/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/delegate/ |
H A D | delegate_common.kshlib | 38 # Cleanup exist user/group. 71 # Verify the specified user have permission on the dataset 90 typeset user 91 for user in $@; do 96 check_fs_perm $user $perm $dtst 99 check_vol_perm $user $perm $dtst 103 log_note "Check $type $user $perm $dtst" 105 log_note "Fail: $user should have $perm" \ 116 # Verify the specified user have no permission on the dataset 135 typeset user [all …]
|
/freebsd/tests/sys/cddl/zfs/tests/delegate/ |
H A D | delegate_common.kshlib | 30 # Cleanup exist user/group. 66 # Verify the specified user have permission on the dataset 85 typeset user 86 for user in $@; do 91 check_fs_perm $user $perm $dtst 94 check_vol_perm $user $perm $dtst 99 log_note "Fail: $user should have $perm " \ 110 # Verify the specified user have no permission on the dataset 129 typeset user 130 for user in $@; do [all …]
|
/freebsd/tests/sys/cddl/zfs/tests/acl/cifs/ |
H A D | cifs_attr_003_pos.ksh | 49 # letting a user/application set them. 65 # 1. Loop super user and non-super user to run the test case. 209 # $2: Execute user 215 typeset user=$2 219 verify_expect $expect $CHG_USR_EXEC $user \ 221 verify_expect $expect $CHG_USR_EXEC $user \ 230 # $2: Execute user 236 typeset user=$2 240 verify_expect $expect $CHG_USR_EXEC $user \ 242 verify_expect $expect $CHG_USR_EXEC $user \ [all …]
|
H A D | cifs_attr_001_pos.ksh | 37 # Verify the user with write_attributes permission or 42 # 1. Loop super user and non-super user to run the test case. 44 # 3. Grant user has write_attributes permission or 85 typeset user=$3 92 if [[ -n $user ]]; then 93 $RUNWATTR -u $user "$CHMOD S+c${attr} $object" 114 typeset user=$3 121 if [[ -n $user ]]; then 122 $RUNWATTR -u $user "$CHMOD S-c${attr} $object" 133 # Grant the ace of write_attributes to the given user [all …]
|
H A D | cifs_attr_002_pos.ksh | 37 # Verify the user with PRIV_FILE_FLAG_SET/PRIV_FILE_FLAG_CLEAR 42 # 1. Loop super user and non-super user to run the test case. 44 # 3. Grant user has PRIV_FILE_FLAG_SET/PRIV_FILE_FLAG_CLEAR separately. 88 typeset user=$3 102 if [[ -n $user ]]; then 103 $RUNWATTR -u $user -p =basic${priv_mod} \ 125 typeset user=$3 139 if [[ -n $user ]]; then 140 $RUNWATTR -u $user -p =basic${priv_mod} \ 152 # Grant the privset to the given user [all …]
|
/freebsd/contrib/kyua/utils/ |
H A D | passwd_test.cpp | 49 const passwd_ns::user user("the-name", 1, 2); in ATF_TEST_CASE_BODY() local 50 ATF_REQUIRE_EQ("the-name", user.name); in ATF_TEST_CASE_BODY() 51 ATF_REQUIRE_EQ(1, user.uid); in ATF_TEST_CASE_BODY() 52 ATF_REQUIRE_EQ(2, user.gid); in ATF_TEST_CASE_BODY() 59 const passwd_ns::user user("i-am-root", 0, 10); in ATF_TEST_CASE_BODY() local 60 ATF_REQUIRE(user.is_root()); in ATF_TEST_CASE_BODY() 67 const passwd_ns::user user("i-am-not-root", 123, 10); in ATF_TEST_CASE_BODY() local 68 ATF_REQUIRE(!user.is_root()); in ATF_TEST_CASE_BODY() 75 const passwd_ns::user user = passwd_ns::current_user(); in ATF_TEST_CASE_BODY() local 76 ATF_REQUIRE_EQ(::getuid(), user.uid); in ATF_TEST_CASE_BODY() [all …]
|
H A D | passwd.cpp | 52 static utils::optional< passwd_ns::user > fake_current_user; 56 static std::vector< passwd_ns::user > mock_users; 59 /// Formats a user for logging purposes. 61 /// \param user The user to format. 63 /// \return The user as a string. 65 format_user(const passwd_ns::user& user) in format_user() argument 67 return F("name=%s, uid=%s, gid=%s") % user.name % user.uid % user.gid; in format_user() 74 /// Constructs a new user. 76 /// \param name_ The name of the user. 77 /// \param uid_ The user identifier. [all …]
|
/freebsd/usr.bin/chpass/ |
