bin/ls/ls.c
443
const char *user, *group;
bin/ls/ls.c
498
user = nuser;
bin/ls/ls.c
501
user = user_from_uid(sp->st_uid, 0);
bin/ls/ls.c
504
if ((ulen = strlen(user)) > maxuser)
bin/ls/ls.c
521
np->user = &np->data[0];
bin/ls/ls.c
522
(void)strlcpy(np->user, user, ulen + 1);
bin/ls/ls.h
72
char *user;
bin/ls/print.c
108
(void)printf("%-*s ", dp->s_user, np->user);
lib/libc/gen/getnetgrent.c
412
in_check(const char *host, const char *user, const char *domain,
lib/libc/gen/getnetgrent.c
419
if ((user != NULL) && (ng->ng_user != NULL) &&
lib/libc/gen/getnetgrent.c
420
strcmp(ng->ng_user, user) != 0)
lib/libc/gen/getnetgrent.c
436
const char *user, const char *domain)
lib/libc/gen/getnetgrent.c
472
i = in_check(host, user, domain, ng);
lib/libc/gen/getnetgrent.c
485
if (in_find(ypdom, sl, name, host, user, domain)) {
lib/libc/gen/getnetgrent.c
657
getnetgrent(const char **host, const char **user, const char **domain)
lib/libc/gen/getnetgrent.c
663
*user = _nglist->ng_user;
lib/libc/gen/getnetgrent.c
674
innetgr(const char *grp, const char *host, const char *user, const char *domain)
lib/libc/gen/getnetgrent.c
702
if (host != NULL && user == NULL) {
lib/libc/gen/getnetgrent.c
705
} else if (host == NULL && user != NULL) {
lib/libc/gen/getnetgrent.c
706
if (in_lookup(ypdom, grp, user, domain, _NG_KEYBYUSER))
lib/libc/gen/getnetgrent.c
721
found = in_find(ypdom, sl, grpdup, host, user, domain);
lib/libc/gen/getpwent.c
331
const char *user, *host, *dom;
lib/libc/gen/getpwent.c
367
s = getnetgrent(&host, &user, &dom);
lib/libc/gen/getpwent.c
373
if (user && *user) {
lib/libc/gen/getpwent.c
375
user, strlen(user), &data, &datalen);
lib/libc/gen/getpwent.c
430
const char *user, *host, *dom;
lib/libc/gen/getpwent.c
460
while (getnetgrent(&host, &user, &dom)) {
lib/libc/gen/getpwent.c
461
if (user && *user)
lib/libc/gen/getpwent.c
463
user);
lib/libc/gen/getpwent.c
564
const char *host, *user, *dom;
lib/libc/gen/getpwent.c
614
s = getnetgrent(&host, &user, &dom);
lib/libc/gen/getpwent.c
620
if (user && *user) {
lib/libc/gen/getpwent.c
622
user, strlen(user),
lib/libc/gen/getpwent.c
641
user = pw->pw_name + 1;
lib/libc/gen/getpwent.c
643
user, strlen(user),
lib/libc/gen/getpwent.c
668
while (getnetgrent(&host, &user, &dom)) {
lib/libc/gen/getpwent.c
669
if (user && *user)
lib/libc/gen/getpwent.c
670
__ypexclude_add(&ypexhead, user);
lib/libc/net/ruserok.c
158
char *user, *p;
lib/libc/net/ruserok.c
187
user = p;
lib/libc/net/ruserok.c
195
user = p;
lib/libc/net/ruserok.c
201
auser = *user ? user : luser;
lib/libfido2/src/assert.c
690
free(assert->stmt[i].user.icon);
lib/libfido2/src/assert.c
691
free(assert->stmt[i].user.name);
lib/libfido2/src/assert.c
692
free(assert->stmt[i].user.display_name);
lib/libfido2/src/assert.c
693
fido_blob_reset(&assert->stmt[i].user.id);
lib/libfido2/src/assert.c
70
return (cbor_decode_user(val, &stmt->user));
lib/libfido2/src/assert.c
811
return (assert->stmt[idx].user.id.ptr);
lib/libfido2/src/assert.c
820
return (assert->stmt[idx].user.id.len);
lib/libfido2/src/assert.c
829
return (assert->stmt[idx].user.icon);
lib/libfido2/src/assert.c
838
return (assert->stmt[idx].user.name);
lib/libfido2/src/assert.c
847
return (assert->stmt[idx].user.display_name);
lib/libfido2/src/cbor.c
1524
fido_user_t *user = arg;
lib/libfido2/src/cbor.c
1535
if (cbor_string_copy(val, &user->icon) < 0) {
lib/libfido2/src/cbor.c
1540
if (cbor_string_copy(val, &user->name) < 0) {
lib/libfido2/src/cbor.c
1545
if (cbor_string_copy(val, &user->display_name) < 0) {
lib/libfido2/src/cbor.c
1550
if (fido_blob_decode(val, &user->id) < 0) {
lib/libfido2/src/cbor.c
1564
cbor_decode_user(const cbor_item_t *item, fido_user_t *user)
lib/libfido2/src/cbor.c
1568
cbor_map_iter(item, user, decode_user_entry) < 0) {
lib/libfido2/src/cbor.c
450
cbor_encode_user_entity(const fido_user_t *user)
lib/libfido2/src/cbor.c
453
const fido_blob_t *id = &user->id;
lib/libfido2/src/cbor.c
454
const char *display = user->display_name;
lib/libfido2/src/cbor.c
460
(user->icon && cbor_add_string(item, "icon", user->icon) < 0) ||
lib/libfido2/src/cbor.c
461
(user->name && cbor_add_string(item, "name", user->name) < 0) ||
lib/libfido2/src/cred.c
1170
return (cred->user.name);
lib/libfido2/src/cred.c
1176
return (cred->user.display_name);
lib/libfido2/src/cred.c
1182
return (cred->user.id.ptr);
lib/libfido2/src/cred.c
1188
return (cred->user.id.len);
lib/libfido2/src/cred.c
544
fido_blob_reset(&cred->user.id);
lib/libfido2/src/cred.c
549
free(cred->user.icon);
lib/libfido2/src/cred.c
550
free(cred->user.name);
lib/libfido2/src/cred.c
551
free(cred->user.display_name);
lib/libfido2/src/cred.c
555
memset(&cred->user, 0, sizeof(cred->user));
lib/libfido2/src/cred.c
73
(argv[2] = cbor_encode_user_entity(&cred->user)) == NULL ||
lib/libfido2/src/cred.c
816
fido_user_t *up = &cred->user;
lib/libfido2/src/credman.c
261
return (cbor_decode_user(val, &cred->user));
lib/libfido2/src/credman.c
86
param_cbor[2] = cbor_encode_user_entity(&cred->user);
lib/libfido2/src/fido/types.h
144
fido_user_t user; /* user entity */
lib/libfido2/src/fido/types.h
169
fido_user_t user; /* user attributes */
lib/libfido2/src/touch.c
19
fido_user_t user;
lib/libfido2/src/touch.c
27
memset(&user, 0, sizeof(user));
lib/libfido2/src/touch.c
38
(user.name = strdup(FIDO_DUMMY_USER_NAME)) == NULL) {
lib/libfido2/src/touch.c
43
if (fido_blob_set(&user.id, &user_id, sizeof(user_id)) < 0) {
lib/libfido2/src/touch.c
50
(argv[2] = cbor_encode_user_entity(&user)) == NULL ||
lib/libfido2/src/touch.c
76
free(user.name);
lib/libfido2/src/touch.c
77
free(user.id.ptr);
lib/libpanel/p_bottom.c
57
dBug(("--> bottom_panel %s", USER_PTR(pan->user, 1)));
lib/libpanel/p_delete.c
55
dBug(("...discard ptr=%s", USER_PTR(pan->user, 1)));
lib/libpanel/p_hide.c
55
dBug(("--> hide_panel %s", USER_PTR(pan->user, 1)));
lib/libpanel/p_new.c
61
pan->user = name ## _id; \
lib/libpanel/p_new.c
62
_tracef("create :user_ptr %p", pan->user)
lib/libpanel/p_new.c
66
pan->user = (void *)0
lib/libpanel/p_show.c
58
dBug(("--> show_panel %s", USER_PTR(pan->user, 1)));
lib/libpanel/p_user.c
50
pan->user = uptr;
lib/libpanel/p_user.c
58
returnCVoidPtr(pan ? pan->user : (NCURSES_CONST void *)0);
lib/libpanel/panel.c
103
(_nc_bottom_panel) ? USER_PTR(_nc_bottom_panel->user, 1) : "--",
lib/libpanel/panel.c
104
(_nc_top_panel) ? USER_PTR(_nc_top_panel->user, 2) : "--");
lib/libpanel/panel.c
106
_tracef("pan id=%s", USER_PTR(pan->user, 1));
lib/libpanel/panel.c
83
text, USER_PTR(pan->user, 1),
lib/libpanel/panel.c
84
(pan->below) ? USER_PTR(pan->below->user, 2) : "--",
lib/libpanel/panel.c
85
(pan->above) ? USER_PTR(pan->above->user, 3) : "--",
lib/libpanel/panel.h
52
NCURSES_CONST void *user;
lib/libpcap/pcap-bpf.c
173
(*callback)(user, (struct pcap_pkthdr*)bp, bp + hdrlen);
lib/libpcap/pcap-bpf.c
69
pcap_read(pcap_t *p, int cnt, pcap_handler callback, u_char *user)
lib/libpcap/pcap.c
54
pcap_dispatch(pcap_t *p, int cnt, pcap_handler callback, u_char *user)
lib/libpcap/pcap.c
58
return (pcap_offline_read(p, cnt, callback, user));
lib/libpcap/pcap.c
59
return (pcap_read(p, cnt, callback, user));
lib/libpcap/pcap.c
63
pcap_loop(pcap_t *p, int cnt, pcap_handler callback, u_char *user)
lib/libpcap/pcap.c
69
n = pcap_offline_read(p, cnt, callback, user);
lib/libpcap/pcap.c
76
n = pcap_read(p, cnt, callback, user);
lib/libpcap/savefile.c
359
pcap_offline_read(pcap_t *p, int cnt, pcap_handler callback, u_char *user)
lib/libpcap/savefile.c
394
(*callback)(user, &h, p->buffer);
lib/libpcap/savefile.c
407
pcap_dump(u_char *user, const struct pcap_pkthdr *h, const u_char *sp)
lib/libpcap/savefile.c
411
f = (FILE *)user;
libexec/ftpd/extern.h
97
void user(char *);
libexec/ftpd/ftpd.c
2820
char *user = NULL;
libexec/ftpd/ftpd.c
2830
if ((user = malloc((size_t)(cp - dir))) == NULL)
libexec/ftpd/ftpd.c
2832
strlcpy(user, dir + 1, (size_t)(cp - dir));
libexec/ftpd/ftpd.c
2835
if (strcmp(user, pw->pw_name) != 0) {
libexec/ftpd/ftpd.c
2836
if ((pw = getpwnam(user)) == NULL) {
libexec/ftpd/ftpd.c
2838
free(user);
libexec/ftpd/ftpd.c
2842
free(user);
libexec/ftpd/monitor.c
268
user(name);
libexec/login_ldap/login_ldap.c
188
auth_ldap(char *user, char *class, char *pass)
libexec/login_ldap/login_ldap.c
202
ctx.user = user;
libexec/login_ldap/login_ldap.h
44
char *user; /* the user to authenticate */
libexec/login_ldap/util.c
489
q = tmp + strlcat(tmp, ctx->user, sizeof(tmp));
libexec/login_skey/login_skey.c
115
user = *argv;
libexec/login_skey/login_skey.c
133
haskey = (skeychallenge2(fd, &skey, user, challenge) == 0);
libexec/login_skey/login_skey.c
153
haskey = (skeylookup(&skey, user) == 0);
libexec/login_skey/login_skey.c
158
haskey = (skeychallenge2(fd, &skey, user, challenge) == 0);
libexec/login_skey/login_skey.c
213
haskey = (skeychallenge2(fd, &skey, user, challenge) == 0);
libexec/login_skey/login_skey.c
58
char *user = NULL, *cp, *ep;
libexec/login_token/token.c
105
tokenchallenge(char *user, char *challenge, int size, char *card_type)
libexec/login_token/token.c
115
tokendb_getrec(user, &tr) == 0 &&
libexec/login_token/token.c
118
while ((r = tokendb_lockrec(user, &tr, TOKEN_LOCKED)) == 1) {
libexec/login_token/token.c
138
tokendb_putrec(user, &tr);
libexec/login_token/token.c
147
tokendb_putrec(user, &tr);
libexec/spamlogd/spamlogd.c
239
logpkt_handler(u_char *user, const struct pcap_pkthdr *h, const u_char *sp)
regress/sys/arch/amd64/fpu/fxproc0.c
90
struct user user;
regress/sys/arch/amd64/fpu/fxproc0.c
91
struct fxsave64 *fxs = &user.u_pcb.pcb_savefpu.fp_fxsave;
regress/sys/arch/amd64/fpu/fxproc0.c
96
if (kvm_read(kd, (u_long)proc.p_addr, &user, sizeof(user)) == -1)
regress/usr.bin/ssh/unittests/misc/test_parse.c
25
char *user, *host, *path;
regress/usr.bin/ssh/unittests/misc/test_parse.c
28
user = host = path = NULL;
regress/usr.bin/ssh/unittests/misc/test_parse.c
30
&user, &host, &path), 0);
regress/usr.bin/ssh/unittests/misc/test_parse.c
31
ASSERT_STRING_EQ(user, "someuser");
regress/usr.bin/ssh/unittests/misc/test_parse.c
34
free(user); free(host); free(path);
regress/usr.bin/ssh/unittests/misc/test_parse.c
38
user = host = path = NULL;
regress/usr.bin/ssh/unittests/misc/test_parse.c
40
&user, &host, &path), 0);
regress/usr.bin/ssh/unittests/misc/test_parse.c
41
ASSERT_STRING_EQ(user, "someuser");
regress/usr.bin/ssh/unittests/misc/test_parse.c
44
free(user); free(host); free(path);
regress/usr.bin/ssh/unittests/misc/test_parse.c
48
user = host = path = NULL;
regress/usr.bin/ssh/unittests/misc/test_parse.c
50
&user, &host, &path), 0);
regress/usr.bin/ssh/unittests/misc/test_parse.c
51
ASSERT_STRING_EQ(user, "someuser");
regress/usr.bin/ssh/unittests/misc/test_parse.c
54
free(user); free(host); free(path);
regress/usr.bin/ssh/unittests/misc/test_parse.c
58
user = host = path = NULL;
regress/usr.bin/ssh/unittests/misc/test_parse.c
60
&user, &host, &path), 0);
regress/usr.bin/ssh/unittests/misc/test_parse.c
61
ASSERT_STRING_EQ(user, "someuser");
regress/usr.bin/ssh/unittests/misc/test_parse.c
64
free(user); free(host); free(path);
regress/usr.bin/ssh/unittests/misc/test_parse.c
68
user = host = path = NULL;
regress/usr.bin/ssh/unittests/misc/test_parse.c
70
&user, &host, &path), 0);
regress/usr.bin/ssh/unittests/misc/test_parse.c
71
ASSERT_STRING_EQ(user, "someuser");
regress/usr.bin/ssh/unittests/misc/test_parse.c
74
free(user); free(host); free(path);
regress/usr.bin/ssh/unittests/misc/test_parse.c
78
user = host = path = NULL;
regress/usr.bin/ssh/unittests/misc/test_parse.c
80
&user, &host, &port, &path), 0);
regress/usr.bin/ssh/unittests/misc/test_parse.c
81
ASSERT_STRING_EQ(user, "someuser");
regress/usr.bin/ssh/unittests/misc/test_parse.c
85
free(user); free(host); free(path);
sbin/iked/parse.y
3347
create_user(const char *user, const char *pass)
sbin/iked/parse.y
3353
if (*user == '\0' || (strlcpy(usr.usr_name, user,
sbin/iked/parse.y
494
| grammar user '\n'
sbin/iked/parse.y
559
user : USER STRING STRING {
sbin/iked/policy.c
970
user_lookup(struct iked *env, const char *user)
sbin/iked/policy.c
974
if (strlcpy(key.usr_name, user,
sbin/pflogd/pflogd.c
479
dump_packet_nobuf(u_char *user, const struct pcap_pkthdr *h, const u_char *sp)
sbin/pflogd/pflogd.c
481
FILE *f = (FILE *)user;
sbin/pflogd/pflogd.c
559
dump_packet(u_char *user, const struct pcap_pkthdr *h, const u_char *sp)
sbin/pflogd/pflogd.c
561
FILE *f = (FILE *)user;
sbin/pflogd/pflogd.c
585
dump_packet_nobuf(user, h, sp);
sbin/reboot/reboot.c
145
if ((user = getlogin()) == NULL)
sbin/reboot/reboot.c
146
user = (pw = getpwuid(getuid())) ?
