/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/delegate/ |
H A D | delegate_common.kshlib | 89 typeset user 90 for user in $@; do 95 check_fs_perm $user $perm $dtst 98 check_vol_perm $user $perm $dtst 102 log_note "Check $type $user $perm $dtst" 104 log_note "Fail: $user should have $perm" \ 134 typeset user 135 for user in $@; do 140 check_fs_perm $user $perm $dtst 143 check_vol_perm $user $perm $dtst [all …]
|
/freebsd/tests/sys/cddl/zfs/tests/delegate/ |
H A D | delegate_common.kshlib | 85 typeset user 86 for user in $@; do 91 check_fs_perm $user $perm $dtst 94 check_vol_perm $user $perm $dtst 99 log_note "Fail: $user should have $perm " \ 129 typeset user 130 for user in $@; do 135 check_fs_perm $user $perm $dtst 138 check_vol_perm $user $perm $dtst 143 log_note "Fail: $user should not have $perm " \ [all …]
|
/freebsd/tests/sys/cddl/zfs/tests/acl/cifs/ |
H A D | cifs_attr_003_pos.ksh | 215 typeset user=$2 219 verify_expect $expect $CHG_USR_EXEC $user \ 221 verify_expect $expect $CHG_USR_EXEC $user \ 236 typeset user=$2 240 verify_expect $expect $CHG_USR_EXEC $user \ 242 verify_expect $expect $CHG_USR_EXEC $user \ 250 typeset user=$2 254 verify_expect $expect $CHG_USR_EXEC $user \ 269 typeset user=$2 275 verify_expect $expect $CHG_USR_EXEC $user \ [all …]
|
H A D | cifs_attr_001_pos.ksh | 85 typeset user=$3 92 if [[ -n $user ]]; then 93 $RUNWATTR -u $user "$CHMOD S+c${attr} $object" 114 typeset user=$3 121 if [[ -n $user ]]; then 122 $RUNWATTR -u $user "$CHMOD S-c${attr} $object" 140 typeset user=$1 143 if [[ -z $user || -z $object ]]; then 144 log_fail "User($user), Object($object) not defined." 151 if [[ $user == "root" ]]; then [all …]
|
H A D | cifs_attr_002_pos.ksh | 88 typeset user=$3 102 if [[ -n $user ]]; then 103 $RUNWATTR -u $user -p =basic${priv_mod} \ 125 typeset user=$3 139 if [[ -n $user ]]; then 140 $RUNWATTR -u $user -p =basic${priv_mod} \ 159 typeset user=$1 162 if [[ -z $user || -z $priv ]]; then 163 log_fail "User($user), Priv($priv) not defined." 176 typeset user=$1 [all …]
|
/freebsd/contrib/kyua/utils/ |
H A D | passwd_test.cpp | 49 const passwd_ns::user user("the-name", 1, 2); in ATF_TEST_CASE_BODY() local 50 ATF_REQUIRE_EQ("the-name", user.name); in ATF_TEST_CASE_BODY() 51 ATF_REQUIRE_EQ(1, user.uid); in ATF_TEST_CASE_BODY() 52 ATF_REQUIRE_EQ(2, user.gid); in ATF_TEST_CASE_BODY() 59 const passwd_ns::user user("i-am-root", 0, 10); in ATF_TEST_CASE_BODY() local 60 ATF_REQUIRE(user.is_root()); in ATF_TEST_CASE_BODY() 67 const passwd_ns::user user("i-am-not-root", 123, 10); in ATF_TEST_CASE_BODY() local 68 ATF_REQUIRE(!user.is_root()); in ATF_TEST_CASE_BODY() 75 const passwd_ns::user user = passwd_ns::current_user(); in ATF_TEST_CASE_BODY() local 76 ATF_REQUIRE_EQ(::getuid(), user.uid); in ATF_TEST_CASE_BODY() [all …]
|
H A D | passwd.cpp | 52 static utils::optional< passwd_ns::user > fake_current_user; 56 static std::vector< passwd_ns::user > mock_users; 65 format_user(const passwd_ns::user& user) in format_user() argument 67 return F("name=%s, uid=%s, gid=%s") % user.name % user.uid % user.gid; in format_user() 79 passwd_ns::user::user(const std::string& name_, const unsigned int uid_, in user() function in passwd_ns::user 92 passwd_ns::user::is_root(void) const in is_root() 101 passwd_ns::user 105 const user u = fake_current_user.get(); in current_user() 109 const user u = find_user_by_uid(::getuid()); in current_user() 123 passwd_ns::user [all …]
