| /src/distrib/utils/embedded/files/ | 
| creds_msdos | 32 #	"sshkeyfile <user> <path on msdos>" 33 #	"sshkey <user> <entry>"
 34 # 	"useraddhash <user> <passwd hash>"
 35 # 	"useradd <user> <passwd>"
 55 	local user="$1"
 59 	if ! id -u "${user}" > /dev/null 2>&1; then
 60 		useradd -m -G "${group}" "${user}" || fail "Useradd failed."
 63 	eval ssh_userdir=~"${user}/.ssh"
 66 	chown "${user}" "${ssh_userdir}"
 72 	local user="$1
 [all...]
 | 
| /src/sys/external/bsd/drm2/dist/drm/nouveau/nvif/ | 
| nouveau_nvif_user.c | 27 #include <nvif/user.h> 35 	if (device->user.func) {
 36 		nvif_object_fini(&device->user.object);
 37 		device->user.func = NULL;
 54 	if (device->user.func)
 62 			       &device->user.object);
 66 	nvif_object_map(&device->user.object, NULL, 0);
 67 	device->user.func = users[cid].func;
 
 | 
| nouveau_nvif_userc361.c | 27 #include <nvif/user.h> 30 nvif_userc361_doorbell(struct nvif_user *user, u32 token)
 32 	nvif_wr32(&user->object, 0x90, token);
 
 | 
| /src/usr.sbin/bootp/bootpd/ | 
| syslog.conf | 9 # Note: Have to exclude user from most lines so that user.alert 10 #	and user.emerg are not included, because old sendmails
 13 #	can remove all the special cases for "user" logging.
 15 #*.err;kern.debug;auth.notice;user.none		/dev/console
 16 kern.debug;user,mail.crit;auth.notice		/dev/console
 19 #*.err;kern.debug;daemon,auth.notice;mail.crit;user.none /var/adm/messages
 20 kern.debug;user,mail.crit;auth.notice		/var/adm/messages
 25 *.alert;kern.err;daemon.err;user.none		operator
 26 *.alert;user.none				roo
 [all...]
 | 
| /src/lib/libpam/modules/pam_login_access/ | 
| pam_login_access.c | 64 	const void *rhost, *tty, *user;  local in function:pam_sm_acct_mgmt 68 	pam_err = pam_get_item(pamh, PAM_USER, &user);
 72 	if (user == NULL)
 75 	PAM_LOG("Got user: %s", (const char *)user);
 88 		PAM_LOG("Checking login.access for user %s on tty %s",
 89 		    (const char *)user, (const char *)tty);
 90 		if (login_access(user, tty) != 0)
 93 		    (const char *)user, (const char *)tty);
 95 		PAM_LOG("Checking login.access for user %s from host %s"
 [all...]
 | 
| /src/tests/usr.sbin/inetd/ | 
| inetd_ratelimit.conf | 11 	user = root, 21 	user = root,
 30 	user = root,
 39 	user = root,
 50 	user = root,
 59 	user = root,
 70 	user = root,
 80 	user = root,
 89 	user = root,
 98 	user = root
 [all...]
 | 
| /src/distrib/utils/libhack/ | 
| getnetgr.c | 38 getnetgrent(host, user, domain) 40 	const char	**user;
 47 innetgr(grp, host, user, domain)
 48 	const char	*grp, *host, *user, *domain;
 
 | 
| /src/lib/libpanel/ | 
| getuser.c | 40 	return p->user; 
 | 
| setuser.c | 40 	p->user = u; 
 | 
| /src/usr.sbin/user/ | 
| Makefile | 10 PROG= user 11 SRCS+= user.c main.c
 12 LINKS+=	${BINDIR}/user ${BINDIR}/useradd
 13 LINKS+=	${BINDIR}/user ${BINDIR}/userdel
 14 LINKS+=	${BINDIR}/user ${BINDIR}/usermod
 15 LINKS+=	${BINDIR}/user ${BINDIR}/group
 16 LINKS+=	${BINDIR}/user ${BINDIR}/groupadd
 17 LINKS+=	${BINDIR}/user ${BINDIR}/groupdel
 18 LINKS+=	${BINDIR}/user ${BINDIR}/groupmod
 19 LINKS+=	${BINDIR}/user ${BINDIR}/userinf
 [all...]
 | 
| /src/lib/libwrap/ | 
| hosts_ctl.c | 6   * access control checker. The host name and user name arguments should be 32 hosts_ctl(char *daemon, char *name, char *addr, char *user)
 40 				      RQ_USER, user,
 
