/openbsd-src/gnu/usr.bin/binutils/gdb/testsuite/gdb.base/ |
H A D | define.exp | 62 # Verify that GDB allows a user to define their very own commands. 70 {pass "define user command: nextwhere"} 71 timeout {fail "(timeout) define user command: nextwhere"} 75 {fail "define user command: nextwhere"} 76 timeout {fail "(timeout) define user command: nextwhere"} 84 {pass "use user command: nextwhere"} 86 {fail "use user command: nextwhere"} 87 timeout {fail "(timeout) use user command: nextwhere"} 90 # Verify that a user can define a command whose spelling is a 91 # proper substring of another user-defined command. [all …]
|
/openbsd-src/usr.bin/tmux/ |
H A D | server-acl.c | 63 /* Find user entry. */ 94 /* Allow a user. */ 98 struct server_acl_user *user; in server_acl_user_allow() local 100 user = server_acl_user_find(uid); in server_acl_user_allow() 101 if (user == NULL) { in server_acl_user_allow() 102 user = xcalloc(1, sizeof *user); in server_acl_user_allow() 103 user->uid = uid; in server_acl_user_allow() 104 RB_INSERT(server_acl_entries, &server_acl_entries, user); in server_acl_user_allow() 108 /* Deny a user (remove from the tree). */ 112 struct server_acl_user *user; in server_acl_user_deny() local [all …]
|
/openbsd-src/usr.bin/chpass/ |
H A D | chpass.1 | 40 .Nd add or change user database information 44 .Op Ar user 49 allows editing of the user database information associated 51 .Ar user , 52 or, by default, the current user. 55 Only the information that the user is allowed to change is displayed. 66 The superuser is allowed to directly supply a user database 73 user database fields, although they may be empty. 75 Attempts to change the user's shell to 83 user's login name [all …]
|
/openbsd-src/regress/usr.sbin/snmpd/ |
H A D | snmpd.conf | 17 user noauthpriv 18 user auth_md5 authkey testpass auth hmac-md5 19 user auth_sha1 authkey testpass auth hmac-sha1 20 user auth_sha224 authkey testpass auth hmac-sha224 21 user auth_sha256 authkey testpass auth hmac-sha256 22 user auth_sha384 authkey testpass auth hmac-sha384 23 user auth_sha512 authkey testpass auth hmac-sha512 24 user authpriv_md5_des authkey testpass auth hmac-md5 enckey testpass enc des 25 user authpriv_md5_aes authkey testpass auth hmac-md5 enckey testpass enc aes 26 user authpriv_sha1_des authkey testpass auth hmac-sha1 enckey testpass enc des [all …]
|
/openbsd-src/usr.bin/id/ |
H A D | id.1 | 41 .Nd return user identity 44 .Op Ar user 47 .Op Ar user 50 .Op Ar user 53 .Op Ar user 56 .Op Ar user 61 .Op Ar user 65 utility displays the user and group names and numeric IDs, of the 71 .Ar user 72 (login name or user ID) [all …]
|
/openbsd-src/usr.bin/login/ |
H A D | login.1 | 45 .Op Ar user 51 If no user is specified, or if a user is specified and authentication 52 of the user fails, 54 prompts for a user name. 62 is appended to the user name (i.e., 63 .Ar user : Ns Va style ) . 70 option is used when a user name is specified to indicate that proper 97 Specifies the remote user that initiated the connection. 105 boolean is not set in the user' [all...] |
/openbsd-src/lib/libc/sys/ |
H A D | setreuid.2 | 37 .Nd set real and effective user IDs 43 The real and effective user IDs of the 45 The saved user ID will be set to the new value of the real 46 user ID if a real user ID is specified and either 47 the new real user ID value is different from the current value 48 or the new value of the effective user ID differs from the 49 current saved user ID. 51 Unprivileged users may change either user ID to the current value 52 of the real, effective, or saved user ID. 56 user ID forces the system to substitute the current [all …]
|
H A D | setuid.2 | 41 .Nd set user and group ID 55 function sets the real and effective user IDs and the saved set-user-ID 59 function is permitted if the effective user ID is that of the superuser, 60 or if the specified user ID is the same as the effective user ID. 61 If not, but the specified user ID is the same as the real user ID, 63 will set the effective user ID to the real user ID. 71 function is permitted if the effective user ID is that of the superuser, 82 sets the effective user ID (group ID) of the current process. 83 The effective user ID may be set to the value 84 of the real user ID or the saved set-user-ID (see [all …]
|
/openbsd-src/regress/usr.bin/ssh/ |
