HomeSort by: relevance | last modified time | path
    Searched refs:user (Results 1 - 25 of 1471) sorted by relevancy

1 2 3 4 5 6 7 8 91011>>

  /src/crypto/external/bsd/heimdal/dist/lib/roken/
get_default_username.c 48 const char *user; local
50 user = getenv ("USER");
51 if (user == NULL)
52 user = getenv ("LOGNAME");
53 if (user == NULL)
54 user = getenv ("USERNAME");
57 if (user == NULL) {
58 user = (const char *)getlogin ();
59 if (user != NULL
    [all...]
k_getpwnam.c 44 k_getpwnam (const char *user)
48 p = getpwnam (user);
54 spwd = getspnam (user);
innetgr.c 42 const char *user, const char *domain)
  /src/external/bsd/kyua-cli/dist/utils/
passwd.hpp 42 /// Represents a system user.
43 class user { class in namespace:utils::passwd
45 /// The name of the user.
48 /// The system-wide identifier of the user.
51 /// The login group identifier for the user.
54 user(const std::string&, const unsigned int, const unsigned int);
60 user current_user(void);
61 user find_user_by_name(const std::string&);
62 user find_user_by_uid(const unsigned int);
63 void set_current_user_for_testing(const user&)
    [all...]
passwd_test.cpp 49 const passwd_ns::user user("the-name", 1, 2);
50 ATF_REQUIRE_EQ("the-name", user.name);
51 ATF_REQUIRE_EQ(1, user.uid);
52 ATF_REQUIRE_EQ(2, user.gid);
59 const passwd_ns::user user("i-am-root", 0, 10);
60 ATF_REQUIRE(user.is_root());
67 const passwd_ns::user user("i-am-not-root", 123, 10)
75 const passwd_ns::user user = passwd_ns::current_user(); local
87 const passwd_ns::user user = passwd_ns::current_user(); local
99 const passwd_ns::user user = passwd_ns::find_user_by_name(pw->pw_name); local
123 const passwd_ns::user user = passwd_ns::find_user_by_name("myself1"); local
136 const passwd_ns::user user = passwd_ns::find_user_by_uid(::getuid()); local
155 const passwd_ns::user user = passwd_ns::find_user_by_uid(10); local
    [all...]
passwd.cpp 52 static utils::optional< passwd_ns::user > fake_current_user;
56 static std::vector< passwd_ns::user > mock_users;
59 /// Formats a user for logging purposes.
61 /// \param user The user to format.
63 /// \return The user as a string.
65 format_user(const passwd_ns::user& user)
67 return F("name=%s, uid=%s, gid=%s") % user.name % user.uid % user.gid
79 passwd_ns::user::user(const std::string& name_, const unsigned int uid_, function in class:passwd_ns::user
    [all...]
  /src/distrib/utils/embedded/files/
creds_msdos 32 # "sshkeyfile <user> <path on msdos>"
33 # "sshkey <user> <entry>"
34 # "useraddhash <user> <passwd hash>"
35 # "useradd <user> <passwd>"
55 local user="$1"
59 if ! id -u "${user}" > /dev/null 2>&1; then
60 useradd -m -G "${group}" "${user}" || fail "Useradd failed."
63 eval ssh_userdir=~"${user}/.ssh"
66 chown "${user}" "${ssh_userdir}"
72 local user="$1
    [all...]
  /src/external/ibm-public/postfix/dist/src/smtpd/
smtpd_check_dsn.in 39 mail user@4.1.1_dsn
40 mail user@4.1.2_dsn
41 mail user@4.1.3_dsn
42 mail user@4.1.4_dsn
43 mail user@4.1.5_dsn
44 mail user@4.1.6_dsn
45 mail user@4.1.7_dsn
46 mail user@4.1.8_dsn
47 mail user@4.4.0_dsn
52 rcpt user@4.1.1_ds
    [all...]
smtpd_dns_filter.in 19 mail user@spike.porcupine.org
23 mail user@spike.porcupine.org
24 rcpt user@spike.porcupine.org
28 mail user@spike.porcupine.org
29 rcpt user@spike.porcupine.org
32 mail user@spike.porcupine.org
33 rcpt user@spike.porcupine.org
44 mail user@xn--1xa.porcupine.org
46 mail user@nullmx.porcupine.org
48 mail user@nxdomain.porcupine.or
    [all...]
  /src/crypto/external/bsd/netpgp/dist/doc/
Makefile 1 # Just do user doc for the moment.
2 all: doxy-user
4 doxy-user: doxygen-user.cfg
5 [ -d doxy-user ] || mkdir doxy-user
6 doxygen doxygen-user.cfg
13 rm -rf doxy-user doxy-dev
15 .PHONY: doxy-user doxy-dev
  /src/crypto/external/bsd/heimdal/dist/lib/gssapi/krb5/
authorize_localname.c 45 char *user; local
53 user = malloc(user_name->length + 1);
54 if (user == NULL) {
59 memcpy(user, user_name->value, user_name->length);
60 user[user_name->length] = '\0';
63 user_ok = krb5_kuserok(context, princ, user);
65 free(user);
  /src/external/bsd/ppp/dist/pppd/
session.h 41 #define SESS_AUTH 1 /* Check User Authentication */
57 * const char* user :
61 * The password to validate the user with. May safely be null.
64 * The TTY the user is connected on. May safely be null.
74 session_start(const int flags, const char* user, const char* passwd, const char* tty, char** msg);
77 #define session_auth(user, pass, tty, msg) \
78 session_start(SESS_AUTH, user, pass, tty, msg)
