/netbsd-6-1-5-RELEASE/sys/fs/filecorefs/ |
H A D | filecore_mount.h | 76 uid_t uid; /* uid that owns filecore files */ member in struct:filecore_args 85 #define FILECOREMNT_USEUID 8 /* Use uid of mount process */
|
/netbsd-6-1-5-RELEASE/sys/fs/ntfs/ |
H A D | ntfsmount.h | 39 uid_t uid; /* uid that owns ntfs files */ member in struct:ntfs_args
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/roken/ |
H A D | k_getpwuid.c | 44 k_getpwuid (uid_t uid) argument 48 p = getpwuid (uid);
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssh/dist/ |
H A D | openssh-lpk_sun.schema | 20 MUST ( sshPublicKey $ uid )
|
H A D | uidswap.c | 7 * Code for uid-swapping. 40 /* Saved effective uid. */ 49 * Temporarily changes to the given uid. If the effective user 80 /* Set the effective uid to the given (unprivileged) uid. */ 92 * Restores to the original (privileged) uid. 105 /* Set the effective uid back to the saved privileged uid. */ 116 * Permanently sets all uids to the given uid. This cannot be 148 fatal("%s: euid incorrect uid 155 permanently_drop_suid(uid_t uid) argument [all...] |
/netbsd-6-1-5-RELEASE/sys/kern/ |
H A D | kern_uidinfo.c | 51 #define UIHASH(uid) (&uihashtbl[(uid) & uihash]) 67 * Ensure that uid 0 is always in the user hash table, as 74 uid_find(uid_t uid) argument 79 uipp = UIHASH(uid); 88 if (uip->ui_uid != uid) 96 newuip->ui_uid = uid; 100 * allocated this 'uid', thus full re-check is needed. 118 chgproccnt(uid_t uid, int diff) argument 123 uip = uid_find(uid); [all...] |
/netbsd-6-1-5-RELEASE/sys/compat/osf1/ |
H A D | osf1_prot.c | 78 * If you change "uid" to "gid" in the discussion, below, about 100 * ID, and the saved set-user-ID to uid. 101 * If the process does not have appropriate privileges, but uid 103 * setuid() function sets the effective user ID to uid; the 110 uid_t uid = SCARG(uap, uid); local 113 error = do_setresuid(l, uid, uid, uid, 0); 115 error = do_setresuid(l, -1, uid, [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/kcm/ |
H A D | acl.c | 116 if (kcm_is_same_session(client, ccache->uid, ccache->session)) { 123 if (client->uid == ccache->uid) { 160 if (ccache->uid != client->uid) 179 uid_t uid, 188 if (ccache->uid != client->uid) 196 ccache->uid = uid; 176 kcm_chown(krb5_context context, kcm_client *client, kcm_ccache ccache, uid_t uid, gid_t gid) argument [all...] |
H A D | client.c | 104 snprintf(prefix, sizeof(prefix), "%ld:", (long)client->uid); 122 if ((ccache->uid != client->uid || 138 ccache->uid = client->uid; 165 unsigned long uid; local 166 int matches = sscanf(name,"%ld:",&uid); 168 matches = sscanf(name,"%ld",&uid); 170 struct passwd *pwd = getpwuid(uid); 173 kcm_chown(context, client, ccache, uid, gi [all...] |
/netbsd-6-1-5-RELEASE/external/bsd/openldap/dist/tests/data/ |
H A D | slapd-proxycache.conf | 48 pcacheattrset 0 sn cn title uid 49 pcacheattrset 1 mail postaladdress telephonenumber cn uid 52 pcachetemplate (uid=) 1 @TTL@ @NTTL@ @STTL@ 54 pcachetemplate (&(objectclass=)(uid=)) 1 @TTL@ @NTTL@ @STTL@ @TTR@ 55 pcachebind (&(objectclass=person)(uid=)) 1 @BTTR@ sub "ou=Alumni Association,ou=people,dc=example,dc=com" 62 #bdb#index cn,sn,uid,mail pres,eq,sub 64 #hdb#index cn,sn,uid,mail pres,eq,sub
|
/netbsd-6-1-5-RELEASE/gnu/dist/groff/src/preproc/eqn/ |
H A D | box.cpp | 270 box::box() : spacing_type(ORDINARY_TYPE), uid(next_uid++) 302 printf(".nr " MARK_WIDTH_REG " 0\\n[" WIDTH_FORMAT "]\n", b->uid); 337 b->uid); 342 b->uid, body_height, b->uid, body_depth); 368 uid, body_height, uid, body_height); 373 uid, body_depth, uid, body_depth); 379 printf(".nr " WIDTH_FORMAT " 0\n", uid); [all...] |
