/src/libexec/httpd/ |
tilde-luzah-bozo.c | 33 /* this code implements ~user support for bozohttpd */ 50 * - chdir's /~user/public_html 55 * transform_request() is supposed to check that we have user support 62 char *s, *file = NULL, *user; local in function:bozo_user_transform 66 user = strchr(request->hr_file + 1, '~'); 69 assert(user != NULL); 71 user++; 73 if ((s = strchr(user, '/')) != NULL) { 77 debug((httpd, DEBUG_OBESE, "looking for user %s", 78 user)); [all...] |
/src/sys/external/bsd/drm2/dist/drm/nouveau/nvkm/engine/disp/ |
nouveau_nvkm_engine_disp_dmacgp102.c | 39 int user = chan->chid.user; local in function:gp102_disp_dmac_init 54 nvkm_error(subdev, "ch %d init: %08x\n", user, 67 .user = nv50_disp_chan_user,
|
nouveau_nvkm_engine_disp_dmacgf119.c | 39 chan->chid.user, -9, handle, 40 chan->chid.user << 27 | 0x00000001); 49 int user = chan->chid.user; local in function:gf119_disp_dmac_fini 58 nvkm_error(subdev, "ch %d fini: %08x\n", user, 69 int user = chan->chid.user; local in function:gf119_disp_dmac_init 84 nvkm_error(subdev, "ch %d init: %08x\n", user, 97 .user = nv50_disp_chan_user,
|
nouveau_nvkm_engine_disp_piocgf119.c | 41 int user = chan->chid.user; local in function:gf119_disp_pioc_fini 48 nvkm_error(subdev, "ch %d fini: %08x\n", user, 60 int user = chan->chid.user; local in function:gf119_disp_pioc_init 69 nvkm_error(subdev, "ch %d init: %08x\n", user, 82 .user = nv50_disp_chan_user,
|
nouveau_nvkm_engine_disp_piocnv50.c | 41 int user = chan->chid.user; local in function:nv50_disp_pioc_fini 48 nvkm_error(subdev, "ch %d timeout: %08x\n", user, 60 int user = chan->chid.user; local in function:nv50_disp_pioc_init 67 nvkm_error(subdev, "ch %d timeout0: %08x\n", user, 78 nvkm_error(subdev, "ch %d timeout1: %08x\n", user, 91 .user = nv50_disp_chan_user,
|
nouveau_nvkm_engine_disp_dmacnv50.c | 79 chan->chid.user, -10, handle, 80 chan->chid.user << 28 | 81 chan->chid.user); 90 int user = chan->chid.user; local in function:nv50_disp_dmac_fini 99 nvkm_error(subdev, "ch %d fini timeout, %08x\n", user, 110 int user = chan->chid.user; local in function:nv50_disp_dmac_init 125 nvkm_error(subdev, "ch %d init timeout, %08x\n", user, 138 .user = nv50_disp_chan_user [all...] |
rootnv50.h | 22 } user[]; member in struct:nv50_disp_root_func
|
/src/lib/libpam/modules/pam_login_access/ |
pam_login_access.c | 64 const void *rhost, *tty, *user; local in function:pam_sm_acct_mgmt 68 pam_err = pam_get_item(pamh, PAM_USER, &user); 72 if (user == NULL) 75 PAM_LOG("Got user: %s", (const char *)user); 88 PAM_LOG("Checking login.access for user %s on tty %s", 89 (const char *)user, (const char *)tty); 90 if (login_access(user, tty) != 0) 93 (const char *)user, (const char *)tty); 95 PAM_LOG("Checking login.access for user %s from host %s" [all...] |
/src/lib/libpam/modules/pam_skey/ |
pam_skey.c | 57 const char *user, *skinfo, *pass; local in function:pam_sm_authenticate 63 user = getlogin(); 65 retval = pam_get_user(pamh, &user, NULL); 68 PAM_LOG("Got user: %s", user); 71 if (skey_haskey(user) != 0) 74 skinfo = skey_keyinfo(user); 93 retval = skey_passcheck(user, response) == -1 ?