sbin/reboot/reboot.c
152
"halted (with powerdown) by %s", user);
sbin/reboot/reboot.c
154
syslog(LOG_CRIT, "halted by %s", user);
sbin/reboot/reboot.c
158
syslog(LOG_CRIT, "rebooted by %s", user);
sbin/reboot/reboot.c
77
char *p, *user;
sys/arch/alpha/alpha/machdep.c
166
struct user *proc0paddr;
sys/arch/alpha/alpha/machdep.c
617
(struct user *)pmap_steal_memory(UPAGES * PAGE_SIZE, NULL, NULL);
sys/arch/alpha/alpha/pmap.c
2429
pmap_emulate_reference(struct proc *p, vaddr_t v, int user, int type)
sys/arch/alpha/alpha/pmap.c
2442
p, v, user, type);
sys/arch/alpha/alpha/pmap.c
2449
if (user)
sys/arch/alpha/alpha/pmap.c
2508
if (!(*pte & (user ? PG_UWE : PG_UWE | PG_KWE))) {
sys/arch/alpha/alpha/pmap.c
2511
user, type, *pte);
sys/arch/alpha/alpha/pmap.c
2516
user, type, *pte);
sys/arch/alpha/alpha/pmap.c
2519
if (!(*pte & (user ? PG_URE : PG_URE | PG_KRE))) {
sys/arch/alpha/alpha/pmap.c
2522
user, type, *pte);
sys/arch/alpha/alpha/pmap.c
2527
user, type, *pte);
sys/arch/alpha/alpha/pmap.c
2553
p, v, user, type, pa, pte, *pte);
sys/arch/alpha/alpha/trap.c
151
int isfatal, int user)
sys/arch/alpha/alpha/trap.c
183
user ? "user" : "kernel");
sys/arch/alpha/alpha/trap.c
211
int user;
sys/arch/alpha/alpha/trap.c
227
user = (framep->tf_regs[FRAME_PS] & ALPHA_PSL_USERMODE) != 0;
sys/arch/alpha/alpha/trap.c
228
if (user) {
sys/arch/alpha/alpha/trap.c
238
if (user) {
sys/arch/alpha/alpha/trap.c
263
if (user) {
sys/arch/alpha/alpha/trap.c
284
if (!user) {
sys/arch/alpha/alpha/trap.c
344
if (user &&
sys/arch/alpha/alpha/trap.c
354
if (pmap_emulate_reference(p, a0, user, a1)) {
sys/arch/alpha/alpha/trap.c
389
if (!user && (a0 >= VM_MIN_KERNEL_ADDRESS ||
sys/arch/alpha/alpha/trap.c
421
if (!user) {
sys/arch/alpha/alpha/trap.c
456
printtrap(a0, a1, a2, entry, framep, 1, user);
sys/arch/alpha/alpha/trap.c
461
if (user) {
sys/arch/alpha/alpha/trap.c
470
printtrap(a0, a1, a2, entry, framep, 1, user);
sys/arch/alpha/alpha/vm_machdep.c
74
struct user *up = p2->p_addr;
sys/arch/alpha/include/pmap.h
183
int pmap_emulate_reference(struct proc *p, vaddr_t v, int user, int type);
sys/arch/amd64/amd64/machdep.c
1260
struct user *proc0paddr = NULL;
sys/arch/amd64/amd64/trap.c
305
vctrap(struct trapframe *frame, int user, int *sig, int *code)
sys/arch/amd64/amd64/trap.c
315
if (user) {
sys/arch/amd64/amd64/trap.c
347
if (user) {
sys/arch/amd64/amd64/trap.c
369
if (user) {
sys/arch/amd64/amd64/trap.c
441
if (user) {
sys/arch/amd64/amd64/trap.c
449
if (user) {
sys/arch/arm/arm/arm32_machdep.c
100
struct user *proc0paddr;
sys/arch/arm/arm/db_trace.c
77
struct user *u;
sys/arch/arm/arm/fault.c
167
u_int user, far, fsr, ftyp;
sys/arch/arm/arm/fault.c
194
user = TRAP_USERMODE(tf);
sys/arch/arm/arm/fault.c
199
if (user) {
sys/arch/arm/arm/fault.c
221
if (user) {
sys/arch/arm/arm/fault.c
250
if (user) {
sys/arch/arm/arm/fault.c
276
if (user == 0 && (va >= VM_MIN_KERNEL_ADDRESS ||
sys/arch/arm/arm/fault.c
295
user = 1;
sys/arch/arm/arm/fault.c
339
if (user == 0) {
sys/arch/arm/arm/fault.c
372
if (user)
sys/arch/arm/arm/openprom.c
105
error = copyin(user, cp, len);
sys/arch/arm/arm/openprom.c
95
openpromgetstr(int len, char *user, char **cpp)
sys/arch/arm/include/param.h
89
#define USPACE_UNDEF_STACK_BOTTOM (sizeof(struct user) + FPCONTEXTSIZE + 10)
sys/arch/arm64/arm64/machdep.c
85
struct user *proc0paddr;
sys/arch/arm64/arm64/machdep.c
929
proc0paddr = (struct user *)abp->kern_stack;
sys/arch/arm64/arm64/openprom.c
107
error = copyin(user, cp, len);
sys/arch/arm64/arm64/openprom.c
97
openpromgetstr(int len, char *user, char **cpp)
sys/arch/armv7/armv7/armv7_machdep.c
180
extern struct user *proc0paddr;
sys/arch/armv7/armv7/armv7_machdep.c
703
proc0paddr = (struct user *)kernelstack.pv_va;
sys/arch/hppa/hppa/machdep.c
138
struct user *proc0paddr;
sys/arch/hppa/hppa/pmap.c
622
extern struct user *proc0paddr;
sys/arch/hppa/hppa/vm_machdep.c
60
if (round_page(sizeof(struct user)) > NBPG)
sys/arch/i386/i386/machdep.c
2937
extern struct user *proc0paddr;
sys/arch/i386/i386/machdep.c
3175
if (offsetof(struct user, u_pcb.pcb_savefpu) & 0xf)
sys/arch/i386/i386/pmapae.c
776
extern struct user *proc0paddr;
sys/arch/loongson/loongson/machdep.c
113
struct user *proc0paddr;
sys/arch/loongson/loongson/machdep.c
821
(struct user *)pmap_steal_memory(USPACE, NULL, NULL);
sys/arch/luna88k/luna88k/machdep.c
205
extern struct user *proc0paddr;
sys/arch/macppc/macppc/machdep.c
94
extern struct user *proc0paddr;
sys/arch/macppc/macppc/openprom.c
104
error = copyin(user, cp, len);
sys/arch/macppc/macppc/openprom.c
94
openpromgetstr(int len, char *user, char **cpp)
sys/arch/mips64/include/cpu.h
140
struct user *ci_curprocpaddr;
sys/arch/mips64/include/cpu.h
410
struct user;
sys/arch/mips64/include/cpu.h
424
void savectx(struct user *, int);
sys/arch/mips64/mips64/pmap.c
101
int user; /* entering user mapping */
sys/arch/mips64/mips64/pmap.c
1031
stat_count(enter_stats.user);
sys/arch/octeon/octeon/machdep.c
122
struct user *proc0paddr;
sys/arch/octeon/octeon/machdep.c
553
(struct user *)pmap_steal_memory(USPACE, NULL, NULL);
sys/arch/octeon/octeon/openprom.c
107
error = copyin(user, cp, len);
sys/arch/octeon/octeon/openprom.c
97
openpromgetstr(int len, char *user, char **cpp)
sys/arch/powerpc64/powerpc64/machdep.c
348
proc0paddr = (struct user *)initstack;
sys/arch/powerpc64/powerpc64/machdep.c
68
struct user *proc0paddr;
sys/arch/powerpc64/powerpc64/openprom.c
107
error = copyin(user, cp, len);
sys/arch/powerpc64/powerpc64/openprom.c
97
openpromgetstr(int len, char *user, char **cpp)
sys/arch/riscv64/riscv64/machdep.c
675
proc0paddr = (struct user *)rbp->kern_stack;
sys/arch/riscv64/riscv64/machdep.c
83
struct user *proc0paddr;
sys/arch/riscv64/riscv64/openprom.c
107
error = copyin(user, cp, len);
sys/arch/riscv64/riscv64/openprom.c
97
openpromgetstr(int len, char *user, char **cpp)
sys/arch/sh/sh/db_interface.c
601
struct user *u;
sys/arch/sh/sh/db_interface.c
608
#define MAX_FRAME (PAGE_SIZE - sizeof(struct user))
sys/arch/sh/sh/sh_machdep.c
123
struct user *proc0paddr; /* init_main.c use this. */
sys/arch/sh/sh/sh_machdep.c
213
proc0paddr = (struct user *)u;
sys/arch/sh/sh/sh_machdep.c
235
memset((char *)(u + sizeof(struct user)), 0x5a,
sys/arch/sh/sh/sh_machdep.c
236
PAGE_SIZE - sizeof(struct user));
sys/arch/sh/sh/vm_machdep.c
197
memset((char *)fptop - PAGE_SIZE + sizeof(struct user), 0x5a,
sys/arch/sh/sh/vm_machdep.c
198
PAGE_SIZE - sizeof(struct user));
sys/arch/sparc64/sparc64/db_trace.c
74
struct user *u;
sys/arch/sparc64/sparc64/machdep.c
195
extern struct user *proc0paddr;
sys/arch/sparc64/sparc64/openprom.c
149
openpromgetstr(int len, char *user, char **cpp)
sys/arch/sparc64/sparc64/openprom.c
159
error = copyin(user, cp, len);
sys/dev/ic/aic79xx.c
2886
transinfo = &tinfo->user;
sys/dev/ic/aic79xx.c
2968
*offset = MIN(*offset, tinfo->user.offset);
sys/dev/ic/aic79xx.c
2996
*bus_width = MIN(tinfo->user.width, *bus_width);
sys/dev/ic/aic79xx.c
3076
tinfo->user.period = period;
sys/dev/ic/aic79xx.c
3077
tinfo->user.offset = offset;
sys/dev/ic/aic79xx.c
3078
tinfo->user.ppr_options = ppr_options;
sys/dev/ic/aic79xx.c
3214
tinfo->user.width = width;
sys/dev/ic/aic79xx.c
6562
tinfo->user.protocol_version = 4;
sys/dev/ic/aic79xx.c
6563
tinfo->user.transport_version = 4;
sys/dev/ic/aic79xx.c
6570
tinfo->user.period = AHD_SYNCRATE_DT;
sys/dev/ic/aic79xx.c
6572
tinfo->user.period = AHD_SYNCRATE_160;
sys/dev/ic/aic79xx.c
6574
tinfo->user.offset = MAX_OFFSET;
sys/dev/ic/aic79xx.c
6575
tinfo->user.ppr_options = MSG_EXT_PPR_RD_STRM
sys/dev/ic/aic79xx.c
6582
tinfo->user.ppr_options |= MSG_EXT_PPR_RTI;
sys/dev/ic/aic79xx.c
6584
tinfo->user.width = MSG_EXT_WDTR_BUS_16_BIT;
sys/dev/ic/aic79xx.c
6639
user_tinfo = &tinfo->user;
sys/dev/ic/aic79xx.c
6644
tinfo->user.protocol_version = 4;
sys/dev/ic/aic79xx.c
6645
tinfo->user.transport_version = 4;
sys/dev/ic/aic79xx.h
751
struct ahd_transinfo user;
sys/dev/ic/aic79xx_openbsd.c
590
if (width > tinfo->user.width)
sys/dev/ic/aic79xx_openbsd.c
591
width = tinfo->user.width;
sys/dev/ic/aic79xx_openbsd.c
598
period = tinfo->user.period;
sys/dev/ic/aic79xx_openbsd.c
599
offset = tinfo->user.offset;
sys/dev/ic/aic79xx_openbsd.c
603
ppr_options = tinfo->user.ppr_options;
sys/dev/ic/aic79xx_openbsd.c
620
if (ppr_options != 0 && tinfo->user.transport_version >= 3) {
sys/dev/ic/aic79xx_openbsd.c
621
tinfo->goal.transport_version = tinfo->user.transport_version;
sys/dev/ic/aic79xx_openbsd.c
622
tinfo->curr.transport_version = tinfo->user.transport_version;
sys/dev/ic/aic7xxx.c
1707
transinfo = &tinfo->user;
sys/dev/ic/aic7xxx.c
1848
*offset = MIN(*offset, tinfo->user.offset);
sys/dev/ic/aic7xxx.c
1876
*bus_width = MIN(tinfo->user.width, *bus_width);
sys/dev/ic/aic7xxx.c
1956
tinfo->user.period = period;
sys/dev/ic/aic7xxx.c
1957
tinfo->user.offset = offset;
sys/dev/ic/aic7xxx.c
1958
tinfo->user.ppr_options = ppr_options;
sys/dev/ic/aic7xxx.c
2074
tinfo->user.width = width;
sys/dev/ic/aic7xxx.c
4836
tinfo->user.width = MSG_EXT_WDTR_BUS_16_BIT;
sys/dev/ic/aic7xxx.c
4842
tinfo->user.period = ahc_syncrates->period;
sys/dev/ic/aic7xxx.c
4843
tinfo->user.offset = MAX_OFFSET;
sys/dev/ic/aic7xxx.c
4873
tinfo->user.period =
sys/dev/ic/aic7xxx.c
4876
tinfo->user.period = 0;
sys/dev/ic/aic7xxx.c
4878
tinfo->user.offset = MAX_OFFSET;
sys/dev/ic/aic7xxx.c
4881
tinfo->user.ppr_options =
sys/dev/ic/aic7xxx.c
4890
tinfo->user.period =
sys/dev/ic/aic7xxx.c
4895
if (tinfo->user.period != 0)
sys/dev/ic/aic7xxx.c
4896
tinfo->user.offset = MAX_OFFSET;
sys/dev/ic/aic7xxx.c
4898
if (tinfo->user.period == 0)
sys/dev/ic/aic7xxx.c
4899
tinfo->user.offset = 0;
sys/dev/ic/aic7xxx.c
4902
tinfo->user.width = MSG_EXT_WDTR_BUS_16_BIT;
sys/dev/ic/aic7xxx.c
4903
tinfo->user.protocol_version = 4;
sys/dev/ic/aic7xxx.c
4905
tinfo->user.transport_version = 3;
sys/dev/ic/aic7xxx.c
4907
tinfo->user.transport_version = 2;
sys/dev/ic/aic7xxx_openbsd.c
659
if (width > tinfo->user.width)
sys/dev/ic/aic7xxx_openbsd.c
660
width = tinfo->user.width;
sys/dev/ic/aic7xxx_openbsd.c
667
period = tinfo->user.period;
sys/dev/ic/aic7xxx_openbsd.c
668
offset = tinfo->user.offset;
sys/dev/ic/aic7xxx_openbsd.c
672
ppr_options = tinfo->user.ppr_options;
sys/dev/ic/aic7xxx_openbsd.c
691
if (ppr_options != 0 && tinfo->user.transport_version >= 3) {
sys/dev/ic/aic7xxx_openbsd.c
692
tinfo->goal.transport_version = tinfo->user.transport_version;
sys/dev/ic/aic7xxx_openbsd.c
693
tinfo->curr.transport_version = tinfo->user.transport_version;
sys/dev/ic/aic7xxxvar.h
735
struct ahc_transinfo user;
sys/dev/ic/stireg.h
217
u_int32_t user: 1; /* user-defined mode */