80 #define session_check(user, pass, tty, msg) \
81 session_start(SESS_ACCT, user, pass, tty, msg)
83 #define session_full(user, pass, tty, msg)
    [all...]
  /src/sys/external/bsd/drm2/dist/drm/nouveau/nvif/
nouveau_nvif_user.c 27 #include <nvif/user.h>
35 if (device->user.func) {
36 nvif_object_fini(&device->user.object);
37 device->user.func = NULL;
54 if (device->user.func)
62 &device->user.object);
66 nvif_object_map(&device->user.object, NULL, 0);
67 device->user.func = users[cid].func;
nouveau_nvif_userc361.c 27 #include <nvif/user.h>
30 nvif_userc361_doorbell(struct nvif_user *user, u32 token)
32 nvif_wr32(&user->object, 0x90, token);
  /src/external/bsd/atf/etc/atf/
common.conf 8 # an unprivileged user to perform extra checks. Set this variable to
9 # the user you want to use in those cases. If not set, those tests will
11 unprivileged-user = "_tests"
  /src/external/bsd/wpa/dist/src/ap/
eap_user_db.c 2 * hostapd / EAP user database
23 static void set_user_methods(struct hostapd_eap_user *user, const char *methods)
32 os_memset(&user->methods, 0, sizeof(user->methods));
39 user->methods[num_methods].method =
41 &user->methods[num_methods].vendor);
42 if (user->methods[num_methods].vendor == EAP_VENDOR_IETF &&
43 user->methods[num_methods].method == EAP_TYPE_NONE) {
45 user->ttls_auth |= EAP_TTLS_AUTH_PAP;
49 user->ttls_auth |= EAP_TTLS_AUTH_CHAP
81 struct hostapd_eap_user *user = ctx; local
105 struct hostapd_eap_user *user = ctx; local
139 struct hostapd_eap_user *user = NULL; local
236 struct hostapd_eap_user *user = conf->eap_user; local
    [all...]
  /src/external/bsd/tmux/dist/
server-acl.c 63 /* Find user entry. */
94 /* Allow a user. */
98 struct server_acl_user *user; local
100 user = server_acl_user_find(uid);
101 if (user == NULL) {
102 user = xcalloc(1, sizeof *user);
103 user->uid = uid;
104 RB_INSERT(server_acl_entries, &server_acl_entries, user);
108 /* Deny a user (remove from the tree). *
112 struct server_acl_user *user; local
125 struct server_acl_user *user; local
144 struct server_acl_user *user; local
166 struct server_acl_user *user; local
    [all...]
  /src/usr.sbin/bootp/bootpd/
syslog.conf 9 # Note: Have to exclude user from most lines so that user.alert
10 # and user.emerg are not included, because old sendmails
13 # can remove all the special cases for "user" logging.
15 #*.err;kern.debug;auth.notice;user.none /dev/console
16 kern.debug;user,mail.crit;auth.notice /dev/console
19 #*.err;kern.debug;daemon,auth.notice;mail.crit;user.none /var/adm/messages
20 kern.debug;user,mail.crit;auth.notice /var/adm/messages
25 *.alert;kern.err;daemon.err;user.none operator
26 *.alert;user.none roo
    [all...]
  /src/crypto/external/bsd/heimdal/dist/lib/krb5/
get_default_principal.c 45 const char *user = getenv("USER"); local
46 if(user == NULL)
47 user = getenv("LOGNAME");
48 if(user == NULL)
49 user = getenv("USERNAME");
50 return user;
66 const char *user; local
73 user = getlogin();
74 if(user == NULL
    [all...]
  /src/lib/libpam/modules/pam_login_access/
pam_login_access.c 64 const void *rhost, *tty, *user; local
68 pam_err = pam_get_item(pamh, PAM_USER, &user);
72 if (user == NULL)
75 PAM_LOG("Got user: %s", (const char *)user);
88 PAM_LOG("Checking login.access for user %s on tty %s",
89 (const char *)user, (const char *)tty);
90 if (login_access(user, tty) != 0)
93 (const char *)user, (const char *)tty);
95 PAM_LOG("Checking login.access for user %s from host %s"
    [all...]
  /src/distrib/utils/libhack/
getnetgr.c 38 getnetgrent(host, user, domain)
40 const char **user;
47 innetgr(grp, host, user, domain)
48 const char *grp, *host, *user, *domain;
  /src/lib/libpanel/
getuser.c 40 return p->user;
  /src/crypto/external/bsd/heimdal/dist/lib/otp/
otp_challenge.c 44 otp_challenge (OtpContext *ctx, char *user, char *str, size_t len)
51 ctx->user = strdup(user);
52 if (ctx->user == NULL) {
  /src/external/bsd/cron/dist/
funcs.h 34 job_add(entry *, user *, time_t),
35 job_remove(entry *, user *),
37 link_user(cron_db *, user *),
38 unlink_user(cron_db *, user *),
39 free_user(user *),
53 pid_t do_command(entry *, user *);
75 user *load_user(int, struct passwd *, const char *),
90 extern int cron_pam_start (const char *user);
  /src/external/mit/isl/dist/
isl_tarjan.h 37 isl_bool (*follows)(int i, int j, void *user), void *user);
39 int node, isl_bool (*follows)(int i, int j, void *user), void *user);

Completed in 122 milliseconds

1 2 3 4 5 6 7 8 91011>>