/src/libexec/httpd/ |
tilde-luzah-bozo.c | 33 /* this code implements ~user support for bozohttpd */ 50 * - chdir's /~user/public_html 55 * transform_request() is supposed to check that we have user support 62 char *s, *file = NULL, *user; local in function:bozo_user_transform 66 user = strchr(request->hr_file + 1, '~'); 69 assert(user != NULL); 71 user++; 73 if ((s = strchr(user, '/')) != NULL) { 77 debug((httpd, DEBUG_OBESE, "looking for user %s", 78 user)); [all...] |
tilde-luzah-bozo.c | 33 /* this code implements ~user support for bozohttpd */ 50 * - chdir's /~user/public_html 55 * transform_request() is supposed to check that we have user support 62 char *s, *file = NULL, *user; local in function:bozo_user_transform 66 user = strchr(request->hr_file + 1, '~'); 69 assert(user != NULL); 71 user++; 73 if ((s = strchr(user, '/')) != NULL) { 77 debug((httpd, DEBUG_OBESE, "looking for user %s", 78 user)); [all...] |
/src/sys/external/bsd/drm2/dist/drm/nouveau/nvkm/engine/disp/ |
nouveau_nvkm_engine_disp_dmacgp102.c | 39 int user = chan->chid.user; local in function:gp102_disp_dmac_init 54 nvkm_error(subdev, "ch %d init: %08x\n", user, 67 .user = nv50_disp_chan_user,
|
nouveau_nvkm_engine_disp_dmacgp102.c | 39 int user = chan->chid.user; local in function:gp102_disp_dmac_init 54 nvkm_error(subdev, "ch %d init: %08x\n", user, 67 .user = nv50_disp_chan_user,
|
nouveau_nvkm_engine_disp_dmacgf119.c | 39 chan->chid.user, -9, handle, 40 chan->chid.user << 27 | 0x00000001); 49 int user = chan->chid.user; local in function:gf119_disp_dmac_fini 58 nvkm_error(subdev, "ch %d fini: %08x\n", user, 69 int user = chan->chid.user; local in function:gf119_disp_dmac_init 84 nvkm_error(subdev, "ch %d init: %08x\n", user, 97 .user = nv50_disp_chan_user,
|
nouveau_nvkm_engine_disp_piocgf119.c | 41 int user = chan->chid.user; local in function:gf119_disp_pioc_fini 48 nvkm_error(subdev, "ch %d fini: %08x\n", user, 60 int user = chan->chid.user; local in function:gf119_disp_pioc_init 69 nvkm_error(subdev, "ch %d init: %08x\n", user, 82 .user = nv50_disp_chan_user,
|
nouveau_nvkm_engine_disp_piocnv50.c | 41 int user = chan->chid.user; local in function:nv50_disp_pioc_fini 48 nvkm_error(subdev, "ch %d timeout: %08x\n", user, 60 int user = chan->chid.user; local in function:nv50_disp_pioc_init 67 nvkm_error(subdev, "ch %d timeout0: %08x\n", user, 78 nvkm_error(subdev, "ch %d timeout1: %08x\n", user, 91 .user = nv50_disp_chan_user,
|
nouveau_nvkm_engine_disp_dmacgf119.c | 39 chan->chid.user, -9, handle, 40 chan->chid.user << 27 | 0x00000001); 49 int user = chan->chid.user; local in function:gf119_disp_dmac_fini 58 nvkm_error(subdev, "ch %d fini: %08x\n", user, 69 int user = chan->chid.user; local in function:gf119_disp_dmac_init 84 nvkm_error(subdev, "ch %d init: %08x\n", user, 97 .user = nv50_disp_chan_user,
|
nouveau_nvkm_engine_disp_piocgf119.c | 41 int user = chan->chid.user; local in function:gf119_disp_pioc_fini 48 nvkm_error(subdev, "ch %d fini: %08x\n", user, 60 int user = chan->chid.user; local in function:gf119_disp_pioc_init 69 nvkm_error(subdev, "ch %d init: %08x\n", user, 82 .user = nv50_disp_chan_user,
|
nouveau_nvkm_engine_disp_piocnv50.c | 41 int user = chan->chid.user; local in function:nv50_disp_pioc_fini 48 nvkm_error(subdev, "ch %d timeout: %08x\n", user, 60 int user = chan->chid.user; local in function:nv50_disp_pioc_init 67 nvkm_error(subdev, "ch %d timeout0: %08x\n", user, 78 nvkm_error(subdev, "ch %d timeout1: %08x\n", user, 91 .user = nv50_disp_chan_user,
|
nouveau_nvkm_engine_disp_dmacnv50.c | 79 chan->chid.user, -10, handle, 80 chan->chid.user << 28 | 81 chan->chid.user); 90 int user = chan->chid.user; local in function:nv50_disp_dmac_fini 99 nvkm_error(subdev, "ch %d fini timeout, %08x\n", user, 110 int user = chan->chid.user; local in function:nv50_disp_dmac_init 125 nvkm_error(subdev, "ch %d init timeout, %08x\n", user, 138 .user = nv50_disp_chan_user [all...] |
/src/lib/libpam/modules/pam_login_access/ |
pam_login_access.c | 64 const void *rhost, *tty, *user; local in function:pam_sm_acct_mgmt 68 pam_err = pam_get_item(pamh, PAM_USER, &user); 72 if (user == NULL) 75 PAM_LOG("Got user: %s", (const char *)user); 88 PAM_LOG("Checking login.access for user %s on tty %s", 89 (const char *)user, (const char *)tty); 90 if (login_access(user, tty) != 0) 93 (const char *)user, (const char *)tty); 95 PAM_LOG("Checking login.access for user %s from host %s" [all...] |
pam_login_access.c | 64 const void *rhost, *tty, *user; local in function:pam_sm_acct_mgmt 68 pam_err = pam_get_item(pamh, PAM_USER, &user); 72 if (user == NULL) 75 PAM_LOG("Got user: %s", (const char *)user); 88 PAM_LOG("Checking login.access for user %s on tty %s", 89 (const char *)user, (const char *)tty); 90 if (login_access(user, tty) != 0) 93 (const char *)user, (const char *)tty); 95 PAM_LOG("Checking login.access for user %s from host %s" [all...] |
/src/lib/libpam/modules/pam_skey/ |
pam_skey.c | 57 const char *user, *skinfo, *pass; local in function:pam_sm_authenticate 63 user = getlogin(); 65 retval = pam_get_user(pamh, &user, NULL); 68 PAM_LOG("Got user: %s", user); 71 if (skey_haskey(user) != 0) 74 skinfo = skey_keyinfo(user); 93 retval = skey_passcheck(user, response) == -1 ?