sys/dev/pci/drm/amd/amdgpu/amdgpu_cs.c
1540
struct drm_amdgpu_fence *user)
sys/dev/pci/drm/amd/amdgpu/amdgpu_cs.c
1547
ctx = amdgpu_ctx_get(filp->driver_priv, user->ctx_id);
sys/dev/pci/drm/amd/amdgpu/amdgpu_cs.c
1551
r = amdgpu_ctx_get_entity(ctx, user->ip_type, user->ip_instance,
sys/dev/pci/drm/amd/amdgpu/amdgpu_cs.c
1552
user->ring, &entity);
sys/dev/pci/drm/amd/amdgpu/amdgpu_cs.c
1558
fence = amdgpu_ctx_get_fence(ctx, entity, user->seq_no);
sys/dev/pci/drm/amd/amdkfd/kfd_smi_events.c
112
ret = copy_to_user(user, buf, to_copy);
sys/dev/pci/drm/amd/amdkfd/kfd_smi_events.c
126
static ssize_t kfd_smi_ev_write(struct file *filep, const char __user *user,
sys/dev/pci/drm/amd/amdkfd/kfd_smi_events.c
132
if (!access_ok(user, size) || size < sizeof(events))
sys/dev/pci/drm/amd/amdkfd/kfd_smi_events.c
134
if (copy_from_user(&events, user, sizeof(events)))
sys/dev/pci/drm/amd/amdkfd/kfd_smi_events.c
81
static ssize_t kfd_smi_ev_read(struct file *filep, char __user *user,
sys/dev/pci/drm/drm_fbdev_dma.c
20
static int drm_fbdev_dma_fb_open(struct fb_info *info, int user)
sys/dev/pci/drm/drm_fbdev_dma.c
25
if (user && !try_module_get(fb_helper->dev->driver->fops->owner))
sys/dev/pci/drm/drm_fbdev_dma.c
31
static int drm_fbdev_dma_fb_release(struct fb_info *info, int user)
sys/dev/pci/drm/drm_fbdev_dma.c
35
if (user)
sys/dev/pci/drm/drm_fbdev_shmem.c
17
static int drm_fbdev_shmem_fb_open(struct fb_info *info, int user)
sys/dev/pci/drm/drm_fbdev_shmem.c
22
if (user && !try_module_get(fb_helper->dev->driver->fops->owner))
sys/dev/pci/drm/drm_fbdev_shmem.c
28
static int drm_fbdev_shmem_fb_release(struct fb_info *info, int user)
sys/dev/pci/drm/drm_fbdev_shmem.c
32
if (user)
sys/dev/pci/drm/drm_fbdev_ttm.c
18
static int drm_fbdev_ttm_fb_open(struct fb_info *info, int user)
sys/dev/pci/drm/drm_fbdev_ttm.c
23
if (user && !try_module_get(fb_helper->dev->driver->fops->owner))
sys/dev/pci/drm/drm_fbdev_ttm.c
29
static int drm_fbdev_ttm_fb_release(struct fb_info *info, int user)
sys/dev/pci/drm/drm_fbdev_ttm.c
33
if (user)
sys/dev/pci/drm/i915/gem/i915_gem_context.c
1937
const struct drm_i915_gem_context_param_sseu *user,
sys/dev/pci/drm/i915/gem/i915_gem_context.c
1945
if (!user->slice_mask || !user->subslice_mask ||
sys/dev/pci/drm/i915/gem/i915_gem_context.c
1946
!user->min_eus_per_subslice || !user->max_eus_per_subslice)
sys/dev/pci/drm/i915/gem/i915_gem_context.c
1950
if (user->max_eus_per_subslice < user->min_eus_per_subslice)
sys/dev/pci/drm/i915/gem/i915_gem_context.c
1957
if (overflows_type(user->slice_mask, context->slice_mask) ||
sys/dev/pci/drm/i915/gem/i915_gem_context.c
1958
overflows_type(user->subslice_mask, context->subslice_mask) ||
sys/dev/pci/drm/i915/gem/i915_gem_context.c
1959
overflows_type(user->min_eus_per_subslice,
sys/dev/pci/drm/i915/gem/i915_gem_context.c
1961
overflows_type(user->max_eus_per_subslice,
sys/dev/pci/drm/i915/gem/i915_gem_context.c
1966
if (user->slice_mask & ~device->slice_mask)
sys/dev/pci/drm/i915/gem/i915_gem_context.c
1969
if (user->subslice_mask & ~dev_subslice_mask)
sys/dev/pci/drm/i915/gem/i915_gem_context.c
1972
if (user->max_eus_per_subslice > device->max_eus_per_subslice)
sys/dev/pci/drm/i915/gem/i915_gem_context.c
1975
context->slice_mask = user->slice_mask;
sys/dev/pci/drm/i915/gem/i915_gem_context.c
1976
context->subslice_mask = user->subslice_mask;
sys/dev/pci/drm/i915/gem/i915_gem_context.c
1977
context->min_eus_per_subslice = user->min_eus_per_subslice;
sys/dev/pci/drm/i915/gem/i915_gem_context.c
1978
context->max_eus_per_subslice = user->max_eus_per_subslice;
sys/dev/pci/drm/i915/gem/i915_gem_context.c
2025
if ((user->min_eus_per_subslice !=
sys/dev/pci/drm/i915/gem/i915_gem_context.c
2027
(user->max_eus_per_subslice !=
sys/dev/pci/drm/i915/gem/i915_gem_context.c
2140
struct i915_gem_context_param_context_image user;
sys/dev/pci/drm/i915/gem/i915_gem_context.c
2153
if (args->size < sizeof(user))
sys/dev/pci/drm/i915/gem/i915_gem_context.c
2156
if (copy_from_user(&user, u64_to_user_ptr(args->value), sizeof(user)))
sys/dev/pci/drm/i915/gem/i915_gem_context.c
2159
if (user.mbz)
sys/dev/pci/drm/i915/gem/i915_gem_context.c
2162
if (user.flags & ~(I915_CONTEXT_IMAGE_FLAG_ENGINE_INDEX))
sys/dev/pci/drm/i915/gem/i915_gem_context.c
2166
if (user.flags & I915_CONTEXT_IMAGE_FLAG_ENGINE_INDEX)
sys/dev/pci/drm/i915/gem/i915_gem_context.c
2169
ce = lookup_user_engine(ctx, lookup, &user.engine);
sys/dev/pci/drm/i915/gem/i915_gem_context.c
2173
if (user.size < ce->engine->context_size) {
sys/dev/pci/drm/i915/gem/i915_gem_context.c
2190
state = memdup_user(u64_to_user_ptr(user.image), ce->engine->context_size);
sys/dev/pci/drm/i915/gem/i915_gem_context.c
2211
args->size = sizeof(user);
sys/dev/pci/drm/i915/gem/i915_gem_context.c
748
struct i915_context_param_engines __user *user =
sys/dev/pci/drm/i915/gem/i915_gem_context.c
759
if (args->size < sizeof(*user) ||
sys/dev/pci/drm/i915/gem/i915_gem_context.c
760
!IS_ALIGNED(args->size - sizeof(*user), sizeof(*user->engines))) {
sys/dev/pci/drm/i915/gem/i915_gem_context.c
766
set.num_engines = (args->size - sizeof(*user)) / sizeof(*user->engines);
sys/dev/pci/drm/i915/gem/i915_gem_context.c
779
if (copy_from_user(&ci, &user->engines[n], sizeof(ci))) {
sys/dev/pci/drm/i915/gem/i915_gem_context.c
806
if (!get_user(extensions, &user->extensions))
sys/dev/pci/drm/i915/gem/i915_gem_context.h
244
const struct drm_i915_gem_context_param_sseu *user,
sys/dev/pci/drm/i915/gem/i915_gem_execbuffer.c
2936
struct drm_i915_gem_exec_fence __user *user;
sys/dev/pci/drm/i915/gem/i915_gem_execbuffer.c
2949
ULONG_MAX / sizeof(*user),
sys/dev/pci/drm/i915/gem/i915_gem_execbuffer.c
2953
user = u64_to_user_ptr(args->cliprects_ptr);
sys/dev/pci/drm/i915/gem/i915_gem_execbuffer.c
2954
if (!access_ok(user, num_fences * sizeof(*user)))
sys/dev/pci/drm/i915/gem/i915_gem_execbuffer.c
2979
if (__copy_from_user(&user_fence, user++, sizeof(user_fence)))
sys/dev/pci/drm/i915/gt/uc/intel_uc_fw.c
548
bool user = e == -EINVAL;
sys/dev/pci/drm/i915/gt/uc/intel_uc_fw.c
553
uc_fw->user_overridden = user;
sys/dev/pci/drm/i915/gt/uc/intel_uc_fw.c
558
uc_fw->user_overridden = user;
sys/dev/pci/drm/i915/gt/uc/intel_uc_fw.c
562
uc_fw->user_overridden = user;
sys/dev/pci/drm/i915/gt/uc/intel_uc_fw.c
568
uc_fw->user_overridden = user;
sys/dev/pci/drm/i915/gt/uc/intel_uc_fw.c
573
uc_fw->user_overridden = user;
sys/dev/pci/drm/i915/gt/uc/intel_uc_fw.c
574
} else if (user && i915_inject_probe_error(i915, e)) {
sys/dev/pci/drm/i915/intel_wakeref.h
274
struct ref_tracker *user = NULL;
sys/dev/pci/drm/i915/intel_wakeref.h
276
ref_tracker_alloc(dir, &user, GFP_NOWAIT);
sys/dev/pci/drm/i915/intel_wakeref.h
278
return user ?: INTEL_WAKEREF_DEF;
sys/dev/pci/drm/radeon/radeon_fbdev.c
145
static int radeon_fbdev_fb_open(struct fb_info *info, int user)
sys/dev/pci/drm/radeon/radeon_fbdev.c
163
static int radeon_fbdev_fb_release(struct fb_info *info, int user)
sys/dev/softraid.c
3307
int user, void *data)
sys/dev/softraid.c
3321
DEVNAME(sc), user);
sys/dev/softraid.c
3328
if (user) {
sys/dev/softraid.c
3451
if (user == 0 && (sd->sd_meta_flags & BIOC_SCNOAUTOASSEMBLE)) {
sys/kern/init_main.c
122
extern struct user *proc0paddr;
sys/kern/kern_fork.c
166
p->p_addr = (struct user *)uaddr;
sys/sys/proc.h
429
struct user *p_addr; /* Kernel virtual addr of u-area */
usr.bin/cu/cu.c
430
char user[128], *out;
usr.bin/cu/cu.c
442
if (slash > sizeof(user) - 1)
usr.bin/cu/cu.c
444
memcpy(user, filename, slash);
usr.bin/cu/cu.c
445
user[slash] = '\0';
usr.bin/cu/cu.c
446
if ((pw = getpwnam(user)) == NULL)
usr.bin/cvs/rcs.c
814
rcs_lock_add(RCSFILE *file, const char *user, RCSNUM *rev)
usr.bin/cvs/rcs.c
820
if (strcmp(lkp->rl_name, user) == 0 &&
usr.bin/cvs/rcs.c
826
lkp->rl_name = xstrdup(user);
usr.bin/cvs/rcs.c
845
rcs_lock_remove(RCSFILE *file, const char *user, RCSNUM *rev)
usr.bin/cvs/rcs.c
850
if (strcmp(lkp->rl_name, user) == 0 &&
usr.bin/finger/finger.c
169
struct utmp user;
usr.bin/finger/finger.c
176
while (fread((char *)&user, sizeof(user), 1, stdin) == 1) {
usr.bin/finger/finger.c
177
if (!user.ut_name[0])
usr.bin/finger/finger.c
179
if ((pn = find_person(user.ut_name)) == NULL) {
usr.bin/finger/finger.c
180
bcopy(user.ut_name, name, UT_NAMESIZE);
usr.bin/finger/finger.c
185
enter_where(&user, pn);
usr.bin/finger/finger.c
198
struct utmp user;
usr.bin/finger/finger.c
269
while (fread((char *)&user, sizeof(user), 1, stdin) == 1) {
usr.bin/finger/finger.c
270
if (!user.ut_name[0])
usr.bin/finger/finger.c
272
if ((pn = find_person(user.ut_name)) == NULL)
usr.bin/finger/finger.c
274
enter_where(&user, pn);
usr.bin/finger/util.c
137
match(struct passwd *pw, char *user)
usr.bin/finger/util.c
149
if (!strcasecmp(p, user))
usr.bin/from/from.c
114
mail_spool(char *file, const char *user)
usr.bin/from/from.c
126
if (user == NULL) {
usr.bin/from/from.c
128
if ((user = getenv("LOGNAME")) == NULL &&
usr.bin/from/from.c
129
(user = getenv("USER")) == NULL) {
usr.bin/from/from.c
133
user = pwd->pw_name;
usr.bin/from/from.c
138
if (asprintf(&file, "%s/%s", _PATH_MAILDIR, user) == -1)
usr.bin/from/from.c
45
char *mail_spool(char *file, const char *user);
usr.bin/ftp/cmds.h
51
void user(int, char **);
usr.bin/ftp/cmdtab.c
206
{ "user", H(userhelp), 0, 1, 1, CMPL0 user },
usr.bin/ftp/util.c
216
ftp_login(const char *host, char *user, char *pass)
usr.bin/ftp/util.c
224
if (user == NULL && !anonftp) {
usr.bin/ftp/util.c
225
if (ruserpass(host, &user, &pass, &acctname) < 0) {
usr.bin/ftp/util.c
235
if ((user == NULL || pass == NULL) && anonftp) {
usr.bin/ftp/util.c
242
if ((user = getlogin()) == NULL) {
usr.bin/ftp/util.c
244
user = "anonymous";
usr.bin/ftp/util.c
246
user = pw->pw_name;
usr.bin/ftp/util.c
258
user);
usr.bin/ftp/util.c
261
user, hp->h_name);
usr.bin/ftp/util.c
264
user = "anonymous"; /* as per RFC 1635 */
usr.bin/ftp/util.c
269
user = "ftp"; /* some servers only allow "ftp" */
usr.bin/ftp/util.c
271
while (user == NULL) {
usr.bin/ftp/util.c
280
user = myname;
usr.bin/ftp/util.c
284
user = tmp;
usr.bin/ftp/util.c
288
n = command("USER %s", user);
usr.bin/ftp/util.c
302
warnx("Login %s failed.", user);
usr.bin/id/id.c
178
user(pw);
usr.bin/id/id.c
50
void user(struct passwd *);
usr.bin/mail/v7.local.c
52
findmail(const char *user, char *buf, int buflen)
usr.bin/mail/v7.local.c
65
(void)snprintf(buf, buflen, "%s/%s", _PATH_MAILDIR, user);
usr.bin/mg/fileio.c
706
char user[LOGIN_NAME_MAX], path[NFILEN];
usr.bin/mg/fileio.c
721
if (ulen >= sizeof(user)) {
usr.bin/mg/fileio.c
729
memcpy(user, &fn[1], ulen);
usr.bin/mg/fileio.c
730
user[ulen] = '\0';
usr.bin/mg/fileio.c
731
pw = getpwnam(user);
