HomeSort by: relevance | last modified time | path
    Searched defs:user (Results 1 - 25 of 319) sorted by relevancy

1 2 3 4 5 6 7 8 91011>>

  /src/crypto/external/bsd/heimdal/dist/lib/roken/
get_default_username.c 48 const char *user; local
50 user = getenv ("USER");
51 if (user == NULL)
52 user = getenv ("LOGNAME");
53 if (user == NULL)
54 user = getenv ("USERNAME");
57 if (user == NULL) {
58 user = (const char *)getlogin ();
59 if (user != NULL
    [all...]
  /src/external/bsd/atf/dist/tools/
user.hpp 40 namespace user { namespace in namespace:tools
49 } // namespace user
  /src/crypto/external/bsd/heimdal/dist/lib/gssapi/krb5/
authorize_localname.c 45 char *user; local
53 user = malloc(user_name->length + 1);
54 if (user == NULL) {
59 memcpy(user, user_name->value, user_name->length);
60 user[user_name->length] = '\0';
63 user_ok = krb5_kuserok(context, princ, user);
65 free(user);
  /src/libexec/httpd/
tilde-luzah-bozo.c 33 /* this code implements ~user support for bozohttpd */
50 * - chdir's /~user/public_html
55 * transform_request() is supposed to check that we have user support
62 char *s, *file = NULL, *user; local
66 user = strchr(request->hr_file + 1, '~');
69 assert(user != NULL);
71 user++;
73 if ((s = strchr(user, '/')) != NULL) {
77 debug((httpd, DEBUG_OBESE, "looking for user %s",
78 user));
    [all...]
  /src/sys/external/bsd/drm2/dist/drm/nouveau/nvkm/engine/disp/
nouveau_nvkm_engine_disp_dmacgp102.c 39 int user = chan->chid.user; local
54 nvkm_error(subdev, "ch %d init: %08x\n", user,
67 .user = nv50_disp_chan_user,
nouveau_nvkm_engine_disp_dmacgf119.c 39 chan->chid.user, -9, handle,
40 chan->chid.user << 27 | 0x00000001);
49 int user = chan->chid.user; local
58 nvkm_error(subdev, "ch %d fini: %08x\n", user,
69 int user = chan->chid.user; local
84 nvkm_error(subdev, "ch %d init: %08x\n", user,
97 .user = nv50_disp_chan_user,
nouveau_nvkm_engine_disp_piocgf119.c 41 int user = chan->chid.user; local
48 nvkm_error(subdev, "ch %d fini: %08x\n", user,
60 int user = chan->chid.user; local
69 nvkm_error(subdev, "ch %d init: %08x\n", user,
82 .user = nv50_disp_chan_user,
nouveau_nvkm_engine_disp_piocnv50.c 41 int user = chan->chid.user; local
48 nvkm_error(subdev, "ch %d timeout: %08x\n", user,
60 int user = chan->chid.user; local
67 nvkm_error(subdev, "ch %d timeout0: %08x\n", user,
78 nvkm_error(subdev, "ch %d timeout1: %08x\n", user,
91 .user = nv50_disp_chan_user,
nouveau_nvkm_engine_disp_dmacnv50.c 79 chan->chid.user, -10, handle,
80 chan->chid.user << 28 |
81 chan->chid.user);
90 int user = chan->chid.user; local
99 nvkm_error(subdev, "ch %d fini timeout, %08x\n", user,
110 int user = chan->chid.user; local
125 nvkm_error(subdev, "ch %d init timeout, %08x\n", user,
138 .user = nv50_disp_chan_user
    [all...]
  /src/external/bsd/kyua-cli/dist/utils/
passwd.hpp 42 /// Represents a system user.
43 class user { class in namespace:utils::passwd
45 /// The name of the user.
48 /// The system-wide identifier of the user.
51 /// The login group identifier for the user.
54 user(const std::string&, const unsigned int, const unsigned int);
60 user current_user(void);
61 user find_user_by_name(const std::string&);
62 user find_user_by_uid(const unsigned int);
63 void set_current_user_for_testing(const user&)
    [all...]
  /src/external/mit/isl/dist/
isl_output_private.h 8 * user is set by the caller of print_space and may be used inside print_dim.
19 void *user; member in struct:isl_print_space_data
isl_id_private.h 16 /* Represent a name and/or user pointer.
18 * If "free_user" is set, then it will be called on "user" when
26 void *user; member in struct:isl_id
29 __isl_give void (*free_user)(void *user);
  /src/lib/libpam/modules/pam_login_access/
pam_login_access.c 64 const void *rhost, *tty, *user; local
