Searched refs:user (Results 1 - 25 of 904) sorted by relevance

1234567891011>>

/freebsd-current/crypto/heimdal/lib/roken/
H A Dget_default_username.c46 const char *user; local
48 user = getenv ("USER");
49 if (user == NULL)
50 user = getenv ("LOGNAME");
51 if (user == NULL)
52 user = getenv ("USERNAME");
55 if (user == NULL) {
56 user = (const char *)getlogin ();
57 if (user != NULL)
58 return user;
[all...]
H A Dinnetgr.c40 const char *user, const char *domain)
39 innetgr(const char *netgroup, const char *machine, const char *user, const char *domain) argument
H A Dk_getpwnam.c42 k_getpwnam (const char *user) argument
46 p = getpwnam (user);
52 spwd = getspnam (user);
/freebsd-current/contrib/kyua/utils/
H A Dpasswd.hpp44 /// Represents a system user.
45 class user { class in namespace:utils::passwd
47 /// The name of the user.
50 /// The system-wide identifier of the user.
53 /// The login group identifier for the user.
56 user(const std::string&, const unsigned int, const unsigned int);
62 user current_user(void);
63 user find_user_by_name(const std::string&);
64 user find_user_by_uid(const unsigned int);
65 void set_current_user_for_testing(const user
[all...]
H A Dpasswd_fwd.hpp39 class user;
H A Dpasswd_test.cpp49 const passwd_ns::user user("the-name", 1, 2);
50 ATF_REQUIRE_EQ("the-name", user.name);
51 ATF_REQUIRE_EQ(1, user.uid);
52 ATF_REQUIRE_EQ(2, user.gid);
59 const passwd_ns::user user("i-am-root", 0, 10);
60 ATF_REQUIRE(user.is_root());
67 const passwd_ns::user user("
75 const passwd_ns::user user = passwd_ns::current_user(); local
87 const passwd_ns::user user = passwd_ns::current_user(); local
99 const passwd_ns::user user = passwd_ns::find_user_by_name(pw->pw_name); local
123 const passwd_ns::user user = passwd_ns::find_user_by_name("myself1"); local
136 const passwd_ns::user user = passwd_ns::find_user_by_uid(::getuid()); local
155 const passwd_ns::user user = passwd_ns::find_user_by_uid(10); local
[all...]
H A Dpasswd.cpp52 static utils::optional< passwd_ns::user > fake_current_user;
56 static std::vector< passwd_ns::user > mock_users;
59 /// Formats a user for logging purposes.
61 /// \param user The user to format.
63 /// \return The user as a string.
65 format_user(const passwd_ns::user& user) argument
67 return F("name=%s, uid=%s, gid=%s") % user.name % user
79 passwd_ns::user::user(const std::string& name_, const unsigned int uid_, function in class:passwd_ns::user
[all...]
/freebsd-current/contrib/openbsm/bin/auditdistd/
H A Dsandbox.h35 int sandbox(const char *user, bool capsicum, const char *fmt, ...);
/freebsd-current/crypto/heimdal/lib/gssapi/krb5/
H A Dauthorize_localname.c43 char *user; local
51 user = malloc(user_name->length + 1);
52 if (user == NULL) {
57 memcpy(user, user_name->value, user_name->length);
58 user[user_name->length] = '\0';
61 user_ok = krb5_kuserok(context, princ, user);
63 free(user);
/freebsd-current/crypto/heimdal/lib/krb5/
H A Dget_default_principal.c43 const char *user = getenv("USER"); local
44 if(user == NULL)
45 user = getenv("LOGNAME");
46 if(user == NULL)
47 user = getenv("USERNAME");
48 return user;
64 const char *user; local
71 user = getlogin();
72 if(user == NULL)
73 user
[all...]
/freebsd-current/crypto/openssh/regress/unittests/misc/
H A Dtest_parse.c3 * Regress test for misc user/host/URI parsing functions.