H A D | addrmatch.sh | 10 user="$1"; addr="$2"; host="$3"; laddr="$4"; lport="$5" 13 verbose "test $descr for $user $addr $host" 15 -C user=${user},addr=${addr},host=${host},laddr=${laddr},lport=${lport} | \ 35 run_trial user 192.168.0.1 somehost 1.2.3.4 1234 match1 "first entry" 36 run_trial user 192.168.30.1 somehost 1.2.3.4 1234 nomatch "negative match" 37 run_trial user 19.0.0.1 somehost 1.2.3.4 1234 nomatch "no match" 38 run_trial user 10.255.255.254 somehost 1.2.3.4 1234 match1 "list middle" 39 run_trial user 192.168.30.1 192.168.0.1 1.2.3.4 1234 nomatch "faked IP in hostname" 40 run_trial user 1.1.1.1 somehost.example.com 1.2.3.4 1234 match2 "bare IP4 address" 41 run_trial user 19.0.0.1 somehost 127.0.0.1 1234 match3 "localaddress" [all …]
|
H A D | cert-userkey.sh | 4 tid="certified user keys" 6 rm -f $OBJ/authorized_keys_${USER}* $OBJ/user_ca_key* $OBJ/cert_user_key* 46 # Generate and sign user keys 48 verbose "$tid: sign user ${ktype} cert" 58 -I "regress user key for $USER" \ 59 -n ${USER},mekmitasdigoat $tflag $OBJ/cert_user_key_${ktype} || \ 69 rm -f $OBJ/authorized_keys_${USER}* $OBJ/authorized_principals_${USER}* 70 touch $OBJ/authorized_keys_${USER}_ [all...] |
/openbsd-src/regress/usr.bin/ssh/unittests/misc/ |
H A D | test_parse.c | 3 * Regress test for misc user/host/URI parsing functions. 25 char *user, *host, *path; in test_parse() local 29 &user, &host, &path), 0); in test_parse() 30 ASSERT_STRING_EQ(user, "someuser"); in test_parse() 33 free(user); free(host); free(path); in test_parse() 38 &user, &host, &path), 0); in test_parse() 39 ASSERT_STRING_EQ(user, "someuser"); in test_parse() 42 free(user); free(host); free(path); in test_parse() 47 &user, &host, &path), 0); in test_parse() 48 ASSERT_STRING_EQ(user, "someuser"); in test_parse() [all …]
|
/openbsd-src/regress/lib/libc/env/ |
H A D | envtest.c | 50 fakenv[1] = "USER=root"; in fake_env() 53 fakenv[4] = "USER=root"; in fake_env() 67 n = count_instances("USER"); in main() 69 fprintf(stderr, "initial: %d instances of USER, expected %d\n", in main() 74 if (unsetenv("USER") != 0) { in main() 75 fprintf(stderr, "unsetenv: failed to remove USER\n"); in main() 78 n = count_instances("USER"); in main() 80 fprintf(stderr, "unsetenv: %d instances of USER, expected %d\n", in main() 86 if (setenv("USER", "nobody", 0) != 0) { in main() 87 fprintf(stderr, "setenv: failed to set USER\n"); in main() [all …]
|
/openbsd-src/gnu/llvm/llvm/include/llvm/CodeGen/GlobalISel/ |
H A D | IRTranslator.h | 53 class User; variable 209 bool translateCopy(const User &U, const Value &V, 214 bool translateBitCast(const User &U, MachineIRBuilder &MIRBuilder); 217 bool translateLoad(const User &U, MachineIRBuilder &MIRBuilder); 220 bool translateStore(const User &U, MachineIRBuilder &MIRBuilder); 257 bool translateCall(const User &U, MachineIRBuilder &MIRBuilder); 272 bool translateInvoke(const User &U, MachineIRBuilder &MIRBuilder); 274 bool translateCallBr(const User &U, MachineIRBuilder &MIRBuilder); 276 bool translateLandingPad(const User &U, MachineIRBuilder &MIRBuilder); 280 bool translateCast(unsigned Opcode, const User &U, [all …]
|
/openbsd-src/share/man/man5/ |
H A D | passwd.5 | 45 one per user, containing ten colon separated fields. 50 User's login name. 52 User's 56 User's login user ID. 58 User's login group ID. 60 User's general classification (see 67 General information about the user. 69 User's home directory. 71 User's login shell. 96 and/or identical user IDs, it is usually a mistake to do so. [all …]
|
/openbsd-src/usr.sbin/user/ |
H A D | user.8 | 1 .\" $OpenBSD: user.8,v 1.24 2022/02/06 00:29:03 jsg Exp $ 2 .\" $NetBSD: user.8,v 1.9 2001/06/05 11:31:21 wiz Exp $ 35 .Nm user 36 .Nd manage user login information on the system 38 .Nm user 49 .Nm user 65 .Ar user 66 .Nm user 70 .Nm user 73 .Ar user [all …]
|
H A D | Makefile | 3 PROG= user 4 SRCS= user.c main.c 9 LINKS+= ${BINDIR}/user ${BINDIR}/useradd 10 LINKS+= ${BINDIR}/user ${BINDIR}/userdel 11 LINKS+= ${BINDIR}/user ${BINDIR}/usermod 12 LINKS+= ${BINDIR}/user ${BINDIR}/group 13 LINKS+= ${BINDIR}/user ${BINDIR}/groupadd 14 LINKS+= ${BINDIR}/user ${BINDIR}/groupdel 15 LINKS+= ${BINDIR}/user ${BINDIR}/groupmod 16 LINKS+= ${BINDIR}/user ${BINDIR}/userinfo [all …]
|
H A D | useradd.8 | 36 .Nd add a user to the system 63 .Ar user 67 utility adds a user to the system, creating and 70 for the new user if they exist in the 97 This is the directory to which the user directory is added, 139 for more information on user login classes. 144 A new user can only be created if there are UIDs which can be assigned 156 Sets the base directory name, in which the user's new home 162 GECOS field) which will be added for the user, and typically will include 163 the user's full name and, perhaps, contact information for the user. [all …]
