| /src/crypto/external/bsd/heimdal/dist/lib/roken/ |
| get_default_username.c | 48 const char *user; local 50 user = getenv ("USER"); 51 if (user == NULL) 52 user = getenv ("LOGNAME"); 53 if (user == NULL) 54 user = getenv ("USERNAME"); 57 if (user == NULL) { 58 user = (const char *)getlogin (); 59 if (user != NULL [all...] |
| /src/external/bsd/atf/dist/tools/ |
| user.hpp | 40 namespace user { namespace in namespace:tools 49 } // namespace user
|
| /src/crypto/external/bsd/heimdal/dist/lib/gssapi/krb5/ |
| authorize_localname.c | 45 char *user; local 53 user = malloc(user_name->length + 1); 54 if (user == NULL) { 59 memcpy(user, user_name->value, user_name->length); 60 user[user_name->length] = '\0'; 63 user_ok = krb5_kuserok(context, princ, user); 65 free(user);
|
| /src/libexec/httpd/ |
| tilde-luzah-bozo.c | 33 /* this code implements ~user support for bozohttpd */ 50 * - chdir's /~user/public_html 55 * transform_request() is supposed to check that we have user support 62 char *s, *file = NULL, *user; local 66 user = strchr(request->hr_file + 1, '~'); 69 assert(user != NULL); 71 user++; 73 if ((s = strchr(user, '/')) != NULL) { 77 debug((httpd, DEBUG_OBESE, "looking for user %s", 78 user)); [all...] |
| /src/sys/external/bsd/drm2/dist/drm/nouveau/nvkm/engine/disp/ |
| nouveau_nvkm_engine_disp_dmacgp102.c | 39 int user = chan->chid.user; local 54 nvkm_error(subdev, "ch %d init: %08x\n", user, 67 .user = nv50_disp_chan_user,
|
| nouveau_nvkm_engine_disp_dmacgf119.c | 39 chan->chid.user, -9, handle, 40 chan->chid.user << 27 | 0x00000001); 49 int user = chan->chid.user; local 58 nvkm_error(subdev, "ch %d fini: %08x\n", user, 69 int user = chan->chid.user; local 84 nvkm_error(subdev, "ch %d init: %08x\n", user, 97 .user = nv50_disp_chan_user,
|
| nouveau_nvkm_engine_disp_piocgf119.c | 41 int user = chan->chid.user; local 48 nvkm_error(subdev, "ch %d fini: %08x\n", user, 60 int user = chan->chid.user; local 69 nvkm_error(subdev, "ch %d init: %08x\n", user, 82 .user = nv50_disp_chan_user,
|
| nouveau_nvkm_engine_disp_piocnv50.c | 41 int user = chan->chid.user; local 48 nvkm_error(subdev, "ch %d timeout: %08x\n", user, 60 int user = chan->chid.user; local 67 nvkm_error(subdev, "ch %d timeout0: %08x\n", user, 78 nvkm_error(subdev, "ch %d timeout1: %08x\n", user, 91 .user = nv50_disp_chan_user,
|
| nouveau_nvkm_engine_disp_dmacnv50.c | 79 chan->chid.user, -10, handle, 80 chan->chid.user << 28 | 81 chan->chid.user); 90 int user = chan->chid.user; local 99 nvkm_error(subdev, "ch %d fini timeout, %08x\n", user, 110 int user = chan->chid.user; local 125 nvkm_error(subdev, "ch %d init timeout, %08x\n", user, 138 .user = nv50_disp_chan_user [all...] |
| /src/external/bsd/kyua-cli/dist/utils/ |
| passwd.hpp | 42 /// Represents a system user. 43 class user { class in namespace:utils::passwd 45 /// The name of the user. 48 /// The system-wide identifier of the user. 51 /// The login group identifier for the user. 54 user(const std::string&, const unsigned int, const unsigned int); 60 user current_user(void); 61 user find_user_by_name(const std::string&); 62 user find_user_by_uid(const unsigned int); 63 void set_current_user_for_testing(const user&) [all...] |
| /src/external/mit/isl/dist/ |
| isl_output_private.h | 8 * user is set by the caller of print_space and may be used inside print_dim. 19 void *user; member in struct:isl_print_space_data
|
| isl_id_private.h | 16 /* Represent a name and/or user pointer. 18 * If "free_user" is set, then it will be called on "user" when 26 void *user; member in struct:isl_id 29 __isl_give void (*free_user)(void *user);
|
| /src/lib/libpam/modules/pam_login_access/ |
| pam_login_access.c | 64 const void *rhost, *tty, *user; local 68 pam_err = pam_get_item(pamh, PAM_USER, &user); 72 if (user == NULL) 75 PAM_LOG("Got user: %s", (const char *)user); 88 PAM_LOG("Checking login.access for user %s on tty %s", 89 (const char *)user, (const char *)tty); 90 if (login_access(user, tty) != 0) 93 (const char *)user, (const char *)tty); 95 PAM_LOG("Checking login.access for user %s from host %s" [all...] |
| /src/lib/libpam/modules/pam_skey/ |
| pam_skey.c | 57 const char *user, *skinfo, *pass; local 63 user = getlogin(); 65 retval = pam_get_user(pamh, &user, NULL); 68 PAM_LOG("Got user: %s", user); 71 if (skey_haskey(user) != 0) 74 skinfo = skey_keyinfo(user); 93 retval = skey_passcheck(user, response) == -1 ?