|
/freebsd/contrib/wpa/src/ap/ |
H A D | eap_user_db.c | 23 static void set_user_methods(struct hostapd_eap_user *user, const char *methods) in set_user_methods() argument 32 os_memset(&user->methods, 0, sizeof(user->methods)); in set_user_methods() 39 user->methods[num_methods].method = in set_user_methods() 41 &user->methods[num_methods].vendor); in set_user_methods() 42 if (user->methods[num_methods].vendor == EAP_VENDOR_IETF && in set_user_methods() 43 user->methods[num_methods].method == EAP_TYPE_NONE) { in set_user_methods() 45 user->ttls_auth |= EAP_TTLS_AUTH_PAP; in set_user_methods() 49 user->ttls_auth |= EAP_TTLS_AUTH_CHAP; in set_user_methods() 53 user->ttls_auth |= EAP_TTLS_AUTH_MSCHAP; in set_user_methods() 57 user->ttls_auth |= EAP_TTLS_AUTH_MSCHAPV2; in set_user_methods() [all …]
|
/freebsd/contrib/processor-trace/libipt/test/src/ |
H A D | ptunit-asid.c | 40 struct pt_asid user; in from_user_null() local 43 pt_asid_init(&user); in from_user_null() 48 errcode = pt_asid_from_user(NULL, &user); in from_user_null() 70 struct pt_asid asid, user; in from_user_small() local 73 user.size = sizeof(user.size); in from_user_small() 75 errcode = pt_asid_from_user(&asid, &user); in from_user_small() 86 struct pt_asid asid, user; in from_user_big() local 89 user.size = sizeof(user) + 4; in from_user_big() 90 user.cr3 = 0x4200ull; in from_user_big() 91 user.vmcs = 0x23000ull; in from_user_big() [all …]
|
/freebsd/usr.sbin/extattr/tests/ |
H A D | extattr_test.sh | 47 atf_check -s exit:0 -o empty setextattr user myattr XYZ foo 49 getextattr -qx user myattr foo 60 atf_check -s exit:0 -o empty setextattr user myattr "$BINSTUFF" foo 61 getextattr user myattr foo 63 getextattr -qx user myattr foo 79 atf_check -s exit:0 -o empty setextattr user $ATTRNAME myvalue foo 80 atf_check -s exit:0 -o inline:"${ATTRNAME}\n" lsextattr -q user foo 82 getextattr -q user ${ATTRNAME} foo 83 atf_check -s exit:0 -o empty rmextattr user ${ATTRNAME} foo 84 atf_check -s exit:0 -o empty lsextattr -q user foo [all …]
|
/freebsd/crypto/openssh/regress/unittests/misc/ |
H A D | test_parse.c | 29 char *user, *host, *path; in test_parse() local 33 &user, &host, &path), 0); in test_parse() 34 ASSERT_STRING_EQ(user, "someuser"); in test_parse() 37 free(user); free(host); free(path); in test_parse() 42 &user, &host, &path), 0); in test_parse() 43 ASSERT_STRING_EQ(user, "someuser"); in test_parse() 46 free(user); free(host); free(path); in test_parse() 51 &user, &host, &path), 0); in test_parse() 52 ASSERT_STRING_EQ(user, "someuser"); in test_parse() 55 free(user); free(host); free(path); in test_parse() [all …]
|
/freebsd/contrib/bsnmp/lib/ |
