/src/distrib/utils/embedded/files/ |
creds_msdos | 32 # "sshkeyfile <user> <path on msdos>" 33 # "sshkey <user> <entry>" 34 # "useraddhash <user> <passwd hash>" 35 # "useradd <user> <passwd>" 55 local user="$1" 59 if ! id -u "${user}" > /dev/null 2>&1; then 60 useradd -m -G "${group}" "${user}" || fail "Useradd failed." 63 eval ssh_userdir=~"${user}/.ssh" 66 chown "${user}" "${ssh_userdir}" 72 local user="$1 [all...] |
/src/sys/external/bsd/drm2/dist/drm/nouveau/nvif/ |
nouveau_nvif_user.c | 27 #include <nvif/user.h> 35 if (device->user.func) { 36 nvif_object_fini(&device->user.object); 37 device->user.func = NULL; 54 if (device->user.func) 62 &device->user.object); 66 nvif_object_map(&device->user.object, NULL, 0); 67 device->user.func = users[cid].func;
|
nouveau_nvif_userc361.c | 27 #include <nvif/user.h> 30 nvif_userc361_doorbell(struct nvif_user *user, u32 token) 32 nvif_wr32(&user->object, 0x90, token);
|
/src/usr.sbin/bootp/bootpd/ |
syslog.conf | 9 # Note: Have to exclude user from most lines so that user.alert 10 # and user.emerg are not included, because old sendmails 13 # can remove all the special cases for "user" logging. 15 #*.err;kern.debug;auth.notice;user.none /dev/console 16 kern.debug;user,mail.crit;auth.notice /dev/console 19 #*.err;kern.debug;daemon,auth.notice;mail.crit;user.none /var/adm/messages 20 kern.debug;user,mail.crit;auth.notice /var/adm/messages 25 *.alert;kern.err;daemon.err;user.none operator 26 *.alert;user.none roo [all...] |
/src/lib/libpam/modules/pam_login_access/ |
pam_login_access.c | 64 const void *rhost, *tty, *user; local in function:pam_sm_acct_mgmt 68 pam_err = pam_get_item(pamh, PAM_USER, &user); 72 if (user == NULL) 75 PAM_LOG("Got user: %s", (const char *)user); 88 PAM_LOG("Checking login.access for user %s on tty %s", 89 (const char *)user, (const char *)tty); 90 if (login_access(user, tty) != 0) 93 (const char *)user, (const char *)tty); 95 PAM_LOG("Checking login.access for user %s from host %s" [all...] |
/src/tests/usr.sbin/inetd/ |
inetd_ratelimit.conf | 11 user = root, 21 user = root, 30 user = root, 39 user = root, 50 user = root, 59 user = root, 70 user = root, 80 user = root, 89 user = root, 98 user = root [all...] |
/src/distrib/utils/libhack/ |
getnetgr.c | 38 getnetgrent(host, user, domain) 40 const char **user; 47 innetgr(grp, host, user, domain) 48 const char *grp, *host, *user, *domain;
|
/src/lib/libpanel/ |
getuser.c | 40 return p->user;
|
setuser.c | 40 p->user = u;
|
/src/usr.sbin/user/ |
Makefile | 10 PROG= user 11 SRCS+= user.c main.c 12 LINKS+= ${BINDIR}/user ${BINDIR}/useradd 13 LINKS+= ${BINDIR}/user ${BINDIR}/userdel 14 LINKS+= ${BINDIR}/user ${BINDIR}/usermod 15 LINKS+= ${BINDIR}/user ${BINDIR}/group 16 LINKS+= ${BINDIR}/user ${BINDIR}/groupadd 17 LINKS+= ${BINDIR}/user ${BINDIR}/groupdel 18 LINKS+= ${BINDIR}/user ${BINDIR}/groupmod 19 LINKS+= ${BINDIR}/user ${BINDIR}/userinf [all...] |
/src/lib/libwrap/ |
hosts_ctl.c | 6 * access control checker. The host name and user name arguments should be 32 hosts_ctl(char *daemon, char *name, char *addr, char *user) 40 RQ_USER, user,
|
eval.c | 4 * Routines for controlled evaluation of host names, user names, and so on. 17 * When ALWAYS_RFC931 mode is off, user lookup is done only when required by 50 /* eval_user - look up user name */ 55 if (request->user[0] == 0) { 56 (void)strlcpy(request->user, unknown, sizeof(request->user)); 58 rfc931(request->client->sin, request->server->sin, request->user); 60 return (request->user); 116 #ifndef ALWAYS_RFC931 /* no implicit user lookups */ 117 if (request->user[0] == 0 [all...] |
/src/sys/arch/i386/stand/lib/ |
diskbuf.c | 48 alloc_diskbuf(const void *user) 50 diskbuf_user = user;
|
/src/lib/libpam/modules/pam_skey/ |
pam_skey.c | 57 const char *user, *skinfo, *pass; local in function:pam_sm_authenticate 63 user = getlogin(); 65 retval = pam_get_user(pamh, &user, NULL); 68 PAM_LOG("Got user: %s", user); 71 if (skey_haskey(user) != 0) 74 skinfo = skey_keyinfo(user); 93 retval = skey_passcheck(user, response) == -1 ?