29 char *user, *host, *path; local
33 &user, &host, &path), 0);
34 ASSERT_STRING_EQ(user, "someuser");
37 free(user); free(host); free(path);
42 &user, &host, &path), 0);
43 ASSERT_STRING_EQ(user, "someuser");
46 free(user); free(host); free(path);
51 &user, &host, &path), 0);
52 ASSERT_STRING_EQ(user, "someuse
[all...]
/freebsd-current/tests/sys/cddl/zfs/tests/acl/cifs/
H A Dcifs_attr_003_pos.ksh49 # letting a user/application set them.
65 # 1. Loop super user and non-super user to run the test case.
209 # $2: Execute user
215 typeset user=$2
219 verify_expect $expect $CHG_USR_EXEC $user \
221 verify_expect $expect $CHG_USR_EXEC $user \
230 # $2: Execute user
236 typeset user=$2
240 verify_expect $expect $CHG_USR_EXEC $user \
[all...]
H A Dcifs_attr_001_pos.ksh37 # Verify the user with write_attributes permission or
42 # 1. Loop super user and non-super user to run the test case.
44 # 3. Grant user has write_attributes permission or
85 typeset user=$3
92 if [[ -n $user ]]; then
93 $RUNWATTR -u $user "$CHMOD S+c${attr} $object"
114 typeset user=$3
121 if [[ -n $user ]]; then
122 $RUNWATTR -u $user "
[all...]
H A Dcifs_attr_002_pos.ksh37 # Verify the user with PRIV_FILE_FLAG_SET/PRIV_FILE_FLAG_CLEAR
42 # 1. Loop super user and non-super user to run the test case.
44 # 3. Grant user has PRIV_FILE_FLAG_SET/PRIV_FILE_FLAG_CLEAR separately.
88 typeset user=$3
102 if [[ -n $user ]]; then
103 $RUNWATTR -u $user -p =basic${priv_mod} \
125 typeset user=$3
139 if [[ -n $user ]]; then
140 $RUNWATTR -u $user
[all...]
/freebsd-current/usr.sbin/nologin/
H A Dnologin.c37 const char *user, *tt; local
41 if ((user = getlogin()) == NULL)
42 user = "UNKNOWN";
44 syslog(LOG_CRIT, "Attempted login by %s on %s", user, tt);
/freebsd-current/libexec/rc/rc.d/
H A Dsdpd21 user="${sdpd_username:-nobody}"
22 command_args="-c ${control} -g ${group} -u ${user}"
/freebsd-current/sys/contrib/openzfs/tests/zfs-tests/tests/functional/delegate/
H A Ddelegate_common.kshlib37 # Cleanup exist user/group.
70 # Verify the specified user have permission on the dataset
89 typeset user
90 for user in $@; do
95 check_fs_perm $user $perm $dtst
98 check_vol_perm $user $perm $dtst
102 log_note "Check $type $user $perm $dtst"
104 log_note "Fail: $user should have $perm" \
115 # Verify the specified user have no permission on the dataset
134 typeset user
[all...]
H A Dzfs_allow_005_pos.ksh44 # $ROOT_TESTFS/$user.
61 for user in $EVERYONE; do
62 childfs=$ROOT_TESTFS/$user
64 user_run $user zfs create $childfs
70 if [[ $other == $user ]]; then
71 log_must verify_perm $childfs $perms $user
/freebsd-current/contrib/kyua/utils/process/
H A Disolation.cpp134 /// \param unprivileged_user Unprivileged user to run the test case as.
137 process::isolate_child(const optional< passwd::user >& unprivileged_user,
152 const passwd::user& user = unprivileged_user.get(); local
154 if (user.gid != ::getgid()) {
155 if (::setgid(user.gid) == -1)
157 % user.gid % ::getuid() % ::getgid(), errno);
160 groups[0] = user.gid;
163 % user.gid % ::getuid() % ::getgid(), errno);
166 if (user
192 const passwd::user& user = unprivileged_user.get(); local
[all...]
