Searched refs:user (Results 1 - 25 of 1444) sorted by relevance

1234567891011>>

/netbsd-current/crypto/external/bsd/heimdal/dist/lib/roken/
H A Dget_default_username.c48 const char *user; local
50 user = getenv ("USER");
51 if (user == NULL)
52 user = getenv ("LOGNAME");
53 if (user == NULL)
54 user = getenv ("USERNAME");
57 if (user == NULL) {
58 user = (const char *)getlogin ();
59 if (user != NULL)
60 return user;
[all...]
H A Dk_getpwnam.c44 k_getpwnam (const char *user) argument
48 p = getpwnam (user);
54 spwd = getspnam (user);
H A Dinnetgr.c42 const char *user, const char *domain)
41 innetgr(const char *netgroup, const char *machine, const char *user, const char *domain) argument
/netbsd-current/external/bsd/kyua-cli/dist/utils/
H A Dpasswd.hpp42 /// Represents a system user.
43 class user { class in namespace:utils::passwd
45 /// The name of the user.
48 /// The system-wide identifier of the user.
51 /// The login group identifier for the user.
54 user(const std::string&, const unsigned int, const unsigned int);
60 user current_user(void);
61 user find_user_by_name(const std::string&);
62 user find_user_by_uid(const unsigned int);
63 void set_current_user_for_testing(const user
[all...]
H A Dpasswd_test.cpp49 const passwd_ns::user user("the-name", 1, 2);
50 ATF_REQUIRE_EQ("the-name", user.name);
51 ATF_REQUIRE_EQ(1, user.uid);
52 ATF_REQUIRE_EQ(2, user.gid);
59 const passwd_ns::user user("i-am-root", 0, 10);
60 ATF_REQUIRE(user.is_root());
67 const passwd_ns::user user("
75 const passwd_ns::user user = passwd_ns::current_user(); local
87 const passwd_ns::user user = passwd_ns::current_user(); local
99 const passwd_ns::user user = passwd_ns::find_user_by_name(pw->pw_name); local
123 const passwd_ns::user user = passwd_ns::find_user_by_name("myself1"); local
136 const passwd_ns::user user = passwd_ns::find_user_by_uid(::getuid()); local
155 const passwd_ns::user user = passwd_ns::find_user_by_uid(10); local
[all...]
H A Dpasswd.cpp52 static utils::optional< passwd_ns::user > fake_current_user;
56 static std::vector< passwd_ns::user > mock_users;
59 /// Formats a user for logging purposes.
61 /// \param user The user to format.
63 /// \return The user as a string.
65 format_user(const passwd_ns::user& user) argument
67 return F("name=%s, uid=%s, gid=%s") % user.name % user
79 passwd_ns::user::user(const std::string& name_, const unsigned int uid_, function in class:passwd_ns::user
[all...]
/netbsd-current/distrib/utils/embedded/files/
H A Dcreds_msdos32 # "sshkeyfile <user> <path on msdos>"
33 # "sshkey <user> <entry>"
34 # "useraddhash <user> <passwd hash>"
35 # "useradd <user> <passwd>"
55 local user="$1"
59 if ! id -u "${user}" > /dev/null 2>&1; then
60 useradd -m -G "${group}" "${user}" || fail "Useradd failed."
63 eval ssh_userdir=~"${user}/.ssh"
66 chown "${user}" "${ssh_userdir}"
72 local user
[all...]
/netbsd-current/crypto/external/bsd/netpgp/dist/doc/
H A DMakefile1 # Just do user doc for the moment.
2 all: doxy-user
4 doxy-user: doxygen-user.cfg
5 [ -d doxy-user ] || mkdir doxy-user
6 doxygen doxygen-user.cfg
13 rm -rf doxy-user doxy-dev
15 .PHONY: doxy-user doxy-dev
/netbsd-current/external/bsd/ppp/dist/pppd/
H A Dsession.h52 * const char* user :
56 * The password to validate the user with. May safely be null.
59 * The TTY the user is connected on. May safely be null.
69 session_start(const int flags, const char* user, const char* passwd, const char* tty, char** msg);
72 #define session_auth(user, pass, tty, msg) \
73 session_start(SESS_AUTH, user, pass, tty, msg)
75 #define session_check(user, pass, tty, msg) \
76 session_start(SESS_ACCT, user, pass, tty, msg)
78 #define session_full(user, pass, tty, msg) \
79 session_start(SESS_ALL, user, pas
[all...]
/netbsd-current/crypto/external/bsd/heimdal/dist/lib/gssapi/krb5/
H A Dauthorize_localname.c45 char *user; local
53 user = malloc(user_name->length + 1);
54 if (user == NULL) {
59 memcpy(user, user_name->value, user_name->length);
60 user[user_name->length] = '\0';
63 user_ok = krb5_kuserok(context, princ, user);
65 free(user);
/netbsd-current/external/bsd/atf/etc/atf/
H A Dcommon.conf8 # an unprivileged user to perform extra checks. Set this variable to
9 # the user you want to use in those cases. If not set, those tests will
11 unprivileged-user = "_tests"
/netbsd-current/sys/external/bsd/drm2/dist/drm/nouveau/nvif/
H A Dnouveau_nvif_user.c27 #include <nvif/user.h>
35 if (device->user.func) {
36 nvif_object_fini(&device->user.object);
37 device->user.func = NULL;
54 if (device->user.func)
62 &device->user.object);