|
/src/usr.bin/innetgr/ |
innetgr.c | 45 "usage: %s [-v] [-d domain] [-h host] [-u user] netgroup\n", 54 char *user = NULL; local in function:main 61 user = optarg; 80 ok = innetgr(argv[optind], host, user, domain);
|
/src/lib/libpam/modules/pam_chroot/ |
pam_chroot.c | 62 const char *dir, *end, *cwd, *user; local in function:pam_sm_open_session 67 if (pam_get_user(pamh, &user, NULL) != PAM_SUCCESS || 68 user == NULL || 69 getpwnam_r(user, &pwres, pwbuf, sizeof(pwbuf), &pwd) != 0 || 80 "%s's home directory is too long", user); 91 "%s has no chroot directory", user); 97 openpam_log(PAM_LOG_DEBUG, "chrooting %s to %s", dir, user);
|
/src/lib/libpam/modules/pam_deny/ |
pam_deny.c | 52 const char *user; local in function:pam_sm_authenticate 55 if ((r = pam_get_user(pamh, &user, NULL)) != PAM_SUCCESS)
|
/src/lib/libpam/modules/pam_guest/ |
pam_guest.c | 78 const char *authtok, *guests, *user; local in function:pam_sm_authenticate 82 if (pam_get_user(pamh, &user, NULL) != PAM_SUCCESS || user == NULL) 90 is_guest = lookup(user, guests); 98 strcmp(user, authtok) != 0) 106 pam_setenv(pamh, "GUEST", user, 1);
|
/src/lib/libpam/modules/pam_permit/ |
pam_permit.c | 50 const char *user; local in function:pam_sm_authenticate 53 if ((r = pam_get_user(pamh, &user, NULL)) != PAM_SUCCESS)
|
/src/lib/libpam/modules/pam_rhosts/ |
pam_rhosts.c | 63 const char *user; local in function:pam_sm_authenticate 68 err = pam_get_user(pamh, &user, NULL); 72 if (getpwnam_r(user, &pwres, pwbuf, sizeof(pwbuf), &pwd) != 0 || 87 superuser = (strcmp(user, "root") == 0); 88 err = ruserok(rhost, superuser, ruser, user);
|
/src/lib/libpam/modules/pam_securetty/ |
pam_securetty.c | 67 const char *user; local in function:pam_sm_acct_mgmt 74 pam_err = pam_get_user(pamh, &user, NULL); 77 if (user == NULL || 78 getpwnam_r(user, &pwres, pwbuf, sizeof(pwbuf), &pwd) != 0 || 82 PAM_LOG("Got user: %s", user); 84 /* If the user is not root, secure ttys do not apply */
|
/src/lib/libpanel/ |
panel_impl.h | 45 char *user; member in struct:__panel 54 /* Fake stdscr panel at the bottom, not user visible */
|
/src/libexec/rexecd/unit-tests/ |
rexec.c | 51 char *user = __UNCONST("root"); local in function:main 62 user = optarg; 77 if ((s = rexec(&host, sv->s_port, user, pass, cmd, NULL)) == -1) 89 (void)fprintf(stderr, "Usage: %s [-u <user>] [-p <password>]"
|
/src/sys/external/bsd/drm2/dist/drm/nouveau/nvkm/engine/fifo/ |
nouveau_nvkm_engine_fifo_gv100.c | 30 #include "user.h" 40 struct nvkm_memory *usermem = chan->fifo->user.mem; 41 const u64 user = nvkm_memory_addr(usermem) + (chan->base.chid * 0x200); local in function:gv100_fifo_runlist_chan 44 nvkm_wo32(memory, offset + 0x0, lower_32_bits(user)); 45 nvkm_wo32(memory, offset + 0x4, upper_32_bits(user)); 303 .user = {{-1,-1,VOLTA_USERMODE_A }, gv100_fifo_user_new },
|
/src/usr.sbin/lpr/lpq/ |
lpq.c | 47 * lpq [-a] [-l] [-Pprinter] [user...] [job...] 70 char *user[MAXUSERS]; /* users to process */ variable in typeref:typename:char * [] 71 int users; /* # of users in user array */ 128 user[users++] = *argv; 156 (void)fprintf(stderr, "Usage: %s [-a] [-l] [-Pprinter] [-w maxwait] [user ...] [job ...]\n", getprogname());
|
/src/usr.sbin/lpr/lprm/ |
lprm.c | 45 * lprm - remove the current user's spool entry 47 * lprm [-] [[job #] [user] ...] 76 char *user[MAXUSERS]; /* users to process */ variable in typeref:typename:char * [] 77 int users; /* # of users in user array */ 78 uid_t uid, euid; /* real and effective user id's */ 146 user[users++] = arg; 161 "Usage: %s [-] [-Pprinter] [-w maxwait] [[job #] [user] ...]\n",
|
/src/usr.bin/telnet/ |
main.c | 96 "\n\t[-d] [-e char] [-k realm] [-l user] [-f/-F] [-n tracefile] ", 99 "\n\t[-l user] [-n tracefile] ", 123 char *user; local in function:main 137 user = NULL; 238 user = optarg; 303 if (user) { 305 *argp++ = user;
|
/src/lib/libpam/modules/pam_ftpusers/ |
pam_ftpusers.c | 66 const char *user; local in function:pam_sm_acct_mgmt 73 pam_err = pam_get_user(pamh, &user, NULL); 76 if (user == NULL || 77 getpwnam_r(user, &pwres, pwbuf, sizeof(pwbuf), &pwd) != 0 || 82 ulen = strlen(user); 96 if (len == ulen && strncmp(user, line, len) == 0) 111 if (strcmp(user, *mem) == 0)
|
/src/lib/libpam/modules/pam_nologin/ |
pam_nologin.c | 78 const char *user, *nologin; local in function:pam_sm_authenticate 82 if ((retval = pam_get_user(pamh, &user, NULL)) != PAM_SUCCESS) 85 PAM_LOG("Got user: %s", user); 95 if (getpwnam_r(user, &pwres, pwbuf, sizeof(pwbuf), &pwd) != 0 ||
|
/src/lib/libwrap/ |
rfc931.c | 78 /* rfc931 - return remote user name, given socket structures */ 87 char user[256]; /* XXX */ local in function:rfc931 213 &rmt_port, &our_port, user) == 3 222 if ((cp = strchr(user, '\r')) != NULL) 224 result = user;
|