|
/src/sys/external/bsd/drm2/dist/drm/nouveau/nvkm/engine/disp/ |
nouveau_nvkm_engine_disp_piocgf119.c | 41 int user = chan->chid.user; local in function:gf119_disp_pioc_fini 48 nvkm_error(subdev, "ch %d fini: %08x\n", user, 60 int user = chan->chid.user; local in function:gf119_disp_pioc_init 69 nvkm_error(subdev, "ch %d init: %08x\n", user, 82 .user = nv50_disp_chan_user,
|
nouveau_nvkm_engine_disp_piocnv50.c | 41 int user = chan->chid.user; local in function:nv50_disp_pioc_fini 48 nvkm_error(subdev, "ch %d timeout: %08x\n", user, 60 int user = chan->chid.user; local in function:nv50_disp_pioc_init 67 nvkm_error(subdev, "ch %d timeout0: %08x\n", user, 78 nvkm_error(subdev, "ch %d timeout1: %08x\n", user, 91 .user = nv50_disp_chan_user,
|
nouveau_nvkm_engine_disp_dmacgf119.c | 39 chan->chid.user, -9, handle, 40 chan->chid.user << 27 | 0x00000001); 49 int user = chan->chid.user; local in function:gf119_disp_dmac_fini 58 nvkm_error(subdev, "ch %d fini: %08x\n", user, 69 int user = chan->chid.user; local in function:gf119_disp_dmac_init 84 nvkm_error(subdev, "ch %d init: %08x\n", user, 97 .user = nv50_disp_chan_user,
|
/src/usr.sbin/chroot/ |
chroot.c | 97 getuser(const char *user) 102 if ((pw = getpwnam(user)) != NULL) 105 if (getnum(user, &num) == -1) 106 errx(1, "no such user `%s'", user); 114 char *user; /* user to switch to before running program */ local in function:main 123 user = NULL; 132 user = optarg; 133 if (*user == '\0' [all...] |
/src/usr.sbin/sdpd/ |
main.c | 52 static bool drop_root (char const *user, char const *group); 67 char const *user = "_sdpd", *group = "_sdpd"; local in function:main 91 case 'u': /* user */ 92 user = optarg; 137 if ((user != NULL || group != NULL) && !drop_root(user, group)) 156 drop_root(char const *user, char const *group) 169 if (user != NULL) { 170 uid = strtol(user, &ep, 10); 172 struct passwd *pwd = getpwnam(user); [all...] |
/src/tests/fs/tmpfs/ |
t_create.sh | 35 atf_set "require.user" "root" 51 atf_set "require.config" "unprivileged-user" 52 atf_set "require.user" "root" 55 user=$(atf_config_get unprivileged-user) 56 # Allow the unprivileged user to access the work directory. 57 chown ${user} . 76 atf_check -s exit:0 -o empty -e empty chown ${user}:0 b 78 [ ${st_uid} -eq $(id -u ${user}) ] || atf_fail "Incorrect owner" 81 atf_check -s exit:0 -o empty -e empty chown ${user}:100 [all...] |
/src/libexec/httpd/ |
tilde-luzah-bozo.c | 33 /* this code implements ~user support for bozohttpd */ 50 * - chdir's /~user/public_html 55 * transform_request() is supposed to check that we have user support 62 char *s, *file = NULL, *user; local in function:bozo_user_transform 66 user = strchr(request->hr_file + 1, '~'); 69 assert(user != NULL); 71 user++; 73 if ((s = strchr(user, '/')) != NULL) { 77 debug((httpd, DEBUG_OBESE, "looking for user %s", 78 user)); [all...] |
/src/lib/libpam/modules/pam_guest/ |
pam_guest.c | 78 const char *authtok, *guests, *user; local in function:pam_sm_authenticate 82 if (pam_get_user(pamh, &user, NULL) != PAM_SUCCESS || user == NULL) 90 is_guest = lookup(user, guests); 98 strcmp(user, authtok) != 0) 106 pam_setenv(pamh, "GUEST", user, 1);
|
/src/lib/libpam/modules/pam_chroot/ |
pam_chroot.c | 62 const char *dir, *end, *cwd, *user; local in function:pam_sm_open_session 67 if (pam_get_user(pamh, &user, NULL) != PAM_SUCCESS || 68 user == NULL || 69 getpwnam_r(user, &pwres, pwbuf, sizeof(pwbuf), &pwd) != 0 || 80 "%s's home directory is too long", user); 91 "%s has no chroot directory", user); 97 openpam_log(PAM_LOG_DEBUG, "chrooting %s to %s", dir, user);
|
/src/tests/fs/ffs/ |
t_miscquota.sh | 29 "walk user quota list over several disk blocks" -b le 1 user 33 -b le 1 user 37 -boL le 1 user 41 -boC le 1 user 45 -boLC le 1 user 49 -l le 1 user 53 -oRL le 1 user 57 "new quota entry denied by default entry" 5 -b le 1 user 60 "new quota entry denied by default entry, with list on more than one block" 5000 -b le 1 user [all...] |
/src/lib/libpam/modules/pam_rhosts/ |
pam_rhosts.c | 63 const char *user; local in function:pam_sm_authenticate 68 err = pam_get_user(pamh, &user, NULL); 72 if (getpwnam_r(user, &pwres, pwbuf, sizeof(pwbuf), &pwd) != 0 || 87 superuser = (strcmp(user, "root") == 0); 88 err = ruserok(rhost, superuser, ruser, user);
|