/netbsd-6-1-5-RELEASE/external/bsd/openldap/dist/servers/slapd/ |
H A D | sets.h | 40 struct berval *user, struct berval *target, BerVarray *results);
|
/netbsd-6-1-5-RELEASE/external/mit/xorg/lib/fontconfig/etc/conf.d/ |
H A D | Makefile | 14 50-user.conf \
|
/netbsd-6-1-5-RELEASE/lib/libwrap/ |
H A D | rfc931.c | 80 /* rfc931 - return remote user name, given socket structures */ 91 char user[256]; /* XXX */ local 222 &rmt_port, &our_port, user) == 3 231 if ((cp = strchr(user, '\r')) != NULL) 233 result = user;
|
/netbsd-6-1-5-RELEASE/usr.sbin/quot/ |
H A D | quot.c | 101 static struct user *user(uid_t); 198 static struct user { struct 213 struct user *usr; 231 struct user *usr, *usrn; 232 struct user *svusr; 249 static struct user * 250 user(uid_t uid) function 252 struct user *usr; 285 return ((const struct user *)u [all...] |
/netbsd-6-1-5-RELEASE/tests/sbin/fsck_ffs/ |
H A D | quotas_common.sh | 12 atf_check -o ignore -e ignore tunefs -q user -q group -F ${IMG}
|
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/hostapd/ |
H A D | config_file.c | 204 struct hostapd_eap_user *user, *tail = NULL; local 211 wpa_printf(MSG_ERROR, "EAP user file '%s' not found.", fname); 215 /* Lines: "user" METHOD,METHOD2 "password" (password optional) */ 232 user = NULL; 240 user = os_zalloc(sizeof(*user)); 241 if (user == NULL) { 242 wpa_printf(MSG_ERROR, "EAP user allocation failed"); 245 user->force_version = -1; 261 user [all...] |
/netbsd-6-1-5-RELEASE/lib/libtelnet/ |
H A D | sra.c | 62 char *user, *pass, *xuser, *xpass; variable 126 user = malloc(SMALL_LEN); 133 if (user == NULL || xuser == NULL || pass == NULL || xpass == 177 printf("SRA user rejected for bad PKB\r\n"); 199 pk_decode(xuser, user, &ck); 200 auth_encrypt_user(user); 202 (void)check_user(user, "*"); 217 /* check user's password */ 218 valid = check_user(user, pass); 221 /* PAM (via check_user()) may have changed 'user' */ [all...] |
/netbsd-6-1-5-RELEASE/lib/librmt/ |
H A D | rmtlib.c | 209 * the user have a .netrc file in his/her home directory, or that the 218 _rmt_rexec(const char *host, const char *user) argument 223 /* user may be NULL */ 228 if ((user != NULL) && *user == '\0') 229 user = NULL; 230 return rexec(&host, rexecserv->s_port, user, NULL, 237 * _rmt_open --- open a magtape device on system specified, as given user 239 * file name has the form [user@]system:/dev/???? 241 * file name has the form system[.user] 256 char *sys, *dev, *user; local [all...] |
/netbsd-6-1-5-RELEASE/usr.bin/su/ |
H A D | su_pam.c | 96 const char *user, *shell, *avshell; local 188 user = *argv ? *argv : "root"; 192 if ((p = strchr(user, ':')) != NULL) { 200 if (user[0] == '\0') 201 user = username; 204 if (getpwnam_r(user, &pwres, pwbuf, sizeof(pwbuf), &pwd) != 0 || 206 errx(EXIT_FAILURE, "unknown login %s", user); 213 if ((pam_err = pam_start("su", user, &pamc, &pamh)) != PAM_SUCCESS) { 242 username, user, ontty(), pam_strerror(pamh, pam_err)); 264 * pam_authenticate might have changed the target user [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/po/ |
H A D | gen-po.in | 18 --foreign-user \
|
/netbsd-6-1-5-RELEASE/external/bsd/cron/dist/ |
H A D | job.c | 38 user *u; 47 job_add(entry *e, user *u, time_t target_time) {
|
H A D | database.c | 122 user *u, *nu; 201 link_user(cron_db *db, user *u) { 212 unlink_user(cron_db *db, user *u) { 224 user * 226 user *u; 241 user *u; 254 /* file doesn't have a user in passwd file. 304 * the user, let's deallocate and unlink the user in
|
/netbsd-6-1-5-RELEASE/sys/arch/m68k/m68k/ |
H A D | reenter_syscall.s | 52 movel %a0,%usp | user SP 53 moveml %sp@+,#0x7FFF | restore user registers
|
/netbsd-6-1-5-RELEASE/usr.bin/rsh/ |
H A D | rsh.c | 106 char *args, *host, *p, *user, *name; local 110 host = user = NULL; 148 errx(1, "unknown user id"); 171 user = optarg; 183 errx(1,"only super user can use the -u option"); 216 if (!user && p > host) 217 user = host; 222 if (!user) 223 user = name; 239 name, user, arg [all...] |
/netbsd-6-1-5-RELEASE/usr.sbin/lpr/lpq/ |
H A D | lpq.c | 47 * lpq [-a] [-l] [-Pprinter] [user...] [job...] 70 char *user[MAXUSERS]; /* users to process */ variable 71 int users; /* # of users in user array */ 128 user[users++] = *argv; 156 (void)fprintf(stderr, "Usage: %s [-a] [-l] [-Pprinter] [-w maxwait] [user ...] [job ...]\n", getprogname());
