/freebsd-current/crypto/heimdal/lib/roken/ |
H A D | get_default_username.c | 46 const char *user; local 48 user = getenv ("USER"); 49 if (user == NULL) 50 user = getenv ("LOGNAME"); 51 if (user == NULL) 52 user = getenv ("USERNAME"); 55 if (user == NULL) { 56 user = (const char *)getlogin (); 57 if (user != NULL) 58 return user; [all...] |
H A D | innetgr.c | 40 const char *user, const char *domain) 39 innetgr(const char *netgroup, const char *machine, const char *user, const char *domain) argument
|
H A D | k_getpwnam.c | 42 k_getpwnam (const char *user) argument 46 p = getpwnam (user); 52 spwd = getspnam (user);
|
/freebsd-current/contrib/kyua/utils/ |
H A D | passwd.hpp | 44 /// Represents a system user. 45 class user { class in namespace:utils::passwd 47 /// The name of the user. 50 /// The system-wide identifier of the user. 53 /// The login group identifier for the user. 56 user(const std::string&, const unsigned int, const unsigned int); 62 user current_user(void); 63 user find_user_by_name(const std::string&); 64 user find_user_by_uid(const unsigned int); 65 void set_current_user_for_testing(const user [all...] |
H A D | passwd_fwd.hpp | 39 class user;
|
H A D | passwd_test.cpp | 49 const passwd_ns::user user("the-name", 1, 2); 50 ATF_REQUIRE_EQ("the-name", user.name); 51 ATF_REQUIRE_EQ(1, user.uid); 52 ATF_REQUIRE_EQ(2, user.gid); 59 const passwd_ns::user user("i-am-root", 0, 10); 60 ATF_REQUIRE(user.is_root()); 67 const passwd_ns::user user(" 75 const passwd_ns::user user = passwd_ns::current_user(); local 87 const passwd_ns::user user = passwd_ns::current_user(); local 99 const passwd_ns::user user = passwd_ns::find_user_by_name(pw->pw_name); local 123 const passwd_ns::user user = passwd_ns::find_user_by_name("myself1"); local 136 const passwd_ns::user user = passwd_ns::find_user_by_uid(::getuid()); local 155 const passwd_ns::user user = passwd_ns::find_user_by_uid(10); local [all...] |
H A D | passwd.cpp | 52 static utils::optional< passwd_ns::user > fake_current_user; 56 static std::vector< passwd_ns::user > mock_users; 59 /// Formats a user for logging purposes. 61 /// \param user The user to format. 63 /// \return The user as a string. 65 format_user(const passwd_ns::user& user) argument 67 return F("name=%s, uid=%s, gid=%s") % user.name % user 79 passwd_ns::user::user(const std::string& name_, const unsigned int uid_, function in class:passwd_ns::user [all...] |
/freebsd-current/contrib/openbsm/bin/auditdistd/ |
H A D | sandbox.h | 35 int sandbox(const char *user, bool capsicum, const char *fmt, ...);
|
/freebsd-current/crypto/heimdal/lib/gssapi/krb5/ |
H A D | authorize_localname.c | 43 char *user; local 51 user = malloc(user_name->length + 1); 52 if (user == NULL) { 57 memcpy(user, user_name->value, user_name->length); 58 user[user_name->length] = '\0'; 61 user_ok = krb5_kuserok(context, princ, user); 63 free(user);
|
/freebsd-current/crypto/heimdal/lib/krb5/ |
H A D | get_default_principal.c | 43 const char *user = getenv("USER"); local 44 if(user == NULL) 45 user = getenv("LOGNAME"); 46 if(user == NULL) 47 user = getenv("USERNAME"); 48 return user; 64 const char *user; local 71 user = getlogin(); 72 if(user == NULL) 73 user [all...] |
