/freebsd-10.2-release/contrib/dialog/samples/ |
H A D | inputmenu | 7 user="$USER" 20 "Username:" "$user" \ 44 $user" 10 40 52 Username) user="$item" ;;
|
H A D | inputmenu-stdout | 7 user="$USER" 19 "Username:" "$user" \ 42 $user" 10 40 50 Username) user="$item" ;;
|
/freebsd-10.2-release/share/examples/printing/ |
H A D | make-ps-header | 19 echo "Usage: `basename $0` <user> <host> <job>" 1>&2 26 user=$1 38 % Make sure we do not interfere with user's job that will follow 53 % Display user's login name, nice and large and prominent 56 $page_width ($user) stringwidth pop sub 2 div $page_height 200 sub moveto 57 ($user) show
|
/freebsd-10.2-release/contrib/sendmail/cf/sh/ |
H A D | makeinfo.sh | 46 user=`whoami` 48 user=$LOGNAME 57 echo '#####' built by $user@$host
|
/freebsd-10.2-release/lib/libpam/modules/pam_guest/ |
H A D | pam_guest.c | 72 const char *authtok, *guests, *user; local 76 if (pam_get_user(pamh, &user, NULL) != PAM_SUCCESS || user == NULL) 84 is_guest = lookup(user, guests); 92 strcmp(user, authtok) != 0) 100 pam_setenv(pamh, "GUEST", user, 1);
|
/freebsd-10.2-release/contrib/gdb/gdb/ |
H A D | delta68-nat.c | 22 #include <sys/signal.h> /* for MAXSIG in sys/user.h */ 24 #include <sys/dir.h> /* for struct direct in sys/user.h */ 25 #include <sys/user.h> 34 BLOCKEND is the address of the end of the user structure. */ 45 return offsetof (struct user, u_fpu.regs.reg[regno - FP0_REGNUM][0]); 47 return offsetof (struct user, u_fpu.regs.control); 49 return offsetof (struct user, u_fpu.regs.status); 51 return offsetof (struct user, u_fpu.regs.iaddr); 89 return sizeof (struct user);
|
/freebsd-10.2-release/contrib/sendmail/libsm/ |
H A D | mbdb.c | 45 int (*mbdb_lookup) __P((char *name, SM_MBDB_T *user)); 50 static int mbdb_pw_lookup __P((char *name, SM_MBDB_T *user)); 57 static int mbdb_ldap_lookup __P((char *name, SM_MBDB_T *user)); 155 ** user -- pointer to structure to fill in on success 158 ** On success, fill in *user and return EX_OK. 159 ** If the user does not exist, return EX_NOUSER. 165 sm_mbdb_lookup(name, user) 167 SM_MBDB_T *user; 172 ret = SmMbdbType->mbdb_lookup(name, user); 180 ** user [all...] |
/freebsd-10.2-release/crypto/openssh/ |
H A D | sshlogin.c | 7 * easily use something like login -p -h host -f user, because there are 67 * Returns the time when the user last logged in. Returns 0 if the 69 * The host the user logged in from will be returned in buf. 87 store_lastlog_message(const char *user, uid_t uid) argument 97 time_string = sys_auth_get_lastlogin_msg(user, uid); 103 last_login_time = get_last_login_time(uid, user, hostname, 122 * Records that the user has logged in. I wish these parts of operating 126 record_login(pid_t pid, const char *tty, const char *user, uid_t uid, argument 132 store_lastlog_message(user, uid); 134 li = login_alloc_entry(pid, user, hos 142 record_utmp_only(pid_t pid, const char *ttyname, const char *user, const char *host, struct sockaddr *addr, socklen_t addrlen) argument 156 record_logout(pid_t pid, const char *tty, const char *user) argument [all...] |
/freebsd-10.2-release/usr.sbin/chroot/ |
H A D | chroot.c | 64 char *endp, *p, *user, *group, *grouplist; local 73 user = group = grouplist = NULL; 77 user = optarg; 78 if (*user == '\0') 140 if (user != NULL) { 141 if (isdigit((unsigned char)*user)) { 142 uid = (uid_t)strtoul(user, &endp, 0); 147 if ((pw = getpwnam(user)) != NULL) 150 errx(1, "no such user `%s'", user); [all...] |
/freebsd-10.2-release/crypto/heimdal/lib/roken/ |
H A D | iruserok.c | 92 char *user, *p; local 134 user = p; 139 user = p; 171 switch(*user) { 173 if (!*(user+1)) { /* '+' matches all users */ 177 if (*(user+1) == '@') /* match a user by netgroup */ 178 userok = innetgr(user+2, NULL, (char *)ruser, 180 else /* match a user by direct specification */ 181 userok = !(strcmp(ruser, user [all...] |
