb5/src/windows/leash/LeashView.cpp
573
char username[64];
crypto/krb5/src/windows/leash/LeashView.cpp
583
username[i] = principal[i];
crypto/krb5/src/windows/leash/LeashView.cpp
584
username[i] = '\0';
crypto/krb5/src/windows/leash/LeashView.cpp
599
ldi.username = ldi.in.username;
crypto/krb5/src/windows/leash/LeashView.cpp
600
strcpy(ldi.in.username,username);
crypto/krb5/src/windows/leash/LeashView.cpp
856
char *username = NULL;
crypto/krb5/src/windows/leash/LeashView.cpp
891
username = pname;
crypto/krb5/src/windows/leash/LeashView.cpp
900
ldi.username = ldi.in.username;
crypto/krb5/src/windows/leash/LeashView.cpp
901
strcpy_s(ldi.in.username, username ? username : "");
crypto/krb5/src/windows/leashdll/lsh_pwd.c
1290
lpdi->out.username[0] = 0;
crypto/krb5/src/windows/leashdll/lsh_pwd.c
1333
if (lpdi->username && (strlen(lpdi->username) > 0) &&
crypto/krb5/src/windows/leashdll/lsh_pwd.c
1335
sprintf_s(principal, sizeof(principal), "%s@%s", lpdi->username,
crypto/krb5/src/windows/leashdll/lsh_pwd.c
163
dlginfo->in.username, NETID_USERNAME_SZ);
crypto/krb5/src/windows/leashdll/lsh_pwd.c
1699
lpdi->out.username[0] = 0;
crypto/krb5/src/windows/leashdll/lsh_pwd.c
1713
if (lpdi->username != NULL && (strlen(lpdi->username) > 0) &&
crypto/krb5/src/windows/leashdll/lsh_pwd.c
1716
sizeof(principal), "%s@%s", lpdi->username, lpdi->realm);
crypto/krb5/src/windows/leashdll/lsh_pwd.c
188
char *desiredName = lpdlginfo->username;
crypto/krb5/src/windows/leashdll/lsh_pwd.c
221
desiredName = lpdlginfo->username;
crypto/krb5/src/windows/leashdll/lsh_pwd.c
226
desiredName = lpdlginfo->in.username;
crypto/krb5/src/windows/leashdll/lsh_pwd.c
265
dlginfo->in.username, NETID_USERNAME_SZ);
crypto/krb5/src/windows/leashdll/lsh_pwd.c
279
WideCharToMultiByte(CP_ACP, 0, dlginfo->out.username, -1,
crypto/krb5/src/windows/leashdll/lsh_pwd.c
280
lpdlginfo->out.username, LEASH_USERNAME_SZ,
crypto/krb5/src/windows/leashdll/lshfunc.c
2457
dlginfo->in.username, NETID_USERNAME_SZ);
crypto/openssh/audit-bsm.c
235
selected(char *username, uid_t uid, au_event_t event, int sf)
crypto/openssh/audit-bsm.c
248
rc = au_user_mask(username, &mask);
crypto/openssh/audit-linux.c
42
linux_audit_record_event(int uid, const char *username, const char *hostname,
crypto/openssh/audit-linux.c
55
NULL, "login", username ? username : "(unknown)",
crypto/openssh/audit-linux.c
56
username == NULL ? uid : -1, hostname, ip, ttyn, success);
crypto/openssh/auth2-pubkey.c
389
char *tmp, *username = NULL, *command = NULL, **av = NULL;
crypto/openssh/auth2-pubkey.c
411
username = percent_expand(options.authorized_principals_command_user,
crypto/openssh/auth2-pubkey.c
413
runas_pw = getpwnam(username);
crypto/openssh/auth2-pubkey.c
416
username, strerror(errno));
crypto/openssh/auth2-pubkey.c
507
free(username);
crypto/openssh/auth2-pubkey.c
662
char *username = NULL, *key_fp = NULL, *keytext = NULL;
crypto/openssh/auth2-pubkey.c
682
username = percent_expand(options.authorized_keys_command_user,
crypto/openssh/auth2-pubkey.c
684
runas_pw = getpwnam(username);
crypto/openssh/auth2-pubkey.c
687
username, strerror(errno));
crypto/openssh/auth2-pubkey.c
779
free(username);
crypto/openssh/channels.c
1451
char username[256];
crypto/openssh/channels.c
1507
strlcpy(username, p, sizeof(username));
