Home
last modified time | relevance | path

Searched full:user (Results 1 – 25 of 6466) sorted by relevance

12345678910>>...259

/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/delegate/
H A Ddelegate_common.kshlib38 # Cleanup exist user/group.
71 # Verify the specified user have permission on the dataset
90 typeset user
91 for user in $@; do
96 check_fs_perm $user $perm $dtst
99 check_vol_perm $user $perm $dtst
103 log_note "Check $type $user $perm $dtst"
105 log_note "Fail: $user should have $perm" \
116 # Verify the specified user have no permission on the dataset
135 typeset user
[all …]
/freebsd/tests/sys/cddl/zfs/tests/delegate/
H A Ddelegate_common.kshlib30 # Cleanup exist user/group.
66 # Verify the specified user have permission on the dataset
85 typeset user
86 for user in $@; do
91 check_fs_perm $user $perm $dtst
94 check_vol_perm $user $perm $dtst
99 log_note "Fail: $user should have $perm " \
110 # Verify the specified user have no permission on the dataset
129 typeset user
130 for user in $@; do
[all …]
/freebsd/tests/sys/cddl/zfs/tests/acl/cifs/
H A Dcifs_attr_003_pos.ksh49 # letting a user/application set them.
65 # 1. Loop super user and non-super user to run the test case.
209 # $2: Execute user
215 typeset user=$2
219 verify_expect $expect $CHG_USR_EXEC $user \
221 verify_expect $expect $CHG_USR_EXEC $user \
230 # $2: Execute user
236 typeset user=$2
240 verify_expect $expect $CHG_USR_EXEC $user \
242 verify_expect $expect $CHG_USR_EXEC $user \
[all …]
H A Dcifs_attr_001_pos.ksh37 # Verify the user with write_attributes permission or
42 # 1. Loop super user and non-super user to run the test case.
44 # 3. Grant user has write_attributes permission or
85 typeset user=$3
92 if [[ -n $user ]]; then
93 $RUNWATTR -u $user "$CHMOD S+c${attr} $object"
114 typeset user=$3
121 if [[ -n $user ]]; then
122 $RUNWATTR -u $user "$CHMOD S-c${attr} $object"
133 # Grant the ace of write_attributes to the given user
[all …]
H A Dcifs_attr_002_pos.ksh37 # Verify the user with PRIV_FILE_FLAG_SET/PRIV_FILE_FLAG_CLEAR
42 # 1. Loop super user and non-super user to run the test case.
44 # 3. Grant user has PRIV_FILE_FLAG_SET/PRIV_FILE_FLAG_CLEAR separately.
88 typeset user=$3
102 if [[ -n $user ]]; then
103 $RUNWATTR -u $user -p =basic${priv_mod} \
125 typeset user=$3
139 if [[ -n $user ]]; then
140 $RUNWATTR -u $user -p =basic${priv_mod} \
152 # Grant the privset to the given user
[all …]
/freebsd/contrib/kyua/utils/
H A Dpasswd_test.cpp49 const passwd_ns::user user("the-name", 1, 2); in ATF_TEST_CASE_BODY() local
50 ATF_REQUIRE_EQ("the-name", user.name); in ATF_TEST_CASE_BODY()
51 ATF_REQUIRE_EQ(1, user.uid); in ATF_TEST_CASE_BODY()
52 ATF_REQUIRE_EQ(2, user.gid); in ATF_TEST_CASE_BODY()
59 const passwd_ns::user user("i-am-root", 0, 10); in ATF_TEST_CASE_BODY() local
60 ATF_REQUIRE(user.is_root()); in ATF_TEST_CASE_BODY()
67 const passwd_ns::user user("i-am-not-root", 123, 10); in ATF_TEST_CASE_BODY() local
68 ATF_REQUIRE(!user.is_root()); in ATF_TEST_CASE_BODY()
75 const passwd_ns::user user = passwd_ns::current_user(); in ATF_TEST_CASE_BODY() local
76 ATF_REQUIRE_EQ(::getuid(), user.uid); in ATF_TEST_CASE_BODY()
[all …]
H A Dpasswd.cpp52 static utils::optional< passwd_ns::user > fake_current_user;
56 static std::vector< passwd_ns::user > mock_users;
59 /// Formats a user for logging purposes.
