/netbsd-6-1-5-RELEASE/sys/arch/i386/stand/lib/ |
H A D | diskbuf.c | 46 alloc_diskbuf(const void *user) argument 48 diskbuf_user = user;
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/krb5/ |
H A D | test_alname.c | 41 const char *user, const char *inst, 49 ret = krb5_make_principal(context, &p, realm, user, inst, NULL); 106 char *user; local 125 errx(1, "first argument should be a local user that in root .k5login"); 127 user = argv[0]; 137 test_alname(context, realm, user, NULL, user, 1); 138 test_alname(context, realm, user, "root", "root", 1); 140 test_alname(context, "FOO.BAR.BAZ.KAKA", user, NULL, user, 40 test_alname(krb5_context context, krb5_const_realm realm, const char *user, const char *inst, const char *localuser, int ok) argument [all...] |
/netbsd-6-1-5-RELEASE/external/bsd/openldap/dist/servers/slapd/ |
H A D | user.c | 3 /* user.c - set user id, group id and group access list */ 4 /* OpenLDAP: pkg/ldap/servers/slapd/user.c,v 1.25.2.5 2010/04/13 20:23:22 kurt Exp */ 42 * Set real and effective user id and group id, and group access list 43 * The user and group arguments are freed. 47 slap_init_user( char *user, char *group ) argument 53 if ( user ) { 55 if ( isdigit( (unsigned char) *user ) ) { 59 if ( lutil_atou( &u, user ) != 0 ) { 60 Debug( LDAP_DEBUG_ANY, "Unble to parse user [all...] |
/netbsd-6-1-5-RELEASE/lib/libpam/modules/pam_skey/ |
H A D | pam_skey.c | 57 const char *user, *skinfo, *pass; local 63 user = getlogin(); 65 retval = pam_get_user(pamh, &user, NULL); 68 PAM_LOG("Got user: %s", user); 71 if (skey_haskey(user) != 0) 74 skinfo = skey_keyinfo(user); 93 retval = skey_passcheck(user, response) == -1 ?
|
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/contrib/dbus/ |
H A D | named-dbus-system.conf | 5 <policy user="named"> 10 <policy user="root">
|
/netbsd-6-1-5-RELEASE/usr.sbin/chroot/ |
H A D | chroot.c | 97 getuser(const char *user) argument 102 if ((pw = getpwnam(user)) != NULL) 105 if (getnum(user, &num) == -1) 106 errx(1, "no such user `%s'", user); 114 char *user; /* user to switch to before running program */ local 123 user = NULL; 132 user = optarg; 133 if (*user [all...] |
/netbsd-6-1-5-RELEASE/usr.sbin/sdpd/ |
H A D | main.c | 52 static bool drop_root (char const *user, char const *group); 67 char const *user = "_sdpd", *group = "_sdpd"; local 91 case 'u': /* user */ 92 user = optarg; 137 if ((user != NULL || group != NULL) && !drop_root(user, group)) 156 drop_root(char const *user, char const *group) argument 169 if (user != NULL) { 170 uid = strtol(user, &ep, 10); 172 struct passwd *pwd = getpwnam(user); [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/roken/ |
H A D | verify.c | 48 unix_verify_user(char *user, char *password) argument 52 pw = k_getpwnam(user);
|
H A D | iruserok.c | 94 char *user, *p; local 136 user = p; 141 user = p; 173 switch(*user) { 175 if (!*(user+1)) { /* '+' matches all users */ 179 if (*(user+1) == '@') /* match a user by netgroup */ 180 userok = innetgr(user+2, NULL, (char *)ruser, 182 else /* match a user by direct specification */ 183 userok = !(strcmp(ruser, user [all...] |
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/bin/confgen/unix/ |
H A D | os.c | 36 set_user(FILE *fd, const char *user) { argument 39 pw = getpwnam(user);
|
/netbsd-6-1-5-RELEASE/external/gpl3/binutils/dist/gold/ |
H A D | timer.cc | 41 this->start_time_.user = 0; 87 now->user = (t.tms_utime * 1000) / ticks_per_sec; 91 now->user = 0; 104 delta.user = now.user - this->start_time_.user;
|
/netbsd-6-1-5-RELEASE/lib/libpam/modules/pam_guest/ |
H A D | pam_guest.c | 78 const char *authtok, *guests, *user; local 82 if (pam_get_user(pamh, &user, NULL) != PAM_SUCCESS || user == NULL) 90 is_guest = lookup(user, guests); 98 strcmp(user, authtok) != 0) 106 pam_setenv(pamh, "GUEST", user, 1);
|
/netbsd-6-1-5-RELEASE/lib/libwrap/ |
H A D | eval.c | 4 * Routines for controlled evaluation of host names, user names, and so on. 17 * When ALWAYS_RFC931 mode is off, user lookup is done only when required by 50 /* eval_user - look up user name */ 55 if (request->user[0] == 0) { 56 (void)strlcpy(request->user, unknown, sizeof(request->user)); 58 rfc931(request->client->sin, request->server->sin, request->user); 60 return (request->user); 116 #ifndef ALWAYS_RFC931 /* no implicit user lookups */ 117 if (request->user[ [all...] |
/netbsd-6-1-5-RELEASE/lib/libpam/modules/pam_chroot/ |
H A D | pam_chroot.c | 62 const char *dir, *end, *cwd, *user; local 67 if (pam_get_user(pamh, &user, NULL) != PAM_SUCCESS || 68 user == NULL || 69 getpwnam_r(user, &pwres, pwbuf, sizeof(pwbuf), &pwd) != 0 || 80 "%s's home directory is too long", user); 91 "%s has no chroot directory", user); 97 openpam_log(PAM_LOG_DEBUG, "chrooting %s to %s", dir, user);