|
/netbsd-6-1-5-RELEASE/usr.sbin/lpr/lprm/ |
H A D | lprm.c | 45 * lprm - remove the current user's spool entry 47 * lprm [-] [[job #] [user] ...] 76 char *user[MAXUSERS]; /* users to process */ variable 77 int users; /* # of users in user array */ 78 uid_t uid, euid; /* real and effective user id's */ 145 user[users++] = arg; 160 "Usage: %s [-] [-Pprinter] [-w maxwait] [[job #] [user] ...]\n",
|
/netbsd-6-1-5-RELEASE/tests/fs/ffs/ |
H A D | t_getquota.sh | 30 for q in "user" "group"; do 47 user) 96 user)
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssh/dist/ |
H A D | sftp-common.c | 195 const char *user, *group; local 201 user = user_from_uid(st->st_uid, 0); 204 user = ubuf; 220 ulen = MAX(strlen(user), 8); 225 (u_int)st->st_nlink, ulen, user, glen, group, 229 (u_int)st->st_nlink, ulen, user, glen, group,
|
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/contrib/sdb/pgsql/ |
H A D | pgsqldb.c | 60 char *user; member in struct:dbinfo 90 dbi->user, dbi->passwd); 247 * argv[3] (if present) is the name of the user to connect as 270 dbi->user = NULL; 287 STRDUP_OR_FAIL(dbi->user, argv[3]); 321 if (dbi->user != NULL) 322 isc_mem_free(ns_g_mctx, dbi->user);
|
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/lib/isc/win32/ |
H A D | fsaccess.c | 51 /* Store the user account name locally */ 130 #define SET_AND_CLEAR(user, group, other) \ 131 SET_AND_CLEAR1(user); \ 156 NTFS_Access_Control(const char *filename, const char *user, int access, argument 183 if (!LookupAccountName(0, user, psid, &sidBufferSize, domainBuffer, 329 isc_fsaccess_changeowner(const char *filename, const char *user) { argument 354 if (!LookupAccountName(0, user, psid, &sidBufferSize, domainBuffer,
|
/netbsd-6-1-5-RELEASE/external/bsd/ntp/dist/lib/isc/win32/ |
H A D | fsaccess.c | 51 /* Store the user account name locally */ 130 #define SET_AND_CLEAR(user, group, other) \ 131 SET_AND_CLEAR1(user); \ 156 NTFS_Access_Control(const char *filename, const char *user, int access, argument 183 if (!LookupAccountName(0, user, psid, &sidBufferSize, domainBuffer, 329 isc_fsaccess_changeowner(const char *filename, const char *user) { argument 354 if (!LookupAccountName(0, user, psid, &sidBufferSize, domainBuffer,
|
/netbsd-6-1-5-RELEASE/lib/libpam/modules/pam_ksu/ |
H A D | pam_ksu.c | 67 const char *user; local 73 pamret = pam_get_user(pamh, &user, NULL); 76 PAM_LOG("Got user: %s", user); 86 rv = get_su_principal(context, user, ruser, &su_principal_name, &su_principal); 89 PAM_LOG("kuserok: %s -> %s", su_principal_name, user); 90 rv = krb5_kuserok(context, su_principal, user); 188 /* Determine the target principal given the current user and the target user. 194 * When the target user i [all...] |
/netbsd-6-1-5-RELEASE/external/ibm-public/postfix/dist/src/local/ |
H A D | mailbox.c | 23 /* A zero result means that the named user was not found. 31 /* Attributes describing user rights and environment. 137 mailbox = concatenate(spool_dir, "/", state.msg_attr.user, (char *) 0); 145 * (including file locking) as that user (Mike Muuss, Army Research 150 * group-writable, use the recipient user id and the mail spool group id. 223 "cannot update mailbox %s for user %s. ", 224 mailbox, state.msg_attr.user); 285 && (map_transport = maps_find(transp_maps, state.msg_attr.user, 308 if ((mbox_pwd = mypwnam(state.msg_attr.user)) == 0) 318 * Use the rights of the recipient user [all...] |
/netbsd-6-1-5-RELEASE/usr.sbin/lpr/common_source/ |
H A D | rmjob.c | 62 extern char *user[]; /* users to process */ 63 extern int users; /* # of users in user array */ 73 extern uid_t uid, euid; /* real and effective user id's */ 88 * If the format was `lprm -' and the user isn't the super-user, 89 * then fake things to look like he said `lprm user'. 95 user[0] = person; 266 * Check to see if it's in the user list 268 for (u = user; u < &user[user [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/test/ |
H A D | testssl.com | 29 $ define/user sys$output testssl-x509-output. 30 $ define/user sys$error nla0: 32 $ define/user sys$error nla0: 167 $ define/user sys$output nla0: 170 $ define/user sys$output nla0:
|