/macosx-10.10.1/apache-793/httpd/modules/arch/unix/ |
H A D | mod_unixd.c | 64 uid_t user_id; 182 setuid(ap_unixd_config.user_id) == -1)) { 186 (long) ap_unixd_config.user_id); 216 ap_unixd_config.user_id = ap_uname2id(arg); 218 if (ap_unixd_config.user_id == 0) { 293 ap_unixd_config.user_id = ap_uname2id(DEFAULT_USER); 356 setuid(ap_unixd_config.user_id) == -1)) { 359 (long) ap_unixd_config.user_id); 378 apr_uid_t uid = ap_unixd_config.user_id;
|
H A D | mod_privileges.c | 156 if (cfg->uid && (setuid(ap_unixd_config.user_id) == -1)) {
|
/macosx-10.10.1/apache-793/httpd/os/unix/ |
H A D | unixd.h | 77 uid_t user_id; member in struct:__anon6109
|
H A D | unixd.c | 247 buf.sem_perm.uid = ap_unixd_config.user_id; 263 if (chown(lockfile, ap_unixd_config.user_id,
|
/macosx-10.10.1/ipsec-286.1.1/ipsec-tools/racoon/ |
H A D | localconf.h | 86 vchar_t *user_id; member in struct:bound_addr
|
H A D | oakley.c | 1263 vchar_t *user_id; local 1267 user_id = eay_get_x509_common_name(&p->cert); //%%%%%%%% fix this 1268 if (user_id) { 1270 // the following functions will check if user_id == 0 1271 if (open_dir_authorize_id(user_id, iph1->rmconf->open_dir_auth_group)) { 1272 vfree(user_id); 1275 vfree(user_id);
|
/macosx-10.10.1/emacs-93/emacs/lib-src/ |
H A D | update-game-score.c | 190 char *user_id, *scorefile, *prefix, *user_prefix = NULL; local 238 user_id = get_user_id (); 239 if (user_id == NULL) 253 push_score (&scores, &scorecount, newscore, user_id, newdata);
|
/macosx-10.10.1/SmartCardServices-55111/src/PCSC/ |
H A D | winscard_msg.cpp | 537 msgStruct.user_id = SYS_GetUID(); 623 msg->user_id = htonl(msg->user_id); 646 msg->user_id = ntohl(msg->user_id);
|
H A D | winscard_msg.h | 79 uint32_t user_id; member in struct:rxSharedSegment
|
/macosx-10.10.1/Heimdal-398.1.2/lib/krb5/ |
H A D | krb5-private.h | 417 const char *user_id, 665 const char *user_id, 696 const char *user_id,
|
H A D | pkinit.c | 1853 const char *user_id, 1882 if (user_id) { 1906 ret = hx509_certs_init(context->hx509ctx, user_id, 0, lock, &id->certs); 2344 const char *user_id, 2353 return krb5_get_init_creds_opt_set_pkinit(context, opt, principal, user_id, x509_anchors, pool, pki_revoke, flags, prompter, prompter_data, password); 2360 const char *user_id, 2420 user_id, 2556 const char *user_id, 2561 return krb5_pk_enterprise_cert(context, user_id, realm, principal, res); 2571 const char *user_id, 1851 _krb5_pk_load_id(krb5_context context, struct krb5_pk_identity **ret_id, const char *user_id, const char *anchor_id, char * const *chain_list, char * const *revoke_list, krb5_prompter_fct prompter, void *prompter_data, char *password) argument 2341 _krb5_get_init_creds_opt_set_pkinit_user_cert(krb5_context context, krb5_get_init_creds_opt *opt, krb5_principal principal, const char *user_id, const char *x509_anchors, char * const * pool, char * const * pki_revoke, int flags, krb5_prompter_fct prompter, void *prompter_data, char *password) argument 2357 krb5_get_init_creds_opt_set_pkinit(krb5_context context, krb5_get_init_creds_opt *opt, krb5_principal principal, const char *user_id, const char *x509_anchors, char * const * pool, char * const * pki_revoke, int flags, krb5_prompter_fct prompter, void *prompter_data, char *password) argument 2555 _krb5_pk_enterprise_cert(krb5_context context, const char *user_id, krb5_const_realm realm, krb5_principal *principal, struct hx509_cert_data **res) argument 2570 krb5_pk_enterprise_cert(krb5_context context, const char *user_id, krb5_const_realm realm, krb5_principal *principal, struct hx509_cert_data **res) argument [all...] |
H A D | krb5-protos.h | 4518 const char *user_id, 6302 const char *user_id,
|
/macosx-10.10.1/vim-55/runtime/syntax/ |
H A D | stp.vim | 62 syn keyword stpFunction user_id user_name valid_name valid_user message
|
H A D | sqlanywhere.vim | 51 syn keyword sqlFunction user_id str stuff char_length nullif
|
/macosx-10.10.1/apache-793/httpd/modules/cache/ |
H A D | mod_socache_dbm.c | 104 if (-1 == chown(name, ap_unixd_config.user_id,
|
/macosx-10.10.1/apache-793/httpd/modules/slotmem/ |
H A D | mod_slotmem_shm.c | 108 shmbuf.shm_perm.uid = ap_unixd_config.user_id;
|
/macosx-10.10.1/Heimdal-398.1.2/kdc/ |
H A D | pkinit.c | 2124 const char *user_id, 2145 user_id, 2122 krb5_kdc_pk_initialize(krb5_context context, krb5_kdc_configuration *config, const char *user_id, const char *anchors, char **pool, char **revoke_list) argument
|
/macosx-10.10.1/apache-793/httpd/modules/generators/ |
H A D | mod_cgid.c | 647 if (chown(sockname, ap_unixd_config.user_id, -1) < 0) {
|
/macosx-10.10.1/xnu-2782.1.97/bsd/nfs/ |
H A D | nfs_socket.c | 6192 uid_t user_id; local 6202 user_id = group_id = -2; 6265 nfsm_chain_get_32(error, nmreq, user_id); 6289 temp_pcred.cr_uid = user_id;
|
/macosx-10.10.1/emacs-93/emacs/lisp/progmodes/ |
H A D | sql.el | 1486 "user_id" "user_name" "var" "varp" "year"
|