/freebsd-src/sys/contrib/openzfs/tests/zfs-tests/tests/functional/delegate/ |
H A D | delegate_common.kshlib | 37 # Cleanup exist user/group. 70 # Verify the specified user have permission on the dataset 89 typeset user 90 for user in $@; do 95 check_fs_perm $user $perm $dtst 98 check_vol_perm $user $perm $dtst 102 log_note "Check $type $user $perm $dtst" 104 log_note "Fail: $user should have $perm" \ 115 # Verify the specified user have no permission on the dataset 134 typeset user [all …]
|
/freebsd-src/tests/sys/cddl/zfs/tests/delegate/ |
H A D | delegate_common.kshlib | 30 # Cleanup exist user/group. 66 # Verify the specified user have permission on the dataset 85 typeset user 86 for user in $@; do 91 check_fs_perm $user $perm $dtst 94 check_vol_perm $user $perm $dtst 99 log_note "Fail: $user should have $perm " \ 110 # Verify the specified user have no permission on the dataset 129 typeset user 130 for user in $@; do [all …]
|
/freebsd-src/tests/sys/cddl/zfs/tests/acl/cifs/ |
H A D | cifs_attr_003_pos.ksh | 49 # letting a user/application set them. 65 # 1. Loop super user and non-super user to run the test case. 209 # $2: Execute user 215 typeset user=$2 219 verify_expect $expect $CHG_USR_EXEC $user \ 221 verify_expect $expect $CHG_USR_EXEC $user \ 230 # $2: Execute user 236 typeset user=$2 240 verify_expect $expect $CHG_USR_EXEC $user \ 242 verify_expect $expect $CHG_USR_EXEC $user \ [all …]
|
H A D | cifs_attr_001_pos.ksh | 37 # Verify the user with write_attributes permission or 42 # 1. Loop super user and non-super user to run the test case. 44 # 3. Grant user has write_attributes permission or 85 typeset user=$3 92 if [[ -n $user ]]; then 93 $RUNWATTR -u $user "$CHMOD S+c${attr} $object" 114 typeset user=$3 121 if [[ -n $user ]]; then 122 $RUNWATTR -u $user "$CHMOD S-c${attr} $object" 133 # Grant the ace of write_attributes to the given user [all …]
|
H A D | cifs_attr_002_pos.ksh | 37 # Verify the user with PRIV_FILE_FLAG_SET/PRIV_FILE_FLAG_CLEAR 42 # 1. Loop super user and non-super user to run the test case. 44 # 3. Grant user has PRIV_FILE_FLAG_SET/PRIV_FILE_FLAG_CLEAR separately. 88 typeset user=$3 102 if [[ -n $user ]]; then 103 $RUNWATTR -u $user -p =basic${priv_mod} \ 125 typeset user=$3 139 if [[ -n $user ]]; then 140 $RUNWATTR -u $user -p =basic${priv_mod} \ 152 # Grant the privset to the given user [all …]
|
/freebsd-src/contrib/kyua/utils/ |
H A D | passwd_test.cpp | 49 const passwd_ns::user user("the-name", 1, 2); in ATF_TEST_CASE_BODY() local 50 ATF_REQUIRE_EQ("the-name", user.name); in ATF_TEST_CASE_BODY() 51 ATF_REQUIRE_EQ(1, user.uid); in ATF_TEST_CASE_BODY() 52 ATF_REQUIRE_EQ(2, user.gid); in ATF_TEST_CASE_BODY() 59 const passwd_ns::user user("i-am-root", 0, 10); in ATF_TEST_CASE_BODY() local 60 ATF_REQUIRE(user.is_root()); in ATF_TEST_CASE_BODY() 67 const passwd_ns::user user("i-am-not-root", 123, 10); in ATF_TEST_CASE_BODY() local 68 ATF_REQUIRE(!user.is_root()); in ATF_TEST_CASE_BODY() 75 const passwd_ns::user user = passwd_ns::current_user(); in ATF_TEST_CASE_BODY() local 76 ATF_REQUIRE_EQ(::getuid(), user.uid); in ATF_TEST_CASE_BODY() [all …]
|
H A D | passwd.cpp | 52 static utils::optional< passwd_ns::user > fake_current_user; 56 static std::vector< passwd_ns::user > mock_users; 59 /// Formats a user for logging purposes. 61 /// \param user The user to format. 63 /// \return The user as a string. 65 format_user(const passwd_ns::user& user) in format_user() argument 67 return F("name=%s, uid=%s, gid=%s") % user.name % user.uid % user.gid; in format_user() 74 /// Constructs a new user. 76 /// \param name_ The name of the user. 77 /// \param uid_ The user identifier. [all …]