H A D | delim.cpp | 295 static void define_extensible_string(char *delim, int uid, argument 345 printf(".nr " WIDTH_FORMAT " +\\n[" DELIM_WIDTH_REG "]\n", uid); 348 uid, uid, axis_height); 351 uid, uid, axis_height); 357 printf(".nr " WIDTH_FORMAT " 0\\n[" WIDTH_FORMAT "]\n", uid, p->uid); 358 printf(".nr " HEIGHT_FORMAT " \\n[" HEIGHT_FORMAT "]\n", uid, p->uid); [all...] |
/netbsd-6-1-5-RELEASE/external/ibm-public/postfix/dist/src/postqueue/ |
H A D | postqueue.c | 270 uid_t uid = getuid(); local 272 if (uid != 0 && uid != var_owner_uid 273 && (errstr = check_user_acl_byuid(var_showq_acl, uid)) != 0) 276 errstr, (long) uid); 340 uid_t uid = getuid(); local 342 if (uid != 0 && uid != var_owner_uid 343 && (errstr = check_user_acl_byuid(var_flush_acl, uid)) != 0) 346 errstr, (long) uid); 366 uid_t uid = getuid(); local 400 uid_t uid = getuid(); local [all...] |
/netbsd-6-1-5-RELEASE/external/ibm-public/postfix/dist/src/util/ |
H A D | fullname.c | 59 uid_t uid; local 74 uid = getuid(); 75 if ((pwd = getpwuid(uid)) == 0)
|
/netbsd-6-1-5-RELEASE/external/bsd/iscsi/dist/src/osd/ |
H A D | start_osd | 5 mount -t osdfs /dev/so0 /mnt -o gid=0x2d159c01 -o uid=0x2c8f1801
|
/netbsd-6-1-5-RELEASE/external/bsd/openldap/dist/servers/slapd/ |
H A D | user.c | 49 uid_t uid = 0; local 65 uid = (uid_t)u; 67 pwd = getpwuid( uid ); 87 uid = pwd->pw_uid; 161 if ( setuid( uid ) != 0 ) { 163 (int) uid, 0, 0 ); 168 if ( seteuid( uid ) != 0 ) { 170 (int) uid, 0, 0 );
|
/netbsd-6-1-5-RELEASE/lib/libutil/compat/ |
H A D | compat_login_cap.c | 64 setusercontext(login_cap_t *lc, struct passwd50 *pw50, uid_t uid, u_int flags) argument 69 return __setusercontext50(lc, &pw, uid, flags);
|
/netbsd-6-1-5-RELEASE/external/ibm-public/postfix/dist/src/global/ |
H A D | user_acl.c | 11 /* const char *check_user_acl_byuid(acl, uid) 13 /* uid_t uid; 15 /* check_user_acl_byuid() converts the given uid into a user 17 /* If the uid cannot be resolved to a user name, "unknown" 27 /* .IP uid 28 /* The uid to be checked against the access list. 64 const char *check_user_acl_byuid(char *acl, uid_t uid) argument 81 * static:anyone results in "permit" even when the uid is not found in 95 if ((mypwd = mypwuid(uid)) == 0) {
|
/netbsd-6-1-5-RELEASE/dist/dhcp/tests/failover/ |
H A D | new-failover | 12 uid "test-$foo"; 23 uid "test-$foo";
|
/netbsd-6-1-5-RELEASE/external/bsd/file/dist/src/ |
H A D | tar.h | 58 char uid[8]; member in struct:record::header
|
/netbsd-6-1-5-RELEASE/external/bsd/top/dist/ |
H A D | username.c | 41 * These routines handle uid to username mapping. They use a hash table to 69 int uid; member in struct:hash_data 105 data->uid = xuid; 121 data->uid, data->name, data->expire); 129 data->uid, data->name, data->expire);
|
/netbsd-6-1-5-RELEASE/lib/libc/gen/ |
H A D | pwcache.h | 51 #define UID_SZ 317 /* size of uid to user_name cache */ 52 #define UNM_SZ 317 /* size of user_name to uid cache */ 59 * Node structures used in the user, group, uid, and gid caches. 64 char name[UNMLEN]; /* uid name */ 65 uid_t uid; /* cached uid */ member in struct:uidc
|
/netbsd-6-1-5-RELEASE/lib/libpam/modules/pam_self/ |
H A D | pam_self.c | 66 uid_t uid; local 77 uid = getuid(); 78 if (uid == 0 && !openpam_get_option(pamh, OPT_ALLOW_ROOT)) 81 if (uid == (uid_t)pwd->pw_uid)
|
/netbsd-6-1-5-RELEASE/sys/sys/ |
H A D | ipc.h | 55 uid_t uid; /* user id */ member in struct:ipc_perm 74 uid_t uid; member in struct:ipc_perm_sysctl 122 (dst).uid = (src).uid; \
|
/netbsd-6-1-5-RELEASE/games/snake/snscore/ |
H A D | snscore.c | 71 short uid, score; local 92 for (uid = 2; ;uid++) { 100 players[noplayers].uids = uid; 102 p = getpwuid(uid);
|