/bind-9.11.3/bin/confgen/unix/ |
H A D | os.c | 26 set_user(FILE *fd, const char *user) { argument 29 pw = getpwnam(user);
|
/bind-9.11.3/bin/confgen/win32/ |
H A D | os.c | 24 set_user(FILE *fd, const char *user) { argument
|
/bind-9.11.3/unit/atf-src/tools/ |
H A D | user.hpp | 40 namespace user { namespace in namespace:tools 49 } // namespace user
|
H A D | user.cpp | 43 #include "user.hpp" 45 namespace impl = tools::user; 46 #define IMPL_NAME "tools::user" 60 throw std::runtime_error("Failed to drop user privileges"); 64 impl::get_user_ids(const std::string& user) argument 66 const struct passwd* pw = ::getpwnam(user.c_str()); 68 throw std::runtime_error("Failed to get information for user " + user);
|
H A D | requirements.cpp | 47 #include "user.hpp" 233 check_user(const std::string& user, const vars_map& config) argument 235 if (user == "root") { 236 if (!tools::user::is_root()) 240 } else if (user == "unprivileged") { 241 if (tools::user::is_root()) { 243 "unprivileged-user"); 245 return "Requires an unprivileged user and the " 246 "'unprivileged-user' configuration variable is not set"; 250 (void)tools::user 306 const vars_map::const_iterator user = metadata.find( local [all...] |
H A D | atf-run.cpp | 422 const std::pair< int, int > user = tools::get_required_user( local 433 if (user.first != -1 && user.second != -1) { 434 if (::chown(workdir.get_path().c_str(), user.first, 435 user.second) == -1) {
|
H A D | test-program.cpp | 59 #include "user.hpp" 306 const std::pair< int, int > user = tools::get_required_user( local 308 if (user.first != -1 && user.second != -1) 309 tools::user::drop_privileges(user); 469 } else if (name == "require.user") {
|
/bind-9.11.3/lib/isc/win32/ |
H A D | ntgroups.c | 13 * not normally seen: None and Everyone. A user account belongs to 57 wchar_t user[MAX_NAME_LENGTH]; local 59 retlen = mbstowcs(user, username, MAX_NAME_LENGTH); 68 * groups in which the user is indirectly a member. 71 user, 124 user,
|
H A D | fsaccess.c | 41 /* Store the user account name locally */ 117 #define SET_AND_CLEAR(user, group, other) \ 118 SET_AND_CLEAR1(user); \ 143 NTFS_Access_Control(const char *filename, const char *user, int access, argument 169 if (!LookupAccountName(0, user, psid, &sidBufferSize, domainBuffer, 315 isc_fsaccess_changeowner(const char *filename, const char *user) { argument 340 if (!LookupAccountName(0, user, psid, &sidBufferSize, domainBuffer,
|
/bind-9.11.3/bin/confgen/ |
H A D | keygen.c | 196 * Write a key file to 'keyfile'. If 'user' is non-NULL, 197 * make that user the owner of the file. The key will have 201 write_key_file(const char *keyfile, const char *user, argument 210 if (user != NULL) { 211 if (set_user(fd, user) == -1)
|
H A D | rndc-confgen.c | 74 [-s addr] [-t chrootdir] [-u user]\n\ 84 -u user: set the keyfile owner to \"user\" (requires -a)\n", 90 [-s addr] [-t chrootdir] [-u user]\n\ 100 -u user: set the keyfile owner to \"user\" (requires -a)\n", 126 char *user = NULL; local 201 user = isc_commandline_argument; 238 write_key_file(keyfile, chrootdir == NULL ? user : NULL, 250 write_key_file(buf, user, keynam [all...] |
/bind-9.11.3/contrib/dlz/drivers/ |
H A D | dlz_mysql_driver.c | 784 char *user = NULL; local 922 user = getParameterValue(argv[1], "user="); 939 user, pass, dbname, port, socket, 942 /* let user know if we couldn't connect. */ 969 if (user != NULL) 970 isc_mem_free(ns_g_mctx, user);
|
H A D | dlz_ldap_driver.c | 102 char *user; /*%< who is authenticating */ member in struct:__anon45 226 ldap_result = ldap_bind_s((LDAP *) dbc->dbconn, dbi->user, 955 /* if debugging, let user know we are multithreaded. */ 960 /* if debugging, let user know we are single threaded. */ 1069 ldap_inst->user = isc_mem_strdup(ns_g_mctx, argv[4]); 1070 if (ldap_inst->user == NULL) { 1268 if (((ldap_instance_t *)dbdata)->user != NULL) 1270 ((ldap_instance_t *)dbdata)->user);
|
H A D | dlz_odbc_driver.c | 115 SQLCHAR *user; member in struct:__anon47 220 if (odbc_inst->user != NULL) 221 isc_mem_free(ns_g_mctx, odbc_inst->user); 273 sqlRes = SQLConnect(ndb->dbc, dbi->dsn, safeLen(dbi->dsn), dbi->user, 274 safeLen(dbi->user), dbi->pass, safeLen(dbi->pass)); 1268 /* if debugging, let user know we are multithreaded. */ 1273 /* if debugging, let user know we are single threaded. */ 1331 /* if no username was passed, set odbc_inst.user = NULL; */ 1332 odbc_inst->user = (SQLCHAR *) getParameterValue(argv[2], 1333 "user [all...] |
/bind-9.11.3/contrib/sdb/pgsql/ |
H A D | pgsqldb.c | 49 char *user; member in struct:dbinfo 79 dbi->user, dbi->passwd); 236 * argv[3] (if present) is the name of the user to connect as 259 dbi->user = NULL; 276 STRDUP_OR_FAIL(dbi->user, argv[3]); 310 if (dbi->user != NULL) 311 isc_mem_free(ns_g_mctx, dbi->user);
|
/bind-9.11.3/unit/atf-src/atf-c/detail/ |
H A D | tp_main.c | 66 * The "usage" and "user" error types. 104 FREE_FORM_ERROR(user); variable
|
/bind-9.11.3/contrib/dlz/modules/ldap/ |
H A D | dlz_ldap_dynamic.c | 92 char *user; /*%< who is authenticating */ member in struct:__anon49 220 ldap_result = ldap_bind_s((LDAP *) dbc->dbconn, dbi->user, 914 /* if debugging, let user know we are multithreaded. */ 917 /* if debugging, let user know we are single threaded. */ 1012 ldap->user = strdup(argv[4]); 1013 if (ldap->user == NULL) { 1184 if (db->user != NULL) 1185 free(db->user);
|
/bind-9.11.3/contrib/dlz/modules/mysql/ |
H A D | dlz_mysql_dynamic.c | 88 char *user; member in struct:__anon50 835 /* if debugging, let user know we are multithreaded. */ 838 /* if debugging, let user know we are single threaded. */ 885 mysql->user = get_parameter_value(argv[1], "user="); 1021 mysql->host, mysql->user, 1073 if (db->user != NULL) 1074 free(db->user);
|