/bind-9.6-ESV-R11/bin/rndc/include/rndc/ |
H A D | os.h | 36 int set_user(FILE *fd, const char *user); 38 * Set the owner of the file referenced by 'fd' to 'user'. 41 * -1 insufficient permissions, or 'user' does not exist.
|
/bind-9.6-ESV-R11/unit/atf-src/atf-run/ |
H A D | user.cpp | 36 #include "../atf-c/detail/user.h" 44 #include "user.hpp" 61 throw std::runtime_error("Failed to drop user privileges"); 65 impl::get_user_ids(const std::string& user) argument 67 const struct passwd* pw = ::getpwnam(user.c_str()); 69 throw std::runtime_error("Failed to get information for user " + user);
|
H A D | Makefile.am.inc | 49 atf-run/user.cpp \ 50 atf-run/user.hpp 82 atf-run/user.cpp 106 atf-run/user.cpp 121 atf-run/user.cpp 126 atf_run_user_test_SOURCES = atf-run/user_test.cpp atf-run/user.cpp
|
H A D | requirements.cpp | 51 #include "user.hpp" 226 check_user(const std::string& user, const atf::tests::vars_map& config) argument 228 if (user == "root") { 233 } else if (user == "unprivileged") { 236 "unprivileged-user"); 238 return "Requires an unprivileged user and the " 239 "'unprivileged-user' configuration variable is not set"; 246 return "Failed to get information for user " + 253 throw std::runtime_error("Invalid value '" + user + "' for property " 254 "require.user"); 299 const atf::tests::vars_map::const_iterator user = metadata.find( local [all...] |
H A D | atf-run.cpp | 419 const std::pair< int, int > user = impl::get_required_user( local 430 if (user.first != -1 && user.second != -1) { 431 if (::chown(workdir.get_path().c_str(), user.first, 432 user.second) == -1) {
|
H A D | test-program.cpp | 61 #include "user.hpp" 306 const std::pair< int, int > user = impl::get_required_user( local 308 if (user.first != -1 && user.second != -1) 309 impl::drop_privileges(user); 469 } else if (name == "require.user") {
|
H A D | integration_test.sh | 108 atf_set "require.user" "root" 179 echo "Third: read user-specific common.conf." 193 echo "Fourth: read user-specific <test-suite>.conf." 519 "can be overriden by the user" 548 echo "Checking the user-specific info_start hook" 552 atf_tps_writer_info "test" "user value" 556 -o match:'^info: test, user value' \ 579 echo "Checking the user-specific info_end hook" 583 atf_tps_writer_info "test" "user value" 589 -o match:'^info: test, user valu [all...] |
/bind-9.6-ESV-R11/lib/isc/win32/ |
H A D | ntgroups.c | 22 * not normally seen: None and Everyone. A user account belongs to 66 wchar_t user[MAX_NAME_LENGTH]; local 68 retlen = mbstowcs(user, username, MAX_NAME_LENGTH); 77 * groups in which the user is indirectly a member. 80 user, 133 user,
|
H A D | fsaccess.c | 49 /* Store the user account name locally */ 128 #define SET_AND_CLEAR(user, group, other) \ 129 SET_AND_CLEAR1(user); \ 154 NTFS_Access_Control(const char *filename, const char *user, int access, argument 180 if (!LookupAccountName(0, user, psid, &sidBufferSize, domainBuffer, 326 isc_fsaccess_changeowner(const char *filename, const char *user) { argument 351 if (!LookupAccountName(0, user, psid, &sidBufferSize, domainBuffer,
|
/bind-9.6-ESV-R11/unit/atf-src/atf-c/detail/ |
H A D | Makefile.am.inc | 47 atf-c/detail/user.c \ 48 atf-c/detail/user.h