usr.bin/rcs/rcs.c
693
rcs_lock_add(RCSFILE *file, const char *user, RCSNUM *rev)
usr.bin/rcs/rcs.c
705
if (strcmp(lkp->rl_name, user) == 0 &&
usr.bin/rcs/rcs.c
713
lkp->rl_name = xstrdup(user);
usr.bin/rcs/rcs.c
718
rdp->rd_locker = xstrdup(user);
usr.bin/rcs/rcs.c
735
rcs_lock_remove(RCSFILE *file, const char *user, RCSNUM *rev)
usr.bin/rcs/rcs.c
746
if (strcmp(lkp->rl_name, user) == 0 &&
usr.bin/rdist/client.c
1041
struct stat *st, char *user, char *group)
usr.bin/rdist/client.c
1051
starget, lmode, user, group);
usr.bin/rdist/client.c
1056
starget, lmode, user, group);
usr.bin/rdist/client.c
1059
opts, lmode, user, group, ername);
usr.bin/rdist/client.c
1073
struct stat *st, char *user, char *group)
usr.bin/rdist/client.c
1093
if (senddir(rname, opts, st, user, group, destdir) > 0)
usr.bin/rdist/client.c
1106
(void) sendlink(rname, opts, st, user, group, destdir);
usr.bin/rdist/client.c
1118
return (sendfile(rname, opts, st, user, group, destdir) == 0);
usr.bin/rdist/client.c
1138
char *user, *group;
usr.bin/rdist/client.c
1176
user = getusername(stb.st_uid, target, opts);
usr.bin/rdist/client.c
1184
user, group));
usr.bin/rdist/client.c
1188
user, group));
usr.bin/rdist/client.c
380
sendfile(char *rname, opt_t opts, struct stat *stb, char *user,
usr.bin/rdist/client.c
407
user, group, ername);
usr.bin/rdist/client.c
579
senddir(char *rname, opt_t opts, struct stat *stb, char *user,
usr.bin/rdist/client.c
594
opts, stb->st_mode & 07777, user, group, ername);
usr.bin/rdist/client.c
654
sendlink(char *rname, opt_t opts, struct stat *stb, char *user,
usr.bin/rdist/client.c
679
user, group, ername);
usr.bin/rdist/docmd.c
165
if ((user = getlogin()) == NULL)
usr.bin/rdist/docmd.c
166
user = locuser;
usr.bin/rdist/docmd.c
99
char *file, *user;
usr.bin/snmp/snmpc.c
117
char *user = NULL;
usr.bin/snmp/snmpc.c
277
user = optarg;
usr.bin/snmp/snmpc.c
478
if (user == NULL || user[0] == '\0')
usr.bin/snmp/snmpc.c
480
if ((sec = usm_init(user, strlen(user))) == NULL)
usr.bin/snmp/usm.c
103
memcpy(usm->user, user, userlen);
usr.bin/snmp/usm.c
195
usm->engineidlen, usmcookie->boots, usmcookie->time, usm->user,
usr.bin/snmp/usm.c
345
char *engineid, *user, *digest, *salt;
usr.bin/snmp/usm.c
366
&(usmcookie->boots), &(usmcookie->time), &user, &userlen,
usr.bin/snmp/usm.c
39
char *user;
usr.bin/snmp/usm.c
427
memcmp(user, usm->user, userlen) != 0)
usr.bin/snmp/usm.c
492
free(usm->user);
usr.bin/snmp/usm.c
81
usm_init(const char *user, size_t userlen)
usr.bin/snmp/usm.c
86
if (user == NULL || user[0] == '\0') {
usr.bin/snmp/usm.c
98
if ((usm->user = malloc(userlen)) == NULL) {
usr.bin/ssh/auth-bsdauth.c
72
authctxt->as = auth_userchallenge(authctxt->user,
usr.bin/ssh/auth-rhosts.c
124
user = userbuf;
usr.bin/ssh/auth-rhosts.c
134
if (user[0] == '-') {
usr.bin/ssh/auth-rhosts.c
136
user++;
usr.bin/ssh/auth-rhosts.c
137
} else if (user[0] == '+')
usr.bin/ssh/auth-rhosts.c
138
user++;
usr.bin/ssh/auth-rhosts.c
141
if (!host[0] || !user[0]) {
usr.bin/ssh/auth-rhosts.c
157
if (user[0] == '@') {
usr.bin/ssh/auth-rhosts.c
158
if (!innetgr(user + 1, NULL, client_user, NULL))
usr.bin/ssh/auth-rhosts.c
160
} else if (strcmp(user, client_user) != 0)
usr.bin/ssh/auth-rhosts.c
84
char *host, *user, *cp;
usr.bin/ssh/auth.c
275
authctxt->user,
usr.bin/ssh/auth.c
292
authctxt->user,
usr.bin/ssh/auth.c
414
getpwnamallow(struct ssh *ssh, const char *user)
usr.bin/ssh/auth.c
423
ci->user = user;
usr.bin/ssh/auth.c
424
ci->user_invalid = getpwnam(user) == NULL;
usr.bin/ssh/auth.c
432
pw = getpwnam(user);
usr.bin/ssh/auth.c
435
user, ssh_remote_ipaddr(ssh), ssh_remote_port(ssh));
usr.bin/ssh/auth.c
441
debug("unable to get login class: %s", user);
usr.bin/ssh/auth.c
446
debug("Approval failure for %s", user);
usr.bin/ssh/auth.h
172
struct passwd * getpwnamallow(struct ssh *, const char *user);
usr.bin/ssh/auth.h
59
char *user; /* username sent by the client */
usr.bin/ssh/auth2-chall.c
162
authctxt->user ? authctxt->user : "<nouser>",
usr.bin/ssh/auth2-chall.c
165
if (authctxt->user == NULL || !devs)
usr.bin/ssh/auth2-gss.c
112
if (!authctxt->valid || authctxt->user == NULL) {
usr.bin/ssh/auth2-gss.c
268
authenticated = mm_ssh_gssapi_userok(authctxt->user);
usr.bin/ssh/auth2-gss.c
301
ssh_gssapi_buildmic(b, authctxt->user, authctxt->service,
usr.bin/ssh/auth2-gss.c
309
authenticated = mm_ssh_gssapi_userok(authctxt->user);
usr.bin/ssh/auth2-hostbased.c
122
if (!authctxt->valid || authctxt->user == NULL) {
usr.bin/ssh/auth2-hostbased.c
132
(r = sshbuf_put_cstring(b, authctxt->user)) != 0 ||
usr.bin/ssh/auth2-pubkey.c
130
authctxt->valid ? "valid" : "invalid", authctxt->user,
usr.bin/ssh/auth2-pubkey.c
198
if (!authctxt->valid || authctxt->user == NULL) {
usr.bin/ssh/auth2-pubkey.c
203
xasprintf(&userstyle, "%s%s%s", authctxt->user,
usr.bin/ssh/auth2-pubkey.c
244
authctxt->user, ssh_remote_ipaddr(ssh),
usr.bin/ssh/auth2-pubkey.c
258
authctxt->user, ssh_remote_ipaddr(ssh),
usr.bin/ssh/auth2-pubkey.c
272
if (!authctxt->valid || authctxt->user == NULL) {
usr.bin/ssh/auth2.c
217
user_specific_delay(const char *user)
usr.bin/ssh/auth2.c
225
(unsigned long long)options.timing_secret, user);
usr.bin/ssh/auth2.c
263
char *user = NULL, *service = NULL, *method = NULL, *style = NULL;
usr.bin/ssh/auth2.c
270
if ((r = sshpkt_get_cstring(ssh, &user, NULL)) != 0 ||
usr.bin/ssh/auth2.c
274
debug("userauth-request for user %s service %s method %s", user, service, method);
usr.bin/ssh/auth2.c
277
if ((style = strchr(user, ':')) != NULL)
usr.bin/ssh/auth2.c
284
authctxt->pw = mm_getpwnamallow(ssh, user);
usr.bin/ssh/auth2.c
285
authctxt->user = xstrdup(user);
usr.bin/ssh/auth2.c
290
debug2_f("setting up authctxt for %s", user);
usr.bin/ssh/auth2.c
297
authctxt->valid ? "authenticating " : "invalid ", user);
usr.bin/ssh/auth2.c
298
setproctitle("%s [net]", authctxt->valid ? user : "unknown");
usr.bin/ssh/auth2.c
306
} else if (strcmp(user, authctxt->user) != 0 ||
usr.bin/ssh/auth2.c
310
authctxt->user, authctxt->service, user, service);
usr.bin/ssh/auth2.c
333
user_specific_delay(authctxt->user));
usr.bin/ssh/auth2.c
338
free(user);
usr.bin/ssh/auth2.c
356
authctxt->user);
usr.bin/ssh/auth2.c
398
ssh_packet_set_log_preamble(ssh, "user %s", authctxt->user);
usr.bin/ssh/authfd.c
472
if ((r = sshbuf_put_cstring(b, dch->user)) != 0 ||
usr.bin/ssh/authfd.h
31
char *user; /* wildcards allowed */
usr.bin/ssh/channels.c
1520
char *user = NULL, *host = NULL;
usr.bin/ssh/channels.c
1536
(r = sshbuf_get_nulterminated_string(b, 1024, &user, NULL)) != 0) {
usr.bin/ssh/channels.c
1563
c->self, socks4a ? "SOCKS4A" : "SOCKS4", user, (int)socks_cmd,
usr.bin/ssh/channels.c
1586
free(user);
usr.bin/ssh/groupaccess.c
48
ga_init(const char *user, gid_t base)
usr.bin/ssh/groupaccess.c
58
if (getgrouplist(user, base, groups_bygid, &ngroups) == -1) {
usr.bin/ssh/gss-genr.c
257
ssh_gssapi_buildmic(struct sshbuf *b, const char *user, const char *service,
usr.bin/ssh/gss-genr.c
265
(r = sshbuf_put_cstring(b, user)) != 0 ||
usr.bin/ssh/gss-serv.c
364
ssh_gssapi_userok(char *user)
usr.bin/ssh/gss-serv.c
374
if ((*gssapi_client.mech->userok)(&gssapi_client, user))
usr.bin/ssh/match.c
229
match_user(const char *user, const char *host, const char *ipaddr,
usr.bin/ssh/match.c
236
if (user == NULL && host == NULL && ipaddr == NULL) {
usr.bin/ssh/match.c
243
if (user == NULL)
usr.bin/ssh/match.c
247
return match_pattern(user, pattern);
usr.bin/ssh/match.c
253
if ((ret = match_pattern(user, pat)) == 1)
usr.bin/ssh/misc.c
1058
char *user = NULL, *host = NULL, *path = NULL;
usr.bin/ssh/misc.c
1092
if ((user = urldecode(tmp)) == NULL)
usr.bin/ssh/misc.c
1122
*userp = user;
usr.bin/ssh/misc.c
1123
user = NULL;
usr.bin/ssh/misc.c
1138
free(user);
usr.bin/ssh/misc.c
1223
const char *path = NULL, *user = NULL;
usr.bin/ssh/misc.c
1244
user = copy;
usr.bin/ssh/misc.c
1255
if (user != NULL) {
usr.bin/ssh/misc.c
1256
if ((pw = getpwnam(user)) == NULL) {
usr.bin/ssh/misc.c
1257
error_f("No such user %s", user);
usr.bin/ssh/misc.c
860
char *user = NULL, *host = NULL, *path = NULL;
usr.bin/ssh/misc.c
889
user = xstrdup(sdup);
usr.bin/ssh/misc.c
892
user = NULL;
usr.bin/ssh/misc.c
897
*userp = user;
usr.bin/ssh/misc.c
898
user = NULL;
usr.bin/ssh/misc.c
911
free(user);
usr.bin/ssh/misc.c
929
char *user = NULL, *host = NULL;
usr.bin/ssh/misc.c
946
if ((user = strdup(tmp)) == NULL)
usr.bin/ssh/misc.c
961
*userp = user;
usr.bin/ssh/misc.c
962
user = NULL;
usr.bin/ssh/misc.c
973
free(user);
usr.bin/ssh/monitor.c
1184
xasprintf(&userstyle, "%s%s%s", authctxt->user,
usr.bin/ssh/monitor.c
1255
xasprintf(&userstyle, "%s%s%s", authctxt->user,
usr.bin/ssh/monitor.c
1369
authctxt->user, ssh_remote_ipaddr(ssh),
usr.bin/ssh/monitor.c
1381
authctxt->user, ssh_remote_ipaddr(ssh),
usr.bin/ssh/monitor.c
1794
authenticated = authctxt->valid && ssh_gssapi_userok(authctxt->user);
usr.bin/ssh/monitor.c
310
debug_f("user %s authenticated by privileged process", authctxt->user);
usr.bin/ssh/monitor.c
313
ssh_packet_set_log_preamble(ssh, "user %s", authctxt->user);
usr.bin/ssh/monitor.c
819
if ((r = sshbuf_get_cstring(m, &authctxt->user, NULL)) != 0)
usr.bin/ssh/monitor.c
822
pwent = getpwnamallow(ssh, authctxt->user);
usr.bin/ssh/monitor.c
824
setproctitle("%s [priv]", pwent ? authctxt->user : "unknown");
usr.bin/ssh/monitor.c
857
authctxt->valid ? "authenticating" : "invalid ", authctxt->user);
usr.bin/ssh/monitor.c
863
authctxt->user, ssh_remote_ipaddr(ssh),
usr.bin/ssh/monitor_wrap.c
502
const char *user, const char *host, struct sshkey *key)
usr.bin/ssh/monitor_wrap.c
504
return (mm_key_allowed(MM_HOSTKEY, user, host, key, 0, NULL));
usr.bin/ssh/monitor_wrap.c
508
mm_key_allowed(enum mm_keytype type, const char *user, const char *host,
usr.bin/ssh/monitor_wrap.c
523
(r = sshbuf_put_cstring(m, user ? user : "")) != 0 ||
usr.bin/ssh/monitor_wrap.c
934
mm_ssh_gssapi_userok(char *user)
usr.bin/ssh/monitor_wrap.h
72
int mm_ssh_gssapi_userok(char *user);
usr.bin/ssh/readconf.c
1428
charptr = &options->user;
usr.bin/ssh/readconf.c
2740
options->user = NULL;
usr.bin/ssh/readconf.c
3133
free(o->user);
usr.bin/ssh/readconf.c
341
const char *user, const char *jumphost)
usr.bin/ssh/readconf.c
3449
char *tmp_user = NULL, *tmp_host = NULL, *host = NULL, *user = NULL;
usr.bin/ssh/readconf.c
3489
user = tmp_user;
usr.bin/ssh/readconf.c
350
ssh_digest_update(md, user, strlen(user)) < 0 ||
usr.bin/ssh/readconf.c
3503
o->jump_user = user;
usr.bin/ssh/readconf.c
3507
user = host = NULL; /* transferred */
usr.bin/ssh/readconf.c
3519
free(user);
usr.bin/ssh/readconf.c
3527
char *user = NULL, *host = NULL, *path = NULL;
usr.bin/ssh/readconf.c
