/netbsd-current/crypto/external/bsd/heimdal/dist/lib/roken/ |
H A D | get_default_username.c | 48 const char *user; local 50 user = getenv ("USER"); 51 if (user == NULL) 52 user = getenv ("LOGNAME"); 53 if (user == NULL) 54 user = getenv ("USERNAME"); 57 if (user == NULL) { 58 user = (const char *)getlogin (); 59 if (user != NULL) 60 return user; [all...] |
H A D | k_getpwnam.c | 44 k_getpwnam (const char *user) argument 48 p = getpwnam (user); 54 spwd = getspnam (user);
|
H A D | innetgr.c | 42 const char *user, const char *domain) 41 innetgr(const char *netgroup, const char *machine, const char *user, const char *domain) argument
|
/netbsd-current/external/bsd/kyua-cli/dist/utils/ |
H A D | passwd.hpp | 42 /// Represents a system user. 43 class user { class in namespace:utils::passwd 45 /// The name of the user. 48 /// The system-wide identifier of the user. 51 /// The login group identifier for the user. 54 user(const std::string&, const unsigned int, const unsigned int); 60 user current_user(void); 61 user find_user_by_name(const std::string&); 62 user find_user_by_uid(const unsigned int); 63 void set_current_user_for_testing(const user [all...] |
H A D | passwd_test.cpp | 49 const passwd_ns::user user("the-name", 1, 2); 50 ATF_REQUIRE_EQ("the-name", user.name); 51 ATF_REQUIRE_EQ(1, user.uid); 52 ATF_REQUIRE_EQ(2, user.gid); 59 const passwd_ns::user user("i-am-root", 0, 10); 60 ATF_REQUIRE(user.is_root()); 67 const passwd_ns::user user(" 75 const passwd_ns::user user = passwd_ns::current_user(); local 87 const passwd_ns::user user = passwd_ns::current_user(); local 99 const passwd_ns::user user = passwd_ns::find_user_by_name(pw->pw_name); local 123 const passwd_ns::user user = passwd_ns::find_user_by_name("myself1"); local 136 const passwd_ns::user user = passwd_ns::find_user_by_uid(::getuid()); local 155 const passwd_ns::user user = passwd_ns::find_user_by_uid(10); local [all...] |
H A D | passwd.cpp | 52 static utils::optional< passwd_ns::user > fake_current_user; 56 static std::vector< passwd_ns::user > mock_users; 59 /// Formats a user for logging purposes. 61 /// \param user The user to format. 63 /// \return The user as a string. 65 format_user(const passwd_ns::user& user) argument 67 return F("name=%s, uid=%s, gid=%s") % user.name % user 79 passwd_ns::user::user(const std::string& name_, const unsigned int uid_, function in class:passwd_ns::user [all...] |
/netbsd-current/distrib/utils/embedded/files/ |
H A D | creds_msdos | 32 # "sshkeyfile <user> <path on msdos>" 33 # "sshkey <user> <entry>" 34 # "useraddhash <user> <passwd hash>" 35 # "useradd <user> <passwd>" 55 local user="$1" 59 if ! id -u "${user}" > /dev/null 2>&1; then 60 useradd -m -G "${group}" "${user}" || fail "Useradd failed." 63 eval ssh_userdir=~"${user}/.ssh" 66 chown "${user}" "${ssh_userdir}" 72 local user [all...] |
/netbsd-current/crypto/external/bsd/netpgp/dist/doc/ |
H A D | Makefile | 1 # Just do user doc for the moment. 2 all: doxy-user 4 doxy-user: doxygen-user.cfg 5 [ -d doxy-user ] || mkdir doxy-user 6 doxygen doxygen-user.cfg 13 rm -rf doxy-user doxy-dev 15 .PHONY: doxy-user doxy-dev
|
/netbsd-current/external/bsd/ppp/dist/pppd/ |
H A D | session.h | 52 * const char* user : 56 * The password to validate the user with. May safely be null. 59 * The TTY the user is connected on. May safely be null. 69 session_start(const int flags, const char* user, const char* passwd, const char* tty, char** msg); 72 #define session_auth(user, pass, tty, msg) \ 73 session_start(SESS_AUTH, user, pass, tty, msg) 75 #define session_check(user, pass, tty, msg) \ 76 session_start(SESS_ACCT, user, pass, tty, msg) 78 #define session_full(user, pass, tty, msg) \ 79 session_start(SESS_ALL, user, pas [all...] |
/netbsd-current/crypto/external/bsd/heimdal/dist/lib/gssapi/krb5/ |
H A D | authorize_localname.c | 45 char *user; local 53 user = malloc(user_name->length + 1); 54 if (user == NULL) { 59 memcpy(user, user_name->value, user_name->length); 60 user[user_name->length] = '\0'; 63 user_ok = krb5_kuserok(context, princ, user); 65 free(user);
|
/netbsd-current/external/bsd/atf/etc/atf/ |
H A D | common.conf | 8 # an unprivileged user to perform extra checks. Set this variable to 9 # the user you want to use in those cases. If not set, those tests will 11 unprivileged-user = "_tests"
|
/netbsd-current/sys/external/bsd/drm2/dist/drm/nouveau/nvif/ |
H A D | nouveau_nvif_user.c | 27 #include <nvif/user.h> 35 if (device->user.func) { 36 nvif_object_fini(&device->user.object); 37 device->user.func = NULL; 54 if (device->user.func) 62 &device->user.object); 66 nvif_object_map(&device->user.object, NULL, 0); 67 device->user.func = users[cid].func;