|
/freebsd-src/usr.bin/chpass/ |
H A D | chpass.1 | 38 .Nd add or change user database information 45 .Op user 54 .Op user 59 allows editing of the user database information associated 61 .Ar user 62 or, by default, the current user. 77 Only the information that the user is allowed to change is displayed. 82 The super-user is allowed to directly supply a user database 89 user database fields, although they may be empty. 95 The super-user is allowed to directly supply an encrypted password field, [all …]
|
/freebsd-src/usr.sbin/extattr/tests/ |
H A D | extattr_test.sh | 47 atf_check -s exit:0 -o empty setextattr user myattr XYZ foo 49 getextattr -qx user myattr foo 60 atf_check -s exit:0 -o empty setextattr user myattr "$BINSTUFF" foo 61 getextattr user myattr foo 63 getextattr -qx user myattr foo 79 atf_check -s exit:0 -o empty setextattr user $ATTRNAME myvalue foo 80 atf_check -s exit:0 -o inline:"${ATTRNAME}\n" lsextattr -q user foo 82 getextattr -q user ${ATTRNAME} foo 83 atf_check -s exit:0 -o empty rmextattr user ${ATTRNAME} foo 84 atf_check -s exit:0 -o empty lsextattr -q user foo [all …]
|
/freebsd-src/contrib/processor-trace/libipt/test/src/ |
H A D | ptunit-asid.c | 40 struct pt_asid user; in from_user_null() local 43 pt_asid_init(&user); in from_user_null() 48 errcode = pt_asid_from_user(NULL, &user); in from_user_null() 70 struct pt_asid asid, user; in from_user_small() local 73 user.size = sizeof(user.size); in from_user_small() 75 errcode = pt_asid_from_user(&asid, &user); in from_user_small() 86 struct pt_asid asid, user; in from_user_big() local 89 user.size = sizeof(user) + 4; in from_user_big() 90 user.cr3 = 0x4200ull; in from_user_big() 91 user.vmcs = 0x23000ull; in from_user_big() [all …]
|
/freebsd-src/contrib/wpa/src/ap/ |
H A D | eap_user_db.c | 2 * hostapd / EAP user database 23 static void set_user_methods(struct hostapd_eap_user *user, const char *methods) in set_user_methods() argument 32 os_memset(&user->methods, 0, sizeof(user->methods)); in set_user_methods() 39 user->methods[num_methods].method = in set_user_methods() 41 &user->methods[num_methods].vendor); in set_user_methods() 42 if (user->methods[num_methods].vendor == EAP_VENDOR_IETF && in set_user_methods() 43 user->methods[num_methods].method == EAP_TYPE_NONE) { in set_user_methods() 45 user->ttls_auth |= EAP_TTLS_AUTH_PAP; in set_user_methods() 49 user->ttls_auth |= EAP_TTLS_AUTH_CHAP; in set_user_methods() 53 user->ttls_auth |= EAP_TTLS_AUTH_MSCHAP; in set_user_methods() [all …]
|
/freebsd-src/lib/libsys/ |
H A D | setuid.2 | 36 .Nd set user and group ID 54 user IDs and the saved set-user-ID of the current process 57 .\" The real user ID and the saved set-user-ID are changed only if the 58 .\" effective user ID is that of the super user. 63 .\" system call if the effective user ID is not that of the super user. 67 system call is permitted if the specified ID is equal to the real user ID 69 .\" or the saved set-user-ID 71 or the effective user ID 72 of the process, or if the effective user ID is that of the super user. 82 .\" effective user ID is that of the super user. [all …]
|
/freebsd-src/sys/dev/isci/scil/ |