/freebsd-current/crypto/openssh/regress/unittests/misc/ |
H A D | test_parse.c | 3 * Regress test for misc user/host/URI parsing functions. 29 char *user, *host, *path; local 33 &user, &host, &path), 0); 34 ASSERT_STRING_EQ(user, "someuser"); 37 free(user); free(host); free(path); 42 &user, &host, &path), 0); 43 ASSERT_STRING_EQ(user, "someuser"); 46 free(user); free(host); free(path); 51 &user, &host, &path), 0); 52 ASSERT_STRING_EQ(user, "someuse [all...] |
/freebsd-current/tests/sys/cddl/zfs/tests/acl/cifs/ |
H A D | cifs_attr_003_pos.ksh | 49 # letting a user/application set them. 65 # 1. Loop super user and non-super user to run the test case. 209 # $2: Execute user 215 typeset user=$2 219 verify_expect $expect $CHG_USR_EXEC $user \ 221 verify_expect $expect $CHG_USR_EXEC $user \ 230 # $2: Execute user 236 typeset user=$2 240 verify_expect $expect $CHG_USR_EXEC $user \ [all...] |
H A D | cifs_attr_001_pos.ksh | 37 # Verify the user with write_attributes permission or 42 # 1. Loop super user and non-super user to run the test case. 44 # 3. Grant user has write_attributes permission or 85 typeset user=$3 92 if [[ -n $user ]]; then 93 $RUNWATTR -u $user "$CHMOD S+c${attr} $object" 114 typeset user=$3 121 if [[ -n $user ]]; then 122 $RUNWATTR -u $user " [all...] |
H A D | cifs_attr_002_pos.ksh | 37 # Verify the user with PRIV_FILE_FLAG_SET/PRIV_FILE_FLAG_CLEAR 42 # 1. Loop super user and non-super user to run the test case. 44 # 3. Grant user has PRIV_FILE_FLAG_SET/PRIV_FILE_FLAG_CLEAR separately. 88 typeset user=$3 102 if [[ -n $user ]]; then 103 $RUNWATTR -u $user -p =basic${priv_mod} \ 125 typeset user=$3 139 if [[ -n $user ]]; then 140 $RUNWATTR -u $user [all...] |
/freebsd-current/usr.sbin/nologin/ |
H A D | nologin.c | 37 const char *user, *tt; local 41 if ((user = getlogin()) == NULL) 42 user = "UNKNOWN"; 44 syslog(LOG_CRIT, "Attempted login by %s on %s", user, tt);
|
/freebsd-current/libexec/rc/rc.d/ |
H A D | sdpd | 21 user="${sdpd_username:-nobody}" 22 command_args="-c ${control} -g ${group} -u ${user}"
|
/freebsd-current/sys/contrib/openzfs/tests/zfs-tests/tests/functional/delegate/ |
H A D | delegate_common.kshlib | 37 # Cleanup exist user/group. 70 # Verify the specified user have permission on the dataset 89 typeset user 90 for user in $@; do 95 check_fs_perm $user $perm $dtst 98 check_vol_perm $user $perm $dtst 102 log_note "Check $type $user $perm $dtst" 104 log_note "Fail: $user should have $perm" \ 115 # Verify the specified user have no permission on the dataset 134 typeset user [all...] |
H A D | zfs_allow_005_pos.ksh | 44 # $ROOT_TESTFS/$user. 61 for user in $EVERYONE; do 62 childfs=$ROOT_TESTFS/$user 64 user_run $user zfs create $childfs 70 if [[ $other == $user ]]; then 71 log_must verify_perm $childfs $perms $user
|
/freebsd-current/contrib/kyua/utils/process/ |
H A D | isolation.cpp | 134 /// \param unprivileged_user Unprivileged user to run the test case as. 137 process::isolate_child(const optional< passwd::user >& unprivileged_user, 152 const passwd::user& user = unprivileged_user.get(); local 154 if (user.gid != ::getgid()) { 155 if (::setgid(user.gid) == -1) 157 % user.gid % ::getuid() % ::getgid(), errno); 160 groups[0] = user.gid; 163 % user.gid % ::getuid() % ::getgid(), errno); 166 if (user 192 const passwd::user& user = unprivileged_user.get(); local [all...] |