|
H A D | nouveau_nvif_userc361.c | 27 #include <nvif/user.h> 30 nvif_userc361_doorbell(struct nvif_user *user, u32 token) argument 32 nvif_wr32(&user->object, 0x90, token);
|
/netbsd-current/external/bsd/wpa/dist/src/ap/ |
H A D | eap_user_db.c | 2 * hostapd / EAP user database 23 static void set_user_methods(struct hostapd_eap_user *user, const char *methods) argument 32 os_memset(&user->methods, 0, sizeof(user->methods)); 39 user->methods[num_methods].method = 41 &user->methods[num_methods].vendor); 42 if (user->methods[num_methods].vendor == EAP_VENDOR_IETF && 43 user->methods[num_methods].method == EAP_TYPE_NONE) { 45 user->ttls_auth |= EAP_TTLS_AUTH_PAP; 49 user 81 struct hostapd_eap_user *user = ctx; local 105 struct hostapd_eap_user *user = ctx; local 139 struct hostapd_eap_user *user = NULL; local 236 struct hostapd_eap_user *user = conf->eap_user; local [all...] |
/netbsd-current/external/bsd/tmux/dist/ |
H A D | server-acl.c | 63 /* Find user entry. */ 94 /* Allow a user. */ 98 struct server_acl_user *user; local 100 user = server_acl_user_find(uid); 101 if (user == NULL) { 102 user = xcalloc(1, sizeof *user); 103 user->uid = uid; 104 RB_INSERT(server_acl_entries, &server_acl_entries, user); 108 /* Deny a user (remov 112 struct server_acl_user *user; local 125 struct server_acl_user *user; local 144 struct server_acl_user *user; local 166 struct server_acl_user *user; local 183 server_acl_get_uid(struct server_acl_user *user) argument [all...] |
/netbsd-current/usr.sbin/bootp/bootpd/ |
H A D | syslog.conf | 9 # Note: Have to exclude user from most lines so that user.alert 10 # and user.emerg are not included, because old sendmails 13 # can remove all the special cases for "user" logging. 15 #*.err;kern.debug;auth.notice;user.none /dev/console 16 kern.debug;user,mail.crit;auth.notice /dev/console 19 #*.err;kern.debug;daemon,auth.notice;mail.crit;user.none /var/adm/messages 20 kern.debug;user,mail.crit;auth.notice /var/adm/messages 25 *.alert;kern.err;daemon.err;user.none operator 26 *.alert;user [all...] |
/netbsd-current/crypto/external/bsd/heimdal/dist/lib/krb5/ |
H A D | get_default_principal.c | 45 const char *user = getenv("USER"); local 46 if(user == NULL) 47 user = getenv("LOGNAME"); 48 if(user == NULL) 49 user = getenv("USERNAME"); 50 return user; 66 const char *user; local 73 user = getlogin(); 74 if(user == NULL) 75 user [all...] |
/netbsd-current/lib/libpam/modules/pam_login_access/ |
H A D | pam_login_access.c | 64 const void *rhost, *tty, *user; local 68 pam_err = pam_get_item(pamh, PAM_USER, &user); 72 if (user == NULL) 75 PAM_LOG("Got user: %s", (const char *)user); 88 PAM_LOG("Checking login.access for user %s on tty %s", 89 (const char *)user, (const char *)tty); 90 if (login_access(user, tty) != 0) 93 (const char *)user, (const char *)tty); 95 PAM_LOG("Checking login.access for user [all...] |
/netbsd-current/external/mit/isl/dist/doc/ |
H A D | Makefile.am | 6 user.tex \ 21 user.tex: user.pod 23 manual.pdf: manual.tex user.tex $(srcdir)/implementation.tex reading.tex 29 user.html: user.pod
|
/netbsd-current/distrib/utils/libhack/ |
H A D | getnetgr.c | 38 getnetgrent(host, user, domain) 40 const char **user; 47 innetgr(grp, host, user, domain) 48 const char *grp, *host, *user, *domain;
|
/netbsd-current/lib/libpanel/ |
H A D | getuser.c | 40 return p->user;
|
/netbsd-current/crypto/external/bsd/heimdal/dist/lib/otp/ |
H A D | otp_challenge.c | 44 otp_challenge (OtpContext *ctx, char *user, char *str, size_t len) argument 51 ctx->user = strdup(user); 52 if (ctx->user == NULL) {
|
/netbsd-current/external/bsd/cron/dist/ |
H A D | funcs.h | 34 job_add(entry *, user *, time_t), 35 job_remove(entry *, user *), 37 link_user(cron_db *, user *), 38 unlink_user(cron_db *, user *), 39 free_user(user *), 53 pid_t do_command(entry *, user *); 75 user *load_user(int, struct passwd *, const char *), 90 extern int cron_pam_start (const char *user);
|
/netbsd-current/external/mit/isl/dist/ |
H A D | isl_tarjan.h | 37 isl_bool (*follows)(int i, int j, void *user), void *user); 39 int node, isl_bool (*follows)(int i, int j, void *user), void *user);
|
/netbsd-current/usr.sbin/user/ |
H A D | Makefile | 10 PROG= user 11 SRCS+= user.c main.c 12 LINKS+= ${BINDIR}/user ${BINDIR}/useradd 13 LINKS+= ${BINDIR}/user ${BINDIR}/userdel 14 LINKS+= ${BINDIR}/user ${BINDIR}/usermod 15 LINKS+= ${BINDIR}/user ${BINDIR}/group 16 LINKS+= ${BINDIR}/user ${BINDIR}/groupadd 17 LINKS+= ${BINDIR}/user ${BINDIR}/groupdel 18 LINKS+= ${BINDIR}/user ${BINDIR}/groupmod 19 LINKS+= ${BINDIR}/user [all...] |