|
| /src/usr.bin/innetgr/ |
| innetgr.c | 45 "usage: %s [-v] [-d domain] [-h host] [-u user] netgroup\n", 54 char *user = NULL; local 61 user = optarg; 80 ok = innetgr(argv[optind], host, user, domain);
|
| /src/crypto/external/bsd/heimdal/dist/lib/gssapi/ntlm/ |
| iter_cred.c | 66 char *user = NULL, *domain = NULL; local 74 ret = krb5_ret_stringz(response, &user); 78 free(user); 84 free(user); 88 dn->username = user;
|
| /src/external/bsd/am-utils/dist/amd/ |
| info_passwd.c | 107 * /anydir/dom1/dom2/dom3/user 110 * rfs:=/anydir/dom3;rhost:=dom3.dom2.dom1;sublink:=user 114 * var2:=pw-user:=user 115 * var3:=pw-home:=/anydir/dom1/dom2/dom3/user 120 char *user; local 127 * Find user name. If no / then Invalid... 129 user = strrchr(dir, '/'); 130 if (!user) 132 *user++ = '\0' [all...] |
| /src/external/bsd/tmux/dist/ |
| cmd-server-access.c | 41 .usage = "[-adlrw] " CMD_TARGET_PANE_USAGE " [user]", 51 struct server_acl_user *user; local 54 if ((user = server_acl_user_find(pw->pw_uid)) == NULL) { 55 cmdq_error(item, "user %s not found", pw->pw_name); 60 if (uid == server_acl_get_uid(user)) { 84 cmdq_error(item, "missing user argument"); 92 cmdq_error(item, "unknown user: %s", name); 116 cmdq_error(item, "user %s is already added", 123 /* -r or -w implies -a if user does not exist. */ 130 cmdq_error(item, "user %s not found", pw->pw_name) [all...] |
| /src/lib/libpam/modules/pam_chroot/ |
| pam_chroot.c | 62 const char *dir, *end, *cwd, *user; local 67 if (pam_get_user(pamh, &user, NULL) != PAM_SUCCESS || 68 user == NULL || 69 getpwnam_r(user, &pwres, pwbuf, sizeof(pwbuf), &pwd) != 0 || 80 "%s's home directory is too long", user); 91 "%s has no chroot directory", user); 97 openpam_log(PAM_LOG_DEBUG, "chrooting %s to %s", dir, user);
|
| /src/lib/libpam/modules/pam_deny/ |
| pam_deny.c | 52 const char *user; local 55 if ((r = pam_get_user(pamh, &user, NULL)) != PAM_SUCCESS)
|
| /src/lib/libpam/modules/pam_guest/ |
| pam_guest.c | 78 const char *authtok, *guests, *user; local 82 if (pam_get_user(pamh, &user, NULL) != PAM_SUCCESS || user == NULL) 90 is_guest = lookup(user, guests); 98 strcmp(user, authtok) != 0) 106 pam_setenv(pamh, "GUEST", user, 1);
|
| /src/lib/libpam/modules/pam_permit/ |
| pam_permit.c | 50 const char *user; local 53 if ((r = pam_get_user(pamh, &user, NULL)) != PAM_SUCCESS)
|
| /src/lib/libpam/modules/pam_rhosts/ |
| pam_rhosts.c | 63 const char *user; local 68 err = pam_get_user(pamh, &user, NULL); 72 if (getpwnam_r(user, &pwres, pwbuf, sizeof(pwbuf), &pwd) != 0 || 87 superuser = (strcmp(user, "root") == 0); 88 err = ruserok(rhost, superuser, ruser, user);
|
| /src/lib/libpam/modules/pam_securetty/ |
| pam_securetty.c | 67 const char *user; local 74 pam_err = pam_get_user(pamh, &user, NULL); 77 if (user == NULL || 78 getpwnam_r(user, &pwres, pwbuf, sizeof(pwbuf), &pwd) != 0 || 82 PAM_LOG("Got user: %s", user); 84 /* If the user is not root, secure ttys do not apply */
|
| /src/libexec/rexecd/unit-tests/ |
| rexec.c | 51 char *user = __UNCONST("root"); local 62 user = optarg; 77 if ((s = rexec(&host, sv->s_port, user, pass, cmd, NULL)) == -1) 89 (void)fprintf(stderr, "Usage: %s [-u <user>] [-p <password>]"
|