H A D | snmpcrypto.c | 65 snmp_digest_init(const struct snmp_user *user, EVP_MD_CTX *ctx, in snmp_digest_init() argument 68 if (user->auth_proto == SNMP_AUTH_HMAC_MD5) { in snmp_digest_init() 71 } else if (user->auth_proto == SNMP_AUTH_HMAC_SHA) { in snmp_digest_init() 74 } else if (user->auth_proto == SNMP_AUTH_NOAUTH) in snmp_digest_init() 78 user->auth_proto); in snmp_digest_init() 101 err = snmp_digest_init(&pdu->user, ctx, &dtype, &keylen); in snmp_pdu_calc_digest() 110 memcpy(extkey, pdu->user.auth_key, keylen); in snmp_pdu_calc_digest() 151 if (pdu->user.priv_proto == SNMP_PRIV_DES) { in snmp_pdu_cipher_init() 157 piv[i] = piv[i] ^ pdu->user.priv_key[8 + i]; in snmp_pdu_cipher_init() 158 } else if (pdu->user.priv_proto == SNMP_PRIV_AES) { in snmp_pdu_cipher_init() [all …]
|
/freebsd/crypto/openssh/regress/ |
H A D | addrmatch.sh | 10 user="$1"; addr="$2"; host="$3"; laddr="$4"; lport="$5" 13 verbose "test $descr for $user $addr $host" 15 -C user=${user},addr=${addr},host=${host},laddr=${laddr},lport=${lport} | \ 35 run_trial user 192.168.0.1 somehost 1.2.3.4 1234 match1 "first entry" 36 run_trial user 192.168.30.1 somehost 1.2.3.4 1234 nomatch "negative match" 37 run_trial user 19.0.0.1 somehost 1.2.3.4 1234 nomatch "no match" 38 run_trial user 10.255.255.254 somehost 1.2.3.4 1234 match1 "list middle" 39 run_trial user 192.168.30.1 192.168.0.1 1.2.3.4 1234 nomatch "faked IP in hostname" 40 run_trial user 1.1.1.1 somehost.example.com 1.2.3.4 1234 match2 "bare IP4 address" 41 run_trial user 19.0.0.1 somehost 127.0.0.1 1234 match3 "localaddress" [all …]
|
/freebsd/crypto/heimdal/lib/krb5/ |
H A D | get_default_principal.c | 43 const char *user = getenv("USER"); in get_env_user() local 44 if(user == NULL) in get_env_user() 45 user = getenv("LOGNAME"); in get_env_user() 46 if(user == NULL) in get_env_user() 47 user = getenv("USERNAME"); in get_env_user() 48 return user; in get_env_user() 64 const char *user; in _krb5_get_default_principal_local() local 71 user = getlogin(); in _krb5_get_default_principal_local() 72 if(user == NULL) in _krb5_get_default_principal_local() 73 user = get_env_user(); in _krb5_get_default_principal_local() [all …]
|
H A D | test_alname.c | 39 const char *user, const char *inst, in test_alname() argument 47 ret = krb5_make_principal(context, &p, realm, user, inst, NULL); in test_alname() 104 char *user; in main() local 125 user = argv[0]; in main() 135 test_alname(context, realm, user, NULL, user, 1); in main() 136 test_alname(context, realm, user, "root", "root", 1); in main() 138 test_alname(context, "FOO.BAR.BAZ.KAKA", user, NULL, user, 0); in main() 139 test_alname(context, "FOO.BAR.BAZ.KAKA", user, "root", "root", 0); in main() 141 test_alname(context, realm, user, NULL, in main() 143 test_alname(context, realm, user, "root", in main() [all …]
|
/freebsd/tests/sys/acl/ |
H A D | tools-nfs4.test | 78 > user:0:-----------C--:-------:allow 85 # Test user and group name resolving. 95 > user:root:-----------C--:-------:allow 115 > user:0:-----------C--:-------:allow 134 > user:0:-----------C--:-------:allow 149 > user:root:-----------C--:-------:allow:0 171 > user:0:-----------C--:-------:allow 186 > user:0:-----------C--:-------:allow 225 > user:42:--x-----------:-------:allow 234 > user:42:--x-----------:-------:allow [all …]
|
