Searched refs:user (Results 1 - 25 of 863) sorted by relevance

1234567891011>>

/freebsd-head/crypto/heimdal/lib/roken/
H A Dget_default_username.c46 const char *user; local
48 user = getenv ("USER");
49 if (user == NULL)
50 user = getenv ("LOGNAME");
51 if (user == NULL)
52 user = getenv ("USERNAME");
55 if (user == NULL) {
56 user = (const char *)getlogin ();
57 if (user != NULL)
58 return user;
[all...]
H A Dinnetgr.c40 const char *user, const char *domain)
39 innetgr(const char *netgroup, const char *machine, const char *user, const char *domain) argument
H A Dk_getpwnam.c42 k_getpwnam (const char *user) argument
46 p = getpwnam (user);
52 spwd = getspnam (user);
/freebsd-head/contrib/kyua/utils/
H A Dpasswd.hpp44 /// Represents a system user.
45 class user { class in namespace:utils::passwd
47 /// The name of the user.
50 /// The system-wide identifier of the user.
53 /// The login group identifier for the user.
56 user(const std::string&, const unsigned int, const unsigned int);
62 user current_user(void);
63 user find_user_by_name(const std::string&);
64 user find_user_by_uid(const unsigned int);
65 void set_current_user_for_testing(const user
[all...]
H A Dpasswd_fwd.hpp39 class user;
H A Dpasswd_test.cpp49 const passwd_ns::user user("the-name", 1, 2);
50 ATF_REQUIRE_EQ("the-name", user.name);
51 ATF_REQUIRE_EQ(1, user.uid);
52 ATF_REQUIRE_EQ(2, user.gid);
59 const passwd_ns::user user("i-am-root", 0, 10);
60 ATF_REQUIRE(user.is_root());
67 const passwd_ns::user user("
75 const passwd_ns::user user = passwd_ns::current_user(); local
87 const passwd_ns::user user = passwd_ns::current_user(); local
99 const passwd_ns::user user = passwd_ns::find_user_by_name(pw->pw_name); local
123 const passwd_ns::user user = passwd_ns::find_user_by_name("myself1"); local
136 const passwd_ns::user user = passwd_ns::find_user_by_uid(::getuid()); local
155 const passwd_ns::user user = passwd_ns::find_user_by_uid(10); local
[all...]
H A Dpasswd.cpp52 static utils::optional< passwd_ns::user > fake_current_user;
56 static std::vector< passwd_ns::user > mock_users;
59 /// Formats a user for logging purposes.
61 /// \param user The user to format.
63 /// \return The user as a string.
65 format_user(const passwd_ns::user& user) argument
67 return F("name=%s, uid=%s, gid=%s") % user.name % user
79 passwd_ns::user::user(const std::string& name_, const unsigned int uid_, function in class:passwd_ns::user
[all...]
/freebsd-head/contrib/openbsm/bin/auditdistd/
H A Dsandbox.h35 int sandbox(const char *user, bool capsicum, const char *fmt, ...);
/freebsd-head/crypto/heimdal/lib/gssapi/krb5/
H A Dauthorize_localname.c43 char *user; local
51 user = malloc(user_name->length + 1);
52 if (user == NULL) {
57 memcpy(user, user_name->value, user_name->length);
58 user[user_name->length] = '\0';
61 user_ok = krb5_kuserok(context, princ, user);
63 free(user);
/freebsd-head/crypto/openssh/regress/
H A Daddrmatch.sh10 user="$1"; addr="$2"; host="$3"; laddr="$4"; lport="$5"
13 verbose "test $descr for $user $addr $host"
15 -C user=${user},addr=${addr},host=${host},laddr=${laddr},lport=${lport} | \
35 run_trial user 192.168.0.1 somehost 1.2.3.4 1234 match1 "first entry"
36 run_trial user 192.168.30.1 somehost 1.2.3.4 1234 nomatch "negative match"
37 run_trial user 19.0.0.1 somehost 1.2.3.4 1234 nomatch "no match"
38 run_trial user 10.255.255.254 somehost 1.2.3.4 1234 match1 "list middle"
39 run_trial user 192.168.30.1 192.168.0.1 1.2.3.4 1234 nomatch "faked IP in hostname"
40 run_trial user 1.
[all...]
/freebsd-head/crypto/heimdal/lib/krb5/
H A Dget_default_principal.c43 const char *user = getenv("USER"); local
44 if(user == NULL)
45 user = getenv("LOGNAME");
46 if(user == NULL)
47 user = getenv("USERNAME");
48 return user;
64 const char *user; local
71 user = getlogin();
72 if(user == NULL)
73 user
[all...]