 | 
| eval.c | 4   * Routines for controlled evaluation of host names, user names, and so on. 17   * When ALWAYS_RFC931 mode is off, user lookup is done only when required by
 50 /* eval_user - look up user name */
 55     if (request->user[0] == 0) {
 56 	(void)strlcpy(request->user, unknown, sizeof(request->user));
 58 	    rfc931(request->client->sin, request->server->sin, request->user);
 60     return (request->user);
 116 #ifndef ALWAYS_RFC931				/* no implicit user lookups */
 117     if (request->user[0] == 0
 [all...]
 | 
| /src/sys/arch/i386/stand/lib/ | 
| diskbuf.c | 48 alloc_diskbuf(const void *user) 50 	diskbuf_user = user;
 
 | 
| /src/lib/libpam/modules/pam_skey/ | 
| pam_skey.c | 57 	const char *user, *skinfo, *pass;  local in function:pam_sm_authenticate 63 		user = getlogin();
 65 		retval = pam_get_user(pamh, &user, NULL);
 68 		PAM_LOG("Got user: %s", user);
 71 	if (skey_haskey(user) != 0)
 74 	skinfo = skey_keyinfo(user);
 93 	retval = skey_passcheck(user, response) == -1 ?
 
 | 
| /src/sys/external/bsd/drm2/dist/drm/nouveau/nvkm/engine/disp/ | 
| nouveau_nvkm_engine_disp_piocgf119.c | 41 	int user = chan->chid.user;  local in function:gf119_disp_pioc_fini 48 		nvkm_error(subdev, "ch %d fini: %08x\n", user,
 60 	int user = chan->chid.user;  local in function:gf119_disp_pioc_init
 69 		nvkm_error(subdev, "ch %d init: %08x\n", user,
 82 	.user = nv50_disp_chan_user,
 
 | 
| nouveau_nvkm_engine_disp_piocnv50.c | 41 	int user = chan->chid.user;  local in function:nv50_disp_pioc_fini 48 		nvkm_error(subdev, "ch %d timeout: %08x\n", user,
 60 	int user = chan->chid.user;  local in function:nv50_disp_pioc_init
 67 		nvkm_error(subdev, "ch %d timeout0: %08x\n", user,
 78 		nvkm_error(subdev, "ch %d timeout1: %08x\n", user,
 91 	.user = nv50_disp_chan_user,
 
 | 
| nouveau_nvkm_engine_disp_dmacgf119.c | 39 				 chan->chid.user, -9, handle, 40 				 chan->chid.user << 27 | 0x00000001);
 49 	int user = chan->chid.user;  local in function:gf119_disp_dmac_fini
 58 		nvkm_error(subdev, "ch %d fini: %08x\n", user,
 69 	int user = chan->chid.user;  local in function:gf119_disp_dmac_init
 84 		nvkm_error(subdev, "ch %d init: %08x\n", user,
 97 	.user = nv50_disp_chan_user,
 