H A D | scic_user_callback.h | 61 * be implemented by an SCI Core user. 73 * @brief This callback method asks the user to create a timer and provide 85 * the user must retain. This cookie is to be supplied by the 86 * user anytime a timeout occurs for the created timer. 89 * user. The handle will be utilized for all further interactions 99 * @brief This callback method asks the user to destroy the supplied timer. 113 * @brief This callback method asks the user to start the supplied timer. 116 * timers. Therefore, the SCI user should make sure that it 118 * Additionally, SCI Core user's should be able to handle 138 * @brief This callback method asks the user to stop the supplied timer. [all …]
|
H A D | scif_user_callback.h | 61 * be implemented by an SCI Framework user. 77 * @brief This callback method asks the user to create a timer and provide 89 * the user must retain. This cookie is to be supplied by the 90 * user anytime a timeout occurs for the created timer. 93 * user. The handle will be utilized for all further interactions 103 * @brief This callback method asks the user to destroy the supplied timer. 117 * @brief This callback method asks the user to start the supplied timer. 120 * shot timers. Therefore, the SCI user should make sure that it 122 * Additionally, SCI Framework user's should be able to handle 142 * @brief This callback method asks the user to stop the supplied timer. [all …]
|
/freebsd-src/usr.bin/id/ |
H A D | id.1 | 36 .Nd return user identity 39 .Op Ar user 44 .Op Ar user 49 .Op Ar user 54 .Op Ar user 57 .Op Ar user 60 .Op Ar user 64 utility displays the user and group names and numeric IDs, of the 70 .Ar user 71 (login name or user ID) [all …]
|
/freebsd-src/usr.sbin/adduser/ |
H A D | rmuser.8 | 43 In removing a user from the system, this utility: 46 Removes the user's 52 jobs belonging to the user. 56 signal to all processes owned by the user. 58 Removes the user from the system's local password file. 60 Removes the user's home directory (if it is owned by the user), 65 user from 68 Removes all files owned by the user from 78 per-user unique groups.) 81 semaphores owned by the user. [all …]
|
/freebsd-src/lib/libpam/modules/pam_krb5/ |
H A D | pam_krb5.8 | 28 provides functions to verify the identity of a user 30 and to set user specific credentials 43 It prompts the user for a password and obtains a new Kerberos TGT for 58 The credentials cache should be destroyed by the user at logout with 69 suppress warning messages to the user. 71 reasons why the user's 75 and a previous module obtained the user's password, that password is 76 used to authenticate the user. 78 module returns failure without prompting the user for a password. 81 user' [all...] |
/freebsd-src/usr.bin/su/ |
H A D | su.1 | 33 .Nd substitute user identity 43 utility requests appropriate user credentials via PAM 44 and switches to that user ID 45 (the default user is the superuser). 64 .Ev USER , 72 .Ev USER 73 is set to the target login, unless the target login has a user ID of 0, 78 Resource limits and session priority applicable to the original user's 81 are also normally retained unless the target login has a user ID of 0. 89 Only allowed for the super-user. [all …]
|
/freebsd-src/lib/libpam/modules/pam_xdg/ |
H A D | pam_xdg.c | 57 const char *user; in _pam_xdg_open() local 68 /* Get user info */ in _pam_xdg_open() 69 rv = pam_get_item(pamh, PAM_USER, (const void **)&user); in _pam_xdg_open() 70 if (rv != PAM_SUCCESS || user == NULL) { in _pam_xdg_open() 71 PAM_VERBOSE_ERROR("Can't get user information"); in _pam_xdg_open() 74 if ((passwd = getpwnam(user)) == NULL) { in _pam_xdg_open() 75 PAM_VERBOSE_ERROR("Can't get user information"); in _pam_xdg_open() 92 /* Open or create the user xdg directory */ in _pam_xdg_open() 93 rt_dir = openat(rt_dir_prefix, user, O_DIRECTORY | O_NOFOLLOW); in _pam_xdg_open() 95 rt_dir = mkdirat(rt_dir_prefix, user, RUNTIME_DIR_MOD in _pam_xdg_open() 212 const char *user; _pam_xdg_close() local [all...] |