crypto/openssh/loginrec.c
1162
if (strncmp(li->username, ut->ut_name,
crypto/openssh/loginrec.c
1163
MIN_SIZEOF(li->username, ut->ut_name)) == 0) {
crypto/openssh/loginrec.c
1326
if (strncmp(li->username, utx->ut_user,
crypto/openssh/loginrec.c
1327
MIN_SIZEOF(li->username, utx->ut_user)) == 0 ) {
crypto/openssh/loginrec.c
1417
li->wtmpdb_id = wtmpdb_login(NULL, USER_PROCESS, li->username,
crypto/openssh/loginrec.c
1541
LASTLOG_FILE, li->username);
crypto/openssh/loginrec.c
1627
if ((ll = getlastlogxbyname(li->username, &l)) == NULL) {
crypto/openssh/loginrec.c
1686
utx = getutxuser(li->username);
crypto/openssh/loginrec.c
1711
record_failed_login(struct ssh *ssh, const char *username, const char *hostname,
crypto/openssh/loginrec.c
1744
strlcpy(li.username, username, sizeof(li.username));
crypto/openssh/loginrec.c
306
if (strlcpy(li->username, pw->pw_name, sizeof(li->username)) >=
crypto/openssh/loginrec.c
307
sizeof(li->username)) {
crypto/openssh/loginrec.c
310
(unsigned long)sizeof(li->username) - 1);
crypto/openssh/loginrec.c
331
logininfo *login_alloc_entry(pid_t pid, const char *username,
crypto/openssh/loginrec.c
337
login_init_entry(newli, pid, username, hostname, line);
crypto/openssh/loginrec.c
359
login_init_entry(struct logininfo *li, pid_t pid, const char *username,
crypto/openssh/loginrec.c
372
if (username) {
crypto/openssh/loginrec.c
373
strlcpy(li->username, username, sizeof(li->username));
crypto/openssh/loginrec.c
374
pw = getpwnam(li->username);
crypto/openssh/loginrec.c
377
li->username);
crypto/openssh/loginrec.c
461
!sys_auth_record_login(li->username,li->hostname,li->line,
crypto/openssh/loginrec.c
463
logit("Writing login record failed for %s", li->username);
crypto/openssh/loginrec.c
686
strncpy(ut->ut_name, li->username,
crypto/openssh/loginrec.c
687
MIN_SIZEOF(ut->ut_name, li->username));
crypto/openssh/loginrec.c
759
strncpy(utx->ut_user, li->username,
crypto/openssh/loginrec.c
760
MIN_SIZEOF(utx->ut_user, li->username));
crypto/openssh/loginrec.h
71
char username[LINFO_NAMESIZE]; /* login username */
crypto/openssh/loginrec.h
94
struct logininfo *login_alloc_entry(pid_t pid, const char *username,
crypto/openssh/loginrec.h
99
int login_init_entry(struct logininfo *li, pid_t pid, const char *username,
crypto/openssh/logintest.c
101
strlcpy(username, pw->pw_name, sizeof(username));
crypto/openssh/logintest.c
108
li1 = login_alloc_entry((int)getpid(), username, NULL, ttyname(0));
crypto/openssh/logintest.c
77
li->username, li->hostname, li->exit,
crypto/openssh/logintest.c
91
char username[32];
crypto/openssh/monitor_wrap.c
335
mm_getpwnamallow(struct ssh *ssh, const char *username)
crypto/openssh/monitor_wrap.c
348
if ((r = sshbuf_put_cstring(m, username)) != 0)
crypto/openssh/sftp-server.c
1700
char *username;
crypto/openssh/sftp-server.c
1705
if ((r = sshbuf_get_cstring(iqueue, &username, NULL)) != 0)
crypto/openssh/sftp-server.c
1708
debug3("request %u: home-directory \"%s\"", id, username);
crypto/openssh/sftp-server.c
1709
if (username[0] == '\0') {
crypto/openssh/sftp-server.c
1711
} else if ((user_pw = getpwnam(username)) == NULL) {
crypto/openssh/sftp-server.c
1721
free(username);
crypto/openssl/crypto/srp/srp_vfy.c
512
static SRP_user_pwd *find_user(SRP_VBASE *vb, char *username)