/freebsd-10.2-release/crypto/heimdal/appl/login/ |
H A D | utmpx_login.c | 26 int utmpx_login(char *line, const char *user, const char *host) { return 0; } argument 30 utmpx_update(struct utmpx *ut, char *line, const char *user, const char *host) argument 39 strncpy(ut->ut_user, user, sizeof(ut->ut_user)); 58 prepare_utmp (&utmp, line, user, host); 68 utmpx_login(char *line, const char *user, const char *host) argument 79 * process ID for a login or user process. 89 utmpx_update(&save_ut, line, user, host); 99 utmpx_update(&newut, line, user, host);
|
/freebsd-10.2-release/lib/libpam/modules/pam_chroot/ |
H A D | pam_chroot.c | 55 const char *dir, *end, *cwd, *user; local 59 if (pam_get_user(pamh, &user, NULL) != PAM_SUCCESS || 60 user == NULL || (pwd = getpwnam(user)) == NULL) 70 "%s's home directory is too long", user); 81 "%s has no chroot directory", user); 87 openpam_log(PAM_LOG_DEBUG, "chrooting %s to %s", dir, user);
|
/freebsd-10.2-release/lib/libpam/modules/pam_ftpusers/ |
H A D | pam_ftpusers.c | 59 const char *user; local 65 pam_err = pam_get_user(pamh, &user, NULL); 68 if (user == NULL || (pwd = getpwnam(user)) == NULL) 72 ulen = strlen(user); 86 if (len == ulen && strncmp(user, line, len) == 0) 101 if (strcmp(user, *mem) == 0)
|
/freebsd-10.2-release/lib/libpam/modules/pam_opie/ |
H A D | pam_opie.c | 67 const char *user; local 71 user = NULL; 75 user = pwd->pw_name; 78 retval = pam_get_user(pamh, &user, NULL); 83 PAM_LOG("Got user: %s", user); 86 * Watch out: libopie feels entitled to truncate the user name 90 if (strlen(user) >= sizeof(principal)) 92 strlcpy(principal, user, sizeof(principal)); 101 * If the no_fake_prompts option was given, and the user [all...] |
/freebsd-10.2-release/contrib/pjdfstest/tests/granular/ |
H A D | 02.t | 21 # Check whether user 65534 is permitted to read ACL. 25 expect 0 prependacl ${n0} user:65534:read_acl::deny 28 expect 0 prependacl ${n0} user:65534:read_acl::allow 33 # Check whether user 65534 is permitted to write ACL. 35 expect EPERM -u 65534 -g 65534 prependacl ${n0} user:65534:read_data::allow 36 expect 0 prependacl ${n0} user:65534:write_acl::allow 37 expect 0 -u 65534 -g 65534 prependacl ${n0} user:65534:read_data::allow 40 # Check whether user 65534 is permitted to write mode. 43 expect 0 prependacl ${n0} user:65534:write_acl::allow 48 # and SUID/SGID bits. In case user doe [all...] |
/freebsd-10.2-release/tools/regression/pjdfstest/tests/granular/ |
H A D | 02.t | 21 # Check whether user 65534 is permitted to read ACL. 25 expect 0 prependacl ${n0} user:65534:read_acl::deny 28 expect 0 prependacl ${n0} user:65534:read_acl::allow 33 # Check whether user 65534 is permitted to write ACL. 35 expect EPERM -u 65534 -g 65534 prependacl ${n0} user:65534:read_data::allow 36 expect 0 prependacl ${n0} user:65534:write_acl::allow 37 expect 0 -u 65534 -g 65534 prependacl ${n0} user:65534:read_data::allow 40 # Check whether user 65534 is permitted to write mode. 43 expect 0 prependacl ${n0} user:65534:write_acl::allow 48 # and SUID/SGID bits. In case user doe [all...] |
/freebsd-10.2-release/contrib/netbsd-tests/fs/ffs/ |
H A D | t_miscquota.sh | 29 "walk user quota list over several disk blocks" -b le 1 user 33 -b le 1 user 37 -boL le 1 user 41 -boC le 1 user 45 -boLC le 1 user 49 -l le 1 user 53 -oRL le 1 user 57 "new quota entry denied by default entry" 5 -b le 1 user 60 "new quota entry denied by default entry, with list on more than one block" 5000 -b le 1 user [all...] |
/freebsd-10.2-release/sys/contrib/ngatm/netnatm/api/ |