/freebsd-src/crypto/openssh/regress/ |
H A D | addrmatch.sh | 10 user="$1"; addr="$2"; host="$3"; laddr="$4"; lport="$5" 13 verbose "test $descr for $user $addr $host" 15 -C user=${user},addr=${addr},host=${host},laddr=${laddr},lport=${lport} | \ 35 run_trial user 192.168.0.1 somehost 1.2.3.4 1234 match1 "first entry" 36 run_trial user 192.168.30.1 somehost 1.2.3.4 1234 nomatch "negative match" 37 run_trial user 19.0.0.1 somehost 1.2.3.4 1234 nomatch "no match" 38 run_trial user 10.255.255.254 somehost 1.2.3.4 1234 match1 "list middle" 39 run_trial user 192.168.30.1 192.168.0.1 1.2.3.4 1234 nomatch "faked IP in hostname" 40 run_trial user 1.1.1.1 somehost.example.com 1.2.3.4 1234 match2 "bare IP4 address" 41 run_trial user 19.0.0.1 somehost 127.0.0.1 1234 match3 "localaddress" [all …]
|
H A D | cert-userkey.sh | 4 tid="certified user keys" 6 rm -f $OBJ/authorized_keys_$USER $OBJ/user_ca_key* $OBJ/cert_user_key* 43 # Generate and sign user keys 45 verbose "$tid: sign user ${ktype} cert" 55 -I "regress user key for $USER" \ 56 -n ${USER},mekmitasdigoat $tflag $OBJ/cert_user_key_${ktype} || \ 66 rm -f $OBJ/authorized_keys_$USER 81 rm -f $OBJ/authorized_principals_$USER 90 echo > $OBJ/authorized_principals_$USER 99 echo gregorsamsa > $OBJ/authorized_principals_$USER [all …]
|
/freebsd-src/crypto/openssh/regress/unittests/misc/ |
H A D | test_parse.c | 3 * Regress test for misc user/host/URI parsing functions. 29 char *user, *host, *path; in test_parse() local 33 &user, &host, &path), 0); in test_parse() 34 ASSERT_STRING_EQ(user, "someuser"); in test_parse() 37 free(user); free(host); free(path); in test_parse() 42 &user, &host, &path), 0); in test_parse() 43 ASSERT_STRING_EQ(user, "someuser"); in test_parse() 46 free(user); free(host); free(path); in test_parse() 51 &user, &host, &path), 0); in test_parse() 52 ASSERT_STRING_EQ(user, "someuser"); in test_parse() [all …]
|
/freebsd-src/contrib/bsnmp/lib/ |
H A D | snmpcrypto.c | 65 snmp_digest_init(const struct snmp_user *user, EVP_MD_CTX *ctx, in snmp_digest_init() argument 68 if (user->auth_proto == SNMP_AUTH_HMAC_MD5) { in snmp_digest_init() 71 } else if (user->auth_proto == SNMP_AUTH_HMAC_SHA) { in snmp_digest_init() 74 } else if (user->auth_proto == SNMP_AUTH_NOAUTH) in snmp_digest_init() 78 user->auth_proto); in snmp_digest_init() 101 err = snmp_digest_init(&pdu->user, ctx, &dtype, &keylen); in snmp_pdu_calc_digest() 110 memcpy(extkey, pdu->user.auth_key, keylen); in snmp_pdu_calc_digest() 151 if (pdu->user.priv_proto == SNMP_PRIV_DES) { in snmp_pdu_cipher_init() 157 piv[i] = piv[i] ^ pdu->user.priv_key[8 + i]; in snmp_pdu_cipher_init() 158 } else if (pdu->user.priv_proto == SNMP_PRIV_AES) { in snmp_pdu_cipher_init() [all …]
|
/freebsd-src/include/ |
H A D | unistd.h | 93 * implemented (or not) in user mode. Please keep this list in 161 * Those that are marked `user' are implemented entirely in the C 173 #define _SC_BC_BASE_MAX 9 /* user */ 174 #define _SC_BC_DIM_MAX 10 /* user */ 175 #define _SC_BC_SCALE_MAX 11 /* user */ 176 #define _SC_BC_STRING_MAX 12 /* user */ 177 #define _SC_COLL_WEIGHTS_MAX 13 /* user */ 178 #define _SC_EXPR_NEST_MAX 14 /* user */ 179 #define _SC_LINE_MAX 15 /* user */ 180 #define _SC_RE_DUP_MAX 16 /* user */ [all...] |
/freebsd-src/tests/sys/acl/ |
H A D | tools-posix.test | 43 > user::rw- 48 > user::rw- 57 > user::rw- 58 > user:42:r-- 74 > user::rwx 79 > user::rwx 84 > user::rw- 85 > user:42:r-- 96 > user::rwx 97 > user:44:--x [all …]
|