crypto/openssl/crypto/srp/srp_vfy.c
522
if (strcmp(user->id, username) == 0)
crypto/openssl/crypto/srp/srp_vfy.c
543
SRP_user_pwd *SRP_VBASE_get_by_user(SRP_VBASE *vb, char *username)
crypto/openssl/crypto/srp/srp_vfy.c
545
return find_user(vb, username);
crypto/openssl/crypto/srp/srp_vfy.c
553
SRP_user_pwd *SRP_VBASE_get1_by_user(SRP_VBASE *vb, char *username)
crypto/openssl/crypto/srp/srp_vfy.c
564
if ((user = find_user(vb, username)) != NULL)
crypto/openssl/crypto/srp/srp_vfy.c
577
if (!SRP_user_pwd_set1_ids(user, username, NULL))
crypto/openssl/crypto/srp/srp_vfy.c
589
|| !EVP_DigestUpdate(ctxt, username, strlen(username))
crypto/openssl/include/openssl/srp.h
193
SRP_user_pwd *SRP_VBASE_get1_by_user(SRP_VBASE *vb, char *username);
crypto/openssl/include/openssl/srp.h
283
SRP_user_pwd *SRP_VBASE_get_by_user(SRP_VBASE *vb, char *username);
crypto/openssl/test/srptest.c
29
static int run_srp(const char *username, const char *client_pass,
crypto/openssl/test/srptest.c
51
if (!TEST_true(SRP_create_verifier_BN(username, server_pass,
crypto/openssl/test/srptest.c
92
x = SRP_Calc_x(s, username, client_pass);
crypto/openssl/test/sslapitest.c
7536
char *username;
crypto/openssl/test/sslapitest.c
7539
username = SSL_get_srp_username(s);
crypto/openssl/test/sslapitest.c
7540
if (username == NULL) {
crypto/openssl/test/sslapitest.c
7545
user = SRP_VBASE_get1_by_user(vbase, username);
lib/libpam/modules/pam_login_access/login_access.c
176
group_match(const char *tok, const char *username)
lib/libpam/modules/pam_login_access/login_access.c
183
if ((passwd = getpwnam(username)) == NULL)
lib/libpam/modules/pam_login_access/login_access.c
188
syslog(LOG_ERR, "getgrnam() failed for %s: %s", username, strerror(errno));
lib/libpam/modules/pam_login_access/login_access.c
190
syslog(LOG_NOTICE, "group not found: %s", username);
lib/libpam/modules/pam_login_access/login_access.c
194
syslog(LOG_ERR, "cannot allocate memory for grouplist: %s", username);
lib/libpam/modules/pam_login_access/login_access.c
198
if (getgrouplist(username, passwd->pw_gid, grouplist, &ngroups) != 0)
lib/libpam/modules/pam_login_access/login_access.c
199
syslog(LOG_ERR, "getgrouplist() failed for %s", username);
sbin/umbctl/umbctl.c
423
char const * username)
sbin/umbctl/umbctl.c
425
umbp->usernamelen = _char_to_utf16(username, umbp->username,
sbin/umbctl/umbctl.c
426
sizeof(umbp->username));
sbin/umbctl/umbctl.c
428
|| (size_t)umbp->usernamelen > sizeof(umbp->username))
sys/dev/usb/net/if_umb.c
2497
if (!umb_addstr(c, sizeof (*c), &off, sc->sc_info.username,
sys/dev/usb/net/if_umb.c
791
memset(sc->sc_info.username, 0, sizeof (sc->sc_info.username));
sys/dev/usb/net/if_umb.c
792
memcpy(sc->sc_info.username, mp.username, mp.usernamelen);
sys/dev/usb/net/if_umbreg.h
288
uint16_t username[UMB_USERNAME_MAXLEN];
sys/dev/usb/net/if_umbreg.h
341
uint16_t username[UMB_USERNAME_MAXLEN];
sys/netsmb/smb_conn.c
140
strcmp(vcp->vc_username, vcspec->username) != 0)
sys/netsmb/smb_conn.c
448
vcp->vc_username = smb_strdup(vcspec->username);
sys/netsmb/smb_conn.h
317
char * username;
sys/netsmb/smb_usr.c
86
spec->username = dp->ioc_user;
usr.bin/find/function.c
1734
char *username;
usr.bin/find/function.c
1739
username = nextarg(option, argvp);
usr.bin/find/function.c
1743
p = getpwnam(username);