/freebsd-head/sys/contrib/ngatm/netnatm/api/
H A Dcc_user.c68 set_state(struct ccuser *user, enum user_state ns) argument
70 if (user->state != ns) {
71 if (user->cc->log & CCLOG_USER_STATE)
72 cc_user_log(user, "%s -> %s",
73 stab[user->state], stab[ns]);
74 user->state = ns;
79 cc_user_send(struct ccuser *user, u_int op, void *arg, size_t len) argument
81 user->cc->funcs->send_user(user, user
85 cc_user_ok(struct ccuser *user, u_int data, void *arg, size_t len) argument
92 cc_user_err(struct ccuser *user, int err) argument
109 struct ccuser *user; local
133 cc_user_reset(struct ccuser *user) argument
158 cc_user_abort(struct ccuser *user, const struct uni_ie_cause *cause) argument
199 cc_user_destroy(struct ccuser *user) argument
242 check_overlap(struct ccuser *user, struct uni_sap *sap) argument
253 do_arrival(struct ccuser *user) argument
275 cc_query_check(struct ccuser *user) argument
305 cc_attr_query(struct ccuser *user, struct ccconn *conn, uint32_t *attr, u_int count) argument
537 cc_set_check(struct ccuser *user) argument
554 cc_attr_set(struct ccuser *user, struct ccconn *conn, uint32_t *attr, u_int count, u_char *val, size_t vallen) argument
839 cc_user_signal(struct ccuser *user, enum atmop sig, struct uni_msg *msg) argument
985 cc_user_active(struct ccuser *user) argument
1017 cc_user_sig_handle(struct ccuser *user, enum user_sig sig, void *arg, u_int arg2) argument
[all...]
/freebsd-head/tests/sys/cddl/zfs/tests/acl/cifs/
H A Dcifs_attr_003_pos.ksh54 # letting a user/application set them.
70 # 1. Loop super user and non-super user to run the test case.
214 # $2: Execute user
220 typeset user=$2
224 verify_expect $expect $CHG_USR_EXEC $user \
226 verify_expect $expect $CHG_USR_EXEC $user \
235 # $2: Execute user
241 typeset user=$2
245 verify_expect $expect $CHG_USR_EXEC $user \
[all...]
H A Dcifs_attr_001_pos.ksh42 # Verify the user with write_attributes permission or
47 # 1. Loop super user and non-super user to run the test case.
49 # 3. Grant user has write_attributes permission or
90 typeset user=$3
97 if [[ -n $user ]]; then
98 $RUNWATTR -u $user "$CHMOD S+c${attr} $object"
119 typeset user=$3
126 if [[ -n $user ]]; then
127 $RUNWATTR -u $user "
[all...]
H A Dcifs_attr_002_pos.ksh42 # Verify the user with PRIV_FILE_FLAG_SET/PRIV_FILE_FLAG_CLEAR
47 # 1. Loop super user and non-super user to run the test case.
49 # 3. Grant user has PRIV_FILE_FLAG_SET/PRIV_FILE_FLAG_CLEAR separately.
93 typeset user=$3
107 if [[ -n $user ]]; then
108 $RUNWATTR -u $user -p =basic${priv_mod} \
130 typeset user=$3
144 if [[ -n $user ]]; then
145 $RUNWATTR -u $user
[all...]
/freebsd-head/usr.sbin/nologin/
H A Dnologin.c39 const char *user, *tt; local
43 if ((user = getlogin()) == NULL)
44 user = "UNKNOWN";
46 syslog(LOG_CRIT, "Attempted login by %s on %s", user, tt);
/freebsd-head/libexec/rc/rc.d/
H A Dsdpd22 user="${sdpd_username:-nobody}"
23 command_args="-c ${control} -g ${group} -u ${user}"
/freebsd-head/contrib/tcp_wrappers/
H A Dhosts_ctl.c4 * access control checker. The host name and user name arguments should be
24 int hosts_ctl(daemon, name, addr, user)
28 char *user;
36 RQ_USER, user,
/freebsd-head/contrib/kyua/utils/process/
H A Disolation.cpp134 /// \param unprivileged_user Unprivileged user to run the test case as.
