/macosx-10.10/system_cmds-643.1.1/passwd.tproj/ |
H A D | passwd.c | 111 * A very insistent user may override security options. 168 char* user = NULL; local 232 user = argv[0]; 240 if (user == NULL) 247 /* getlogin() is the wrong thing to use here because it returns the wrong user after su */ 253 user = strdup(userRec->pw_name); 257 if (user == NULL) 267 file_passwd(user, locn); 271 nis_passwd(user, locn); 276 od_passwd(user, loc [all...] |
/macosx-10.10/cron-39/cron/ |
H A D | user.c | 11 * user. 20 "$FreeBSD: src/usr.sbin/cron/cron/user.c,v 1.8 1999/08/28 01:15:50 peter Exp $"; 33 user *u; 52 user * 60 user *u; 75 /* file is open. build user entry, then read the crontab file. 77 if ((u = (user *) malloc(sizeof(user))) == NULL) {
|
/macosx-10.10/cups-408/cups/test/ |
H A D | 4.4-subscription-ops.test | 19 ATTR name requesting-user-name $user 52 ATTR name requesting-user-name $user 74 ATTR name requesting-user-name $user 108 ATTR name requesting-user-name $user 136 ATTR name requesting-user-name $user [all...] |
/macosx-10.10/tcl-105/tcl_ext/sdx/sdx/lib/app-sdx/ |
H A D | fetch.tcl | 25 if {![regexp $re $url - x user pw site src]} { 28 if {$user == ""} { 30 set user anonymous 31 set pw $tcl_platform(user)@[info hostname] 39 if {![FTP::Open $site $user $pw \
|
H A D | rexecd.tcl | 57 set user [getns $chan] 60 log "user=$user pass=$pass args=>$args<" 62 if {[string compare $user abort]==0} { 68 if {[catch {eval $callback [list $user $pass] $args} ret]} { 82 proc connect {host user pass cmd {port 512}} { 107 putns $chan ${user} 134 proc rexec::callback {user pass args} {
|
/macosx-10.10/tcl-105/tcl_ext/tcllib/tcllib/modules/pt/ |
H A D | pt_peg_to_json.tcl | 42 variable user unknown 51 variable user 57 -user $user \ 85 user { }
|
/macosx-10.10/apache-793/httpd/modules/mappers/ |
H A D | mod_userdir.c | 39 * user directories (a la Directory Index). For example: 77 * The default directory in user's home dir 203 const char *user, *dname; local 222 user = ap_getword(r->pool, &dname, '/'); 226 * delimiting the "/~user" part from the rest of the URL, in case there 227 * was one (the case where there wasn't being just "GET /~user HTTP/1.0", 238 if (user[0] == '\0' || 239 (user[1] == '.' && (user[2] == '\0' || 240 (user[ [all...] |
/macosx-10.10/apache-793/httpd/support/ |
H A D | htdigest.c | 125 static void add_password(const char *user, const char *realm, apr_file_t *f) argument 147 apr_file_printf(f, "%s:%s:", user, realm); 150 apr_snprintf(string, sizeof(string), "%s:%s:%s", user, realm, pw); 192 char user[MAX_STRING_LEN]; local 225 apr_cpystrn(user, argv[4], sizeof(user)); 228 user, realm); 229 add_password(user, realm, f); 254 apr_cpystrn(user, argv[3], sizeof(user)); [all...] |
/macosx-10.10/ruby-106/ruby/ext/dl/win32/lib/win32/ |
H A D | sspi.rb | 136 attr_accessor :user, :domain, :password 138 def initialize(user = nil, domain = nil, password = nil) 139 @user = user 146 [@user, @user ? @user.length : 0, 209 attr_accessor :credentials, :context, :contextAttributes, :user, :domain 217 # Given a connection and a request path, performs authentication as the current user and returns 220 # If a user an [all...] |
/macosx-10.10/passwordserver_sasl-193/cyrus_sasl/lib/ |
