/freebsd-10.0-release/crypto/heimdal/lib/roken/ |
H A D | get_default_username.c | 46 const char *user; local 48 user = getenv ("USER"); 49 if (user == NULL) 50 user = getenv ("LOGNAME"); 51 if (user == NULL) 52 user = getenv ("USERNAME"); 55 if (user == NULL) { 56 user = (const char *)getlogin (); 57 if (user != NULL) 58 return user; [all...] |
H A D | innetgr.c | 40 const char *user, const char *domain) 39 innetgr(const char *netgroup, const char *machine, const char *user, const char *domain) argument
|
H A D | k_getpwnam.c | 42 k_getpwnam (const char *user) argument 46 p = getpwnam (user); 52 spwd = getspnam (user);
|
/freebsd-10.0-release/contrib/openbsm/bin/auditdistd/ |
H A D | sandbox.h | 37 int sandbox(const char *user, bool capsicum, const char *fmt, ...);
|
/freebsd-10.0-release/crypto/heimdal/lib/gssapi/krb5/ |
H A D | authorize_localname.c | 43 char *user; local 51 user = malloc(user_name->length + 1); 52 if (user == NULL) { 57 memcpy(user, user_name->value, user_name->length); 58 user[user_name->length] = '\0'; 61 user_ok = krb5_kuserok(context, princ, user); 63 free(user);
|
/freebsd-10.0-release/crypto/openssh/regress/ |
H A D | addrmatch.sh | 10 user="$1"; addr="$2"; host="$3"; laddr="$4"; lport="$5" 13 verbose "test $descr for $user $addr $host" 15 -C user=${user},addr=${addr},host=${host},laddr=${laddr},lport=${lport} | \ 35 run_trial user 192.168.0.1 somehost 1.2.3.4 1234 match1 "first entry" 36 run_trial user 192.168.30.1 somehost 1.2.3.4 1234 nomatch "negative match" 37 run_trial user 19.0.0.1 somehost 1.2.3.4 1234 nomatch "no match" 38 run_trial user 10.255.255.254 somehost 1.2.3.4 1234 match1 "list middle" 39 run_trial user 192.168.30.1 192.168.0.1 1.2.3.4 1234 nomatch "faked IP in hostname" 40 run_trial user 1. [all...] |
/freebsd-10.0-release/crypto/heimdal/lib/krb5/ |
H A D | get_default_principal.c | 43 const char *user = getenv("USER"); local 44 if(user == NULL) 45 user = getenv("LOGNAME"); 46 if(user == NULL) 47 user = getenv("USERNAME"); 48 return user; 64 const char *user; local 71 user = getlogin(); 72 if(user == NULL) 73 user [all...] |
H A D | test_alname.c | 39 const char *user, const char *inst, 47 ret = krb5_make_principal(context, &p, realm, user, inst, NULL); 104 char *user; local 123 errx(1, "first argument should be a local user that in root .k5login"); 125 user = argv[0]; 135 test_alname(context, realm, user, NULL, user, 1); 136 test_alname(context, realm, user, "root", "root", 1); 138 test_alname(context, "FOO.BAR.BAZ.KAKA", user, NULL, user, 38 test_alname(krb5_context context, krb5_const_realm realm, const char *user, const char *inst, const char *localuser, int ok) argument [all...] |
/freebsd-10.0-release/sys/contrib/ngatm/netnatm/api/ |
H A D | cc_user.c | 68 set_state(struct ccuser *user, enum user_state ns) argument 70 if (user->state != ns) { 71 if (user->cc->log & CCLOG_USER_STATE) 72 cc_user_log(user, "%s -> %s", 73 stab[user->state], stab[ns]); 74 user->state = ns; 79 cc_user_send(struct ccuser *user, u_int op, void *arg, size_t len) argument 81 user->cc->funcs->send_user(user, user 85 cc_user_ok(struct ccuser *user, u_int data, void *arg, size_t len) argument 92 cc_user_err(struct ccuser *user, int err) argument 109 struct ccuser *user; local 133 cc_user_reset(struct ccuser *user) argument 158 cc_user_abort(struct ccuser *user, const struct uni_ie_cause *cause) argument 199 cc_user_destroy(struct