Lines Matching defs:user

51   /* The user to authorize. */
52 const char *user;
142 const char *user,
151 if (strcmp(value, user) == 0)
164 const char *user,
179 /* If the 'user' is a subgroup, recurse into it. */
183 user, pool))
187 /* If the 'user' is an alias, verify it. */
191 user, pool))
195 /* If the user matches, stop. */
196 else if (strcmp(user, group_user) == 0)
205 * user, given the name part of the rule's name-value pair
220 return (b->user == NULL);
222 return (b->user != NULL);
233 * All that's left over is regular user or group specifications.
236 /* If the session is anonymous, then a user/group
239 if (b->user == NULL)
243 * a user, alias or group rule.
247 b->config, &rule_match_string[1], b->user, pool);
250 b->config, &rule_match_string[1], b->user, pool);
252 return (strcmp(b->user, rule_match_string) == 0);
265 /* Stop if the rule doesn't apply to this user. */
334 /* Validate access to the given user for the given path. This
345 const char *path, const char *user,
354 baton.user = user;
379 /* Validate access to the given user for the subtree starting at the
389 const char *path, const char *user,
396 baton.user = user;
447 const char *user,
454 baton.user = user;
462 * However, this requires access for root explicitly (which the user
465 * this user. */
515 /* If the 'user' is a subgroup, recurse into it. */
582 /* Make sure the user isn't using double-negatives. */
1028 const char *path, const char *user,
1038 /* If PATH is NULL, check if the user has *any* access. */
1042 user, required_access, pool);
1054 current_path, user,
1074 to the requested user. */
1077 user, required_access, pool);