userid
if ((pwd = getpwuid(userid = getuid())) == NULL)
errx(1, "unknown user %d", (int)userid);
uid_t userid;
const char *userid,
if (userid && ldap_count_entries(HDB2LDAP(db), *msg) == 0) {
ret = escape_value(context, userid, "e);
krb5_s4u_userid *userid,
if (userid->user == NULL)
for_user.user = userid->user;
const char *application, const char *userid, uint8_t flags,
uid_t userid;
if ((pwd = getpwuid(userid = getuid())) == NULL)
fatal("unknown user %u", (u_int) userid);
const char *application, const char *userid, uint8_t flags,
(r = sshbuf_put_cstring(req, userid)) != 0 ||
u_char *userid = NULL;
(r = sshbuf_get_string(resp, &userid, &userid_len)) != 0) {
srk->user_id = userid;
userid = NULL;
freezero(userid, userid_len);
char *provider, *application, *pin, *device, *userid;
(r = sshbuf_get_cstring(req, &userid, NULL)) != 0 ||
null_empty(&userid);
if ((r = sshsk_enroll((int)type, provider, device, application, userid,
const char *application, const char *userid, uint8_t flags,
provider_path, device, application, userid, flags,
if ((r = make_options(device, userid, &opts)) != 0)
const char *application, const char *userid, uint8_t flags,
const char *userid,
sig = ossl_sm2_do_sign(key, EVP_sm3(), (const uint8_t *)userid,
strlen(userid), (const uint8_t *)message, msg_len);
ok = ossl_sm2_do_verify(key, EVP_sm3(), sig, (const uint8_t *)userid,
strlen(userid), (const uint8_t *)message, msg_len);
static int create_new_vfile(char *userid, char *password, const char *filename)
gNid = SRP_create_verifier_ex(userid, password, &row[DB_srpsalt],
row[DB_srpid] = OPENSSL_strdup(userid);
static int create_new_vbase(char *userid, char *password)
if (!TEST_true(SRP_create_verifier_BN_ex(userid, password, &salt, &verifier,
user_pwd->id = OPENSSL_strdup(userid);
char *userid = "test", *password = "password", *tstsrpfile;
if (!TEST_true(create_new_vbase(userid, password)))
if (!TEST_true(create_new_vfile(userid, password, tmpfilename)))
|| !TEST_int_gt(SSL_CTX_set_srp_username(cctx, userid), 0))
if ((uid = userid(buf2)) == -1)
if ((ps.uid[0] = userid(optarg)) == -1)
int userid(char *username);
const char *userid, const char *otherhost, const char *orighost)
if (*userid == '\0')
userid = NULL;
if (userid != NULL) {
snprintf(eostat, remspace, " user=%s", userid);
sendmail(struct printer *pp, char *userid, int bombed)
printf("To: %s@%s\n", userid, origin_host);
syslog(LOG_WARNING, "unable to send mail to %s: %m", userid);
userid, *jobname ? jobname : "<unknown>", pp->printer, cp);
userid = getuid();
if (userid != 0 && userid != pp->daemon_user)
if (userid != pp->daemon_user || lpr_username == 0) {
if ((pw = getpwuid(userid)) == NULL)
if (pp->restrict_grp != NULL && userid != pp->daemon_user) {
if (userid && stat(buf, &stb) == 0 && (stb.st_mode & LFM_QUEUE_DIS))
if (fchown(f, userid, -1) < 0) {
if(stats.st_uid == userid) {
static int userid; /* user id */
char *gecos, *homedir, *skel, *walk, *userid, *groupid, *grname;
gecos = homedir = skel = userid = groupid = default_passwd = NULL;
userid = optarg;
if (userid != NULL) {
if ((p = strtok(userid, ", \t")) != NULL)
if (userid)
id = pw_checkid(userid, UID_MAX);