usr.bin/find/function.c
1745
char* cp = username;
usr.bin/find/function.c
1746
if( username[0] == '-' || username[0] == '+' )
usr.bin/find/function.c
1747
username++;
usr.bin/find/function.c
1748
uid = atoi(username);
usr.bin/find/function.c
1749
if (uid == 0 && username[0] != '0')
usr.bin/find/function.c
1750
errx(1, "%s: %s: no such user", option->name, username);
usr.bin/ipcs/ipcs.c
532
user2uid(char *username)
usr.bin/ipcs/ipcs.c
538
uid = strtoul(username, &r, 0);
usr.bin/ipcs/ipcs.c
539
if (!*r && r != username)
usr.bin/ipcs/ipcs.c
541
if ((pwd = getpwnam(username)) == NULL)
usr.bin/ipcs/ipcs.c
55
uid_t user2uid(char *username);
usr.bin/login/login.c
131
static char *username; /* user name */
usr.bin/login/login.c
186
badlogin(username);
usr.bin/login/login.c
229
username = strdup(*argv);
usr.bin/login/login.c
230
if (username == NULL)
usr.bin/login/login.c
277
olduser = username;
usr.bin/login/login.c
278
username = getloginname();
usr.bin/login/login.c
287
if (failures && strcmp(olduser, username) != 0) {
usr.bin/login/login.c
295
pam_err = pam_start("login", username, &pamc, &pamh);
usr.bin/login/login.c
320
(void)getpwnam_r(username, &pwres, pwbuf, sizeof(pwbuf), &pwd);
usr.bin/login/login.c
367
badlogin(username);
usr.bin/login/login.c
507
username, tty, hostname);
usr.bin/login/login.c
510
username, tty);
usr.bin/login/login.c
588
if (setlogin(username) != 0) {
usr.bin/login/login.c
589
syslog(LOG_ERR, "setlogin(%s): %m - exiting", username);
usr.bin/login/login.c
605
(void)setenv("LOGNAME", username, 1);
usr.bin/login/login.c
606
(void)setenv("USER", username, 1);
usr.bin/login/login.c
655
username);
usr.bin/login/login.c
707
if (strcmp(username, tmpl_user) != 0) {
usr.bin/login/login.c
835
badlogin(username);
usr.bin/mail/extern.h
66
char *username(void);
usr.bin/mail/temp.c
67
if ((cp = username()) == NULL) {
usr.bin/su/su.c
152
char *username, *class, shellbuf[MAXPATHLEN];
usr.bin/su/su.c
244
username = getlogin();
usr.bin/su/su.c
245
if (username != NULL)
usr.bin/su/su.c
246
pwd = getpwnam(username);
usr.bin/su/su.c
252
"unable to determine invoking subject: '%s'", username))
usr.bin/su/su.c
258
username = strdup(pwd->pw_name);
usr.bin/su/su.c
259
if (username == NULL)
usr.bin/su/su.c
282
PAM_SET_ITEM(PAM_RUSER, username);
usr.bin/su/su.c
293
username, user, mytty))
usr.bin/su/su.c
297
username, user, mytty);
usr.bin/su/su.c
540
syslog(LOG_NOTICE, "%s to %s%s", username, user,
usr.bin/top/top.c
239
char *(*get_userid)(int) = username;
usr.bin/top/username.h
17
char *username(int uid);
usr.bin/top/username.h
18
int userid(char *username);
usr.sbin/cron/lib/entry.c
303
char *username = cmd; /* temp buffer */
usr.sbin/cron/lib/entry.c
311
ch = get_string(username, MAX_COMMAND, file, " \t");
usr.sbin/cron/lib/entry.c
313
Debug(DPARS, ("load_entry()...got %s\n",username))
usr.sbin/cron/lib/entry.c
323
if ((s = strrchr(username, '/')) != NULL) {
usr.sbin/cron/lib/entry.c
344
if ((s = strrchr(username, ':')) != NULL) {
usr.sbin/cron/lib/entry.c
352
pw = getpwnam(username);
usr.sbin/cron/lib/misc.c
334
allowed(char *username)
usr.sbin/cron/lib/misc.c
353
isallowed = in_file(username, allow);
usr.sbin/cron/lib/misc.c
355
isallowed = !in_file(username, deny);
usr.sbin/cron/lib/misc.c
358
isallowed = (strcmp(username, ROOT_USER) == 0);
