/freebsd-10.2-release/contrib/amd/amd/ |
H A D | info_passwd.c | 109 * /anydir/dom1/dom2/dom3/user 112 * rfs:=/anydir/dom3;rhost:=dom3.dom2.dom1;sublink:=user 116 * var2:=pw-user:=user 117 * var3:=pw-home:=/anydir/dom1/dom2/dom3/user 122 char *user; local 129 * Find user name. If no / then Invalid... 131 user = strrchr(dir, '/'); 132 if (!user) 134 *user [all...] |
/freebsd-10.2-release/contrib/dialog/samples/ |
H A D | form1-utf8 | 14 user="���������" 15 home=/usr/home/$user 26 "Username:" 1 1 "$user" 1 10 10 0 \
|
H A D | passwordform1-utf8 | 14 user="���������" 15 home=/usr/home/$user 26 "Username:" 1 1 "$user" 1 10 10 0 \
|
H A D | inputmenu1 | 14 user="$USER" 26 "Username:" "$user" \ 57 $user" 10 40 65 user="$item"
|
H A D | inputmenu2 | 14 user="$USER" 30 "Username:" "$user" \ 65 $user" 10 40 73 user="$item"
|
H A D | inputmenu3 | 14 user="$USER" 31 "Username:" "$user" "User login-name" \ 68 $user" 10 40 82 user="$item"
|
H A D | inputmenu4 | 14 user="$USER" 27 "Username:" "$user" \ 58 $user" 10 40 66 user="$item"
|
/freebsd-10.2-release/crypto/openssh/ |
H A D | auth-shadow.c | 91 const char *user = ctxt->pw->pw_name; local 96 if ((spw = getspnam((char *)user)) == NULL) { 97 error("Could not get shadow information for %.100s", user); 109 pr = getprpwnam((char *)user); 125 logit("User %.100s password has expired (root forced)", user); 130 logit("User %.100s password has expired (password aged)", user);
|
H A D | auth-rhosts.c | 60 char buf[1024]; /* Must not be larger than host, user, dummy below. */ 84 char hostbuf[1024], userbuf[1024], dummy[1024], *host, *user, *cp; local 113 /* Got both host and user name. */ 124 user = userbuf; 134 if (user[0] == '-') { 136 user++; 137 } else if (user[0] == '+') 138 user++; 140 /* Check for empty host/user names (particularly '+'). */ 141 if (!host[0] || !user[ [all...] |
/freebsd-10.2-release/contrib/pjdfstest/tests/granular/ |
H A D | 05.t | 26 expect 0 prependacl . user:65534:write_data::allow 31 expect 0 prependacl . user:65534:write_data::deny 33 expect 0 prependacl . user:65534:write_data::allow 39 expect 0 prependacl . user:65534:append_data::allow 47 expect 0 prependacl . user:65534:write_data::deny 49 expect 0 prependacl . user:65534:write_data::allow 56 expect 0 prependacl ${n0} user:65534:delete::deny 67 expect 0 prependacl . user:65534:delete_child::deny 88 expect 0 prependacl ${n0} user:65534:delete::allow 93 expect 0 prependacl ${n0} user [all...] |
H A D | 03.t | 26 expect 0 prependacl . user:65534:write_data::allow 31 expect 0 prependacl . user:65534:write_data::deny 33 expect 0 prependacl . user:65534:write_data::allow 44 expect 0 prependacl . user:65534:write_data::deny 46 expect 0 prependacl . user:65534:write_data::allow 52 expect 0 prependacl ${n0} user:65534:delete::deny 63 expect 0 prependacl . user:65534:delete_child::deny 83 expect 0 prependacl ${n0} user:65534:delete::allow 88 expect 0 prependacl ${n0} user:65534:delete::allow 100 expect 0 prependacl . user [all...] |
/freebsd-10.2-release/tools/regression/pjdfstest/tests/granular/ |
H A D | 05.t | 26 expect 0 prependacl . user:65534:write_data::allow 31 expect 0 prependacl . user:65534:write_data::deny 33 expect 0 prependacl . user:65534:write_data::allow 39 expect 0 prependacl . user:65534:append_data::allow 47 expect 0 prependacl . user:65534:write_data::deny 49 expect 0 prependacl . user:65534:write_data::allow 56 expect 0 prependacl ${n0} user:65534:delete::deny 67 expect 0 prependacl . user:65534:delete_child::deny 88 expect 0 prependacl ${n0} user:65534:delete::allow 93 expect 0 prependacl ${n0} user [all...] |
H A D | 03.t | 26 expect 0 prependacl . user:65534:write_data::allow 31 expect 0 prependacl . user:65534:write_data::deny 33 expect 0 prependacl . user:65534:write_data::allow 44 expect 0 prependacl . user:65534:write_data::deny 46 expect 0 prependacl . user:65534:write_data::allow 52 expect 0 prependacl ${n0} user:65534:delete::deny 63 expect 0 prependacl . user:65534:delete_child::deny 83 expect 0 prependacl ${n0} user:65534:delete::allow 88 expect 0 prependacl ${n0} user:65534:delete::allow 100 expect 0 prependacl . user [all...] |