H A D | chpass.1 | 38 .Nd add or change user database information 45 .Op user 54 .Op user 59 allows editing of the user database information associated 61 .Ar user 62 or, by default, the current user. 77 Only the information that the user is allowed to change is displayed. 82 The super-user is allowed to directly supply a user database 89 user database fields, although they may be empty. 95 The super-user is allowed to directly supply an encrypted password field, [all …]
|
/freebsd/usr.sbin/extattr/tests/ |
H A D | extattr_test.sh | 47 atf_check -s exit:0 -o empty setextattr user myattr XYZ foo 49 getextattr -qx user myattr foo 60 atf_check -s exit:0 -o empty setextattr user myattr "$BINSTUFF" foo 61 getextattr user myattr foo 63 getextattr -qx user myattr foo 79 atf_check -s exit:0 -o empty setextattr user $ATTRNAME myvalue foo 80 atf_check -s exit:0 -o inline:"${ATTRNAME}\n" lsextattr -q user foo 82 getextattr -q user ${ATTRNAME} foo 83 atf_check -s exit:0 -o empty rmextattr user ${ATTRNAME} foo 84 atf_check -s exit:0 -o empty lsextattr -q user foo [all …]
|
/freebsd/contrib/processor-trace/libipt/test/src/ |
H A D | ptunit-asid.c | 40 struct pt_asid user; in from_user_null() local 43 pt_asid_init(&user); in from_user_null() 48 errcode = pt_asid_from_user(NULL, &user); in from_user_null() 70 struct pt_asid asid, user; in from_user_small() local 73 user.size = sizeof(user.size); in from_user_small() 75 errcode = pt_asid_from_user(&asid, &user); in from_user_small() 86 struct pt_asid asid, user; in from_user_big() local 89 user.size = sizeof(user) + 4; in from_user_big() 90 user.cr3 = 0x4200ull; in from_user_big() 91 user.vmcs = 0x23000ull; in from_user_big() [all …]
|
/freebsd/contrib/wpa/src/ap/ |
H A D | eap_user_db.c | 2 * hostapd / EAP user database 23 static void set_user_methods(struct hostapd_eap_user *user, const char *methods) in set_user_methods() argument 32 os_memset(&user->methods, 0, sizeof(user->methods)); in set_user_methods() 39 user->methods[num_methods].method = in set_user_methods() 41 &user->methods[num_methods].vendor); in set_user_methods() 42 if (user->methods[num_methods].vendor == EAP_VENDOR_IETF && in set_user_methods() 43 user->methods[num_methods].method == EAP_TYPE_NONE) { in set_user_methods() 45 user->ttls_auth |= EAP_TTLS_AUTH_PAP; in set_user_methods() 49 user->ttls_auth |= EAP_TTLS_AUTH_CHAP; in set_user_methods() 53 user->ttls_auth |= EAP_TTLS_AUTH_MSCHAP; in set_user_methods() [all …]
|
/freebsd/lib/libsys/ |
H A D | setuid.2 | 36 .Nd set user and group ID 54 user IDs and the saved set-user-ID of the current process 57 .\" The real user ID and the saved set-user-ID are changed only if the 58 .\" effective user ID is that of the super user. 63 .\" system call if the effective user ID is not that of the super user. 67 system call is permitted if the specified ID is equal to the real user ID 69 .\" or the saved set-user-ID 71 or the effective user ID 72 of the process, or if the effective user ID is that of the super user. 82 .\" effective user ID is that of the super user. [all …]
|
/freebsd/sys/dev/isci/scil/ |
H A D | scic_user_callback.h | 61 * be implemented by an SCI Core user. 73 * @brief This callback method asks the user to create a timer and provide 85 * the user must retain. This cookie is to be supplied by the 86 * user anytime a timeout occurs for the created timer. 89 * user. The handle will be utilized for all further interactions 99 * @brief This callback method asks the user to destroy the supplied timer. 113 * @brief This callback method asks the user to start the supplied timer. 116 * timers. Therefore, the SCI user should make sure that it 118 * Additionally, SCI Core user's should be able to handle 138 * @brief This callback method asks the user to stop the supplied timer. [all …]