|
pam_skey.c | 57 const char *user, *skinfo, *pass; local in function:pam_sm_authenticate 63 user = getlogin(); 65 retval = pam_get_user(pamh, &user, NULL); 68 PAM_LOG("Got user: %s", user); 71 if (skey_haskey(user) != 0) 74 skinfo = skey_keyinfo(user); 93 retval = skey_passcheck(user, response) == -1 ?
|
/src/usr.bin/innetgr/ |
innetgr.c | 45 "usage: %s [-v] [-d domain] [-h host] [-u user] netgroup\n", 54 char *user = NULL; local in function:main 61 user = optarg; 80 ok = innetgr(argv[optind], host, user, domain);
|
innetgr.c | 45 "usage: %s [-v] [-d domain] [-h host] [-u user] netgroup\n", 54 char *user = NULL; local in function:main 61 user = optarg; 80 ok = innetgr(argv[optind], host, user, domain);
|
/src/lib/libpam/modules/pam_chroot/ |
pam_chroot.c | 62 const char *dir, *end, *cwd, *user; local in function:pam_sm_open_session 67 if (pam_get_user(pamh, &user, NULL) != PAM_SUCCESS || 68 user == NULL || 69 getpwnam_r(user, &pwres, pwbuf, sizeof(pwbuf), &pwd) != 0 || 80 "%s's home directory is too long", user); 91 "%s has no chroot directory", user); 97 openpam_log(PAM_LOG_DEBUG, "chrooting %s to %s", dir, user);
|
/src/lib/libpam/modules/pam_deny/ |
pam_deny.c | 52 const char *user; local in function:pam_sm_authenticate 55 if ((r = pam_get_user(pamh, &user, NULL)) != PAM_SUCCESS)
|
/src/lib/libpam/modules/pam_guest/ |
pam_guest.c | 78 const char *authtok, *guests, *user; local in function:pam_sm_authenticate 82 if (pam_get_user(pamh, &user, NULL) != PAM_SUCCESS || user == NULL) 90 is_guest = lookup(user, guests); 98 strcmp(user, authtok) != 0) 106 pam_setenv(pamh, "GUEST", user, 1);
|
/src/lib/libpam/modules/pam_permit/ |
pam_permit.c | 50 const char *user; local in function:pam_sm_authenticate 53 if ((r = pam_get_user(pamh, &user, NULL)) != PAM_SUCCESS)
|
/src/lib/libpam/modules/pam_rhosts/ |
pam_rhosts.c | 63 const char *user; local in function:pam_sm_authenticate 68 err = pam_get_user(pamh, &user, NULL); 72 if (getpwnam_r(user, &pwres, pwbuf, sizeof(pwbuf), &pwd) != 0 || 87 superuser = (strcmp(user, "root") == 0); 88 err = ruserok(rhost, superuser, ruser, user);
|
/src/lib/libpam/modules/pam_securetty/ |
pam_securetty.c | 67 const char *user; local in function:pam_sm_acct_mgmt 74 pam_err = pam_get_user(pamh, &user, NULL); 77 if (user == NULL || 78 getpwnam_r(user, &pwres, pwbuf, sizeof(pwbuf), &pwd) != 0 || 82 PAM_LOG("Got user: %s", user); 84 /* If the user is not root, secure ttys do not apply */
|
/src/lib/libpanel/ |
panel_impl.h | 45 char *user; member in struct:__panel 54 /* Fake stdscr panel at the bottom, not user visible */
|
/src/libexec/rexecd/unit-tests/ |
rexec.c | 51 char *user = __UNCONST("root"); local in function:main 62 user = optarg; 77 if ((s = rexec(&host, sv->s_port, user, pass, cmd, NULL)) == -1) 89 (void)fprintf(stderr, "Usage: %s [-u <user>] [-p <password>]"
|