61 /// \param user The user to format.
63 /// \return The user as a string.
65 format_user(const passwd_ns::user& user) in format_user() argument
67 return F("name=%s, uid=%s, gid=%s") % user.name % user.uid % user.gid; in format_user()
74 /// Constructs a new user.
76 /// \param name_ The name of the user.
77 /// \param uid_ The user identifier.
[all …]
/freebsd/usr.bin/chpass/
H A Dchpass.138 .Nd add or change user database information
45 .Op user
54 .Op user
59 allows editing of the user database information associated
61 .Ar user
62 or, by default, the current user.
77 Only the information that the user is allowed to change is displayed.
82 The super-user is allowed to directly supply a user database
89 user database fields, although they may be empty.
95 The super-user is allowed to directly supply an encrypted password field,
[all …]
/freebsd/usr.sbin/extattr/tests/
H A Dextattr_test.sh47 atf_check -s exit:0 -o empty setextattr user myattr XYZ foo
49 getextattr -qx user myattr foo
60 atf_check -s exit:0 -o empty setextattr user myattr "$BINSTUFF" foo
61 getextattr user myattr foo
63 getextattr -qx user myattr foo
79 atf_check -s exit:0 -o empty setextattr user $ATTRNAME myvalue foo
80 atf_check -s exit:0 -o inline:"${ATTRNAME}\n" lsextattr -q user foo
82 getextattr -q user ${ATTRNAME} foo
83 atf_check -s exit:0 -o empty rmextattr user ${ATTRNAME} foo
84 atf_check -s exit:0 -o empty lsextattr -q user foo
[all …]
/freebsd/contrib/processor-trace/libipt/test/src/
H A Dptunit-asid.c40 struct pt_asid user; in from_user_null() local
43 pt_asid_init(&user); in from_user_null()
48 errcode = pt_asid_from_user(NULL, &user); in from_user_null()
70 struct pt_asid asid, user; in from_user_small() local
73 user.size = sizeof(user.size); in from_user_small()
75 errcode = pt_asid_from_user(&asid, &user); in from_user_small()
86 struct pt_asid asid, user; in from_user_big() local
89 user.size = sizeof(user) + 4; in from_user_big()
90 user.cr3 = 0x4200ull; in from_user_big()
91 user.vmcs = 0x23000ull; in from_user_big()
[all …]
/freebsd/contrib/wpa/src/ap/
H A Deap_user_db.c2 * hostapd / EAP user database
23 static void set_user_methods(struct hostapd_eap_user *user, const char *methods) in set_user_methods() argument
32 os_memset(&user->methods, 0, sizeof(user->methods)); in set_user_methods()
39 user->methods[num_methods].method = in set_user_methods()
41 &user->methods[num_methods].vendor); in set_user_methods()
42 if (user->methods[num_methods].vendor == EAP_VENDOR_IETF && in set_user_methods()
43 user->methods[num_methods].method == EAP_TYPE_NONE) { in set_user_methods()
45 user->ttls_auth |= EAP_TTLS_AUTH_PAP; in set_user_methods()
49 user->ttls_auth |= EAP_TTLS_AUTH_CHAP; in set_user_methods()
53 user->ttls_auth |= EAP_TTLS_AUTH_MSCHAP; in set_user_methods()
[all …]
/freebsd/lib/libsys/
H A Dsetuid.236 .Nd set user and group ID
54 user IDs and the saved set-user-ID of the current process
57 .\" The real user ID and the saved set-user-ID are changed only if the
58 .\" effective user ID is that of the super user.
63 .\" system call if the effective user ID is not that of the super user.
67 system call is permitted if the specified ID is equal to the real user ID
69 .\" or the saved set-user-ID
71 or the effective user ID
72 of the process, or if the effective user ID is that of the super user.
82 .\" effective user ID is that of the super user.
[all …]
/freebsd/sys/dev/isci/scil/
H A Dscic_user_callback.h61 * be implemented by an SCI Core user.
73 * @brief This callback method asks the user to create a timer and provide
85 * the user must retain. This cookie is to be supplied by the
86 * user anytime a timeout occurs for the created timer.