|
H A D | scif_user_callback.h | 61 * be implemented by an SCI Framework user. 77 * @brief This callback method asks the user to create a timer and provide 89 * the user must retain. This cookie is to be supplied by the 90 * user anytime a timeout occurs for the created timer. 93 * user. The handle will be utilized for all further interactions 103 * @brief This callback method asks the user to destroy the supplied timer. 117 * @brief This callback method asks the user to start the supplied timer. 120 * shot timers. Therefore, the SCI user should make sure that it 122 * Additionally, SCI Framework user's should be able to handle 142 * @brief This callback method asks the user to stop the supplied timer. [all …]
|
/freebsd/crypto/krb5/src/man/ |
H A D | ksu.man | 32 ksu \- Kerberized super-user 54 one is to securely change the real and effective user ID to that of 55 the target user, and the other is to create a new security context. 61 the user invoking the program will start with "source" 62 (e.g., "source user", "source cache", etc.). 72 is the first step in authentication. The user can either specify his 75 described in the OPTIONS section (see \fB\-n\fP option). The target user 77 default. If \fB\&.\fP is specified then the target user will be the 78 source user (e.g., \fBksu .\fP). If the source user is root or the 79 target user is the source user, no authentication or authorization [all …]
|
/freebsd/usr.bin/id/ |
H A D | id.1 | 36 .Nd return user identity 39 .Op Ar user 44 .Op Ar user 49 .Op Ar user 54 .Op Ar user 57 .Op Ar user 60 .Op Ar user 64 utility displays the user and group names and numeric IDs, of the 70 .Ar user 71 (login name or user ID) [all …]
|
/freebsd/usr.sbin/adduser/ |
H A D | rmuser.8 | 43 In removing a user from the system, this utility: 46 Removes the user's 52 jobs belonging to the user. 56 signal to all processes owned by the user. 58 Removes the user from the system's local password file. 60 Removes the user's home directory (if it is owned by the user), 65 user from 68 Removes all files owned by the user from 78 per-user unique groups.) 81 semaphores owned by the user. [all …]
|
/freebsd/crypto/krb5/doc/html/_sources/user/user_commands/ |
H A D | ksu.rst.txt | 34 one is to securely change the real and effective user ID to that of 35 the target user, and the other is to create a new security context. 40 the user invoking the program will start with "source" 41 (e.g., "source user", "source cache", etc.). 51 is the first step in authentication. The user can either specify his 54 described in the OPTIONS section (see **-n** option). The target user 56 default. If ``.`` is specified then the target user will be the 57 source user (e.g., ``ksu .``). If the source user is root or the 58 target user is the source user, no authentication or authorization 68 **GET_TGT_VIA_PASSWD** define, the user will be prompted for a [all …]
|
/freebsd/crypto/krb5/doc/user/user_commands/ |
H A D | ksu.rst | 34 one is to securely change the real and effective user ID to that of 35 the target user, and the other is to create a new security context. 40 the user invoking the program will start with "source" 41 (e.g., "source user", "source cache", etc.). 51 is the first step in authentication. The user can either specify his 54 described in the OPTIONS section (see **-n** option). The target user 56 default. If ``.`` is specified then the target user will be the 57 source user (e.g., ``ksu .``). If the source user is root or the 58 target user is the source user, no authentication or authorization 68 **GET_TGT_VIA_PASSWD** define, the user will be prompted for a [all …]