usr.sbin/cron/lib/misc.c
372
log_it(const char *username, int xpid, const char *event, const char *detail)
usr.sbin/cron/lib/misc.c
390
msg = malloc(strlen(username)
usr.sbin/cron/lib/misc.c
412
username,
usr.sbin/cron/lib/misc.c
444
syslog(LOG_INFO, "(%s) %s (%s)\n", username, event, detail);
usr.sbin/cron/lib/misc.c
451
username, pid, event, detail);
usr.sbin/jail/command.c
294
const char *jidstr, *conslog, *fmt, *path, *ruleset, *term, *username;
usr.sbin/jail/command.c
694
username = string_param(j->intparams[injail
usr.sbin/jail/command.c
724
injail ? " in jail" : "", username ? " as " : "",
usr.sbin/jail/command.c
725
username ? username : "", j->comline);
usr.sbin/jail/command.c
74
static int get_user_info(struct cfjail *j, const char *username,
usr.sbin/jail/command.c
746
if ((clean || username) && injail && sjuser &&
usr.sbin/jail/command.c
747
get_user_info(j, username, &pwd, &lcap) < 0)
usr.sbin/jail/command.c
779
if (clean || username) {
usr.sbin/jail/command.c
781
get_user_info(j, username, &pwd, &lcap) < 0)
usr.sbin/jail/command.c
795
if (setusercontext(lcap, pwd, pwd->pw_uid, username
usr.sbin/jail/command.c
807
if (clean && username && chdir(pwd->pw_dir) < 0) {
usr.sbin/jail/command.c
971
get_user_info(struct cfjail *j, const char *username,
usr.sbin/jail/command.c
977
*pwdp = pwd = username ? getpwnam(username) : getpwuid(getuid());
usr.sbin/jail/command.c
980
jail_warnx(j, "getpwnam%s%s: %s", username ? " " : "",
usr.sbin/jail/command.c
981
username ? username : "", strerror(errno));
usr.sbin/jail/command.c
982
else if (username)
usr.sbin/jail/command.c
983
jail_warnx(j, "%s: no such user", username);
usr.sbin/jexec/jexec.c
111
get_user_info(username, &pwd, &lcap);
usr.sbin/jexec/jexec.c
123
if (clean || username != NULL) {
usr.sbin/jexec/jexec.c
126
get_user_info(username, &pwd, &lcap);
usr.sbin/jexec/jexec.c
137
if (setusercontext(lcap, pwd, pwd->pw_uid, username
usr.sbin/jexec/jexec.c
146
if (clean && username && !dflag && chdir(pwd->pw_dir) < 0)
usr.sbin/jexec/jexec.c
178
get_user_info(const char *username, const struct passwd **pwdp,
usr.sbin/jexec/jexec.c
185
if (username) {
usr.sbin/jexec/jexec.c
186
pwd = getpwnam(username);
usr.sbin/jexec/jexec.c
189
err(1, "getpwnam: %s", username);
usr.sbin/jexec/jexec.c
191
errx(1, "%s: no such user", username);
usr.sbin/jexec/jexec.c
52
static void get_user_info(const char *username, const struct passwd **pwdp,
usr.sbin/jexec/jexec.c
66
const char *username, *shell, *term;
usr.sbin/jexec/jexec.c
71
username = NULL;
usr.sbin/jexec/jexec.c
92
username = optarg;
usr.sbin/jexec/jexec.c
96
username = optarg;
usr.sbin/pwd_mkdb/pwd_mkdb.c
102
char *username;
usr.sbin/pwd_mkdb/pwd_mkdb.c
110
username = NULL;
usr.sbin/pwd_mkdb/pwd_mkdb.c
134
username = optarg;
usr.sbin/pwd_mkdb/pwd_mkdb.c
144
if (argc != 1 || (username && (*username == '+' || *username == '-')))
usr.sbin/pwd_mkdb/pwd_mkdb.c
201
if (username) {
usr.sbin/pwd_mkdb/pwd_mkdb.c
237
len = strlen(username);
usr.sbin/pwd_mkdb/pwd_mkdb.c
240
memmove(buf + 1, username, MIN(len, sizeof(buf) - 1));
usr.sbin/pwd_mkdb/pwd_mkdb.c
259
if (!strcmp(data.data, username))
usr.sbin/pwd_mkdb/pwd_mkdb.c
322
if (username == NULL) {
usr.sbin/pwd_mkdb/pwd_mkdb.c
360
(!username || (strcmp(username, pwd.pw_name) == 0))) {