89 * user. The handle will be utilized for all further interactions
99 * @brief This callback method asks the user to destroy the supplied timer.
113 * @brief This callback method asks the user to start the supplied timer.
116 * timers. Therefore, the SCI user should make sure that it
118 * Additionally, SCI Core user's should be able to handle
138 * @brief This callback method asks the user to stop the supplied timer.
[all …]
H A Dscif_user_callback.h61 * be implemented by an SCI Framework user.
77 * @brief This callback method asks the user to create a timer and provide
89 * the user must retain. This cookie is to be supplied by the
90 * user anytime a timeout occurs for the created timer.
93 * user. The handle will be utilized for all further interactions
103 * @brief This callback method asks the user to destroy the supplied timer.
117 * @brief This callback method asks the user to start the supplied timer.
120 * shot timers. Therefore, the SCI user should make sure that it
122 * Additionally, SCI Framework user's should be able to handle
142 * @brief This callback method asks the user to stop the supplied timer.
[all …]
/freebsd/crypto/krb5/src/man/
H A Dksu.man32 ksu \- Kerberized super-user
54 one is to securely change the real and effective user ID to that of
55 the target user, and the other is to create a new security context.
61 the user invoking the program will start with "source"
62 (e.g., "source user", "source cache", etc.).
72 is the first step in authentication. The user can either specify his
75 described in the OPTIONS section (see \fB\-n\fP option). The target user
77 default. If \fB\&.\fP is specified then the target user will be the
78 source user (e.g., \fBksu .\fP). If the source user is root or the
79 target user is the source user, no authentication or authorization
[all …]
/freebsd/usr.bin/id/
H A Did.136 .Nd return user identity
39 .Op Ar user
44 .Op Ar user
49 .Op Ar user
54 .Op Ar user
57 .Op Ar user
60 .Op Ar user
64 utility displays the user and group names and numeric IDs, of the
70 .Ar user
71 (login name or user ID)
[all …]
/freebsd/usr.sbin/adduser/
H A Drmuser.843 In removing a user from the system, this utility:
46 Removes the user's
52 jobs belonging to the user.
56 signal to all processes owned by the user.
58 Removes the user from the system's local password file.
60 Removes the user's home directory (if it is owned by the user),
65 user from
68 Removes all files owned by the user from
78 per-user unique groups.)
81 semaphores owned by the user.
[all …]
/freebsd/crypto/krb5/doc/html/_sources/user/user_commands/
H A Dksu.rst.txt34 one is to securely change the real and effective user ID to that of
35 the target user, and the other is to create a new security context.
40 the user invoking the program will start with "source"
41 (e.g., "source user", "source cache", etc.).
51 is the first step in authentication. The user can either specify his
54 described in the OPTIONS section (see **-n** option). The target user
56 default. If ``.`` is specified then the target user will be the
57 source user (e.g., ``ksu .``). If the source user is root or the
58 target user is the source user, no authentication or authorization
68 **GET_TGT_VIA_PASSWD** define, the user will be prompted for a
[all …]
/freebsd/crypto/krb5/doc/user/user_commands/
H A Dksu.rst34 one is to securely change the real and effective user ID to that of
35 the target user, and the other is to create a new security context.
40 the user invoking the program will start with "source"
41 (e.g., "source user", "source cache", etc.).
51 is the first step in authentication. The user can either specify his
54 described in the OPTIONS section (see **-n** option). The target user
56 default. If ``.`` is specified then the target user will be the
57 source user (e.g., ``ksu .``). If the source user is root or the
58 target user is the source user, no authentication or authorization
68 **GET_TGT_VIA_PASSWD** define, the user will be prompted for a
[all …]
/freebsd/lib/libpam/modules/pam_krb5/
H A Dpam_krb5.828 provides functions to verify the identity of a user
30 and to set user specific credentials
43 It prompts the user for a password and obtains a new Kerberos TGT for
58 The credentials cache should be destroyed by the user at logout with
69 suppress warning messages to the user.
71 reasons why the user's
75 and a previous module obtained the user's password, that password is
76 used to authenticate the user.
78 module returns failure without prompting the user for a password.
81 user's password.