ccuser *user) argument 242 check_overlap(struct ccuser *user, struct uni_sap *sap) argument 253 do_arrival(struct ccuser *user) argument 275 cc_query_check(struct ccuser *user) argument 305 cc_attr_query(struct ccuser *user, struct ccconn *conn, uint32_t *attr, u_int count) argument 537 cc_set_check(struct ccuser *user) argument 554 cc_attr_set(struct ccuser *user, struct ccconn *conn, uint32_t *attr, u_int count, u_char *val, size_t vallen) argument 839 cc_user_signal(struct ccuser *user, enum atmop sig, struct uni_msg *msg) argument 985 cc_user_active(struct ccuser *user) argument 1017 cc_user_sig_handle(struct ccuser *user, enum user_sig sig, void *arg, u_int arg2) argument [all...] |
/freebsd-10.0-release/contrib/wpa/src/ap/ |
H A D | eap_user_db.c | 2 * hostapd / EAP user database 23 static void set_user_methods(struct hostapd_eap_user *user, const char *methods) argument 32 os_memset(&user->methods, 0, sizeof(user->methods)); 39 user->methods[num_methods].method = 41 &user->methods[num_methods].vendor); 42 if (user->methods[num_methods].vendor == EAP_VENDOR_IETF && 43 user->methods[num_methods].method == EAP_TYPE_NONE) { 45 user->ttls_auth |= EAP_TTLS_AUTH_PAP; 49 user 81 struct hostapd_eap_user *user = ctx; local 101 struct hostapd_eap_user *user = ctx; local 135 struct hostapd_eap_user *user = NULL; local 216 struct hostapd_eap_user *user = conf->eap_user; local [all...] |
/freebsd-10.0-release/etc/rc.d/ |
H A D | sdpd | 21 user="${sdpd_username:-nobody}" 22 command_args="-c ${control} -g ${group} -u ${user}"
|
H A D | cleartmp | 41 ! \( -name .sujournal -type f -user root \) \ 42 ! \( -name .snap -type d -user root \) \ 43 ! \( -name lost+found -type d -user root \) \ 44 ! \( \( -name quota.user -or -name quota.group \) \ 45 -type f -user root \) \
|
/freebsd-10.0-release/usr.sbin/nologin/ |
H A D | nologin.c | 39 const char *user, *tt; local 43 if ((user = getlogin()) == NULL) 44 user = "UNKNOWN"; 46 syslog(LOG_CRIT, "Attempted login by %s on %s", user, tt);
|
/freebsd-10.0-release/contrib/tcp_wrappers/ |
H A D | hosts_ctl.c | 4 * access control checker. The host name and user name arguments should be 24 int hosts_ctl(daemon, name, addr, user) 28 char *user; 36 RQ_USER, user,
|
/freebsd-10.0-release/libexec/bootpd/ |
H A D | syslog.conf | 9 # Note: Have to exclude user from most lines so that user.alert 10 # and user.emerg are not included, because old sendmails 13 # can remove all the special cases for "user" logging. 15 #*.err;kern.debug;auth.notice;user.none /dev/console 16 kern.debug;user,mail.crit;auth.notice /dev/console 19 #*.err;kern.debug;daemon,auth.notice;mail.crit;user.none /var/adm/messages 20 kern.debug;user,mail.crit;auth.notice /var/adm/messages 25 *.alert;kern.err;daemon.err;user.none operator 26 *.alert;user [all...] |
/freebsd-10.0-release/lib/libpam/modules/pam_login_access/ |
H A D | pam_login_access.c | 59 const void *rhost, *tty, *user; local 63 pam_err = pam_get_item(pamh, PAM_USER, &user); 67 if (user == NULL) 70 PAM_LOG("Got user: %s", (const char *)user); 83 PAM_LOG("Checking login.access for user %s on tty %s", 84 (const char *)user, (const char *)tty); 85 if (login_access(user, tty) != 0) 88 user, tty); 90 PAM_LOG("Checking login.access for user [all...] |
/freebsd-10.0-release/contrib/dialog/samples/ |