/freebsd-current/crypto/openssh/regress/ |
H A D | addrmatch.sh | 10 user="$1"; addr="$2"; host="$3"; laddr="$4"; lport="$5" 13 verbose "test $descr for $user $addr $host" 15 -C user=${user},addr=${addr},host=${host},laddr=${laddr},lport=${lport} | \ 35 run_trial user 192.168.0.1 somehost 1.2.3.4 1234 match1 "first entry" 36 run_trial user 192.168.30.1 somehost 1.2.3.4 1234 nomatch "negative match" 37 run_trial user 19.0.0.1 somehost 1.2.3.4 1234 nomatch "no match" 38 run_trial user 10.255.255.254 somehost 1.2.3.4 1234 match1 "list middle" 39 run_trial user 192.168.30.1 192.168.0.1 1.2.3.4 1234 nomatch "faked IP in hostname" 40 run_trial user 1. [all...] |
/freebsd-current/contrib/wpa/src/ap/ |
H A D | eap_user_db.c | 2 * hostapd / EAP user database 23 static void set_user_methods(struct hostapd_eap_user *user, const char *methods) argument 32 os_memset(&user->methods, 0, sizeof(user->methods)); 39 user->methods[num_methods].method = 41 &user->methods[num_methods].vendor); 42 if (user->methods[num_methods].vendor == EAP_VENDOR_IETF && 43 user->methods[num_methods].method == EAP_TYPE_NONE) { 45 user->ttls_auth |= EAP_TTLS_AUTH_PAP; 49 user 81 struct hostapd_eap_user *user = ctx; local 105 struct hostapd_eap_user *user = ctx; local 139 struct hostapd_eap_user *user = NULL; local 236 struct hostapd_eap_user *user = conf->eap_user; local [all...] |
/freebsd-current/libexec/bootpd/ |
H A D | syslog.conf | 9 # Note: Have to exclude user from most lines so that user.alert 10 # and user.emerg are not included, because old sendmails 13 # can remove all the special cases for "user" logging. 15 #*.err;kern.debug;auth.notice;user.none /dev/console 16 kern.debug;user,mail.crit;auth.notice /dev/console 19 #*.err;kern.debug;daemon,auth.notice;mail.crit;user.none /var/adm/messages 20 kern.debug;user,mail.crit;auth.notice /var/adm/messages 25 *.alert;kern.err;daemon.err;user.none operator 26 *.alert;user [all...] |
/freebsd-current/tests/sys/cddl/zfs/tests/delegate/ |
H A D | delegate_common.kshlib | 30 # Cleanup exist user/group. 66 # Verify the specified user have permission on the dataset 85 typeset user 86 for user in $@; do 91 check_fs_perm $user $perm $dtst 94 check_vol_perm $user $perm $dtst 99 log_note "Fail: $user should have $perm " \ 110 # Verify the specified user have no permission on the dataset 129 typeset user 130 for user i [all...] |
/freebsd-current/lib/libpam/modules/pam_login_access/ |
H A D | pam_login_access.c | 72 const void *rhost, *tty, *user; local 76 pam_err = pam_get_item(pamh, PAM_USER, &user); 80 if (user == NULL) 83 PAM_LOG("Got user: %s", (const char *)user); 104 PAM_LOG("Checking login.access for user %s from host %s", 105 (const char *)user, (const char *)rhost); 106 if (login_access(user, rhost, &login_access_opts) != 0) 109 (const char *)user, (const char *)rhost); 111 PAM_LOG("Checking login.access for user [all...] |
/freebsd-current/usr.sbin/cron/cron/ |
H A D | funcs.h | 32 job_add(entry *, user *), 33 do_command(entry *, user *), 34 link_user(cron_db *, user *), 35 unlink_user(cron_db *, user *), 36 free_user(user *), 64 user *load_user(int, struct passwd *, const char *),
|