137 process::isolate_child(const optional< passwd::user >& unprivileged_user,
152 const passwd::user& user = unprivileged_user.get(); local
154 if (user.gid != ::getgid()) {
155 if (::setgid(user.gid) == -1)
157 % user.gid % ::getuid() % ::getgid(), errno);
160 groups[0] = user.gid;
163 % user.gid % ::getuid() % ::getgid(), errno);
166 if (user
192 const passwd::user& user = unprivileged_user.get(); local
[all...]
/freebsd-head/contrib/wpa/src/ap/
H A Deap_user_db.c2 * hostapd / EAP user database
23 static void set_user_methods(struct hostapd_eap_user *user, const char *methods) argument
32 os_memset(&user->methods, 0, sizeof(user->methods));
39 user->methods[num_methods].method =
41 &user->methods[num_methods].vendor);
42 if (user->methods[num_methods].vendor == EAP_VENDOR_IETF &&
43 user->methods[num_methods].method == EAP_TYPE_NONE) {
45 user->ttls_auth |= EAP_TTLS_AUTH_PAP;
49 user
81 struct hostapd_eap_user *user = ctx; local
105 struct hostapd_eap_user *user = ctx; local
139 struct hostapd_eap_user *user = NULL; local
236 struct hostapd_eap_user *user = conf->eap_user; local
[all...]
/freebsd-head/libexec/bootpd/
H A Dsyslog.conf9 # Note: Have to exclude user from most lines so that user.alert
10 # and user.emerg are not included, because old sendmails
13 # can remove all the special cases for "user" logging.
15 #*.err;kern.debug;auth.notice;user.none /dev/console
16 kern.debug;user,mail.crit;auth.notice /dev/console
19 #*.err;kern.debug;daemon,auth.notice;mail.crit;user.none /var/adm/messages
20 kern.debug;user,mail.crit;auth.notice /var/adm/messages
25 *.alert;kern.err;daemon.err;user.none operator
26 *.alert;user
[all...]
/freebsd-head/tests/sys/cddl/zfs/tests/delegate/
H A Ddelegate_common.kshlib35 # Cleanup exist user/group.
71 # Verify the specified user have permission on the dataset
90 typeset user
91 for user in $@; do
96 check_fs_perm $user $perm $dtst
99 check_vol_perm $user $perm $dtst
104 log_note "Fail: $user should have $perm " \
115 # Verify the specified user have no permission on the dataset
134 typeset user
135 for user i
[all...]
/freebsd-head/lib/libpam/modules/pam_login_access/
H A Dpam_login_access.c74 const void *rhost, *tty, *user; local
78 pam_err = pam_get_item(pamh, PAM_USER, &user);
82 if (user == NULL)
85 PAM_LOG("Got user: %s", (const char *)user);
106 PAM_LOG("Checking login.access for user %s from host %s",
107 (const char *)user, (const char *)rhost);
108 if (login_access(user, rhost, &login_access_opts) != 0)
111 (const char *)user, (const char *)rhost);
113 PAM_LOG("Checking login.access for user
[all...]
/freebsd-head/contrib/dialog/samples/
H A Dform212 user="$USER"
23 "1 Username:" 1 1 "$user" 1 12 10 10 \
27 "2 Username:" 5 1 "$user" 5 12 10 10 \
31 "3 Username:" 9 1 "$user" 9 12 10 10 \
35 "4 Username:" 13 1 "$user" 13 12 10 10 \
39 "5 Username:" 17 1 "$user" 17 12 10 10 \
43 "6 Username:" 21 1 "$user" 21 12 10 10 \
47 "7 Username:" 25 1 "$user" 25 12 10 10 \
/freebsd-head/crypto/heimdal/lib/gssapi/mech/
H A Dgss_authorize_localname.c36 sizeof("local-login-user") - 1,
37 "local-login-user"
43 const struct _gss_name *user)
58 &user->gn_value,
59 &user->gn_type);
73 const struct _gss_name *user)
78 if (!gss_oid_equal(&user->gn_type, GSS_C_NT_USER_NAME))
102 value.length == user->gn_value.length &&
103 memcmp(value.value, user->gn_value.value, user
41 mech_authorize_localname(OM_uint32 *minor_status, const struct _gss_name *name, const struct _gss_name *user) argument
71 attr_authorize_localname(OM_uint32 *minor_status, const struct _gss_name *name, const struct _gss_name *user) argument
123 const struct _gss_name *user = (const struct _gss_name *) gss_user; local
167 gss_userok(const gss_name_t name, const char *user) argument
[all...]

Completed in 81 milliseconds

1234567891011>>