H A D | tools-nfs4-psarc.test | 69 > user:0:-----------C--:-------:allow 73 # Test user and group name resolving. 83 > user:root:-----------C--:-------:allow 98 > user:0:-----------C--:-------:allow 115 > user:0:-----------C--:-------:allow 128 > user:root:-----------C--:-------:allow:0 148 > user:0:-----------C--:-------:allow 161 > user:0:-----------C--:-------:allow 197 > user:42:--x-----------:-------:allow 203 > user:42:--x-----------:-------:allow [all …]
|
/freebsd/contrib/sendmail/libsm/ |
H A D | mbdb.c | 40 int (*mbdb_lookup) __P((char *name, SM_MBDB_T *user)); 45 static int mbdb_pw_lookup __P((char *name, SM_MBDB_T *user)); 51 static int mbdb_ldap_lookup __P((char *name, SM_MBDB_T *user)); 156 sm_mbdb_lookup(name, user) in sm_mbdb_lookup() argument 158 SM_MBDB_T *user; 163 ret = SmMbdbType->mbdb_lookup(name, user); 179 sm_mbdb_frompw(user, pw) in sm_mbdb_frompw() argument 180 SM_MBDB_T *user; in sm_mbdb_frompw() 183 SM_REQUIRE(user != NULL); 184 (void) sm_strlcpy(user->mbdb_name, pw->pw_name, [all …]
|
/freebsd/crypto/heimdal/lib/roken/ |
H A D | get_default_username.c | 46 const char *user; in get_default_username() local 48 user = getenv ("USER"); in get_default_username() 49 if (user == NULL) in get_default_username() 50 user = getenv ("LOGNAME"); in get_default_username() 51 if (user == NULL) in get_default_username() 52 user = getenv ("USERNAME"); in get_default_username() 55 if (user == NULL) { in get_default_username() 56 user = (const char *)getlogin (); in get_default_username() 57 if (user != NULL) in get_default_username() 58 return user; in get_default_username() [all …]
|
/freebsd/contrib/kyua/utils/process/ |
H A D | isolation.cpp | 137 process::isolate_child(const optional< passwd::user >& unprivileged_user, in isolate_child() 152 const passwd::user& user = unprivileged_user.get(); in isolate_child() local 154 if (user.gid != ::getgid()) { in isolate_child() 155 if (::setgid(user.gid) == -1) in isolate_child() 157 % user.gid % ::getuid() % ::getgid(), errno); in isolate_child() 160 groups[0] = user.gid; in isolate_child() 163 % user.gid % ::getuid() % ::getgid(), errno); in isolate_child() 166 if (user.uid != ::getuid()) { in isolate_child() 167 if (::setuid(user.uid) == -1) in isolate_child() 169 % user.uid % ::getuid() % ::getgid(), errno); in isolate_child() [all …]
|
/freebsd/lib/libpam/modules/pam_xdg/ |
H A D | pam_xdg.c | 57 const char *user; in _pam_xdg_open() local 69 rv = pam_get_item(pamh, PAM_USER, (const void **)&user); in _pam_xdg_open() 70 if (rv != PAM_SUCCESS || user == NULL) { in _pam_xdg_open() 74 if ((passwd = getpwnam(user)) == NULL) { in _pam_xdg_open() 93 rt_dir = openat(rt_dir_prefix, user, O_DIRECTORY | O_NOFOLLOW); in _pam_xdg_open() 95 rt_dir = mkdirat(rt_dir_prefix, user, RUNTIME_DIR_MODE); in _pam_xdg_open() 97 PAM_VERBOSE_ERROR("mkdir: %s/%s (%d)", RUNTIME_DIR_PREFIX, user, rt_dir); in _pam_xdg_open() 101 rv = fchownat(rt_dir_prefix, user, passwd->pw_uid, passwd->pw_gid, 0); in _pam_xdg_open() 103 PAM_VERBOSE_ERROR("fchownat: %s/%s (%d)", RUNTIME_DIR_PREFIX, user, rv); in _pam_xdg_open() 104 rv = unlinkat(rt_dir_prefix, user, AT_REMOVEDIR); in _pam_xdg_open() [all …]