3530
r = parse_uri("ssh", uri, &user, &host, &port, &path);
usr.bin/ssh/readconf.c
3535
*userp = user;
usr.bin/ssh/readconf.c
3536
user = NULL;
usr.bin/ssh/readconf.c
3545
free(user);
usr.bin/ssh/readconf.c
3728
dump_cfg_string(oUser, o->user);
usr.bin/ssh/readconf.c
642
ruser = options->user == NULL ? pw->pw_name : options->user;
usr.bin/ssh/readconf.c
701
ruser = options->user == NULL ? pw->pw_name : options->user;
usr.bin/ssh/readconf.h
240
const char *portstr, const char *user, const char *jump_host);
usr.bin/ssh/readconf.h
76
char *user; /* User to log in as. */
usr.bin/ssh/scp.c
957
do_sftp_connect(char *host, char *user, int port, char *sftp_direct,
usr.bin/ssh/scp.c
961
if (do_cmd(ssh_program, host, user, port, 1, "sftp",
usr.bin/ssh/servconf.c
1061
if (ci == NULL || (ci->test && ci->user == NULL)) {
usr.bin/ssh/servconf.c
1065
if (ci->user == NULL)
usr.bin/ssh/servconf.c
1067
if (match_usergroup_pattern_list(ci->user, arg) != 1)
usr.bin/ssh/servconf.c
1071
"line %d", ci->user, arg, line);
usr.bin/ssh/servconf.c
1073
if (ci == NULL || (ci->test && ci->user == NULL)) {
usr.bin/ssh/servconf.c
1077
if (ci->user == NULL)
usr.bin/ssh/servconf.c
1079
switch (match_cfg_line_group(arg, line, ci->user)) {
usr.bin/ssh/servconf.c
2798
ci->user = xstrdup(val);
usr.bin/ssh/servconf.c
943
match_cfg_line_group(const char *grps, int line, const char *user)
usr.bin/ssh/servconf.c
948
if (user == NULL)
usr.bin/ssh/servconf.c
951
if ((pw = getpwnam(user)) == NULL) {
usr.bin/ssh/servconf.c
953
"not exist", line, user);
usr.bin/ssh/servconf.c
956
"at line %d", user, line);
usr.bin/ssh/servconf.c
959
user, grps, line);
usr.bin/ssh/servconf.c
961
debug("user %.100s matched group list %.100s at line %d", user,
usr.bin/ssh/servconf.c
995
ci->user ? ci->user : "(null)",
usr.bin/ssh/servconf.h
259
const char *user;
usr.bin/ssh/sftp-common.c
214
const char *user, const char *group)
usr.bin/ssh/sftp-common.c
224
if (user == NULL) {
usr.bin/ssh/sftp-common.c
226
user = ubuf;
usr.bin/ssh/sftp-common.c
234
user = user_from_uid(st->st_uid, 0);
usr.bin/ssh/sftp-common.c
248
ulen = MAXIMUM(strlen(user), 8);
usr.bin/ssh/sftp-common.c
253
mode, lc, ulen, user, glen, group,
usr.bin/ssh/sftp-common.c
257
mode, lc, ulen, user, glen, group,
usr.bin/ssh/sftp-usergroup.c
150
collect_ids_from_glob(glob_t *g, int user, u_int **idsp, u_int *nidsp)
usr.bin/ssh/sftp-usergroup.c
155
if (user) {
usr.bin/ssh/sftp-usergroup.c
189
collect_ids_from_dirents(SFTP_DIRENT **d, int user, u_int **idsp, u_int *nidsp)
usr.bin/ssh/sftp-usergroup.c
194
if (user) {
usr.bin/ssh/sftp.c
2423
char *host = NULL, *user, *cp, **cpp, *file2 = NULL;
usr.bin/ssh/sftp.c
2597
switch (parse_uri("sftp", *argv, &user, &host, &tmp, &file1)) {
usr.bin/ssh/sftp.c
2607
if (parse_user_host_path(*argv, &user, &host,
usr.bin/ssh/sftp.c
2611
if (parse_user_host_port(*argv, &user, &host, NULL)
usr.bin/ssh/sftp.c
2628
if (user != NULL) {
usr.bin/ssh/sftp.c
2630
addargs(&args, "%s", user);
usr.bin/ssh/ssh-add.c
667
free(dch->user);
usr.bin/ssh/ssh-add.c
693
char *user = NULL, *host, *os, *path;
usr.bin/ssh/ssh-add.c
705
user = os;
usr.bin/ssh/ssh-add.c
710
if (user == NULL) {
usr.bin/ssh/ssh-add.c
714
dch->user = xstrdup(user);
usr.bin/ssh/ssh-add.c
729
dch->user = user == NULL ? NULL : xstrdup(user);
usr.bin/ssh/ssh-add.c
737
user == NULL ? "": user, user == NULL ? "" : "@",
usr.bin/ssh/ssh-add.c
774
if (dc->from.user != NULL) {
usr.bin/ssh/ssh-add.c
781
dc->from.user ? dc->from.user : "", dc->from.user ? "@" : "",
usr.bin/ssh/ssh-add.c
783
dc->to.user ? dc->to.user : "", dc->to.user ? "@" : "",
usr.bin/ssh/ssh-agent.c
1083
if ((r = sshbuf_get_cstring(b, &dch->user, NULL)) != 0 ||
usr.bin/ssh/ssh-agent.c
1098
if (*dch->user == '\0') {
usr.bin/ssh/ssh-agent.c
1099
free(dch->user);
usr.bin/ssh/ssh-agent.c
1100
dch->user = NULL;
usr.bin/ssh/ssh-agent.c
1114
dch->user == NULL ? "" : dch->user,
usr.bin/ssh/ssh-agent.c
1115
dch->user == NULL ? "" : "@",
usr.bin/ssh/ssh-agent.c
1157
dc->to.user ? dc->to.user : "", dc->to.user ? "@" : "",
usr.bin/ssh/ssh-agent.c
1161
dc->from.user != NULL) {
usr.bin/ssh/ssh-agent.c
227
free(dch->user);
usr.bin/ssh/ssh-agent.c
255
out->user = dch->user == NULL ? NULL : xstrdup(dch->user);
usr.bin/ssh/ssh-agent.c
297
dch->user == NULL ? "(null)" : dch->user,
usr.bin/ssh/ssh-agent.c
406
const struct sshkey *tokey, Identity *id, const char *user,
usr.bin/ssh/ssh-agent.c
418
i, d->from.user ? d->from.user : "",
usr.bin/ssh/ssh-agent.c
419
d->from.user ? "@" : "",
usr.bin/ssh/ssh-agent.c
422
d->to.user ? d->to.user : "", d->to.user ? "@" : "",
usr.bin/ssh/ssh-agent.c
438
if (d->to.user != NULL && user != NULL &&
usr.bin/ssh/ssh-agent.c
439
!match_pattern(user, d->to.user))
usr.bin/ssh/ssh-agent.c
461
identity_permitted(Identity *id, SocketEntry *e, char *user,
usr.bin/ssh/ssh-agent.c
504
fromkey ? fp1 : "", user ? user : "(ANY)",
usr.bin/ssh/ssh-agent.c
521
test_user = user;
usr.bin/ssh/ssh-agent.c
527
if (hks->forwarded && user != NULL) {
usr.bin/ssh/ssh-agent.c
549
if (hks->forwarded && user == NULL &&
usr.bin/ssh/ssh-agent.c
689
char *user = NULL, *service = NULL, *method = NULL, *pkalg = NULL;
usr.bin/ssh/ssh-agent.c
711
(r = sshbuf_get_cstring(b, &user, NULL)) != 0 || /* server user */
usr.bin/ssh/ssh-agent.c
741
*userp = user;
usr.bin/ssh/ssh-agent.c
742
user = NULL;
usr.bin/ssh/ssh-agent.c
755
free(user);
usr.bin/ssh/ssh-agent.c
841
char *user = NULL, *sig_dest = NULL;
usr.bin/ssh/ssh-agent.c
873
if (parse_userauth_request(data, key, &user, &sid,
usr.bin/ssh/ssh-agent.c
880
debug_f("user=%s", user);
usr.bin/ssh/ssh-agent.c
881
if (identity_permitted(id, e, user, &fwd_host, &dest_host) != 0)
usr.bin/ssh/ssh-agent.c
893
"key %s %s", e->nsession_ids, user,
usr.bin/ssh/ssh-agent.c
916
"user \"%s\" to listed host", user);
usr.bin/ssh/ssh-agent.c
983
free(user);
usr.bin/ssh/ssh-keygen.c
3051
sk_suffix(const char *application, const uint8_t *user, size_t userlen)
usr.bin/ssh/ssh-keygen.c
3067
if (user[userlen - i - 1] != 0)
usr.bin/ssh/ssh-keygen.c
3075
if (asmprintf(&cp, INT_MAX, NULL, "%.*s", (int)slen, user) == -1)
usr.bin/ssh/ssh-keygen.c
3081
cp = tohex(user, slen);
usr.bin/ssh/ssh-keygen.c
3200
confirm_sk_overwrite(const char *application, const char *user)
usr.bin/ssh/ssh-keygen.c
3206
user == NULL ? "null" : user);
usr.bin/ssh/ssh-pkcs11.c
1828
struct pkcs11_provider **providerp, CK_ULONG user)
usr.bin/ssh/ssh-pkcs11.c
1937
if ((ret = pkcs11_open_session(p, i, pin, user)) != 0 ||
usr.bin/ssh/ssh-pkcs11.c
794
CK_ULONG user)
usr.bin/ssh/ssh-pkcs11.c
819
rv = f->C_Login(session, user, (u_char *)pin, strlen(pin));
usr.bin/ssh/ssh.c
1078
if (options.user == NULL) {
usr.bin/ssh/ssh.c
1079
options.user = tuser;
usr.bin/ssh/ssh.c
1093
if (options.user == NULL) {
usr.bin/ssh/ssh.c
1094
options.user = p;
usr.bin/ssh/ssh.c
1120
if (options.user != NULL && !ssh_valid_ruser(options.user))
usr.bin/ssh/ssh.c
1263
if (options.user == NULL) {
usr.bin/ssh/ssh.c
1265
options.user = xstrdup(pw->pw_name);
usr.bin/ssh/ssh.c
1281
jumpuser = options.user;
usr.bin/ssh/ssh.c
1283
strcmp(options.user, jumpuser) == 0)
usr.bin/ssh/ssh.c
1421
if ((p = percent_dollar_expand(options.user,
usr.bin/ssh/ssh.c
1425
user_expanded = strcmp(p, options.user) != 0;
usr.bin/ssh/ssh.c
1426
free(options.user);
usr.bin/ssh/ssh.c
1427
options.user = p;
usr.bin/ssh/ssh.c
1437
!ssh_valid_ruser(options.user))
usr.bin/ssh/ssh.c
1441
cinfo->remuser = xstrdup(options.user);
usr.bin/ssh/ssh.c
975
if (options.user == NULL) {
usr.bin/ssh/ssh.c
976
options.user = xstrdup(optarg);
usr.bin/ssh/sshconnect.c
112
command_string = expand_proxy_command(proxy_command, options.user,
usr.bin/ssh/sshconnect.c
1567
server_user = options.user ? options.user : local_user;
usr.bin/ssh/sshconnect.c
195
command_string = expand_proxy_command(proxy_command, options.user,
usr.bin/ssh/sshconnect.c
72
expand_proxy_command(const char *proxy_command, const char *user,
usr.bin/ssh/sshconnect.c
86
"r", options.user,
usr.bin/ssh/sshlogin.c
117
store_lastlog_message(const char *user, uid_t uid)
usr.bin/ssh/sshlogin.c
126
last_login_time = get_last_login_time(uid, user, hostname,
usr.bin/ssh/sshlogin.c
148
record_login(pid_t pid, const char *tty, const char *user, uid_t uid,
usr.bin/ssh/sshlogin.c
157
store_lastlog_message(user, uid);
usr.bin/ssh/sshlogin.c
163
strncpy(u.ut_name, user, sizeof(u.ut_name));
usr.bin/ssh/sshlogin.c
170
if (strcmp(user, "") != 0) {
usr.bin/su/su.c
183
user = *argv;
usr.bin/su/su.c
185
if ((user = getloginname()) == NULL) {
usr.bin/su/su.c
190
user = "root";
usr.bin/su/su.c
193
if ((p = strchr(user, ':')) != NULL) {
usr.bin/su/su.c
204
auth_setitem(as, AUTHV_NAME, user) != 0)
usr.bin/su/su.c
206
if ((user = auth_getitem(as, AUTHV_NAME)) == NULL)
usr.bin/su/su.c
212
auth_errx(as, 1, "unknown login %s", user);
usr.bin/su/su.c
226
username, user, ontty());
usr.bin/su/su.c
343
username, user, ontty());
usr.bin/su/su.c
65
char *user, *shell = NULL, *avshell, *username, **np;
usr.bin/telnet/commands.c
1735
char *cmd, *hostp = 0, *portp = 0, *user = 0, *aliasp = 0;
usr.bin/telnet/commands.c
1765
if ((user = strdup(*argv++)) == NULL)
usr.bin/telnet/commands.c
1899
if (autologin && user == NULL) {
usr.bin/telnet/commands.c
1902
user = getlogin();
usr.bin/telnet/commands.c
1903
if (user == NULL ||
usr.bin/telnet/commands.c
1904
(pw = getpwnam(user)) == NULL || pw->pw_uid != getuid()) {
usr.bin/telnet/commands.c
1906
user = pw->pw_name;
usr.bin/telnet/commands.c
1908
user = NULL;
usr.bin/telnet/commands.c
1911
if (user) {
usr.bin/telnet/commands.c
1912
env_define("USER", user);
usr.bin/telnet/commands.c
1917
telnet(user);
usr.bin/telnet/main.c
141
user = optarg;
usr.bin/telnet/main.c
186
if (user) {
usr.bin/telnet/main.c
188
*argp++ = user;
usr.bin/telnet/main.c
81
char *user, *alias;
usr.bin/telnet/main.c
90
user = alias = NULL;
usr.bin/telnet/telnet.c
1839
telnet(char *user)
usr.bin/tmux/cmd-queue.c
570
char *user = NULL;
usr.bin/tmux/cmd-queue.c
577
xasprintf(&user, "[%s]", pw->pw_name);
usr.bin/tmux/cmd-queue.c
579
user = xstrdup("[unknown]");
usr.bin/tmux/cmd-queue.c
581
user = xstrdup("");
usr.bin/tmux/cmd-queue.c
584
server_add_message("%s%s key %s: %s", c->name, user,
usr.bin/tmux/cmd-queue.c
587
server_add_message("%s%s command: %s", c->name, user,
usr.bin/tmux/cmd-queue.c
590
free(user);
usr.bin/tmux/cmd-server-access.c
51
struct server_acl_user *user;
usr.bin/tmux/cmd-server-access.c
54
if ((user = server_acl_user_find(pw->pw_uid)) == NULL) {
usr.bin/tmux/cmd-server-access.c
60
if (uid == server_acl_get_uid(user)) {
usr.bin/tmux/format.c
1625
if (ft->c->user != NULL)
usr.bin/tmux/format.c
