HomeSort by: relevance | last modified time | path
    Searched refs:user (Results 1 - 25 of 513) sorted by relevancy

1 2 3 4 5 6 7 8 91011>>

  /src/distrib/utils/embedded/files/
creds_msdos 32 # "sshkeyfile <user> <path on msdos>"
33 # "sshkey <user> <entry>"
34 # "useraddhash <user> <passwd hash>"
35 # "useradd <user> <passwd>"
55 local user="$1"
59 if ! id -u "${user}" > /dev/null 2>&1; then
60 useradd -m -G "${group}" "${user}" || fail "Useradd failed."
63 eval ssh_userdir=~"${user}/.ssh"
66 chown "${user}" "${ssh_userdir}"
72 local user="$1
    [all...]
  /src/sys/external/bsd/drm2/dist/drm/nouveau/nvif/
nouveau_nvif_user.c 27 #include <nvif/user.h>
35 if (device->user.func) {
36 nvif_object_fini(&device->user.object);
37 device->user.func = NULL;
54 if (device->user.func)
62 &device->user.object);
66 nvif_object_map(&device->user.object, NULL, 0);
67 device->user.func = users[cid].func;
nouveau_nvif_userc361.c 27 #include <nvif/user.h>
30 nvif_userc361_doorbell(struct nvif_user *user, u32 token)
32 nvif_wr32(&user->object, 0x90, token);
  /src/usr.sbin/bootp/bootpd/
syslog.conf 9 # Note: Have to exclude user from most lines so that user.alert
10 # and user.emerg are not included, because old sendmails
13 # can remove all the special cases for "user" logging.
15 #*.err;kern.debug;auth.notice;user.none /dev/console
16 kern.debug;user,mail.crit;auth.notice /dev/console
19 #*.err;kern.debug;daemon,auth.notice;mail.crit;user.none /var/adm/messages
20 kern.debug;user,mail.crit;auth.notice /var/adm/messages
25 *.alert;kern.err;daemon.err;user.none operator
26 *.alert;user.none roo
    [all...]
  /src/lib/libpam/modules/pam_login_access/
pam_login_access.c 64 const void *rhost, *tty, *user; local in function:pam_sm_acct_mgmt
68 pam_err = pam_get_item(pamh, PAM_USER, &user);
72 if (user == NULL)
75 PAM_LOG("Got user: %s", (const char *)user);
88 PAM_LOG("Checking login.access for user %s on tty %s",
89 (const char *)user, (const char *)tty);
90 if (login_access(user, tty) != 0)
93 (const char *)user, (const char *)tty);
95 PAM_LOG("Checking login.access for user %s from host %s"
    [all...]
  /src/tests/usr.sbin/inetd/
inetd_ratelimit.conf 11 user = root,
21 user = root,
30 user = root,
39 user = root,
50 user = root,
59 user = root,
70 user = root,
80 user = root,
89 user = root,
98 user = root
    [all...]
  /src/distrib/utils/libhack/
getnetgr.c 38 getnetgrent(host, user, domain)
40 const char **user;
47 innetgr(grp, host, user, domain)
48 const char *grp, *host, *user, *domain;
  /src/lib/libpanel/
getuser.c 40 return p->user;
setuser.c 40 p->user = u;
  /src/usr.sbin/user/
Makefile 10 PROG= user
11 SRCS+= user.c main.c
12 LINKS+= ${BINDIR}/user ${BINDIR}/useradd
13 LINKS+= ${BINDIR}/user ${BINDIR}/userdel
14 LINKS+= ${BINDIR}/user ${BINDIR}/usermod
15 LINKS+= ${BINDIR}/user ${BINDIR}/group
16 LINKS+= ${BINDIR}/user ${BINDIR}/groupadd
17 LINKS+= ${BINDIR}/user ${BINDIR}/groupdel
18 LINKS+= ${BINDIR}/user ${BINDIR}/groupmod
19 LINKS+= ${BINDIR}/user ${BINDIR}/userinf
    [all...]
  /src/lib/libwrap/
hosts_ctl.c 6 * access control checker. The host name and user name arguments should be
32 hosts_ctl(char *daemon, char *name, char *addr, char *user)
40 RQ_USER, user,
eval.c 4 * Routines for controlled evaluation of host names, user names, and so on.
17 * When ALWAYS_RFC931 mode is off, user lookup is done only when required by
50 /* eval_user - look up user name */
55 if (request->user[0] == 0) {
56 (void)strlcpy(request->user, unknown, sizeof(request->user));
58 rfc931(request->client->sin, request->server->sin, request->user);
60 return (request->user);
116 #ifndef ALWAYS_RFC931 /* no implicit user lookups */
117 if (request->user[0] == 0
    [all...]
  /src/sys/arch/i386/stand/lib/
diskbuf.c 48 alloc_diskbuf(const void *user)
50 diskbuf_user = user;
  /src/lib/libpam/modules/pam_skey/
pam_skey.c 57 const char *user, *skinfo, *pass; local in function:pam_sm_authenticate
63 user = getlogin();
65 retval = pam_get_user(pamh, &user, NULL);
68 PAM_LOG("Got user: %s", user);
71 if (skey_haskey(user) != 0)
74 skinfo = skey_keyinfo(user);
93 retval = skey_passcheck(user, response) == -1 ?
  /src/sys/external/bsd/drm2/dist/drm/nouveau/nvkm/engine/disp/