|
/openbsd-src/gnu/gcc/gcc/ |
H A D | bt-load.c | 334 /* Create a new target register user structure, for a use in block BB, 335 instruction INSN. Return the new user. */ 345 btr_user user = NULL; in new_btr_user() local 359 user = obstack_alloc (&migrate_btrl_obstack, sizeof (struct btr_user_s)); in new_btr_user() 360 user->bb = bb; in new_btr_user() 361 user->luid = insn_luid; in new_btr_user() 362 user->insn = insn; in new_btr_user() 363 user->use = use; in new_btr_user() 364 user->other_use_this_block = 0; in new_btr_user() 365 user->next = NULL; in new_btr_user() [all …]
|
/openbsd-src/sbin/init/ |
H A D | init.8 | 52 and begins multi-user operation. 71 Boot directly into single-user mode. 74 Single-user mode is also entered if the boot scripts fail. 76 In single-user mode, the 79 but instead a super-user shell is started on the system console. 89 entered before the system will start a single-user shell. 95 In single-user mode, the system is quiescent for maintenance work and may 96 later be made to go to multi-user by exiting the 97 single-user shell (with ^D). 107 is normally set to 0 while in single-user mode, and raised to 1 when [all …]
|
/openbsd-src/libexec/login_yubikey/ |
H A D | login_yubikey.8 | 40 .Ar user 50 .Ar user 75 .Ar user 76 argument is the login name of the user to be authenticated. 84 will read the user's UID (12 hex digits) from the file 85 .Em user.uid , 86 the user's key (32 hex digits) from 87 .Em user.key , 88 and the user's last-use counter from 89 .Em user.ctr [all …]
|
/openbsd-src/usr.sbin/authpf/ |
H A D | authpf.8 | 23 .Nd authenticating gateway user shell 29 is a user shell for authenticating gateways. 32 rules when a user authenticates and starts a session with 34 and to undo these changes when the user's session exits. 48 is a user shell 52 the gateway system, and can be directly associated with the user name. 68 the user's shell needs to be set to 76 syntax to change rules for an individual user or client IP address 77 as long as a user maintains an active 131 is assigned the user name. [all …]
|
/openbsd-src/usr.sbin/smtpd/ |
H A D | lka_session.c | 104 log_trace(TRACE_EXPAND, "expand: ~/.forward failed for user %s", in lka_session_forward_reply() 105 fwreq->user); in lka_session_forward_reply() 113 "for user %s on forward-only rule", fwreq->user); in lka_session_forward_reply() 118 "for user %s and no default action on rule", fwreq->user); in lka_session_forward_reply() 123 "user %s, just deliver", fwreq->user); in lka_session_forward_reply() 130 /* expand for the current user and rule */ in lka_session_forward_reply() 138 "forward error for user %s", fwreq->user); in lka_session_forward_reply() 144 "for user %s on forward-only rule", fwreq->user); in lka_session_forward_reply() 149 "for user %s and no default action on rule", fwreq->user); in lka_session_forward_reply() 154 "for user %s, just deliver", fwreq->user); in lka_session_forward_reply() [all …]
|
/openbsd-src/usr.bin/skeyinfo/ |
H A D | skeyinfo.1 | 8 .Nd obtain the next S/Key challenge for a user 12 .Op Ar user 15 prints out the next S/Key challenge for the specified user or for the 16 current user if no user is specified. 26 directory containing user entries for S/Key 35 .It cannot open /etc/skey/user 36 The user does not have an entry in 42 .It user is not listed in /etc/skey 43 The S/Key database is enabled but the user does not have an entry in it. 46 program can be used to create an entry for the user.
|
/openbsd-src/lib/libskey/ |
H A D | skey.3 | 77 .Fn skey_authenticate "char *user" 81 .Fn skey_haskey "char *user" 83 .Fn skey_keyinfo "char *user" 85 .Fn skey_passcheck "char *user" "char *passwd" 91 .Fn skeychallenge "struct skey *rec" "char *user" "char *buf" 93 .Fn skeychallenge2 "int fd" "struct skey *rec" "char *user" "char *buf" 97 .Fn skeylookup "struct skey *rec" "char *user" 240 .Fa user 249 the current user. 256 .Fa user [all …]
|
/openbsd-src/gnu/llvm/llvm/utils/TableGen/jupyter/tablegen_kernel/ |
H A D | install.py | 10 def install_my_kernel_spec(user=True, prefix=None): argument 11 """Install the kernel spec for user in given prefix.""" 15 os.path.join(pkgroot, "assets"), "tablegen", user=user, prefix=prefix 20 """Returns whether the current user is root.""" 35 "--user", help="Install in user home directory", action="store_true" 43 user = args.user or not _is_root() 46 install_my_kernel_spec(user=user, prefix=prefix)
|