/freebsd-10.2-release/crypto/openssh/openbsd-compat/ |
H A D | port-aix.c | 130 aix_valid_authentications(const char *user) argument 135 if (getuserattr((char *)user, S_AUTHSYSTEM, &sys, SEC_CHAR) != 0) { 137 user, strerror(errno)); 145 if (getuserattr((char *)user, S_AUTH1, &auth1, SEC_LIST) != 0) { 147 user, strerror(errno)); 157 user, p); 200 * Check if the user's password is expired. 215 default: /* user can't change(2) or other error (-1) */ 216 logit("Password can't be changed for user %s: %.100s", 243 * logins via ssh) or if running as non-root user (sinc 275 sys_auth_record_login(const char *user, const char *host, const char *ttynm, Buffer *loginmsg) argument 295 sys_auth_get_lastlogin_msg(const char *user, uid_t uid) argument 308 record_failed_login(const char *user, const char *hostname, const char *ttyname) argument 331 aix_setauthdb(const char *user) argument 432 getgrouplist(const char *user, gid_t pgid, gid_t *groups, int *grpcnt) argument [all...] |
/freebsd-10.2-release/contrib/netbsd-tests/fs/tmpfs/ |
H A D | t_create.sh | 35 atf_set "require.user" "root" 51 atf_set "require.config" "unprivileged-user" 52 atf_set "require.user" "root" 55 user=$(atf_config_get unprivileged-user) 56 # Allow the unprivileged user to access the work directory. 57 chown ${user} . 76 atf_check -s eq:0 -o empty -e empty chown ${user}:0 b 78 [ ${st_uid} -eq $(id -u ${user}) ] || atf_fail "Incorrect owner" 81 atf_check -s eq:0 -o empty -e empty chown ${user} [all...] |
H A D | t_mkdir.sh | 37 atf_set "require.user" "root" 56 atf_set "require.user" "root" 75 atf_set "require.user" "root" 91 atf_set "require.config" "unprivileged-user" 92 atf_set "require.user" "root" 95 user=$(atf_config_get unprivileged-user) 96 # Allow the unprivileged user to access the work directory. 97 chown ${user} . 103 atf_check -s eq:0 -o empty -e empty chown ${user} [all...] |
/freebsd-10.2-release/crypto/heimdal/lib/gssapi/ntlm/ |
H A D | release_name.c | 47 free(n->user);
|
/freebsd-10.2-release/contrib/ncurses/panel/ |
H A D | p_delete.c | 49 dBug(("--> del_panel %s", USER_PTR(pan->user)));
|
H A D | p_hide.c | 50 dBug(("--> hide_panel %s", USER_PTR(pan->user)));
|
H A D | p_new.c | 74 pan->user = stdscr_id; 76 pan->user = (void *)0; 106 pan->user = new_id; 108 pan->user = (char *)0;
|
/freebsd-10.2-release/tests/sys/kqueue/ |
H A D | Makefile | 23 user.c
|
/freebsd-10.2-release/contrib/openpam/bin/su/ |
H A D | su.c | 74 const char *user, *tty; local 91 user = *argv; 95 user = "root"; 100 pam_start("su", user, &pamc, &pamh); 106 user = getlogin(); 107 if ((pam_err = pam_set_item(pamh, PAM_RUSER, user)) != PAM_SUCCESS) 129 /* get mapped user name; PAM may have changed it */ 131 if (pam_err != PAM_SUCCESS || (pwd = getpwnam(user = item)) == NULL)
|
/freebsd-10.2-release/contrib/libarchive/cpio/ |
H A D | cmdline.c | 281 * <username|uid> - Override user but not group 282 * <username>: - Override both, group is user's default group 283 * <uid>: - Override user but not group 285 * :<groupname|gid> - Override group but not user 310 return ("Invalid empty user/group spec"); 313 * Split spec into [user][:.][group] 323 /* Otherwise, [user] or [user][:] or [user][:][group] */ 333 /* Look up user 334 char *user; local [all...] |
/freebsd-10.2-release/lib/libpam/modules/pam_nologin/ |
H A D | pam_nologin.c | 68 const char *user, *nologin; local 71 retval = pam_get_user(pamh, &user, NULL); 75 PAM_LOG("Got user: %s", user); 77 pwd = getpwnam(user); 84 * capability so that super-user can bypass nologin. 88 PAM_LOG("Unable to get login class for user %s", user);
|
/freebsd-10.2-release/usr.sbin/cron/cron/ |
H A D | user.c | 11 * user. 20 "$FreeBSD: releng/10.2/usr.sbin/cron/cron/user.c 50479 1999-08-28 01:35:59Z peter $"; 33 user *u; 52 user * 60 user *u; 72 /* file is open. build user entry, then read the crontab file. 74 if ((u = (user *) malloc(sizeof(user))) == NULL) {
|