H A D | canonusr.c | 1 /* canonusr.c - user canonicalization support 68 const char *user, unsigned ulen, 84 if(!user || !oparams) return SASL_BADPARAM; 100 if(!ulen) ulen = (unsigned int)strlen(user); 110 user, 124 user = user_buf; 160 user, ulen, 168 user, ulen, 189 oparams->user = conn->user_buf; 229 oparams->user, 67 _sasl_canon_user(sasl_conn_t *conn, const char *user, unsigned ulen, unsigned flags, sasl_out_params_t *oparams) argument 266 _sasl_canon_user_lookup(sasl_conn_t *conn, const char *user, unsigned ulen, unsigned flags, sasl_out_params_t *oparams) argument 349 _canonuser_internal(const sasl_utils_t *utils, const char *user, unsigned ulen, unsigned flags __attribute__((unused)), char *out_user, unsigned out_umax, unsigned *out_ulen) argument 409 _cu_internal_server(void *glob_context __attribute__((unused)), sasl_server_params_t *sparams, const char *user, unsigned ulen, unsigned flags, char *out_user, unsigned out_umax, unsigned *out_ulen) argument 421 _cu_internal_client(void *glob_context __attribute__((unused)), sasl_client_params_t *cparams, const char *user, unsigned ulen, unsigned flags, char *out_user, unsigned out_umax, unsigned *out_ulen) argument [all...] |
/macosx-10.10/passwordserver_sasl-193/cyrus_sasl/saslauthd/ |
H A D | auth_httpform.c | 232 const char *user, 248 user = url_escape(user); 249 if (!user) { 256 memset(user, 0, strlen(user)); 257 free(user); 264 memset(user, 0, strlen(user)); 265 free(user); 226 create_post_data( const char *formdata, const char *user, const char *password, const char *realm ) argument 492 auth_httpform( const char *user, const char *password, const char *service, const char *realm ) argument [all...] |
/macosx-10.10/Heimdal-398.1.2/lib/gssapi/ntlm/ |
H A D | import_name.c | 40 const char *user, const char *domain, int flags) 49 n->user = strdup(user); 53 if (n->user == NULL || n->domain == NULL) { 54 free(n->user); 119 char *name, *p, *user, *domain; local 137 user = p + 1; 141 user = name; 151 *output_name = _gss_ntlm_create_name(minor_status, user, domain, 0); 39 _gss_ntlm_create_name(OM_uint32 *minor_status, const char *user, const char *domain, int flags) argument
|
/macosx-10.10/curl-83.1.2/curl/lib/ |
H A D | curl_sspi.c | 164 * userp [in] - The user name in the format User or Domain\User. 165 * passdwp [in] - The user's password. 174 xcharp_u user, dup_user; local 188 user.const_tchar_ptr = _tcschr(useranddomain.const_tchar_ptr, TEXT('\\')); 189 if(!user.const_tchar_ptr) 190 user.const_tchar_ptr = _tcschr(useranddomain.const_tchar_ptr, TEXT('/')); 192 if(user.tchar_ptr) { 194 domlen = user.tchar_ptr - useranddomain.tchar_ptr; 195 user.tchar_ptr++; 198 user [all...] |
/macosx-10.10/libarchive-30/libarchive/cpio/ |
H A D | cmdline.c | 275 * <username|uid> - Override user but not group 276 * <username>: - Override both, group is user's default group 277 * <uid>: - Override user but not group 279 * :<groupname|gid> - Override group but not user 302 return ("Invalid empty user/group spec"); 305 * Split spec into [user][:.][group] 315 /* Otherwise, [user] or [user][:] or [user][:][group] */ 325 /* Look up user 326 char *user; local [all...] |
/macosx-10.10/shell_cmds-179/systime/ |
H A D | systime.c | 36 static kern_return_t get_processor_time(uint64_t *user, uint64_t *sys, uint64_t *idle); 140 " systime [-P] -u user -s sys -i idle\n"); 147 uint64_t user, system, idle; local 150 kret = get_processor_time(&user, &system, &idle); 154 printf("systime_user=%llu\n", user); 162 uint64_t user, system, idle; local 166 kret = get_processor_time(&user, &system, &idle); 170 userelapsed = user - olduser; 176 fprintf(stderr, "%1.02f%% user %1.02f%% sys %1.02f%% idle\n", 187 fprintf(stderr, "%1.02f real %1.02f user 195 get_processor_time(uint64_t *user, uint64_t *sys, uint64_t *idle) argument [all...] |
/macosx-10.10/OpenSSH-189/openssh/ |
H A D | auth1.c | 54 static char *client_user = NULL; /* Used to fill in remote user for PAM */ 122 * Read user password. It is in plain text, but was 166 * Get client user name. Note that we just have to 168 * claim to be any user. 232 * read packets, try to authenticate the user and 244 authctxt->valid ? "" : "invalid user ", authctxt->user); 246 /* If the user has no password, accept authentication immediately. */ 312 fatal("INTERNAL ERROR: authenticated invalid user %s", 313 authctxt->user); 388 char *user, *style = NULL; local [all...] |