68 pam_err = pam_get_item(pamh, PAM_USER, &user);
72 if (user == NULL)
75 PAM_LOG("Got user: %s", (const char *)user);
88 PAM_LOG("Checking login.access for user %s on tty %s",
89 (const char *)user, (const char *)tty);
90 if (login_access(user, tty) != 0)
93 (const char *)user, (const char *)tty);
95 PAM_LOG("Checking login.access for user %s from host %s"
    [all...]
  /src/lib/libpam/modules/pam_skey/
pam_skey.c 57 const char *user, *skinfo, *pass; local
63 user = getlogin();
65 retval = pam_get_user(pamh, &user, NULL);
68 PAM_LOG("Got user: %s", user);
71 if (skey_haskey(user) != 0)
74 skinfo = skey_keyinfo(user);
93 retval = skey_passcheck(user, response) == -1 ?
  /src/usr.bin/innetgr/
innetgr.c 45 "usage: %s [-v] [-d domain] [-h host] [-u user] netgroup\n",
54 char *user = NULL; local
61 user = optarg;
80 ok = innetgr(argv[optind], host, user, domain);
  /src/crypto/external/bsd/heimdal/dist/lib/gssapi/ntlm/
iter_cred.c 66 char *user = NULL, *domain = NULL; local
74 ret = krb5_ret_stringz(response, &user);
78 free(user);
84 free(user);
88 dn->username = user;
  /src/external/bsd/am-utils/dist/amd/
info_passwd.c 107 * /anydir/dom1/dom2/dom3/user
110 * rfs:=/anydir/dom3;rhost:=dom3.dom2.dom1;sublink:=user
114 * var2:=pw-user:=user
115 * var3:=pw-home:=/anydir/dom1/dom2/dom3/user
120 char *user; local
127 * Find user name. If no / then Invalid...
129 user = strrchr(dir, '/');
130 if (!user)
132 *user++ = '\0'
    [all...]
  /src/external/bsd/tmux/dist/
cmd-server-access.c 41 .usage = "[-adlrw] " CMD_TARGET_PANE_USAGE " [user]",
51 struct server_acl_user *user; local
54 if ((user = server_acl_user_find(pw->pw_uid)) == NULL) {
55 cmdq_error(item, "user %s not found", pw->pw_name);
60 if (uid == server_acl_get_uid(user)) {
84 cmdq_error(item, "missing user argument");
92 cmdq_error(item, "unknown user: %s", name);
116 cmdq_error(item, "user %s is already added",
123 /* -r or -w implies -a if user does not exist. */
130 cmdq_error(item, "user %s not found", pw->pw_name)
    [all...]
  /src/lib/libpam/modules/pam_chroot/
pam_chroot.c 62 const char *dir, *end, *cwd, *user; local
67 if (pam_get_user(pamh, &user, NULL) != PAM_SUCCESS ||
68 user == NULL ||
69 getpwnam_r(user, &pwres, pwbuf, sizeof(pwbuf), &pwd) != 0 ||
80 "%s's home directory is too long", user);
91 "%s has no chroot directory", user);
97 openpam_log(PAM_LOG_DEBUG, "chrooting %s to %s", dir, user);
  /src/lib/libpam/modules/pam_deny/
pam_deny.c 52 const char *user; local
55 if ((r = pam_get_user(pamh, &user, NULL)) != PAM_SUCCESS)
  /src/lib/libpam/modules/pam_guest/
pam_guest.c 78 const char *authtok, *guests, *user; local
82 if (pam_get_user(pamh, &user, NULL) != PAM_SUCCESS || user == NULL)
90 is_guest = lookup(user, guests);
98 strcmp(user, authtok) != 0)
106 pam_setenv(pamh, "GUEST", user, 1);
  /src/lib/libpam/modules/pam_permit/
pam_permit.c 50 const char *user; local
53 if ((r = pam_get_user(pamh, &user, NULL)) != PAM_SUCCESS)
  /src/lib/libpam/modules/pam_rhosts/
pam_rhosts.c 63 const char *user; local
68 err = pam_get_user(pamh, &user, NULL);
72 if (getpwnam_r(user, &pwres, pwbuf, sizeof(pwbuf), &pwd) != 0 ||
87 superuser = (strcmp(user, "root") == 0);
88 err = ruserok(rhost, superuser, ruser, user);
  /src/lib/libpam/modules/pam_securetty/
pam_securetty.c 67 const char *user; local
74 pam_err = pam_get_user(pamh, &user, NULL);
77 if (user == NULL ||
78 getpwnam_r(user, &pwres, pwbuf, sizeof(pwbuf), &pwd) != 0 ||
82 PAM_LOG("Got user: %s", user);
84 /* If the user is not root, secure ttys do not apply */
  /src/libexec/rexecd/unit-tests/
rexec.c 51 char *user = __UNCONST("root"); local
62 user = optarg;
77 if ((s = rexec(&host, sv->s_port, user, pass, cmd, NULL)) == -1)
89 (void)fprintf(stderr, "Usage: %s [-u <user>] [-p <password>]"

Completed in 33 milliseconds

1 2 3 4 5 6 7 8 91011>>