66 nvif_object_map(&device->user.object, NULL, 0);
67 device->user.func = users[cid].func;
H A Dnouveau_nvif_userc361.c27 #include <nvif/user.h>
30 nvif_userc361_doorbell(struct nvif_user *user, u32 token) argument
32 nvif_wr32(&user->object, 0x90, token);
/netbsd-current/external/bsd/wpa/dist/src/ap/
H A Deap_user_db.c2 * hostapd / EAP user database
23 static void set_user_methods(struct hostapd_eap_user *user, const char *methods) argument
32 os_memset(&user->methods, 0, sizeof(user->methods));
39 user->methods[num_methods].method =
41 &user->methods[num_methods].vendor);
42 if (user->methods[num_methods].vendor == EAP_VENDOR_IETF &&
43 user->methods[num_methods].method == EAP_TYPE_NONE) {
45 user->ttls_auth |= EAP_TTLS_AUTH_PAP;
49 user
81 struct hostapd_eap_user *user = ctx; local
105 struct hostapd_eap_user *user = ctx; local
139 struct hostapd_eap_user *user = NULL; local
236 struct hostapd_eap_user *user = conf->eap_user; local
[all...]
/netbsd-current/external/bsd/tmux/dist/
H A Dserver-acl.c63 /* Find user entry. */
94 /* Allow a user. */
98 struct server_acl_user *user; local
100 user = server_acl_user_find(uid);
101 if (user == NULL) {
102 user = xcalloc(1, sizeof *user);
103 user->uid = uid;
104 RB_INSERT(server_acl_entries, &server_acl_entries, user);
108 /* Deny a user (remov
112 struct server_acl_user *user; local
125 struct server_acl_user *user; local
144 struct server_acl_user *user; local
166 struct server_acl_user *user; local
183 server_acl_get_uid(struct server_acl_user *user) argument
[all...]
/netbsd-current/usr.sbin/bootp/bootpd/
H A Dsyslog.conf9 # Note: Have to exclude user from most lines so that user.alert
10 # and user.emerg are not included, because old sendmails
13 # can remove all the special cases for "user" logging.
15 #*.err;kern.debug;auth.notice;user.none /dev/console
16 kern.debug;user,mail.crit;auth.notice /dev/console
19 #*.err;kern.debug;daemon,auth.notice;mail.crit;user.none /var/adm/messages
20 kern.debug;user,mail.crit;auth.notice /var/adm/messages
25 *.alert;kern.err;daemon.err;user.none operator
26 *.alert;user
[all...]
/netbsd-current/crypto/external/bsd/heimdal/dist/lib/krb5/
H A Dget_default_principal.c45 const char *user = getenv("USER"); local
46 if(user == NULL)
47 user = getenv("LOGNAME");
48 if(user == NULL)
49 user = getenv("USERNAME");
50 return user;
66 const char *user; local
73 user = getlogin();
74 if(user == NULL)
75 user
[all...]
/netbsd-current/lib/libpam/modules/pam_login_access/
H A Dpam_login_access.c64 const void *rhost, *tty, *user; local
68 pam_err = pam_get_item(pamh, PAM_USER, &user);
72 if (user == NULL)
75 PAM_LOG("Got user: %s", (const char *)user);
88 PAM_LOG("Checking login.access for user %s on tty %s",
89 (const char *)user, (const char *)tty);
90 if (login_access(user, tty) != 0)
93 (const char *)user, (const char *)tty);
95 PAM_LOG("Checking login.access for user
[all...]
/netbsd-current/external/mit/isl/dist/doc/
H A DMakefile.am6 user.tex \
21 user.tex: user.pod
23 manual.pdf: manual.tex user.tex $(srcdir)/implementation.tex reading.tex
29 user.html: user.pod
/netbsd-current/distrib/utils/libhack/
H A Dgetnetgr.c38 getnetgrent(host, user, domain)
40 const char **user;
47 innetgr(grp, host, user, domain)
48 const char *grp, *host, *user, *domain;
/netbsd-current/lib/libpanel/
H A Dgetuser.c40 return p->user;
/netbsd-current/crypto/external/bsd/heimdal/dist/lib/otp/
H A Dotp_challenge.c44 otp_challenge (OtpContext *ctx, char *user, char *str, size_t len) argument
51 ctx->user = strdup(user);
52 if (ctx->user == NULL) {
/netbsd-current/external/bsd/cron/dist/
H A Dfuncs.h34 job_add(entry *, user *, time_t),
35 job_remove(entry *, user *),
37 link_user(cron_db *, user *),
38 unlink_user(cron_db *, user *),
39 free_user(user *),
53 pid_t do_command(entry *, user *);
75 user *load_user(int, struct passwd *, const char *),
90 extern int cron_pam_start (const char *user);
/netbsd-current/external/mit/isl/dist/
H A Disl_tarjan.h37 isl_bool (*follows)(int i, int j, void *user), void *user);
39 int node, isl_bool (*follows)(int i, int j, void *user), void *user);
/netbsd-current/usr.sbin/user/
H A DMakefile10 PROG= user
11 SRCS+= user.c main.c
12 LINKS+= ${BINDIR}/user ${BINDIR}/useradd
13 LINKS+= ${BINDIR}/user ${BINDIR}/userdel
14 LINKS+= ${BINDIR}/user ${BINDIR}/usermod
15 LINKS+= ${BINDIR}/user ${BINDIR}/group
16 LINKS+= ${BINDIR}/user ${BINDIR}/groupadd
17 LINKS+= ${BINDIR}/user ${BINDIR}/groupdel
18 LINKS+= ${BINDIR}/user ${BINDIR}/groupmod
19 LINKS+= ${BINDIR}/user
[all...]

Completed in 436 milliseconds

1234567891011>>