Searched refs:user (Results 26 - 50 of 834) sorted by relevance

1234567891011>>

/netbsd-6-1-5-RELEASE/sys/arch/i386/stand/lib/
H A Ddiskbuf.c46 alloc_diskbuf(const void *user) argument
48 diskbuf_user = user;
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/krb5/
H A Dtest_alname.c41 const char *user, const char *inst,
49 ret = krb5_make_principal(context, &p, realm, user, inst, NULL);
106 char *user; local
125 errx(1, "first argument should be a local user that in root .k5login");
127 user = argv[0];
137 test_alname(context, realm, user, NULL, user, 1);
138 test_alname(context, realm, user, "root", "root", 1);
140 test_alname(context, "FOO.BAR.BAZ.KAKA", user, NULL, user,
40 test_alname(krb5_context context, krb5_const_realm realm, const char *user, const char *inst, const char *localuser, int ok) argument
[all...]
/netbsd-6-1-5-RELEASE/external/bsd/openldap/dist/servers/slapd/
H A Duser.c3 /* user.c - set user id, group id and group access list */
4 /* OpenLDAP: pkg/ldap/servers/slapd/user.c,v 1.25.2.5 2010/04/13 20:23:22 kurt Exp */
42 * Set real and effective user id and group id, and group access list
43 * The user and group arguments are freed.
47 slap_init_user( char *user, char *group ) argument
53 if ( user ) {
55 if ( isdigit( (unsigned char) *user ) ) {
59 if ( lutil_atou( &u, user ) != 0 ) {
60 Debug( LDAP_DEBUG_ANY, "Unble to parse user
[all...]
/netbsd-6-1-5-RELEASE/lib/libpam/modules/pam_skey/
H A Dpam_skey.c57 const char *user, *skinfo, *pass; local
63 user = getlogin();
65 retval = pam_get_user(pamh, &user, NULL);
68 PAM_LOG("Got user: %s", user);
71 if (skey_haskey(user) != 0)
74 skinfo = skey_keyinfo(user);
93 retval = skey_passcheck(user, response) == -1 ?
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/contrib/dbus/
H A Dnamed-dbus-system.conf5 <policy user="named">
10 <policy user="root">
/netbsd-6-1-5-RELEASE/usr.sbin/chroot/
H A Dchroot.c97 getuser(const char *user) argument
102 if ((pw = getpwnam(user)) != NULL)
105 if (getnum(user, &num) == -1)
106 errx(1, "no such user `%s'", user);
114 char *user; /* user to switch to before running program */ local
123 user = NULL;
132 user = optarg;
133 if (*user
[all...]
/netbsd-6-1-5-RELEASE/usr.sbin/sdpd/
H A Dmain.c52 static bool drop_root (char const *user, char const *group);
67 char const *user = "_sdpd", *group = "_sdpd"; local
91 case 'u': /* user */
92 user = optarg;
137 if ((user != NULL || group != NULL) && !drop_root(user, group))
156 drop_root(char const *user, char const *group) argument
169 if (user != NULL) {
170 uid = strtol(user, &ep, 10);
172 struct passwd *pwd = getpwnam(user);
[all...]
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/roken/
H A Dverify.c48 unix_verify_user(char *user, char *password) argument
52 pw = k_getpwnam(user);
H A Diruserok.c94 char *user, *p; local
136 user = p;
141 user = p;
173 switch(*user) {
175 if (!*(user+1)) { /* '+' matches all users */
179 if (*(user+1) == '@') /* match a user by netgroup */
180 userok = innetgr(user+2, NULL, (char *)ruser,
182 else /* match a user by direct specification */
183 userok = !(strcmp(ruser, user
[all...]
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/bin/confgen/unix/
H A Dos.c36 set_user(FILE *fd, const char *user) { argument
39 pw = getpwnam(user);
/netbsd-6-1-5-RELEASE/external/gpl3/binutils/dist/gold/
H A Dtimer.cc41 this->start_time_.user = 0;
87 now->user = (t.tms_utime * 1000) / ticks_per_sec;
91 now->user = 0;
104 delta.user = now.user - this->start_time_.user;
/netbsd-6-1-5-RELEASE/lib/libpam/modules/pam_guest/
H A Dpam_guest.c78 const char *authtok, *guests, *user; local
82 if (pam_get_user(pamh, &user, NULL) != PAM_SUCCESS || user == NULL)
90 is_guest = lookup(user, guests);
98 strcmp(user, authtok) != 0)
106 pam_setenv(pamh, "GUEST", user, 1);
/netbsd-6-1-5-RELEASE/lib/libwrap/
H A Deval.c4 * Routines for controlled evaluation of host names, user names, and so on.
17 * When ALWAYS_RFC931 mode is off, user lookup is done only when required by
50 /* eval_user - look up user name */
55 if (request->user[0] == 0) {
56 (void)strlcpy(request->user, unknown, sizeof(request->user));
58 rfc931(request->client->sin, request->server->sin, request->user);
60 return (request->user);
116 #ifndef ALWAYS_RFC931 /* no implicit user lookups */
117 if (request->user[
[all...]
/netbsd-6-1-5-RELEASE/lib/libpam/modules/pam_chroot/
H A Dpam_chroot.c62 const char *dir, *end, *cwd, *user; local
67 if (pam_get_user(pamh, &user, NULL) != PAM_SUCCESS ||
68 user == NULL ||
69 getpwnam_r(user, &pwres, pwbuf, sizeof(pwbuf), &pwd) != 0 ||
80 "%s's home directory is too long", user);
91 "%s has no chroot directory", user);