 | 
| /src/usr.sbin/chroot/ | 
| chroot.c | 97 getuser(const char *user) 102 	if ((pw = getpwnam(user)) != NULL)
 105 	if (getnum(user, &num) == -1)
 106 		errx(1, "no such user `%s'", user);
 114 	char	*user;		/* user to switch to before running program */  local in function:main
 123 	user = NULL;
 132 			user = optarg;
 133 			if (*user == '\0'
 [all...]
 | 
| /src/usr.sbin/sdpd/ | 
| main.c | 52 static bool	drop_root	(char const *user, char const *group); 67 	char const		*user = "_sdpd", *group = "_sdpd";  local in function:main
 91 		case 'u': /* user */
 92 			user = optarg;
 137 	if ((user != NULL || group != NULL) && !drop_root(user, group))
 156 drop_root(char const *user, char const *group)
 169 	if (user != NULL) {
 170 		uid = strtol(user, &ep, 10);
 172 			struct passwd	*pwd = getpwnam(user);
 [all...]
 | 
| /src/tests/fs/tmpfs/ | 
| t_create.sh | 35 	atf_set "require.user" "root" 51 	atf_set "require.config" "unprivileged-user"
 52 	atf_set "require.user" "root"
 55 	user=$(atf_config_get unprivileged-user)
 56 	# Allow the unprivileged user to access the work directory.
 57 	chown ${user} .
 76 	atf_check -s exit:0 -o empty -e empty chown ${user}:0 b
 78 	[ ${st_uid} -eq $(id -u ${user}) ] || atf_fail "Incorrect owner"
 81 	atf_check -s exit:0 -o empty -e empty chown ${user}:100
 [all...]
 | 
| /src/libexec/httpd/ | 
| tilde-luzah-bozo.c | 33 /* this code implements ~user support for bozohttpd */ 50  *	- chdir's /~user/public_html
 55  * transform_request() is supposed to check that we have user support
 62 	char	*s, *file = NULL, *user;  local in function:bozo_user_transform
 66 	user = strchr(request->hr_file + 1, '~');
 69 	assert(user != NULL);
 71 	user++;
 73 	if ((s = strchr(user, '/')) != NULL) {
 77 	debug((httpd, DEBUG_OBESE, "looking for user %s",
 78 		user));
 [all...]
 | 
| /src/lib/libpam/modules/pam_guest/ | 
| pam_guest.c | 78 	const char *authtok, *guests, *user;  local in function:pam_sm_authenticate 82 	if (pam_get_user(pamh, &user, NULL) != PAM_SUCCESS || user == NULL)
 90 	is_guest = lookup(user, guests);
 98 		    strcmp(user, authtok) != 0)
 106 		pam_setenv(pamh, "GUEST", user, 1);
 
 | 
| /src/lib/libpam/modules/pam_chroot/ | 
| pam_chroot.c | 62 	const char *dir, *end, *cwd, *user;  local in function:pam_sm_open_session 67 	if (pam_get_user(pamh, &user, NULL) != PAM_SUCCESS ||
 68 	    user == NULL ||
 69 	    getpwnam_r(user, &pwres, pwbuf, sizeof(pwbuf), &pwd) != 0 ||
 80 			    "%s's home directory is too long", user);
 91 			    "%s has no chroot directory", user);
 97 	openpam_log(PAM_LOG_DEBUG, "chrooting %s to %s", dir, user);
 
 | 
| /src/tests/fs/ffs/ | 
| t_miscquota.sh | 29     "walk user quota list over several disk blocks" -b le 1 user 33     -b le 1 user
 37     -boL le 1 user
 41     -boC le 1 user
 45     -boLC le 1 user
 49     -l le 1 user
 53     -oRL le 1 user
 57     "new quota entry denied by default entry" 5 -b le 1 user
 60     "new quota entry denied by default entry, with list on more than one block" 5000 -b le 1 user
 [all...]
 | 
| /src/lib/libpam/modules/pam_rhosts/ | 
| pam_rhosts.c | 63 	const char *user;  local in function:pam_sm_authenticate 68 	err = pam_get_user(pamh, &user, NULL);
 72 	if (getpwnam_r(user, &pwres, pwbuf, sizeof(pwbuf), &pwd) != 0 ||
 87 	superuser = (strcmp(user, "root") == 0);
 88 	err = ruserok(rhost, superuser, ruser, user);
 
 |