H A D | form2 | 12 user="$USER" 23 "1 Username:" 1 1 "$user" 1 12 10 10 \ 27 "2 Username:" 5 1 "$user" 5 12 10 10 \ 31 "3 Username:" 9 1 "$user" 9 12 10 10 \ 35 "4 Username:" 13 1 "$user" 13 12 10 10 \ 39 "5 Username:" 17 1 "$user" 17 12 10 10 \ 43 "6 Username:" 21 1 "$user" 21 12 10 10 \ 47 "7 Username:" 25 1 "$user" 25 12 10 10 \
|
H A D | inputmenu | 7 user="$USER" 20 "Username:" "$user" \ 44 $user" 10 40 52 Username) user="$item" ;;
|
/freebsd-10.0-release/crypto/heimdal/lib/gssapi/mech/ |
H A D | gss_authorize_localname.c | 36 sizeof("local-login-user") - 1, 37 "local-login-user" 43 const struct _gss_name *user) 58 &user->gn_value, 59 &user->gn_type); 73 const struct _gss_name *user) 78 if (!gss_oid_equal(&user->gn_type, GSS_C_NT_USER_NAME)) 102 value.length == user->gn_value.length && 103 memcmp(value.value, user->gn_value.value, user 41 mech_authorize_localname(OM_uint32 *minor_status, const struct _gss_name *name, const struct _gss_name *user) argument 71 attr_authorize_localname(OM_uint32 *minor_status, const struct _gss_name *name, const struct _gss_name *user) argument 123 const struct _gss_name *user = (const struct _gss_name *) gss_user; local 167 gss_userok(const gss_name_t name, const char *user) argument [all...] |
/freebsd-10.0-release/contrib/ncurses/panel/ |
H A D | p_user.c | 35 * Set/Get panels user pointer 47 pan->user = uptr; 55 returnCVoidPtr(pan ? pan->user : (NCURSES_CONST void *)0);
|
/freebsd-10.0-release/usr.bin/tip/tip/ |
H A D | log.c | 54 char *user, *timestamp; local 64 if ((user = getlogin()) == NOSTR) { 66 user = "???"; 68 user = pwd->pw_name; 74 user, timestamp, group,
|
/freebsd-10.0-release/contrib/bsnmp/lib/ |
H A D | snmpcrypto.c | 66 snmp_digest_init(const struct snmp_user *user, EVP_MD_CTX *ctx, argument 69 if (user->auth_proto == SNMP_AUTH_HMAC_MD5) { 72 } else if (user->auth_proto == SNMP_AUTH_HMAC_SHA) { 75 } else if (user->auth_proto == SNMP_AUTH_NOAUTH) 79 user->auth_proto); 99 err = snmp_digest_init(&pdu->user, &ctx, &dtype, &keylen); 106 memcpy(extkey, pdu->user.auth_key, keylen); 147 if (pdu->user.priv_proto == SNMP_PRIV_DES) { 153 piv[i] = piv[i] ^ pdu->user.priv_key[8 + i]; 154 } else if (pdu->user 232 snmp_passwd_to_keys(struct snmp_user *user, char *passwd) argument 272 snmp_get_local_keys(struct snmp_user *user, uint8_t *eid, uint32_t elen) argument 310 snmp_calc_keychange(struct snmp_user *user, uint8_t *keychange) argument 370 snmp_passwd_to_keys(struct snmp_user *user, char *passwd __unused) argument 382 snmp_get_local_keys(struct snmp_user *user, uint8_t *eid __unused, uint32_t elen __unused) argument [all...] |
/freebsd-10.0-release/libexec/ulog-helper/ |
H A D | ulog-helper.c | 38 * This setuid helper utility writes user login records to disk. 45 * It uses the real user ID of the calling process to determine the 74 const char *line, *user, *host; local 82 user = get_username(); 83 if (user == NULL) 89 ulog_login(line, user, host);
|
/freebsd-10.0-release/tools/regression/kqueue/ |
H A D | Makefile | 17 user.c
|
/freebsd-10.0-release/usr.sbin/bluetooth/sdpd/ |
H A D | main.c | 54 static int32_t drop_root (char const *user, char const *group); 69 char const *user = "nobody", *group = "nobody"; local 87 case 'u': /* user */ 88 user = optarg; 130 if ((user != NULL || group != NULL) && drop_root(user, group) < 0) 149 drop_root(char const *user, char const *group) argument 161 if (user != NULL) { 162 uid = strtol(user, &ep, 10); 164 struct passwd *pwd = getpwnam(user); [all...] |