[all …]
/freebsd/include/
H A Dunistd.h93 * implemented (or not) in user mode. Please keep this list in
161 * Those that are marked `user' are implemented entirely in the C
173 #define _SC_BC_BASE_MAX 9 /* user */
174 #define _SC_BC_DIM_MAX 10 /* user */
175 #define _SC_BC_SCALE_MAX 11 /* user */
176 #define _SC_BC_STRING_MAX 12 /* user */
177 #define _SC_COLL_WEIGHTS_MAX 13 /* user */
178 #define _SC_EXPR_NEST_MAX 14 /* user */
179 #define _SC_LINE_MAX 15 /* user */
180 #define _SC_RE_DUP_MAX 16 /* user */
[all …]
/freebsd/lib/libpam/modules/pam_xdg/
H A Dpam_xdg.c57 const char *user; in _pam_xdg_open() local
68 /* Get user info */ in _pam_xdg_open()
69 rv = pam_get_item(pamh, PAM_USER, (const void **)&user); in _pam_xdg_open()
70 if (rv != PAM_SUCCESS || user == NULL) { in _pam_xdg_open()
71 PAM_VERBOSE_ERROR("Can't get user information"); in _pam_xdg_open()
74 if ((passwd = getpwnam(user)) == NULL) { in _pam_xdg_open()
75 PAM_VERBOSE_ERROR("Can't get user information"); in _pam_xdg_open()
92 /* Open or create the user xdg directory */ in _pam_xdg_open()
93 rt_dir = openat(rt_dir_prefix, user, O_DIRECTORY | O_NOFOLLOW); in _pam_xdg_open()
95 rt_dir = mkdirat(rt_dir_prefix, user, RUNTIME_DIR_MODE); in _pam_xdg_open()
[all …]
/freebsd/usr.bin/su/
H A Dsu.133 .Nd substitute user identity
43 utility requests appropriate user credentials via PAM
44 and switches to that user ID
45 (the default user is the superuser).
64 .Ev USER ,
72 .Ev USER
73 is set to the target login, unless the target login has a user ID of 0,
78 Resource limits and session priority applicable to the original user's
81 are also normally retained unless the target login has a user ID of 0.
89 Only allowed for the super-user.
[all …]
/freebsd/contrib/bsnmp/lib/
H A Dsnmpcrypto.c65 snmp_digest_init(const struct snmp_user *user, EVP_MD_CTX *ctx, in snmp_digest_init() argument
68 if (user->auth_proto == SNMP_AUTH_HMAC_MD5) { in snmp_digest_init()
71 } else if (user->auth_proto == SNMP_AUTH_HMAC_SHA) { in snmp_digest_init()
74 } else if (user->auth_proto == SNMP_AUTH_NOAUTH) in snmp_digest_init()
78 user->auth_proto); in snmp_digest_init()
101 err = snmp_digest_init(&pdu->user, ctx, &dtype, &keylen); in snmp_pdu_calc_digest()
110 memcpy(extkey, pdu->user.auth_key, keylen); in snmp_pdu_calc_digest()
151 if (pdu->user.priv_proto == SNMP_PRIV_DES) { in snmp_pdu_cipher_init()
157 piv[i] = piv[i] ^ pdu->user.priv_key[8 + i]; in snmp_pdu_cipher_init()
158 } else if (pdu->user.priv_proto == SNMP_PRIV_AES) { in snmp_pdu_cipher_init()
[all …]
/freebsd/crypto/openssh/regress/
H A Dcert-userkey.sh4 tid="certified user keys"
6 rm -f $OBJ/authorized_keys_$USER $OBJ/user_ca_key* $OBJ/cert_user_key*
43 # Generate and sign user keys
45 verbose "$tid: sign user ${ktype} cert"
55 -I "regress user key for $USER" \
56 -n ${USER},mekmitasdigoat $tflag $OBJ/cert_user_key_${ktype} || \
66 rm -f $OBJ/authorized_keys_$USER
81 rm -f $OBJ/authorized_principals_$USER
90 echo > $OBJ/authorized_principals_$USER
99 echo gregorsamsa > $OBJ/authorized_principals_$USER
[all …]

12345678910>>...259