|
/freebsd/lib/libpam/modules/pam_krb5/ |
H A D | pam_krb5.8 | 28 provides functions to verify the identity of a user 30 and to set user specific credentials 43 It prompts the user for a password and obtains a new Kerberos TGT for 58 The credentials cache should be destroyed by the user at logout with 69 suppress warning messages to the user. 71 reasons why the user's 75 and a previous module obtained the user's password, that password is 76 used to authenticate the user. 78 module returns failure without prompting the user for a password. 81 user's password. [all …]
|
/freebsd/include/ |
H A D | unistd.h | 93 * implemented (or not) in user mode. Please keep this list in 161 * Those that are marked `user' are implemented entirely in the C 173 #define _SC_BC_BASE_MAX 9 /* user */ 174 #define _SC_BC_DIM_MAX 10 /* user */ 175 #define _SC_BC_SCALE_MAX 11 /* user */ 176 #define _SC_BC_STRING_MAX 12 /* user */ 177 #define _SC_COLL_WEIGHTS_MAX 13 /* user */ 178 #define _SC_EXPR_NEST_MAX 14 /* user */ 179 #define _SC_LINE_MAX 15 /* user */ 180 #define _SC_RE_DUP_MAX 16 /* user */ [all …]
|
/freebsd/lib/libpam/modules/pam_xdg/ |
H A D | pam_xdg.c | 57 const char *user; in _pam_xdg_open() local 68 /* Get user info */ in _pam_xdg_open() 69 rv = pam_get_item(pamh, PAM_USER, (const void **)&user); in _pam_xdg_open() 70 if (rv != PAM_SUCCESS || user == NULL) { in _pam_xdg_open() 71 PAM_VERBOSE_ERROR("Can't get user information"); in _pam_xdg_open() 74 if ((passwd = getpwnam(user)) == NULL) { in _pam_xdg_open() 75 PAM_VERBOSE_ERROR("Can't get user information"); in _pam_xdg_open() 92 /* Open or create the user xdg directory */ in _pam_xdg_open() 93 rt_dir = openat(rt_dir_prefix, user, O_DIRECTORY | O_NOFOLLOW); in _pam_xdg_open() 95 rt_dir = mkdirat(rt_dir_prefix, user, RUNTIME_DIR_MODE); in _pam_xdg_open() [all …]
|
/freebsd/usr.bin/su/ |
H A D | su.1 | 33 .Nd substitute user identity 43 utility requests appropriate user credentials via PAM 44 and switches to that user ID 45 (the default user is the superuser). 64 .Ev USER , 72 .Ev USER 73 is set to the target login, unless the target login has a user ID of 0, 78 Resource limits and session priority applicable to the original user's 81 are also normally retained unless the target login has a user ID of 0. 89 Only allowed for the super-user. [all …]
|
/freebsd/contrib/bsnmp/lib/ |
H A D | snmpcrypto.c | 65 snmp_digest_init(const struct snmp_user *user, EVP_MD_CTX *ctx, in snmp_digest_init() argument 68 if (user->auth_proto == SNMP_AUTH_HMAC_MD5) { in snmp_digest_init() 71 } else if (user->auth_proto == SNMP_AUTH_HMAC_SHA) { in snmp_digest_init() 74 } else if (user->auth_proto == SNMP_AUTH_NOAUTH) in snmp_digest_init() 78 user->auth_proto); in snmp_digest_init() 101 err = snmp_digest_init(&pdu->user, ctx, &dtype, &keylen); in snmp_pdu_calc_digest() 110 memcpy(extkey, pdu->user.auth_key, keylen); in snmp_pdu_calc_digest() 151 if (pdu->user.priv_proto == SNMP_PRIV_DES) { in snmp_pdu_cipher_init() 157 piv[i] = piv[i] ^ pdu->user.priv_key[8 + i]; in snmp_pdu_cipher_init() 158 } else if (pdu->user.priv_proto == SNMP_PRIV_AES) { in snmp_pdu_cipher_init() [all …]
|
/freebsd/crypto/openssh/regress/ |
H A D | cert-userkey.sh | 4 tid="certified user keys" 6 rm -f $OBJ/authorized_keys_$USER $OBJ/user_ca_key* $OBJ/cert_user_key* 43 # Generate and sign user keys 45 verbose "$tid: sign user ${ktype} cert" 55 -I "regress user key for $USER" \ 56 -n ${USER},mekmitasdigoat $tflag $OBJ/cert_user_key_${ktype} || \ 66 rm -f $OBJ/authorized_keys_$USER 81 rm -f $OBJ/authorized_principals_$USER 90 echo > $OBJ/authorized_principals_$USER 99 echo gregorsamsa > $OBJ/authorized_principals_$USER [all …]
|