nouveau_nvkm_engine_disp_piocgf119.c 41 int user = chan->chid.user; local in function:gf119_disp_pioc_fini
48 nvkm_error(subdev, "ch %d fini: %08x\n", user,
60 int user = chan->chid.user; local in function:gf119_disp_pioc_init
69 nvkm_error(subdev, "ch %d init: %08x\n", user,
82 .user = nv50_disp_chan_user,
nouveau_nvkm_engine_disp_piocnv50.c 41 int user = chan->chid.user; local in function:nv50_disp_pioc_fini
48 nvkm_error(subdev, "ch %d timeout: %08x\n", user,
60 int user = chan->chid.user; local in function:nv50_disp_pioc_init
67 nvkm_error(subdev, "ch %d timeout0: %08x\n", user,
78 nvkm_error(subdev, "ch %d timeout1: %08x\n", user,
91 .user = nv50_disp_chan_user,
nouveau_nvkm_engine_disp_dmacgf119.c 39 chan->chid.user, -9, handle,
40 chan->chid.user << 27 | 0x00000001);
49 int user = chan->chid.user; local in function:gf119_disp_dmac_fini
58 nvkm_error(subdev, "ch %d fini: %08x\n", user,
69 int user = chan->chid.user; local in function:gf119_disp_dmac_init
84 nvkm_error(subdev, "ch %d init: %08x\n", user,
97 .user = nv50_disp_chan_user,
  /src/usr.sbin/chroot/
chroot.c 97 getuser(const char *user)
102 if ((pw = getpwnam(user)) != NULL)
105 if (getnum(user, &num) == -1)
106 errx(1, "no such user `%s'", user);
114 char *user; /* user to switch to before running program */ local in function:main
123 user = NULL;
132 user = optarg;
133 if (*user == '\0'
    [all...]
  /src/usr.sbin/sdpd/
main.c 52 static bool drop_root (char const *user, char const *group);
67 char const *user = "_sdpd", *group = "_sdpd"; local in function:main
91 case 'u': /* user */
92 user = optarg;
137 if ((user != NULL || group != NULL) && !drop_root(user, group))
156 drop_root(char const *user, char const *group)
169 if (user != NULL) {
170 uid = strtol(user, &ep, 10);
172 struct passwd *pwd = getpwnam(user);
    [all...]
  /src/tests/fs/tmpfs/
t_create.sh 35 atf_set "require.user" "root"
51 atf_set "require.config" "unprivileged-user"
52 atf_set "require.user" "root"
55 user=$(atf_config_get unprivileged-user)
56 # Allow the unprivileged user to access the work directory.
57 chown ${user} .
76 atf_check -s exit:0 -o empty -e empty chown ${user}:0 b
78 [ ${st_uid} -eq $(id -u ${user}) ] || atf_fail "Incorrect owner"
81 atf_check -s exit:0 -o empty -e empty chown ${user}:100
    [all...]
  /src/libexec/httpd/
tilde-luzah-bozo.c 33 /* this code implements ~user support for bozohttpd */
50 * - chdir's /~user/public_html
55 * transform_request() is supposed to check that we have user support
62 char *s, *file = NULL, *user; local in function:bozo_user_transform
66 user = strchr(request->hr_file + 1, '~');
69 assert(user != NULL);
71 user++;
73 if ((s = strchr(user, '/')) != NULL) {
77 debug((httpd, DEBUG_OBESE, "looking for user %s",
78 user));
    [all...]
  /src/lib/libpam/modules/pam_guest/
pam_guest.c 78 const char *authtok, *guests, *user; local in function:pam_sm_authenticate
82 if (pam_get_user(pamh, &user, NULL) != PAM_SUCCESS || user == NULL)
90 is_guest = lookup(user, guests);
98 strcmp(user, authtok) != 0)
106 pam_setenv(pamh, "GUEST", user, 1);
  /src/lib/libpam/modules/pam_chroot/
pam_chroot.c 62 const char *dir, *end, *cwd, *user; local in function:pam_sm_open_session
67 if (pam_get_user(pamh, &user, NULL) != PAM_SUCCESS ||
68 user == NULL ||
69 getpwnam_r(user, &pwres, pwbuf, sizeof(pwbuf), &pwd) != 0 ||
80 "%s's home directory is too long", user);
91 "%s has no chroot directory", user);
97 openpam_log(PAM_LOG_DEBUG, "chrooting %s to %s", dir, user);
  /src/tests/fs/ffs/
t_miscquota.sh 29 "walk user quota list over several disk blocks" -b le 1 user
33 -b le 1 user
37 -boL le 1 user
41 -boC le 1 user
45 -boLC le 1 user
49 -l le 1 user
53 -oRL le 1 user
57 "new quota entry denied by default entry" 5 -b le 1 user
60 "new quota entry denied by default entry, with list on more than one block" 5000 -b le 1 user
    [all...]
  /src/lib/libpam/modules/pam_rhosts/
pam_rhosts.c 63 const char *user; local in function:pam_sm_authenticate
68 err = pam_get_user(pamh, &user, NULL);
72 if (getpwnam_r(user, &pwres, pwbuf, sizeof(pwbuf), &pwd) != 0 ||
87 superuser = (strcmp(user, "root") == 0);
88 err = ruserok(rhost, superuser, ruser, user);

Completed in 46 milliseconds

1 2 3 4 5 6 7 8 91011>>