/netbsd-src/external/bsd/atf/etc/atf/ |
H A D | common.conf | 11 unprivileged-user = "_tests"
|
/netbsd-src/external/ibm-public/postfix/dist/src/postconf/ |
H A D | test47.ref | 1 ./postconf: fatal: invalid unprivileged field "X" in "bar inet - X n - 0 other"
|
H A D | test62.ref | 4 foo/unix/unprivileged
|
/netbsd-src/external/ibm-public/postfix/dist/src/master/ |
H A D | master_ent.c | 275 int unprivileged; /* passed on to child */ in get_master_ent() local 489 unprivileged = get_bool_ent(&bufp, "unprivileged", "y"); in get_master_ent() 565 if (unprivileged) in get_master_ent()
|
/netbsd-src/external/bsd/kyua-atf-compat/dist/ |
H A D | helpers.sh | 65 for var in unprivileged-user var1 var2 var3; do
|
H A D | atf-run.sh | 95 unprivileged-user=*)
|
/netbsd-src/tests/fs/tmpfs/ |
H A D | t_create.sh | 55 user=$(atf_config_get unprivileged-user)
|
H A D | t_mkdir.sh | 95 user=$(atf_config_get unprivileged-user)
|
/netbsd-src/sys/external/gpl2/dts/dist/arch/arm/boot/dts/ |
H A D | xenvm-4.2.dts | 3 * Xen Virtual Machine for unprivileged guests
|
/netbsd-src/sys/rump/ |
H A D | README.dirs | 31 as an ethernet bus. works completely unprivileged.
|
/netbsd-src/external/mpl/bind/dist/doc/arm/ |
H A D | security.inc.rst | 212 the daemon as an unprivileged user (:option:`-u <named -u>` user). We suggest running 213 as an unprivileged user when using the ``chroot`` feature. 250 If the :iscman:`named` daemon is running as an unprivileged user, it
|
/netbsd-src/external/bsd/ntp/dist/sntp/ |
H A D | sntp.texi | 73 The simplest use of this program is as an unprivileged command to
|
H A D | sntp-opts.def | 297 and can be run as an unprivileged command
|
/netbsd-src/external/bsd/kyua-cli/dist/examples/ |
H A D | kyua.conf | 49 -- The name or UID of the unprivileged user.
|
/netbsd-src/external/bsd/ntp/dist/ntpdc/ |
H A D | ntpdc.texi | 73 The simplest use of this program is as an unprivileged command to
|
/netbsd-src/distrib/sets/ |
H A D | README | 78 list. Failure to add this will break unprivileged builds.
|
/netbsd-src/external/ibm-public/postfix/dist/proto/ |
H A D | memcache_table | 50 # server, the socket must be accessible by the unprivileged 200 # unprivileged Postfix user.
|
/netbsd-src/external/bsd/am-utils/dist/ |
H A D | BUGS | 209 broken NFS/TCP connections using unprivileged ports (greater than 1024), 214 The darwin (MacOS X) kernel defaults to using unprivileged ports, but that 218 unprivileged ports, causing the same EPERM error above.
|
/netbsd-src/crypto/external/bsd/openssl/dist/test/ |
H A D | README.md | 11 **Warning:** you MUST run the tests from an unprivileged account
|
/netbsd-src/crypto/dist/ipsec-tools/src/racoon/doc/ |
H A D | README.privsep | 17 available to the unprivileged instance of racoon, and from there they will be
|
/netbsd-src/external/ibm-public/postfix/dist/ |
H A D | RELEASE_NOTES-3.7 | 77 the postlog(1) command is now set-gid postdrop, so that unprivileged
|
/netbsd-src/external/gpl2/xcvs/dist/ |
H A D | README.VMS | 46 3. rsh - unprivileged (on VMS side)
|
/netbsd-src/external/bsd/less/dist/ |
H A D | defines.o2 | 23 * be safe to run by unprivileged users.
|
H A D | defines.wn | 23 * be safe to run by unprivileged users.
|
H A D | defines.o9 | 22 * be safe to run by unprivileged users.
|