H A D | cc_conn.c | 101 * Remove connection from its user's queue 107 if (conn->user == NULL) 108 cc_conn_log(conn, "no %s", "user"); 110 TAILQ_REMOVE(&conn->user->connq, conn, connq_link); 111 conn->user->queue_act--; 112 conn->user = NULL; 117 * Put connection on user queue 120 cc_connect_to_user(struct ccconn *conn, struct ccuser *user) argument 123 if (conn->user != NULL) 124 cc_conn_log(conn, "still connected to %p", conn->user); 601 struct ccuser *user; local 927 struct ccuser *user = conn->user; local 946 struct ccuser *user = conn->user; local 1665 struct ccuser *user = conn->user; local 1782 struct ccuser *user = conn->user; local [all...] |
/freebsd-10.2-release/crypto/heimdal/lib/gssapi/ntlm/ |
H A D | iter_cred.c | 64 char *user = NULL, *domain = NULL; local 72 ret = krb5_ret_stringz(response, &user); 76 free(user); 82 free(user); 86 dn->username = user;
|
/freebsd-10.2-release/contrib/openpam/lib/libpam/ |
H A D | pam_get_user.c | 57 * Retrieve user name 62 const char **user, 72 if (pamh == NULL || user == NULL) 74 r = pam_get_item(pamh, PAM_USER, (const void **)user); 75 if (r == PAM_SUCCESS && *user != NULL) 100 r = pam_get_item(pamh, PAM_USER, (const void **)user); 114 * The =pam_get_user function returns the name of the target user, as 116 * If no user was specified, nor set using =pam_set_item, =pam_get_user 117 * will prompt for a user name. 118 * Either way, a pointer to the user nam 61 pam_get_user(pam_handle_t *pamh, const char **user, const char *prompt) argument [all...] |
/freebsd-10.2-release/lib/libpam/modules/pam_rhosts/ |
H A D | pam_rhosts.c | 57 const char *user; local 61 err = pam_get_user(pamh, &user, NULL); 65 if ((pw = getpwnam(user)) == NULL) 79 superuser = (strcmp(user, "root") == 0); 80 err = ruserok(rhost, superuser, ruser, user);
|
/freebsd-10.2-release/lib/libpam/modules/pam_securetty/ |
H A D | pam_securetty.c | 60 const char *user; local 64 pam_err = pam_get_user(pamh, &user, NULL); 67 if (user == NULL || (pwd = getpwnam(user)) == NULL) 70 PAM_LOG("Got user: %s", user); 72 /* If the user is not root, secure ttys do not apply */
|
/freebsd-10.2-release/contrib/gcc/ |
H A D | bt-load.c | 335 /* Create a new target register user structure, for a use in block BB, 336 instruction INSN. Return the new user. */ 346 btr_user user = NULL; 360 user = obstack_alloc (&migrate_btrl_obstack, sizeof (struct btr_user_s)); 361 user->bb = bb; 362 user->luid = insn_luid; 363 user->insn = insn; 364 user->use = use; 365 user->other_use_this_block = 0; 366 user 345 btr_user user = NULL; local 408 btr_user user; local 516 btr_user user; local 532 btr_user user = new_btr_user (bb, insn_luid, insn); local 691 btr_user user = use_array[insn_uid]; local 825 btr_user user; local 1018 btr_user user; local 1081 btr_user user; local 1165 btr_user user; local 1284 btr_user user; local [all...] |
/freebsd-10.2-release/contrib/tcp_wrappers/ |
H A D | eval.c | 2 * Routines for controlled evaluation of host names, user names, and so on. 15 * When ALWAYS_RFC931 mode is off, user lookup is done only when required by 43 /* eval_user - look up user name */ 48 if (request->user[0] == 0) { 49 strcpy(request->user, unknown); 51 rfc931(request->client->sin, request->server->sin, request->user); 53 return (request->user); 109 #ifndef ALWAYS_RFC931 /* no implicit user lookups */ 110 if (request->user[0] == 0) 114 sprintf(both, "%s@%s", request->user, hostinf [all...] |
/freebsd-10.2-release/contrib/ncurses/panel/ |
H A D | panel.c | 78 text, USER_PTR(pan->user), 79 (pan->below) ? USER_PTR(pan->below->user) : "--", 80 (pan->above) ? USER_PTR(pan->above->user) : "--", 96 (_nc_bottom_panel) ? USER_PTR(_nc_bottom_panel->user) : "--", 97 (_nc_top_panel) ? USER_PTR(_nc_top_panel->user) : "--"); 99 _tracef("pan id=%s", USER_PTR(pan->user));
|