1626
return (xstrdup(ft->c->user));
usr.bin/tmux/format.c
1629
ft->c->user = xstrdup(pw->pw_name);
usr.bin/tmux/format.c
1630
return (xstrdup(ft->c->user));
usr.bin/tmux/key-string.c
198
u_int i, user;
usr.bin/tmux/key-string.c
205
if (sscanf(string, "User%u", &user) == 1 && user <= KEYC_NUSER)
usr.bin/tmux/key-string.c
206
return (KEYC_USER + user);
usr.bin/tmux/server-acl.c
100
user = server_acl_user_find(uid);
usr.bin/tmux/server-acl.c
101
if (user == NULL) {
usr.bin/tmux/server-acl.c
102
user = xcalloc(1, sizeof *user);
usr.bin/tmux/server-acl.c
103
user->uid = uid;
usr.bin/tmux/server-acl.c
104
RB_INSERT(server_acl_entries, &server_acl_entries, user);
usr.bin/tmux/server-acl.c
112
struct server_acl_user *user;
usr.bin/tmux/server-acl.c
114
user = server_acl_user_find(uid);
usr.bin/tmux/server-acl.c
115
if (user != NULL) {
usr.bin/tmux/server-acl.c
116
RB_REMOVE(server_acl_entries, &server_acl_entries, user);
usr.bin/tmux/server-acl.c
117
free(user);
usr.bin/tmux/server-acl.c
125
struct server_acl_user *user;
usr.bin/tmux/server-acl.c
128
user = server_acl_user_find(uid);
usr.bin/tmux/server-acl.c
129
if (user == NULL)
usr.bin/tmux/server-acl.c
131
user->flags &= ~SERVER_ACL_READONLY;
usr.bin/tmux/server-acl.c
135
if (uid != (uid_t)-1 && uid == user->uid)
usr.bin/tmux/server-acl.c
144
struct server_acl_user *user;
usr.bin/tmux/server-acl.c
147
user = server_acl_user_find(uid);
usr.bin/tmux/server-acl.c
148
if (user == NULL)
usr.bin/tmux/server-acl.c
150
user->flags |= SERVER_ACL_READONLY;
usr.bin/tmux/server-acl.c
154
if (uid != (uid_t)-1 && uid == user->uid)
usr.bin/tmux/server-acl.c
166
struct server_acl_user *user;
usr.bin/tmux/server-acl.c
173
user = server_acl_user_find(uid);
usr.bin/tmux/server-acl.c
174
if (user == NULL)
usr.bin/tmux/server-acl.c
176
if (user->flags & SERVER_ACL_READONLY)
usr.bin/tmux/server-acl.c
183
server_acl_get_uid(struct server_acl_user *user)
usr.bin/tmux/server-acl.c
185
return (user->uid);
usr.bin/tmux/server-acl.c
98
struct server_acl_user *user;
usr.bin/tmux/server-client.c
540
free((void *)c->user);
usr.bin/write/write.c
122
utmp_chk(char *user, char *tty)
usr.bin/write/write.c
131
if (strncmp(user, u.ut_name, sizeof(u.ut_name)) == 0 &&
usr.bin/write/write.c
153
search_utmp(char *user, char *tty, int ttyl, char *mytty, uid_t myuid)
usr.bin/write/write.c
167
if (strncmp(user, u.ut_name, sizeof(u.ut_name)) == 0) {
usr.bin/write/write.c
188
errx(1, "%s is not logged in", user);
usr.bin/write/write.c
194
errx(1, "%s has messages disabled", user);
usr.bin/write/write.c
197
user, tty);
usr.sbin/amd/amd/info_passwd.c
127
if (*rhost == '\0' || *user == '\0' || *dir == '\0')
usr.sbin/amd/amd/info_passwd.c
137
dir, rhost, rhost, user, pw->pw_dir);
usr.sbin/amd/amd/info_passwd.c
90
char *user, *p, *q;
usr.sbin/amd/amd/info_passwd.c
96
user = strrchr(dir, '/');
usr.sbin/amd/amd/info_passwd.c
97
if (!user)
usr.sbin/amd/amd/info_passwd.c
99
*user++ = '\0';
usr.sbin/chroot/chroot.c
56
char *user, *group, *grouplist;
usr.sbin/chroot/chroot.c
64
user = grouplist = NULL;
usr.sbin/chroot/chroot.c
68
user = optarg;
usr.sbin/chroot/chroot.c
69
if (*user == '\0')
usr.sbin/chroot/chroot.c
87
if (user != NULL) {
usr.sbin/chroot/chroot.c
88
if ((pwd = getpwnam(user)) == NULL)
usr.sbin/chroot/chroot.c
89
errx(1, "no such user `%s'", user);
usr.sbin/chroot/chroot.c
91
err(1, "unable to get login class for `%s'", user);
usr.sbin/cron/cron.c
269
user *u;
usr.sbin/cron/cron.c
287
user *u;
usr.sbin/cron/database.c
154
user *
usr.sbin/cron/database.c
157
user *u = NULL;
usr.sbin/cron/database.c
174
user *u, *new_u;
usr.sbin/cron/database.c
55
user *u;
usr.sbin/cron/do_command.c
48
static void child_process(entry *, user *);
usr.sbin/cron/do_command.c
51
do_command(entry *e, user *u)
usr.sbin/cron/do_command.c
83
child_process(entry *e, user *u)
usr.sbin/cron/funcs.h
26
job_add(entry *, user *),
usr.sbin/cron/funcs.h
27
job_remove(entry *, user *),
usr.sbin/cron/funcs.h
29
free_user(user *),
usr.sbin/cron/funcs.h
37
pid_t do_command(entry *, user *);
usr.sbin/cron/funcs.h
54
user *load_user(FILE *, struct passwd *, const char *),
usr.sbin/cron/job.c
35
user *u;
usr.sbin/cron/job.c
43
job_add(entry *e, user *u)
usr.sbin/cron/job.c
70
job_remove(entry *e, user *u)
usr.sbin/cron/user.c
38
free_user(user *u)
usr.sbin/cron/user.c
61
user *
usr.sbin/cron/user.c
65
user *u;
usr.sbin/cron/user.c
75
if ((u = malloc(sizeof(user))) == NULL)
usr.sbin/httpd/server_http.c
134
char *line = NULL, *user = NULL, *pass = NULL;
usr.sbin/httpd/server_http.c
165
user = line;
usr.sbin/httpd/server_http.c
175
if (strcmp(clt_user, user) != 0) {
usr.sbin/httpd/server_http.c
1859
char *user = NULL;
usr.sbin/httpd/server_http.c
1896
stravis(&user, clt->clt_remote_user, HTTPD_LOGVIS) == -1)
usr.sbin/httpd/server_http.c
1910
user, tstamp,
usr.sbin/httpd/server_http.c
1935
stravis(&user, clt->clt_remote_user, HTTPD_LOGVIS) == -1)
usr.sbin/httpd/server_http.c
1941
stravis(&user, tls_peer_cert_subject(clt->clt_tls_ctx),
usr.sbin/httpd/server_http.c
1962
srv_conf->name, ip, user == NULL ? "-" :
usr.sbin/httpd/server_http.c
1963
user, tstamp,
usr.sbin/httpd/server_http.c
2020
free(user);
usr.sbin/lpd/printer.c
940
const char *user;
usr.sbin/lpd/printer.c
945
user = job->mail;
usr.sbin/lpd/printer.c
947
user = job->person;
usr.sbin/lpd/printer.c
948
if (user == NULL) {
usr.sbin/lpd/printer.c
986
fprintf(fp, "To: %s@%s\n", user, job->host);
usr.sbin/lpr/common_source/displayq.c
267
if (snprintf(cp, len, " %s", user[i]) >= len) {
usr.sbin/lpr/common_source/displayq.c
417
for (u = user; u < &user[users]; u++)
usr.sbin/lpr/common_source/displayq.c
64
extern char *user[]; /* users to process */
usr.sbin/lpr/common_source/rmjob.c
108
user[0] = person;
usr.sbin/lpr/common_source/rmjob.c
294
for (u = user; u < &user[users]; u++)
usr.sbin/lpr/common_source/rmjob.c
346
n = strlcpy(cp, user[i], sizeof(buf) - (cp - buf + 1));
usr.sbin/lpr/common_source/rmjob.c
54
extern char *user[]; /* users to process */
usr.sbin/lpr/lpd/lpd.c
424
char *user[MAXUSERS]; /* users to process */
usr.sbin/lpr/lpd/lpd.c
509
user[users++] = cp;
usr.sbin/lpr/lpd/lpd.c
545
user[users++] = cp;
usr.sbin/lpr/lpd/printjob.c
1112
sendmail(char *user, int bombed)
usr.sbin/lpr/lpd/printjob.c
1119
if (user[0] == '-' || user[0] == '/' || !isprint((unsigned char)user[0]))
usr.sbin/lpr/lpd/printjob.c
1137
printf("To: %s@%s\n", user, fromhost);
usr.sbin/lpr/lpd/printjob.c
1185
user, *jobname ? jobname : "<unknown>", printer, cp);
usr.sbin/lpr/lpq/lpq.c
124
user[users++] = *argv;
usr.sbin/lpr/lpq/lpq.c
62
char *user[MAXUSERS]; /* users to process */
usr.sbin/lpr/lprm/lprm.c
142
user[users++] = argv[0];
usr.sbin/lpr/lprm/lprm.c
68
char *user[MAXUSERS]; /* users to process */
usr.sbin/npppd/npppd/npppd_auth.c
249
npppd_auth_user *user;
usr.sbin/npppd/npppd/npppd_auth.c
254
user = NULL;
usr.sbin/npppd/npppd/npppd_auth.c
260
if ((user = npppd_auth_get_user(base, username)) == NULL) {
usr.sbin/npppd/npppd/npppd_auth.c
272
lpassword = strlen(user->password) + 1;
usr.sbin/npppd/npppd/npppd_auth.c
283
strlcpy(password, user->password, sz);
usr.sbin/npppd/npppd/npppd_auth.c
285
free(user);
usr.sbin/npppd/npppd/npppd_auth.c
308
npppd_auth_user *user;
usr.sbin/npppd/npppd/npppd_auth.c
315
if ((user = npppd_auth_get_user(base, username)) == NULL)
usr.sbin/npppd/npppd/npppd_auth.c
318
if (user->framed_ip_address.s_addr != 0) {
usr.sbin/npppd/npppd/npppd_auth.c
319
*ip4address = user->framed_ip_address;
usr.sbin/npppd/npppd/npppd_auth.c
321
*ip4netmask = user->framed_ip_netmask;
usr.sbin/npppd/npppd/npppd_auth.c
323
free(user);
usr.sbin/npppd/npppd/npppd_auth.c
326
free(user);
usr.sbin/npppd/npppd/npppd_auth.c
349
npppd_auth_user *user;
usr.sbin/npppd/npppd/npppd_auth.c
351
user = NULL;
usr.sbin/npppd/npppd/npppd_auth.c
356
if ((user = npppd_auth_get_user(base, username)) == NULL)
usr.sbin/npppd/npppd/npppd_auth.c
367
lcallnum = strlen(user->calling_number) + 1;
usr.sbin/npppd/npppd/npppd_auth.c
374
strlcpy(number, user->calling_number, sz);
usr.sbin/npppd/npppd/npppd_auth.c
377
free(user);
usr.sbin/nsd/udb.c
497
void udb_base_set_userdata(udb_base* udb, udb_void user)
usr.sbin/nsd/udb.c
500
if(user) { assert(udb_valid_dataptr(udb, user)); }
usr.sbin/nsd/udb.c
502
udb_rel_ptr_set(udb->base, &udb->glob_data->user_global, user);
usr.sbin/nsd/udb.h
417
void udb_base_set_userdata(udb_base* udb, udb_void user);
usr.sbin/pppd/auth.c
271
ChapAuthWithPeer(unit, user, ho->chap_mdtype);
usr.sbin/pppd/auth.c
279
upap_authwithpeer(unit, user, passwd);
usr.sbin/pppd/auth.c
532
if (user[0] == 0)
usr.sbin/pppd/auth.c
533
strlcpy(user, our_name, MAXNAMELEN);
usr.sbin/pppd/auth.c
596
&& have_chap_secret(user, remote_name, (u_int32_t)0);
usr.sbin/pppd/auth.c
628
char passwd[256], user[256];
usr.sbin/pppd/auth.c
637
BCOPY(auser, user, userlen);
usr.sbin/pppd/auth.c
638
user[userlen] = '\0';
usr.sbin/pppd/auth.c
655
if (scan_authfile(f, user, our_name, remote,
usr.sbin/pppd/auth.c
659
syslog(LOG_WARNING, "PAP authentication failure for %s", user);
usr.sbin/pppd/auth.c
666
ret = plogin(user, passwd, msg, msglen);
usr.sbin/pppd/auth.c
668
syslog(LOG_WARNING, "PAP login failure for %s", user);
usr.sbin/pppd/auth.c
683
attempts, devnam, user);
usr.sbin/pppd/auth.c
716
plogin(char *user, char *passwd, char **msg, int *msglen)
usr.sbin/pppd/auth.c
721
pw = getpwnam_shadow(user);
usr.sbin/pppd/auth.c
732
logwtmp(tty, user, remote_name); /* Add wtmp login entry */
usr.sbin/pppd/auth.c
751
syslog(LOG_INFO, "user %s logged in", user);
usr.sbin/pppd/auth.c
831
ret = scan_authfile(f, user,
usr.sbin/pppd/options.c
114
char user[MAXNAMELEN]; /* Username for PAP */
usr.sbin/pppd/options.c
1762
strlcpy(user, argv[0], MAXNAMELEN);
usr.sbin/pppd/options.c
630
char *user, *path, *file;
usr.sbin/pppd/options.c
635
if (pw == NULL || (user = pw->pw_dir) == NULL || user[0] == 0)
usr.sbin/pppd/options.c
638
if (asprintf(&path, "%s/%s", user, file) == -1)
usr.sbin/pppd/pppd.h
108
extern char user[]; /* Our name for authenticating ourselves */
usr.sbin/pppd/upap.c
125
upap_authwithpeer(int unit, char *user, char *password)
usr.sbin/pppd/upap.c
130
u->us_user = user;
usr.sbin/pppd/upap.c
131
u->us_userlen = strlen(user);
usr.sbin/pppd/upap.c
546
char *user, *pwd, *msg;
usr.sbin/pppd/upap.c
574
user = (char *) (p + 1);
usr.sbin/pppd/upap.c
579
print_string(user, ulen, printer, arg);
usr.sbin/quot/quot.c
190
struct user *usr;
usr.sbin/quot/quot.c
194
if (!(users = calloc(nusers, sizeof(struct user)))) {
usr.sbin/quot/quot.c
209
struct user *usr, *usrn;
usr.sbin/quot/quot.c
210
struct user *svusr;
usr.sbin/quot/quot.c
