Searched refs:user (Results 51 - 75 of 720) sorted by relevance

1234567891011>>

/freebsd-10.2-release/contrib/amd/amd/
H A Dinfo_passwd.c109 * /anydir/dom1/dom2/dom3/user
112 * rfs:=/anydir/dom3;rhost:=dom3.dom2.dom1;sublink:=user
116 * var2:=pw-user:=user
117 * var3:=pw-home:=/anydir/dom1/dom2/dom3/user
122 char *user; local
129 * Find user name. If no / then Invalid...
131 user = strrchr(dir, '/');
132 if (!user)
134 *user
[all...]
/freebsd-10.2-release/contrib/dialog/samples/
H A Dform1-utf814 user="���������"
15 home=/usr/home/$user
26 "Username:" 1 1 "$user" 1 10 10 0 \
H A Dpasswordform1-utf814 user="���������"
15 home=/usr/home/$user
26 "Username:" 1 1 "$user" 1 10 10 0 \
H A Dinputmenu114 user="$USER"
26 "Username:" "$user" \
57 $user" 10 40
65 user="$item"
H A Dinputmenu214 user="$USER"
30 "Username:" "$user" \
65 $user" 10 40
73 user="$item"
H A Dinputmenu314 user="$USER"
31 "Username:" "$user" "User login-name" \
68 $user" 10 40
82 user="$item"
H A Dinputmenu414 user="$USER"
27 "Username:" "$user" \
58 $user" 10 40
66 user="$item"
/freebsd-10.2-release/crypto/openssh/
H A Dauth-shadow.c91 const char *user = ctxt->pw->pw_name; local
96 if ((spw = getspnam((char *)user)) == NULL) {
97 error("Could not get shadow information for %.100s", user);
109 pr = getprpwnam((char *)user);
125 logit("User %.100s password has expired (root forced)", user);
130 logit("User %.100s password has expired (password aged)", user);
H A Dauth-rhosts.c60 char buf[1024]; /* Must not be larger than host, user, dummy below. */
84 char hostbuf[1024], userbuf[1024], dummy[1024], *host, *user, *cp; local
113 /* Got both host and user name. */
124 user = userbuf;
134 if (user[0] == '-') {
136 user++;
137 } else if (user[0] == '+')
138 user++;
140 /* Check for empty host/user names (particularly '+'). */
141 if (!host[0] || !user[
[all...]
/freebsd-10.2-release/contrib/pjdfstest/tests/granular/
H A D05.t26 expect 0 prependacl . user:65534:write_data::allow
31 expect 0 prependacl . user:65534:write_data::deny
33 expect 0 prependacl . user:65534:write_data::allow
39 expect 0 prependacl . user:65534:append_data::allow
47 expect 0 prependacl . user:65534:write_data::deny
49 expect 0 prependacl . user:65534:write_data::allow
56 expect 0 prependacl ${n0} user:65534:delete::deny
67 expect 0 prependacl . user:65534:delete_child::deny
88 expect 0 prependacl ${n0} user:65534:delete::allow
93 expect 0 prependacl ${n0} user
[all...]
H A D03.t26 expect 0 prependacl . user:65534:write_data::allow
31 expect 0 prependacl . user:65534:write_data::deny
33 expect 0 prependacl . user:65534:write_data::allow
44 expect 0 prependacl . user:65534:write_data::deny
46 expect 0 prependacl . user:65534:write_data::allow
52 expect 0 prependacl ${n0} user:65534:delete::deny
63 expect 0 prependacl . user:65534:delete_child::deny
83 expect 0 prependacl ${n0} user:65534:delete::allow
88 expect 0 prependacl ${n0} user:65534:delete::allow
100 expect 0 prependacl . user
[all...]
/freebsd-10.2-release/tools/regression/pjdfstest/tests/granular/
H A D05.t26 expect 0 prependacl . user:65534:write_data::allow
31 expect 0 prependacl . user:65534:write_data::deny
33 expect 0 prependacl . user:65534:write_data::allow
39 expect 0 prependacl . user:65534:append_data::allow
47 expect 0 prependacl . user:65534:write_data::deny
49 expect 0 prependacl . user:65534:write_data::allow
56 expect 0 prependacl ${n0} user:65534:delete::deny
67 expect 0 prependacl . user:65534:delete_child::deny
88 expect 0 prependacl ${n0} user:65534:delete::allow
93 expect 0 prependacl ${n0} user
[all...]
H A D03.t26 expect 0 prependacl . user:65534:write_data::allow
31 expect 0 prependacl . user:65534:write_data::deny
33 expect 0 prependacl . user:65534:write_data::allow
44 expect 0 prependacl . user:65534:write_data::deny
46 expect 0 prependacl . user:65534:write_data::allow
52 expect 0 prependacl ${n0} user:65534:delete::deny
63 expect 0 prependacl . user:65534:delete_child::deny