|
/netbsd-6-1-5-RELEASE/tests/fs/ffs/ |
H A D | t_miscquota.sh | 29 "walk user quota list over several disk blocks" -b le 1 user 33 -b le 1 user 37 -boL le 1 user 41 -boC le 1 user 45 -boLC le 1 user 49 -l le 1 user 53 -oRL le 1 user 57 "new quota entry denied by default entry" 5 -b le 1 user 60 "new quota entry denied by default entry, with list on more than one block" 5000 -b le 1 user [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/gssapi/ntlm/ |
H A D | iter_cred.c | 65 char *user = NULL, *domain = NULL; local 73 ret = krb5_ret_stringz(response, &user); 77 free(user); 83 free(user); 87 dn->username = user;
|
/netbsd-6-1-5-RELEASE/external/bsd/openpam/dist/lib/ |
H A D | pam_get_user.c | 59 * Retrieve user name 64 const char **user, 74 if (pamh == NULL || user == NULL) 76 r = pam_get_item(pamh, PAM_USER, (const void **)user); 77 if (r == PAM_SUCCESS && *user != NULL) 102 r = pam_get_item(pamh, PAM_USER, (const void **)user); 117 * The =pam_get_user function returns the name of the target user, as 119 * If no user was specified, nor set using =pam_set_item, =pam_get_user 120 * will prompt for a user name. 121 * Either way, a pointer to the user nam 63 pam_get_user(pam_handle_t *pamh, const char **user, const char *prompt) argument [all...] |
/netbsd-6-1-5-RELEASE/lib/libpam/modules/pam_rhosts/ |
H A D | pam_rhosts.c | 63 const char *user; local 68 err = pam_get_user(pamh, &user, NULL); 72 if (getpwnam_r(user, &pwres, pwbuf, sizeof(pwbuf), &pwd) != 0 || 87 superuser = (strcmp(user, "root") == 0); 88 err = ruserok(rhost, superuser, ruser, user);
|
/netbsd-6-1-5-RELEASE/external/gpl3/gcc/dist/gcc/ |
H A D | bt-load.c | 331 /* Create a new target register user structure, for a use in block BB, 332 instruction INSN. Return the new user. */ 342 btr_user user = NULL; 356 user = XOBNEW (&migrate_btrl_obstack, struct btr_user_s); 357 user->bb = bb; 358 user->luid = insn_luid; 359 user->insn = insn; 360 user->use = use; 361 user->other_use_this_block = 0; 362 user 341 btr_user user = NULL; local 404 btr_user user; local 512 btr_user user; local 528 btr_user user = new_btr_user (bb, insn_luid, insn); local 687 btr_user user = use_array[insn_uid]; local 821 btr_user user; local 1013 btr_user user; local 1076 btr_user user; local 1160 btr_user user; local 1279 btr_user user; local [all...] |
/netbsd-6-1-5-RELEASE/gnu/dist/gcc4/gcc/ |
H A D | bt-load.c | 334 /* Create a new target register user structure, for a use in block BB, 335 instruction INSN. Return the new user. */ 345 btr_user user = NULL; 359 user = obstack_alloc (&migrate_btrl_obstack, sizeof (struct btr_user_s)); 360 user->bb = bb; 361 user->luid = insn_luid; 362 user->insn = insn; 363 user->use = use; 364 user->other_use_this_block = 0; 365 user 344 btr_user user = NULL; local 407 btr_user user; local 515 btr_user user; local 531 btr_user user = new_btr_user (bb, insn_luid, insn); local 690 btr_user user = use_array[insn_uid]; local 824 btr_user user; local 1016 btr_user user; local 1079 btr_user user; local 1163 btr_user user; local 1282 btr_user user; local [all...] |
/netbsd-6-1-5-RELEASE/external/bsd/atf/dist/atf-run/ |
H A D | user.cpp | 36 #include "../atf-c/detail/user.h" 44 #include "user.hpp" 61 throw std::runtime_error("Failed to drop user privileges"); 65 impl::get_user_ids(const std::string& user) argument 67 const struct passwd* pw = ::getpwnam(user.c_str()); 69 throw std::runtime_error("Failed to get information for user " + user);
|
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/unit/atf-src/atf-run/ |
H A D | user.cpp | 35 #include "../atf-c/detail/user.h" 42 #include "user.hpp" 59 throw std::runtime_error("Failed to drop user privileges"); 63 impl::get_user_ids(const std::string& user) argument 65 const struct passwd* pw = ::getpwnam(user.c_str()); 67 throw std::runtime_error("Failed to get information for user " + user);
|
/netbsd-6-1-5-RELEASE/libexec/rexecd/unit-tests/ |
H A D | rexec.c | 51 char *user = __UNCONST("root"); local 62 user = optarg; 77 if ((s = rexec(&host, sv->s_port, user, pass, cmd, NULL)) == -1) 89 (void)fprintf(stderr, "Usage: %s [-u <user>] [-p <password>]"
|
/netbsd-6-1-5-RELEASE/external/ibm-public/postfix/dist/src/virtual/ |
H A D | recipient.c | 21 /* Attributes describing user rights and mailbox location. 77 state.msg_attr.user = mystrdup(state.msg_attr.rcpt.address); 78 lowercase(state.msg_attr.user); 92 myfree(state.msg_attr.user);
|
/netbsd-6-1-5-RELEASE/usr.bin/innetgr/ |
H A D | innetgr.c | 48 "usage: %s [-v] [-d domain] [-h host] [-u user] netgroup\n", 59 char *user = NULL; local 66 user = optarg; 85 ok = innetgr(argv[optind], host, user, domain);
|