214
if (!(users = calloc(nusers, sizeof(struct user))))
usr.sbin/quot/quot.c
227
static struct user *
usr.sbin/quot/quot.c
231
struct user *usr;
usr.sbin/quot/quot.c
261
const struct user *u1 = v1, *u2 = v2;
usr.sbin/quot/quot.c
266
#define sortusers(users) (qsort((users), nusers, sizeof(struct user), \
usr.sbin/quot/quot.c
273
struct user *usr;
usr.sbin/quot/quot.c
278
usr = user(uid);
usr.sbin/quot/quot.c
369
struct user *usr, *usrs;
usr.sbin/quot/quot.c
387
if (!(usrs = calloc(nusers, sizeof(struct user))))
usr.sbin/quot/quot.c
389
memcpy(usrs, users, nusers * sizeof(struct user));
usr.sbin/quot/quot.c
429
printf("%s\t", user(DIP(super, dp, di_uid))->name);
usr.sbin/radiusd/radiusd.c
1746
userpass.user, sizeof(userpass.user)) != 0) {
usr.sbin/radiusd/radiusd.h
82
char user[256];
usr.sbin/radiusd/radiusd_bsdauth.c
134
char *user, *pass;
usr.sbin/radiusd/radiusd_bsdauth.c
155
user = (char *)(args + 1);
usr.sbin/radiusd/radiusd_bsdauth.c
156
user[args->userlen - 1] = '\0';
usr.sbin/radiusd/radiusd_bsdauth.c
157
pass = user + args->userlen;
usr.sbin/radiusd/radiusd_bsdauth.c
160
if (auth_userokay(user, NULL, NULL, pass))
usr.sbin/radiusd/radiusd_bsdauth.c
172
char *user, *group;
usr.sbin/radiusd/radiusd_bsdauth.c
196
user = (char *)(args + 1);
usr.sbin/radiusd/radiusd_bsdauth.c
197
user[args->userlen - 1] = '\0';
usr.sbin/radiusd/radiusd_bsdauth.c
198
group = user + args->userlen;
usr.sbin/radiusd/radiusd_bsdauth.c
201
user[strcspn(user, ":")] = '\0';
usr.sbin/radiusd/radiusd_bsdauth.c
202
pw = getpwnam(user);
usr.sbin/radiusd/radiusd_bsdauth.c
330
module_bsdauth_userpass(void *ctx, u_int q_id, const char *user,
usr.sbin/radiusd/radiusd_bsdauth.c
349
usercheck.userlen = strlen(user) + 1;
usr.sbin/radiusd/radiusd_bsdauth.c
353
iov[1].iov_base = (char *)user;
usr.sbin/radiusd/radiusd_bsdauth.c
374
groupcheck.userlen = strlen(user) + 1;
usr.sbin/radiusd/radiusd_bsdauth.c
378
iov[1].iov_base = (char *)user;
usr.sbin/radiusd/radiusd_ipcp.c
1246
assign->seq, assign->user->name, delay, assign->session_id,
usr.sbin/radiusd/radiusd_ipcp.c
1285
assign->seq, assign->user->name, dur.tv_sec,
usr.sbin/radiusd/radiusd_ipcp.c
1311
ipcp_ipv4_assign(struct module_ipcp *self, struct user *user,
usr.sbin/radiusd/radiusd_ipcp.c
1322
ip->user = user;
usr.sbin/radiusd/radiusd_ipcp.c
1325
TAILQ_INSERT_TAIL(&user->ipv4s, ip, next);
usr.sbin/radiusd/radiusd_ipcp.c
1354
TAILQ_REMOVE(&ip->user->ipv4s, ip, next);
usr.sbin/radiusd/radiusd_ipcp.c
1383
TAILQ_REMOVE(&assign->user->ipv4s, assign, next);
usr.sbin/radiusd/radiusd_ipcp.c
1401
struct user *
usr.sbin/radiusd/radiusd_ipcp.c
1405
struct user user;
usr.sbin/radiusd/radiusd_ipcp.c
1408
struct user *elm;
usr.sbin/radiusd/radiusd_ipcp.c
1410
strlcpy(key.user.name, username, 256);
usr.sbin/radiusd/radiusd_ipcp.c
1411
elm = RB_FIND(user_tree, &self->users, &key.user);
usr.sbin/radiusd/radiusd_ipcp.c
1413
if ((elm = calloc(1, offsetof(struct user, name[
usr.sbin/radiusd/radiusd_ipcp.c
1425
user_compar(struct user *a, struct user *b)
usr.sbin/radiusd/radiusd_ipcp.c
1432
RB_GENERATE_STATIC(user_tree, user, tree, user_compar);
usr.sbin/radiusd/radiusd_ipcp.c
1460
struct user *user;
usr.sbin/radiusd/radiusd_ipcp.c
147
RB_HEAD(user_tree, user) users;
usr.sbin/radiusd/radiusd_ipcp.c
1483
if ((user = ipcp_user_get(self, record->username))
usr.sbin/radiusd/radiusd_ipcp.c
1486
if ((assigned = ipcp_ipv4_assign(self, user, ipv4))
usr.sbin/radiusd/radiusd_ipcp.c
1537
strlcpy(record.username, assigned->user->name, sizeof(record.username));
usr.sbin/radiusd/radiusd_ipcp.c
1589
strlcpy(dump->records[idx].rec.username, assign->user->name,
usr.sbin/radiusd/radiusd_ipcp.c
1684
assign->user->name);
usr.sbin/radiusd/radiusd_ipcp.c
181
*ipcp_ipv4_assign(struct module_ipcp *, struct user *,
usr.sbin/radiusd/radiusd_ipcp.c
194
static struct user
usr.sbin/radiusd/radiusd_ipcp.c
196
static int user_compar(struct user *, struct user *);
usr.sbin/radiusd/radiusd_ipcp.c
225
RB_PROTOTYPE_STATIC(user_tree, user, tree, user_compar);
usr.sbin/radiusd/radiusd_ipcp.c
360
struct user *user, *usert;
usr.sbin/radiusd/radiusd_ipcp.c
367
RB_FOREACH_SAFE(user, user_tree, &self->users, usert) {
usr.sbin/radiusd/radiusd_ipcp.c
368
RB_REMOVE(user_tree, &self->users, user);
usr.sbin/radiusd/radiusd_ipcp.c
369
free(user);
usr.sbin/radiusd/radiusd_ipcp.c
67
RB_ENTRY(user) tree;
usr.sbin/radiusd/radiusd_ipcp.c
747
struct user *user = NULL;
usr.sbin/radiusd/radiusd_ipcp.c
802
if ((user = ipcp_user_get(self, username)) == NULL) {
usr.sbin/radiusd/radiusd_ipcp.c
812
user->name, self->max_sessions);
usr.sbin/radiusd/radiusd_ipcp.c
818
TAILQ_FOREACH_SAFE(assign, &user->ipv4s, next, assignt) {
usr.sbin/radiusd/radiusd_ipcp.c
83
struct user *user;
usr.sbin/radiusd/radiusd_ipcp.c
849
user->name, self->user_max_sessions);
usr.sbin/radiusd/radiusd_ipcp.c
859
user->name);
usr.sbin/radiusd/radiusd_ipcp.c
875
user->name);
usr.sbin/radiusd/radiusd_ipcp.c
920
"the address pool", q_id, user->name);
usr.sbin/radiusd/radiusd_ipcp.c
924
if ((assigned = ipcp_ipv4_assign(self, user, addr4)) == NULL) {
usr.sbin/radiusd/radiusd_module.c
465
module_userpass(base->ctx, userpass->q_id, userpass->user,
usr.sbin/radiusd/radiusd_module.h
34
void (*userpass)(void *ctx, u_int query_id, const char *user,
usr.sbin/smtpd/aliases.c
102
xlowercase(user, user, sizeof(user));
usr.sbin/smtpd/aliases.c
106
pbuf = strchr(user, *env->sc_subaddressing_delim);
usr.sbin/smtpd/aliases.c
117
user, *env->sc_subaddressing_delim, tag, domain))
usr.sbin/smtpd/aliases.c
127
if (!bsnprintf(buf, sizeof(buf), "%s@%s", user, domain))
usr.sbin/smtpd/aliases.c
138
user, *env->sc_subaddressing_delim, tag))
usr.sbin/smtpd/aliases.c
148
if (!bsnprintf(buf, sizeof(buf), "%s", user))
usr.sbin/smtpd/aliases.c
86
char user[LINE_MAX];
usr.sbin/smtpd/aliases.c
98
if (!bsnprintf(user, sizeof(user), "%s", maddr->user))
usr.sbin/smtpd/bounce.c
163
(void)snprintf(buf, sizeof(buf), "%s@%s", evp.sender.user,
usr.sbin/smtpd/bounce.c
177
(void)snprintf(buf, sizeof(buf), "%s@%s: %s", evp.dest.user,
usr.sbin/smtpd/bounce.c
183
(void)strlcpy(be->dest.user, evp.dest.user, sizeof(be->dest.user));
usr.sbin/smtpd/bounce.c
517
evp->dest.user,
usr.sbin/smtpd/enqueue.c
251
user = "anonymous";
usr.sbin/smtpd/enqueue.c
253
user = xstrdup(pw->pw_name);
usr.sbin/smtpd/enqueue.c
258
if ((user = getlogin()) != NULL && *user != '\0') {
usr.sbin/smtpd/enqueue.c
259
if ((pw = getpwnam(user)) == NULL ||
usr.sbin/smtpd/enqueue.c
263
user = "anonymous";
usr.sbin/smtpd/enqueue.c
265
user = xstrdup(pw ? pw->pw_name : user);
usr.sbin/smtpd/enqueue.c
523
msg.from = qualify_addr(user);
usr.sbin/smtpd/enqueue.c
92
char *user = NULL;
usr.sbin/smtpd/envelope.c
541
addr->user, addr->domain);
usr.sbin/smtpd/expand.c
63
!strcmp(expand->parent->u.user, node->u.user)) {
usr.sbin/smtpd/lka.c
722
lka_authenticate(const char *tablename, const char *user, const char *password)
usr.sbin/smtpd/lka.c
728
log_debug("debug: lka: authenticating for %s:%s", tablename, user);
usr.sbin/smtpd/lka.c
739
user, password)) {
usr.sbin/smtpd/lka.c
741
tablename, user);
usr.sbin/smtpd/lka.c
747
tablename, user);
usr.sbin/smtpd/lka.c
756
switch (table_lookup(table, K_CREDENTIALS, user, &lk)) {
usr.sbin/smtpd/lka.c
759
tablename, user);
usr.sbin/smtpd/lka_session.c
105
fwreq->user);
usr.sbin/smtpd/lka_session.c
113
"for user %s on forward-only rule", fwreq->user);
usr.sbin/smtpd/lka_session.c
118
"for user %s and no default action on rule", fwreq->user);
usr.sbin/smtpd/lka_session.c
123
"user %s, just deliver", fwreq->user);
usr.sbin/smtpd/lka_session.c
138
"forward error for user %s", fwreq->user);
usr.sbin/smtpd/lka_session.c
144
"for user %s on forward-only rule", fwreq->user);
usr.sbin/smtpd/lka_session.c
149
"for user %s and no default action on rule", fwreq->user);
usr.sbin/smtpd/lka_session.c
154
"for user %s, just deliver", fwreq->user);
usr.sbin/smtpd/lka_session.c
272
xn->u.mailaddr.user, xn->u.mailaddr.domain, xn->depth);
usr.sbin/smtpd/lka_session.c
282
ep.sender.user[0] == '\0' &&
usr.sbin/smtpd/lka_session.c
283
(strncasecmp(ep.dest.user, "SRS0=", 5) == 0 ||
usr.sbin/smtpd/lka_session.c
284
strncasecmp(ep.dest.user, "SRS1=", 5) == 0)) {
usr.sbin/smtpd/lka_session.c
320
xlowercase(maddr.user, xn->u.mailaddr.user,
usr.sbin/smtpd/lka_session.c
321
sizeof maddr.user);
usr.sbin/smtpd/lka_session.c
345
xlowercase(node.u.user, xn->u.mailaddr.user,
usr.sbin/smtpd/lka_session.c
346
sizeof node.u.user);
usr.sbin/smtpd/lka_session.c
354
xn->u.user, xn->depth, xn->sameuser);
usr.sbin/smtpd/lka_session.c
365
r = aliases_get(&lks->expand, xn->u.user);
usr.sbin/smtpd/lka_session.c
380
if ((tag = strchr(xn->u.user, *env->sc_subaddressing_delim)) != NULL) {
usr.sbin/smtpd/lka_session.c
386
r = table_lookup(userbase, K_USERINFO, xn->u.user, &lk);
usr.sbin/smtpd/lka_session.c
413
if (dsp->u.local.user) {
usr.sbin/smtpd/lka_session.c
414
if (strcmp(dsp->u.local.user, xn->u.user) != 0) {
usr.sbin/smtpd/lka_session.c
430
(void)strlcpy(fwreq.user, lk.userinfo.username, sizeof(fwreq.user));
usr.sbin/smtpd/lka_session.c
512
const char *user;
usr.sbin/smtpd/lka_session.c
538
(void)strlcpy(ep->mda_user, xn->u.user, sizeof(ep->mda_user));
usr.sbin/smtpd/lka_session.c
542
user = !xn->parent->realuser ?
usr.sbin/smtpd/lka_session.c
544
xn->parent->u.user;
usr.sbin/smtpd/lka_session.c
545
(void)strlcpy(ep->mda_user, user, sizeof (ep->mda_user));
usr.sbin/smtpd/mda.c
268
deliver.userinfo = s->user->userinfo;
usr.sbin/smtpd/mda.c
44
char *user;
usr.sbin/smtpd/mda.c
544
mda_fail(struct mda_user *user, int permfail, const char *error,
usr.sbin/smtpd/mda.c
549
while ((e = TAILQ_FIRST(&user->envelopes))) {
usr.sbin/smtpd/mda.c
550
TAILQ_REMOVE(&user->envelopes, e, entry);
usr.sbin/smtpd/mda.c
562
mda_user_free(user);
usr.sbin/smtpd/mda.c
635
s->user->running--;
usr.sbin/smtpd/mda.c
636
if (!(s->user->flags & USER_RUNNABLE)) {
usr.sbin/smtpd/mda.c
638
s->user->name);
usr.sbin/smtpd/mda.c
639
TAILQ_INSERT_TAIL(&runnable, s->user, entry_runnable);
usr.sbin/smtpd/mda.c
640
s->user->flags |= USER_RUNNABLE;
usr.sbin/smtpd/mda.c
671
evp->user,
usr.sbin/smtpd/mda.c
70
struct mda_user *user;
usr.sbin/smtpd/mda.c
748
if (dsp->u.local.user)
usr.sbin/smtpd/mda.c
751
u->id, mda_user_to_text(u), dsp->u.local.user);
usr.sbin/smtpd/mda.c
796
if (evp->sender.user[0] && evp->sender.domain[0])
usr.sbin/smtpd/mda.c
798
evp->sender.user, evp->sender.domain);
usr.sbin/smtpd/mda.c
800
(void)snprintf(buf, sizeof buf, "%s@%s", evp->dest.user,
usr.sbin/smtpd/mda.c
803
(void)snprintf(buf, sizeof buf, "%s@%s", evp->rcpt.user,
usr.sbin/smtpd/mda.c
806
e->user = evp->mda_user[0] ?