|
/freebsd/usr.sbin/syslogd/tests/ |
H A D | syslogd_test.sh | 31 syslogd_log -p user.debug -t unix -h "${SYSLOGD_LOCAL_SOCKET}" \ 57 syslogd_log -4 -p user.debug -t inet -h 127.0.0.1 -P "${SYSLOGD_UDP_PORT}" \ 83 syslogd_log -6 -p user.debug -t unix -h ::1 -P "${SYSLOGD_UDP_PORT}" \ 104 syslogd_log -p user.debug -t reload -h "${SYSLOGD_LOCAL_SOCKET}" \ 113 syslogd_log -p user.debug -t reload -h "${SYSLOGD_LOCAL_SOCKET}" \ 137 syslogd_log -p user.debug -t "prog${i}" -h "${SYSLOGD_LOCAL_SOCKET}" \ 150 syslogd_log -p user.debug -t "prog${i}" -h "${SYSLOGD_LOCAL_SOCKET}" \ 174 syslogd_log -p user.debug -t "host${i}" -H "host${i}" \ 187 syslogd_log -p user.debug -t "host${i}" -H "host${i}" \ 211 syslogd_log -p user.debug -t "prop1" -h "${SYSLOGD_LOCAL_SOCKET}" "FreeBSD" [all …]
|
/freebsd/lib/libpam/modules/pam_login_access/ |
H A D | pam_login_access.c | 72 const void *rhost, *tty, *user; in pam_sm_acct_mgmt() local 76 pam_err = pam_get_item(pamh, PAM_USER, &user); in pam_sm_acct_mgmt() 80 if (user == NULL) in pam_sm_acct_mgmt() 83 PAM_LOG("Got user: %s", (const char *)user); in pam_sm_acct_mgmt() 105 (const char *)user, (const char *)rhost); in pam_sm_acct_mgmt() 106 if (login_access(user, rhost, &login_access_opts) != 0) in pam_sm_acct_mgmt() 109 (const char *)user, (const char *)rhost); in pam_sm_acct_mgmt() 112 (const char *)user, (const char *)tty); in pam_sm_acct_mgmt() 113 if (login_access(user, tty, &login_access_opts) != 0) in pam_sm_acct_mgmt() 116 (const char *)user, (const char *)tty); in pam_sm_acct_mgmt() [all …]
|
/freebsd/crypto/heimdal/lib/gssapi/mech/ |
H A D | gss_authorize_localname.c | 43 const struct _gss_name *user) in mech_authorize_localname() argument 58 &user->gn_value, in mech_authorize_localname() 59 &user->gn_type); in mech_authorize_localname() 73 const struct _gss_name *user) in attr_authorize_localname() argument 78 if (!gss_oid_equal(&user->gn_type, GSS_C_NT_USER_NAME)) in attr_authorize_localname() 102 value.length == user->gn_value.length && in attr_authorize_localname() 103 memcmp(value.value, user->gn_value.value, user->gn_value.length) == 0) in attr_authorize_localname() 123 const struct _gss_name *user = (const struct _gss_name *) gss_user; in gss_authorize_localname() local 137 if (HEIM_SLIST_FIRST(&user->gn_mn) != NULL) in gss_authorize_localname() 142 major_status = mech_authorize_localname(minor_status, name, user); in gss_authorize_localname() [all …]
|
/freebsd/contrib/pjdfstest/tests/granular/ |
H A D | 02.t | 26 expect 0 prependacl ${n0} user:65534:read_acl::deny 29 expect 0 prependacl ${n0} user:65534:read_acl::allow 36 expect EPERM -u 65534 -g 65534 prependacl ${n0} user:65534:read_data::allow 37 expect 0 prependacl ${n0} user:65534:write_acl::allow 38 expect 0 -u 65534 -g 65534 prependacl ${n0} user:65534:read_data::allow 44 expect 0 prependacl ${n0} user:65534:write_acl::allow 64 expect 0 prependacl ${n0} user:65534:write_acl::allow 71 expect 0 prependacl ${n0} user:65534:write_acl::allow 78 expect 0 prependacl ${n0} user:65534:write_acl::allow 84 expect 0 prependacl ${n0} user:65534:write_acl::allow [all …]
|