97 openpam_log(PAM_LOG_DEBUG, "chrooting %s to %s", dir, user);
/netbsd-6-1-5-RELEASE/tests/fs/ffs/
H A Dt_miscquota.sh29 "walk user quota list over several disk blocks" -b le 1 user
33 -b le 1 user
37 -boL le 1 user
41 -boC le 1 user
45 -boLC le 1 user
49 -l le 1 user
53 -oRL le 1 user
57 "new quota entry denied by default entry" 5 -b le 1 user
60 "new quota entry denied by default entry, with list on more than one block" 5000 -b le 1 user
[all...]
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/gssapi/ntlm/
H A Diter_cred.c65 char *user = NULL, *domain = NULL; local
73 ret = krb5_ret_stringz(response, &user);
77 free(user);
83 free(user);
87 dn->username = user;
/netbsd-6-1-5-RELEASE/external/bsd/openpam/dist/lib/
H A Dpam_get_user.c59 * Retrieve user name
64 const char **user,
74 if (pamh == NULL || user == NULL)
76 r = pam_get_item(pamh, PAM_USER, (const void **)user);
77 if (r == PAM_SUCCESS && *user != NULL)
102 r = pam_get_item(pamh, PAM_USER, (const void **)user);
117 * The =pam_get_user function returns the name of the target user, as
119 * If no user was specified, nor set using =pam_set_item, =pam_get_user
120 * will prompt for a user name.
121 * Either way, a pointer to the user nam
63 pam_get_user(pam_handle_t *pamh, const char **user, const char *prompt) argument
[all...]
/netbsd-6-1-5-RELEASE/lib/libpam/modules/pam_rhosts/
H A Dpam_rhosts.c63 const char *user; local
68 err = pam_get_user(pamh, &user, NULL);
72 if (getpwnam_r(user, &pwres, pwbuf, sizeof(pwbuf), &pwd) != 0 ||
87 superuser = (strcmp(user, "root") == 0);
88 err = ruserok(rhost, superuser, ruser, user);
/netbsd-6-1-5-RELEASE/external/gpl3/gcc/dist/gcc/
H A Dbt-load.c331 /* Create a new target register user structure, for a use in block BB,
332 instruction INSN. Return the new user. */
342 btr_user user = NULL;
356 user = XOBNEW (&migrate_btrl_obstack, struct btr_user_s);
357 user->bb = bb;
358 user->luid = insn_luid;
359 user->insn = insn;
360 user->use = use;
361 user->other_use_this_block = 0;
362 user
341 btr_user user = NULL; local
404 btr_user user; local
512 btr_user user; local
528 btr_user user = new_btr_user (bb, insn_luid, insn); local
687 btr_user user = use_array[insn_uid]; local
821 btr_user user; local
1013 btr_user user; local
1076 btr_user user; local
1160 btr_user user; local
1279 btr_user user; local
[all...]
/netbsd-6-1-5-RELEASE/gnu/dist/gcc4/gcc/
H A Dbt-load.c334 /* Create a new target register user structure, for a use in block BB,
335 instruction INSN. Return the new user. */
345 btr_user user = NULL;
359 user = obstack_alloc (&migrate_btrl_obstack, sizeof (struct btr_user_s));
360 user->bb = bb;
361 user->luid = insn_luid;
362 user->insn = insn;
363 user->use = use;
364 user->other_use_this_block = 0;
365 user
344 btr_user user = NULL; local
407 btr_user user; local
515 btr_user user; local
531 btr_user user = new_btr_user (bb, insn_luid, insn); local
690 btr_user user = use_array[insn_uid]; local
824 btr_user user; local
1016 btr_user user; local
1079 btr_user user; local
1163 btr_user user; local
1282 btr_user user; local
[all...]
/netbsd-6-1-5-RELEASE/external/bsd/atf/dist/atf-run/
H A Duser.cpp36 #include "../atf-c/detail/user.h"
44 #include "user.hpp"
61 throw std::runtime_error("Failed to drop user privileges");
65 impl::get_user_ids(const std::string& user) argument
67 const struct passwd* pw = ::getpwnam(user.c_str());
69 throw std::runtime_error("Failed to get information for user " + user);
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/unit/atf-src/atf-run/
H A Duser.cpp35 #include "../atf-c/detail/user.h"
42 #include "user.hpp"
59 throw std::runtime_error("Failed to drop user privileges");
63 impl::get_user_ids(const std::string& user) argument
65 const struct passwd* pw = ::getpwnam(user.c_str());
67 throw std::runtime_error("Failed to get information for user " + user);
/netbsd-6-1-5-RELEASE/libexec/rexecd/unit-tests/
H A Drexec.c51 char *user = __UNCONST("root"); local
62 user = optarg;
77 if ((s = rexec(&host, sv->s_port, user, pass, cmd, NULL)) == -1)
89 (void)fprintf(stderr, "Usage: %s [-u <user>] [-p <password>]"
/netbsd-6-1-5-RELEASE/external/ibm-public/postfix/dist/src/virtual/
H A Drecipient.c21 /* Attributes describing user rights and mailbox location.
77 state.msg_attr.user = mystrdup(state.msg_attr.rcpt.address);
78 lowercase(state.msg_attr.user);
92 myfree(state.msg_attr.user);
/netbsd-6-1-5-RELEASE/usr.bin/innetgr/
H A Dinnetgr.c48 "usage: %s [-v] [-d domain] [-h host] [-u user] netgroup\n",
59 char *user = NULL; local
66 user = optarg;
85 ok = innetgr(argv[optind], host, user, domain);

Completed in 712 milliseconds

1234567891011>>