/freebsd-current/crypto/openssh/regress/
H A Daddrmatch.sh10 user="$1"; addr="$2"; host="$3"; laddr="$4"; lport="$5"
13 verbose "test $descr for $user $addr $host"
15 -C user=${user},addr=${addr},host=${host},laddr=${laddr},lport=${lport} | \
35 run_trial user 192.168.0.1 somehost 1.2.3.4 1234 match1 "first entry"
36 run_trial user 192.168.30.1 somehost 1.2.3.4 1234 nomatch "negative match"
37 run_trial user 19.0.0.1 somehost 1.2.3.4 1234 nomatch "no match"
38 run_trial user 10.255.255.254 somehost 1.2.3.4 1234 match1 "list middle"
39 run_trial user 192.168.30.1 192.168.0.1 1.2.3.4 1234 nomatch "faked IP in hostname"
40 run_trial user 1.
[all...]
/freebsd-current/contrib/wpa/src/ap/
H A Deap_user_db.c2 * hostapd / EAP user database
23 static void set_user_methods(struct hostapd_eap_user *user, const char *methods) argument
32 os_memset(&user->methods, 0, sizeof(user->methods));
39 user->methods[num_methods].method =
41 &user->methods[num_methods].vendor);
42 if (user->methods[num_methods].vendor == EAP_VENDOR_IETF &&
43 user->methods[num_methods].method == EAP_TYPE_NONE) {
45 user->ttls_auth |= EAP_TTLS_AUTH_PAP;
49 user
81 struct hostapd_eap_user *user = ctx; local
105 struct hostapd_eap_user *user = ctx; local
139 struct hostapd_eap_user *user = NULL; local
236 struct hostapd_eap_user *user = conf->eap_user; local
[all...]
/freebsd-current/libexec/bootpd/
H A Dsyslog.conf9 # Note: Have to exclude user from most lines so that user.alert
10 # and user.emerg are not included, because old sendmails
13 # can remove all the special cases for "user" logging.
15 #*.err;kern.debug;auth.notice;user.none /dev/console
16 kern.debug;user,mail.crit;auth.notice /dev/console
19 #*.err;kern.debug;daemon,auth.notice;mail.crit;user.none /var/adm/messages
20 kern.debug;user,mail.crit;auth.notice /var/adm/messages
25 *.alert;kern.err;daemon.err;user.none operator
26 *.alert;user
[all...]
/freebsd-current/tests/sys/cddl/zfs/tests/delegate/
H A Ddelegate_common.kshlib30 # Cleanup exist user/group.
66 # Verify the specified user have permission on the dataset
85 typeset user
86 for user in $@; do
91 check_fs_perm $user $perm $dtst
94 check_vol_perm $user $perm $dtst
99 log_note "Fail: $user should have $perm " \
110 # Verify the specified user have no permission on the dataset
129 typeset user
130 for user i
[all...]
/freebsd-current/lib/libpam/modules/pam_login_access/
H A Dpam_login_access.c72 const void *rhost, *tty, *user; local
76 pam_err = pam_get_item(pamh, PAM_USER, &user);
80 if (user == NULL)
83 PAM_LOG("Got user: %s", (const char *)user);
104 PAM_LOG("Checking login.access for user %s from host %s",
105 (const char *)user, (const char *)rhost);
106 if (login_access(user, rhost, &login_access_opts) != 0)
109 (const char *)user, (const char *)rhost);
111 PAM_LOG("Checking login.access for user
[all...]
/freebsd-current/usr.sbin/cron/cron/
H A Dfuncs.h32 job_add(entry *, user *),
33 do_command(entry *, user *),
34 link_user(cron_db *, user *),
35 unlink_user(cron_db *, user *),
36 free_user(user *),
64 user *load_user(int, struct passwd *, const char *),

Completed in 112 milliseconds

1234567891011>>