83 expect 0 prependacl ${n0} user:65534:delete::allow
88 expect 0 prependacl ${n0} user:65534:delete::allow
100 expect 0 prependacl . user
[all...]
/freebsd-10.2-release/crypto/openssh/openbsd-compat/
H A Dport-aix.c130 aix_valid_authentications(const char *user) argument
135 if (getuserattr((char *)user, S_AUTHSYSTEM, &sys, SEC_CHAR) != 0) {
137 user, strerror(errno));
145 if (getuserattr((char *)user, S_AUTH1, &auth1, SEC_LIST) != 0) {
147 user, strerror(errno));
157 user, p);
200 * Check if the user's password is expired.
215 default: /* user can't change(2) or other error (-1) */
216 logit("Password can't be changed for user %s: %.100s",
243 * logins via ssh) or if running as non-root user (sinc
275 sys_auth_record_login(const char *user, const char *host, const char *ttynm, Buffer *loginmsg) argument
295 sys_auth_get_lastlogin_msg(const char *user, uid_t uid) argument
308 record_failed_login(const char *user, const char *hostname, const char *ttyname) argument
331 aix_setauthdb(const char *user) argument
432 getgrouplist(const char *user, gid_t pgid, gid_t *groups, int *grpcnt) argument
[all...]
/freebsd-10.2-release/contrib/netbsd-tests/fs/tmpfs/
H A Dt_create.sh35 atf_set "require.user" "root"
51 atf_set "require.config" "unprivileged-user"
52 atf_set "require.user" "root"
55 user=$(atf_config_get unprivileged-user)
56 # Allow the unprivileged user to access the work directory.
57 chown ${user} .
76 atf_check -s eq:0 -o empty -e empty chown ${user}:0 b
78 [ ${st_uid} -eq $(id -u ${user}) ] || atf_fail "Incorrect owner"
81 atf_check -s eq:0 -o empty -e empty chown ${user}
[all...]
H A Dt_mkdir.sh37 atf_set "require.user" "root"
56 atf_set "require.user" "root"
75 atf_set "require.user" "root"
91 atf_set "require.config" "unprivileged-user"
92 atf_set "require.user" "root"
95 user=$(atf_config_get unprivileged-user)
96 # Allow the unprivileged user to access the work directory.
97 chown ${user} .
103 atf_check -s eq:0 -o empty -e empty chown ${user}
[all...]
/freebsd-10.2-release/crypto/heimdal/lib/gssapi/ntlm/
H A Drelease_name.c47 free(n->user);
/freebsd-10.2-release/contrib/ncurses/panel/
H A Dp_delete.c49 dBug(("--> del_panel %s", USER_PTR(pan->user)));
H A Dp_hide.c50 dBug(("--> hide_panel %s", USER_PTR(pan->user)));
H A Dp_new.c74 pan->user = stdscr_id;
76 pan->user = (void *)0;
106 pan->user = new_id;
108 pan->user = (char *)0;
/freebsd-10.2-release/tests/sys/kqueue/
H A DMakefile23 user.c
/freebsd-10.2-release/contrib/openpam/bin/su/
H A Dsu.c74 const char *user, *tty; local
91 user = *argv;
95 user = "root";
100 pam_start("su", user, &pamc, &pamh);
106 user = getlogin();
107 if ((pam_err = pam_set_item(pamh, PAM_RUSER, user)) != PAM_SUCCESS)
129 /* get mapped user name; PAM may have changed it */
131 if (pam_err != PAM_SUCCESS || (pwd = getpwnam(user = item)) == NULL)
/freebsd-10.2-release/contrib/libarchive/cpio/
H A Dcmdline.c281 * <username|uid> - Override user but not group
282 * <username>: - Override both, group is user's default group
283 * <uid>: - Override user but not group
285 * :<groupname|gid> - Override group but not user
310 return ("Invalid empty user/group spec");
313 * Split spec into [user][:.][group]
323 /* Otherwise, [user] or [user][:] or [user][:][group] */
333 /* Look up user
334 char *user; local
[all...]
/freebsd-10.2-release/lib/libpam/modules/pam_nologin/
H A Dpam_nologin.c68 const char *user, *nologin; local
71 retval = pam_get_user(pamh, &user, NULL);
75 PAM_LOG("Got user: %s", user);
77 pwd = getpwnam(user);
84 * capability so that super-user can bypass nologin.
88 PAM_LOG("Unable to get login class for user %s", user);
/freebsd-10.2-release/usr.sbin/cron/cron/
H A Duser.c11 * user.
20 "$FreeBSD: releng/10.2/usr.sbin/cron/cron/user.c 50479 1999-08-28 01:35:59Z peter $";
33 user *u;
52 user *
60 user *u;
72 /* file is open. build user entry, then read the crontab file.
74 if ((u = (user *) malloc(sizeof(user))) == NULL) {

Completed in 108 milliseconds

1234567891011>>