/macosx-10.10/apache-793/httpd/modules/aaa/ |
H A D | mod_authz_dbm.c | 76 OR_AUTHCFG, "database file containing group names and member user IDs"), 139 char *user = r->user; local 152 if (!user) { 166 status = get_dbm_grp(r, apr_pstrcat(r->pool, user, ":", realm, NULL), 167 user, conf->grpfile, conf->dbmtype, &groups); 179 "Authorization of user %s to access %s failed, reason: " 180 "user doesn't appear in DBM group file (%s).", 181 r->user, r->uri, conf->grpfile); 208 "Authorization of user 223 char *user = r->user; local [all...] |
H A D | mod_authz_groupfile.c | 78 "text file containing group names and member user IDs"), 86 static apr_status_t groups_for_user(apr_pool_t *p, char *user, char *grpfile, argument 120 if (!strcmp(w, user)) { 141 char *user = r->user; local 151 if (!user) { 164 status = groups_for_user(r->pool, user, conf->groupfile, 177 "Authorization of user %s to access %s failed, reason: " 178 "user doesn't appear in group file (%s).", 179 r->user, 214 char *user = r->user; local [all...] |
H A D | mod_authn_anon.c | 19 * one gives the magic user name 'anonymous' and ones email address 31 * The magic user id is something like 'anonymous', it is NOT case sensitive. 38 * in broken GUIs like W95 is often given by the user. The Default is off. 60 char *user; member in struct:anon_auth_user 106 conf->users->user = apr_pstrdup(cmd->pool, arg); 117 "a space-separated list of user IDs"), 135 static authn_status check_anonymous(request_rec *r, const char *user, argument 149 if (!*user) { 161 if (!strcasecmp(user, p->user)) { [all...] |
/macosx-10.10/OpenLDAP-499.27/OpenLDAP/libraries/libldap/ |
H A D | passwd.c | 80 struct berval *user, 95 if( user != NULL || oldpw != NULL || newpw != NULL ) { 106 if( user != NULL ) { 108 LDAP_TAG_EXOP_MODIFY_PASSWD_ID, user ); 143 struct berval *user, 154 rc = ldap_passwd( ld, user, oldpw, newpw, sctrls, cctrls, &msgid ); 79 ldap_passwd( LDAP *ld, struct berval *user, struct berval *oldpw, struct berval *newpw, LDAPControl **sctrls, LDAPControl **cctrls, int *msgidp ) argument 141 ldap_passwd_s( LDAP *ld, struct berval *user, struct berval *oldpw, struct berval *newpw, struct berval *newpasswd, LDAPControl **sctrls, LDAPControl **cctrls ) argument
|
/macosx-10.10/postfix-255/postfix/src/smtpd/ |
H A D | smtpd_error.in | 73 rcpt user@example.com 75 rcpt user@example.com 81 rcpt user@example.com
|
/macosx-10.10/remote_cmds-47/revnetgroup.tproj/ |
H A D | revnetgroup.c | 78 char *host, *user, *domain; local 149 while(__getnetgrent(&host, &user, &domain) != 0) { 158 if (!(user && !strcmp(user,"-"))) { 160 user ? user : "*",
|
/macosx-10.10/tcl-105/tcl_ext/tcllib/tcllib/modules/pt/tools/ |
H A D | regenerate_parsers.tcl | 18 set me $tcl_platform(user) 35 # The user has to, well, is asked to, review the results before 37 # the user still ran into the problem, just go to the implementation 54 -user $me \ 69 -user $me \
|
/macosx-10.10/cups-408/cups/everywhere/ |
H A D | document-tests.test | 39 ATTR name requesting-user-name $user 65 ATTR name requesting-user-name $user 80 ATTR name requesting-user-name $user 95 ATTR name requesting-user-name $user 110 ATTR name requesting-user-name $user [all...] |
/macosx-10.10/tcl-105/tcl_ext/expect/expect/example/ |
H A D | kibitz | 2 # allow another user to share a shell (or other program) with you 77 send_user "usage: kibitz \[args] user \[program ...]\n" 78 send_user " or: kibitz \[args] user@host \[program ...]\n" 85 set user [lindex $argv 0] 86 if {[string match -r $user]} { 91 set user [lindex $argv 1] 93 set user_number [expr 1+(0==[string first - $user])] 96 # at this point, user_number and user are correctly determined 101 # user 1 invokes kibitz as "kibitz user[ [all...] |