usr.sbin/smtpd/mda.c
807
xstrdup(evp->mda_user) : xstrdup(evp->dest.user);
usr.sbin/smtpd/mda.c
823
free(e->user);
usr.sbin/smtpd/mda.c
837
s->user = u;
usr.sbin/smtpd/mda_mbox.c
42
if (deliver->sender.user[0] == '\0' &&
usr.sbin/smtpd/mda_mbox.c
47
deliver->sender.user, deliver->sender.domain);
usr.sbin/smtpd/mda_unpriv.c
57
xasprintf(&mda_environ[idx++], "ORIGINAL_RECIPIENT=%s@%s", deliver->rcpt.user, deliver->rcpt.domain);
usr.sbin/smtpd/mda_unpriv.c
58
xasprintf(&mda_environ[idx++], "RECIPIENT=%s@%s", deliver->dest.user, deliver->dest.domain);
usr.sbin/smtpd/mda_unpriv.c
60
xasprintf(&mda_environ[idx++], "LOCAL=%s", deliver->rcpt.user);
usr.sbin/smtpd/mda_unpriv.c
64
if (deliver->sender.user[0])
usr.sbin/smtpd/mda_unpriv.c
66
deliver->sender.user, deliver->sender.domain);
usr.sbin/smtpd/mda_variables.c
107
dlv->sender.user, dlv->sender.domain) >= (int)sizeof tmp)
usr.sbin/smtpd/mda_variables.c
115
dlv->rcpt.user, dlv->rcpt.domain) >= (int)sizeof tmp)
usr.sbin/smtpd/mda_variables.c
123
dlv->dest.user, dlv->dest.domain) >= (int)sizeof tmp)
usr.sbin/smtpd/mda_variables.c
130
string = dlv->sender.user;
usr.sbin/smtpd/mda_variables.c
140
string = dlv->rcpt.user;
usr.sbin/smtpd/mda_variables.c
144
string = dlv->dest.user;
usr.sbin/smtpd/mda_variables.c
153
dlv->sender.user, dlv->sender.domain) >= (int)sizeof tmp)
usr.sbin/smtpd/mta.c
780
if (evp->sender.user[0] || evp->sender.domain[0])
usr.sbin/smtpd/mta.c
782
evp->sender.user, evp->sender.domain);
usr.sbin/smtpd/mta.c
786
if (dispatcher->u.remote.mail_from && evp->sender.user[0]) {
usr.sbin/smtpd/mta.c
791
maddr.user[0] ? maddr.user : evp->sender.user,
usr.sbin/smtpd/mta.c
805
evp->dest.user, evp->dest.domain);
usr.sbin/smtpd/mta.c
808
evp->rcpt.user, evp->rcpt.domain);
usr.sbin/smtpd/mta_session.c
1798
mta_report_link_auth(struct mta_session *s, const char *user, const char *result)
usr.sbin/smtpd/mta_session.c
1803
report_smtp_link_auth("smtp-out", s->id, user, result);
usr.sbin/smtpd/parse.y
466
if (processor->user) {
usr.sbin/smtpd/parse.y
471
processor->user = $2;
usr.sbin/smtpd/parse.y
618
if (dsp->u.local.user) {
usr.sbin/smtpd/parse.y
623
dsp->u.local.user = $2;
usr.sbin/smtpd/queue.c
580
} else if (e->sender.user[0] == '\0') {
usr.sbin/smtpd/queue.c
719
if (strcmp(e->rcpt.user, e->dest.user) ||
usr.sbin/smtpd/queue.c
722
e->rcpt.user, e->rcpt.domain);
usr.sbin/smtpd/queue.c
728
e->id, e->sender.user, e->sender.domain,
usr.sbin/smtpd/queue.c
729
e->dest.user, e->dest.domain,
usr.sbin/smtpd/report_smtp.c
103
report_smtp_link_auth(const char *direction, uint64_t qid, const char *user, const char *result)
usr.sbin/smtpd/report_smtp.c
113
m_add_string(p_lka, user);
usr.sbin/smtpd/smtp_session.c
1918
char buf[1024], *user, *pass;
usr.sbin/smtpd/smtp_session.c
1942
user = memchr(buf, '\0', len);
usr.sbin/smtpd/smtp_session.c
1943
if (user == NULL || user >= buf + len - 2)
usr.sbin/smtpd/smtp_session.c
1945
user++; /* skip NUL */
usr.sbin/smtpd/smtp_session.c
1946
if (user[strcspn(user, "\r\n")] != '\0')
usr.sbin/smtpd/smtp_session.c
1948
if (strlcpy(s->username, user, sizeof(s->username))
usr.sbin/smtpd/smtp_session.c
1952
pass = memchr(user, '\0', len - (user - buf));
usr.sbin/smtpd/smtp_session.c
1962
m_add_string(p_lka, user);
usr.sbin/smtpd/smtp_session.c
2235
p = strchr(maddr->user, ':');
usr.sbin/smtpd/smtp_session.c
2238
memmove(maddr->user, p, strlen(p) + 1);
usr.sbin/smtpd/smtp_session.c
2242
if (mailfrom && maddr->user[0] == '\0' && maddr->domain[0] == '\0')
usr.sbin/smtpd/smtp_session.c
2246
if (maddr->user[0] == '\0' || !valid_localpart(maddr->user))
usr.sbin/smtpd/smtp_session.c
2790
rcpt->maddr.user,
usr.sbin/smtpd/smtp_session.c
2970
smtp_report_link_auth(struct smtp_session *s, const char *user, const char *result)
usr.sbin/smtpd/smtp_session.c
2975
report_smtp_link_auth("smtp-in", s->id, user, result);
usr.sbin/smtpd/smtp_session.c
696
char user[SMTPD_MAXMAILADDRSIZE];
usr.sbin/smtpd/smtp_session.c
741
if (s->tx->evp.rcpt.user[0]) {
usr.sbin/smtpd/smtp_session.c
742
(void)strlcpy(tmp, s->tx->evp.rcpt.user, sizeof tmp);
usr.sbin/smtpd/smtp_session.c
927
s->tx->evp.sender.user,
usr.sbin/smtpd/smtp_session.c
928
s->tx->evp.sender.user[0] == '\0' ? "" : "@",
usr.sbin/smtpd/smtp_session.c
930
rcpt->maddr.user,
usr.sbin/smtpd/smtp_session.c
931
rcpt->maddr.user[0] == '\0' ? "" : "@",
usr.sbin/smtpd/smtp_session.c
946
strnvis(user, s->username, sizeof user, VIS_WHITE | VIS_SAFE);
usr.sbin/smtpd/smtp_session.c
951
s->id, user);
usr.sbin/smtpd/smtp_session.c
953
smtp_report_link_auth(s, user, "pass");
usr.sbin/smtpd/smtp_session.c
961
s->id, user);
usr.sbin/smtpd/smtp_session.c
962
smtp_report_link_auth(s, user, "fail");
usr.sbin/smtpd/smtp_session.c
970
s->id, user);
usr.sbin/smtpd/smtp_session.c
971
smtp_report_link_auth(s, user, "error");
usr.sbin/smtpd/smtpctl.c
1213
e->sender.user, e->sender.domain,
usr.sbin/smtpd/smtpctl.c
1214
e->rcpt.user, e->rcpt.domain,
usr.sbin/smtpd/smtpctl.c
1215
e->dest.user, e->dest.domain,
usr.sbin/smtpd/smtpd-api.h
27
char user[SMTPD_MAXLOCALPARTSIZE];
usr.sbin/smtpd/smtpd.c
1315
const char *user;
usr.sbin/smtpd/smtpd.c
1317
user = fp->user != NULL ? fp->user : SMTPD_USER;
usr.sbin/smtpd/smtpd.c
1318
if ((pw = getpwnam(user)) == NULL)
usr.sbin/smtpd/smtpd.c
1425
dsp->u.local.user ? dsp->u.local.user : deliver->userinfo.username);
usr.sbin/smtpd/smtpd.c
1427
if (dsp->u.local.user) {
usr.sbin/smtpd/smtpd.c
1428
if ((pw = getpwnam(dsp->u.local.user)) == NULL) {
usr.sbin/smtpd/smtpd.c
1431
dsp->u.local.user);
usr.sbin/smtpd/smtpd.c
166
fwreq->user[sizeof(fwreq->user) - 1] = '\0';
usr.sbin/smtpd/smtpd.c
167
fd = parent_forward_open(fwreq->user, fwreq->directory,
usr.sbin/smtpd/smtpd.c
2134
char user[LOGIN_NAME_MAX];
usr.sbin/smtpd/smtpd.c
2138
(void)strlcpy(user, username, sizeof(user));
usr.sbin/smtpd/smtpd.c
2141
ret = auth_userokay(user, NULL, "auth-smtp", pass);
usr.sbin/smtpd/smtpd.h
1054
const char *user;
usr.sbin/smtpd/smtpd.h
1175
char *user;
usr.sbin/smtpd/smtpd.h
441
char user[SMTPD_MAXLOCALPARTSIZE];
usr.sbin/smtpd/smtpd.h
656
char user[SMTPD_VUSERNAME_SIZE];
usr.sbin/smtpd/srs.c
102
maddr.domain, maddr.user, rcpt_domain);
usr.sbin/smtpd/srs.c
134
maddr.domain, maddr.user, rcpt_domain);
usr.sbin/smtpd/srs.c
165
ret = snprintf(tmp, sizeof tmp, "%s@%s", maddr.user, rcpt_domain);
usr.sbin/smtpd/srs.c
256
if ((p = strchr(maddr.user, '=')) == NULL)
usr.sbin/smtpd/srs.c
261
ret = snprintf(dest, sizeof dest, "%s@%s", p, maddr.user);
usr.sbin/smtpd/srs.c
302
if ((p = strchr(maddr.user, '=')) == NULL)
usr.sbin/smtpd/srs.c
307
ret = snprintf(dest, sizeof dest, "SRS0%s@%s", p, maddr.user);
usr.sbin/smtpd/to.c
613
return expandnode->u.user;
usr.sbin/smtpd/to.c
654
if (strlcpy(alias->u.user, line,
usr.sbin/smtpd/to.c
655
sizeof(alias->u.user)) >= sizeof(alias->u.user))
usr.sbin/smtpd/to.c
689
(void)strlcpy(alias->u.mailaddr.user, line, sizeof(alias->u.mailaddr.user));
usr.sbin/smtpd/to.c
69
if (strlcpy(maddr->user, username, sizeof maddr->user)
usr.sbin/smtpd/to.c
70
>= sizeof maddr->user)
usr.sbin/smtpd/to.c
81
if (strlcpy(maddr->user, username, sizeof maddr->user)
usr.sbin/smtpd/to.c
82
>= sizeof maddr->user)
usr.sbin/smtpd/to.c
97
(void)strlcpy(buffer, maddr->user, sizeof buffer);
usr.sbin/smtpd/util.c
390
if (m2.user[0] == '\0' && m2.domain[0] == '\0')
usr.sbin/smtpd/util.c
396
if (m2.user[0]) {
usr.sbin/smtpd/util.c
398
if (strchr(m2.user, *env->sc_subaddressing_delim) == NULL) {
usr.sbin/smtpd/util.c
400
p = strchr(m1.user, *env->sc_subaddressing_delim);
usr.sbin/smtpd/util.c
404
if (strcasecmp(m1.user, m2.user))
usr.sbin/snmpd/parse.y
1142
user->uu_authkey = $2;
usr.sbin/snmpd/parse.y
1145
user->uu_auth = $2;
usr.sbin/snmpd/parse.y
1148
user->uu_privkey = $2;
usr.sbin/snmpd/parse.y
1151
user->uu_priv = $2;
usr.sbin/snmpd/parse.y
128
static struct usmuser *user = NULL;
usr.sbin/snmpd/parse.y
383
user = usm_newuser($2, &errstr);
usr.sbin/snmpd/parse.y
384
if (user == NULL) {
usr.sbin/snmpd/parse.y
391
if (usm_checkuser(user, &errstr) < 0) {
usr.sbin/snmpd/parse.y
395
user = NULL;
usr.sbin/snmpd/usm.c
274
char *user;
usr.sbin/snmpd/usm.c
302
&engine_boots, &engine_time, &user, &userlen, &offs2,
usr.sbin/snmpd/usm.c
311
engine_time, user);
usr.sbin/snmpd/usm.c
334
memcpy(msg->sm_username, user, userlen);
usr.sbin/tcpdump/print-802_11.c
1408
ieee802_11_if_print(u_char *user, const struct pcap_pkthdr *h,
usr.sbin/tcpdump/print-802_11.c
1430
ieee802_11_radio_if_print(u_char *user, const struct pcap_pkthdr *h,
usr.sbin/tcpdump/print-atm.c
51
atm_if_print(u_char *user, const struct pcap_pkthdr *h, const u_char *p)
usr.sbin/tcpdump/print-enc.c
59
enc_if_print(u_char *user, const struct pcap_pkthdr *h, const u_char *p)
usr.sbin/tcpdump/print-ether.c
89
ether_if_print(u_char *user, const struct pcap_pkthdr *h, const u_char *p)
usr.sbin/tcpdump/print-null.c
102
null_if_print(user, h, p);
usr.sbin/tcpdump/print-null.c
106
null_if_print(u_char *user, const struct pcap_pkthdr *h, const u_char *p)
usr.sbin/tcpdump/print-null.c
98
loop_if_print(u_char *user, const struct pcap_pkthdr *h, const u_char *p)
usr.sbin/tcpdump/print-ofp.c
525
ofp_if_print(u_char *user, const struct pcap_pkthdr *h, const u_char *p)
usr.sbin/tcpdump/print-pflog.c
55
pflog_if_print(u_char *user, const struct pcap_pkthdr *h,
usr.sbin/tcpdump/print-pfsync.c
59
pfsync_if_print(u_char *user, const struct pcap_pkthdr *h,
usr.sbin/tcpdump/print-ppp.c
1170
ppp_if_print(u_char *user, const struct pcap_pkthdr *h, const u_char *p)
usr.sbin/tcpdump/print-ppp.c
1190
ppp_ether_if_print(u_char *user, const struct pcap_pkthdr *h, const u_char *p)
usr.sbin/tcpdump/print-ppp.c
1441
ppp_hdlc_if_print(u_char *user, const struct pcap_pkthdr *h,
usr.sbin/tcpdump/print-ppp.c
1471
ppp_if_print(user, h, p)
usr.sbin/tcpdump/print-ppp.c
1472
u_char *user;
usr.sbin/tcpdump/print-raw.c
55
raw_if_print(u_char *user, const struct pcap_pkthdr *h, const u_char *p)
usr.sbin/tcpdump/print-sl.c
118
sl_bsdos_if_print(u_char *user, const struct pcap_pkthdr *h, const u_char *p)
usr.sbin/tcpdump/print-sl.c
72
sl_if_print(u_char *user, const struct pcap_pkthdr *h, const u_char *p)
usr.sbin/tcpdump/print-usbpcap.c
42
usbpcap_if_print(u_char *user, const struct pcap_pkthdr *h, const u_char *p)
usr.sbin/user/user.c
291
removehomedir(const char *user, uid_t uid, const char *dir)
usr.sbin/user/user.c
315
user, dir);
usr.sbin/user/user.c
574
append_group(char *user, int ngroups, const char **groups)
usr.sbin/user/user.c
590
if ((pwp = getpwnam(user))) {
usr.sbin/user/user.c
592
warnx("can't get primary group for user `%s'", user);
usr.sbin/user/user.c
600
groups[i], user);
usr.sbin/user/user.c
603
if (strcmp(user, grp->gr_mem[j]) == 0) {
usr.sbin/user/user.c
611
warn("can't append group for `%s': can't open `%s'", user,
usr.sbin/user/user.c
660
cc = strlcat(buf, user, sizeof(buf)) + 1;
usr.sbin/user/user.c
943
user_exists(const char *user)
usr.sbin/user/user.c
947
return uid_from_user(user, &uid) != -1;
usr.sbin/vmctl/vmctl.c
701
char user[16], group[16];
usr.sbin/vmctl/vmctl.c
723
(void)snprintf(user, sizeof(user),
usr.sbin/vmctl/vmctl.c
726
(void)strlcpy(user, name, sizeof(user));
usr.sbin/vmctl/vmctl.c
736
(void)strlcat(user, group, sizeof(user));
usr.sbin/vmctl/vmctl.c
758
tty, user, vm_state(vir->vir_state),
usr.sbin/vmctl/vmctl.c
765
"-", user, vm_state(vir->vir_state),
usr.sbin/vmd/parse.y
577
char *user, *group;
usr.sbin/vmd/parse.y
584
user = $1;
usr.sbin/vmd/parse.y
585
if ((group = strchr(user, ':')) != NULL) {
usr.sbin/vmd/parse.y
586
if (group == user)
usr.sbin/vmd/parse.y
587
user = NULL;
usr.sbin/vmd/parse.y
591
if (user != NULL && *user) {
usr.sbin/vmd/parse.y
592
if ((pw = getpwnam(user)) == NULL) {
usr.sbin/vmd/parse.y
594
user);
usr.sbin/ypserv/mkalias/mkalias.c
151
char user[4096], host[4096]; /* XXX: DB bsize = 4096 in ypdb.c */
usr.sbin/ypserv/mkalias/mkalias.c
260
split_address(val.dptr, val.dsize, user, host);
usr.sbin/ypserv/mkalias/mkalias.c
46
split_address(char *address, size_t len, char *user, char *host)
usr.sbin/ypserv/mkalias/mkalias.c
52
s = user;
usr.sbin/ypserv/mkalias/mkalias.c
70
s = user;
usr.sbin/ypserv/mknetid/mknetid.c
114
struct user *u;
usr.sbin/ypserv/mknetid/mknetid.c
117
u = malloc(sizeof(struct user));
usr.sbin/ypserv/mknetid/mknetid.c
120
bzero(u, sizeof(struct user));
usr.sbin/ypserv/mknetid/mknetid.c
147
struct user *u;
usr.sbin/ypserv/mknetid/mknetid.c
338
struct user *u, *p;
usr.sbin/ypserv/mknetid/mknetid.c
48
struct user *prev, *next; /* links in read order */
usr.sbin/ypserv/mknetid/mknetid.c
49
struct user *hprev, *hnext; /* links in hash order */
usr.sbin/ypserv/mknetid/mknetid.c
60
struct user *root = NULL, *tail = NULL;
usr.sbin/ypserv/mknetid/mknetid.c
61
struct user *hroot[HASHMAX], *htail[HASHMAX];
usr.sbin/ypserv/revnetgroup/revnetgroup.c
146
while (__getnetgrent(&host, &user, &domain) != 0) {
usr.sbin/ypserv/revnetgroup/revnetgroup.c
155
if (!(user && !strcmp(user,"-"))) {
usr.sbin/ypserv/revnetgroup/revnetgroup.c
157
user ? user : "*",
usr.sbin/ypserv/revnetgroup/revnetgroup.c
77
char *host, *user, *domain;