|
H A D | tp_main.c | 71 * The "usage" and "user" error types. 109 FREE_FORM_ERROR(user); variable
|
/bind-9.6-ESV-R11/bin/rndc/unix/ |
H A D | os.c | 35 set_user(FILE *fd, const char *user) { argument 38 pw = getpwnam(user);
|
/bind-9.6-ESV-R11/lib/isc/unix/ |
H A D | fsaccess.c | 65 #define SET_AND_CLEAR(user, group, other) \ 66 SET_AND_CLEAR1(user); \
|
/bind-9.6-ESV-R11/bin/rndc/ |
H A D | rndc-confgen.c | 80 [-s addr] [-t chrootdir] [-u user]\n\ 89 -u user: set the keyfile owner to \"user\" (requires -a)\n", 96 * Write an rndc.key file to 'keyfile'. If 'user' is non-NULL, 97 * make that user the owner of the file. The key will have 101 write_key_file(const char *keyfile, const char *user, argument 109 if (user != NULL) { 110 if (set_user(fd, user) == -1) 150 char *user = NULL; local 216 user [all...] |
/bind-9.6-ESV-R11/bin/rndc/win32/ |
H A D | os.c | 33 set_user(FILE *fd, const char *user) { argument
|
/bind-9.6-ESV-R11/contrib/sdb/pgsql/ |
H A D | pgsqldb.c | 58 char *user; member in struct:dbinfo 88 dbi->user, dbi->passwd); 234 * argv[3] (if present) is the name of the user to connect as 257 dbi->user = NULL; 274 STRDUP_OR_FAIL(dbi->user, argv[3]); 308 if (dbi->user != NULL) 309 isc_mem_free(ns_g_mctx, dbi->user);
|
/bind-9.6-ESV-R11/contrib/zkt/ |
H A D | zconf.h | 136 user, enumerator in enum:__anon79
|
/bind-9.6-ESV-R11/ |
H A D | bind.keys | 16 # eliminate any user-configured keys. Furthermore, in those versions of
|
/bind-9.6-ESV-R11/contrib/dlz/drivers/ |
H A D | dlz_mysql_driver.c | 787 char *user = NULL; local 925 user = getParameterValue(argv[1], "user="); 942 user, pass, dbname, port, socket, 945 /* let user know if we couldn't connect. */ 972 if (user != NULL) 973 isc_mem_free(ns_g_mctx, user);
|
H A D | dlz_ldap_driver.c | 111 char *user; /*%< who is authenticating */ member in struct:__anon33 233 ldap_result = ldap_bind_s((LDAP *) dbc->dbconn, dbi->user, 953 /* if debugging, let user know we are multithreaded. */ 958 /* if debugging, let user know we are single threaded. */ 1067 ldap_inst->user = isc_mem_strdup(ns_g_mctx, argv[4]); 1068 if (ldap_inst->user == NULL) { 1266 if (((ldap_instance_t *)dbdata)->user != NULL) 1268 ((ldap_instance_t *)dbdata)->user);
|
H A D | dlz_odbc_driver.c | 124 SQLCHAR *user; member in struct:__anon35 229 if (odbc_inst->user != NULL) 230 isc_mem_free(ns_g_mctx, odbc_inst->user); 282 sqlRes = SQLConnect(ndb->dbc, dbi->dsn, safeLen(dbi->dsn), dbi->user, 283 safeLen(dbi->user), dbi->pass, safeLen(dbi->pass)); 1271 /* if debugging, let user know we are multithreaded. */ 1276 /* if debugging, let user know we are single threaded. */ 1334 /* if no username was passed, set odbc_inst.user = NULL; */ 1335 odbc_inst->user = (SQLCHAR *) getParameterValue(argv[2], 1336 "user [all...] |
/bind-9.6-ESV-R11/bin/tests/ |
H A D | b9t.mk | 20 # this is run by cron (user wpk) on aa, sol, irix, hp and aix
|
H A D | named.conf | 440 syslog user; // or worse to syslog (user facility)
|
/bind-9.6-ESV-R11/contrib/queryperf/ |
H A D | configure | 74 # The user is always right. 1200 --bindir=DIR user executables [EPREFIX/bin] 1837 ac_cv_prog_CC="$CC" # Let the user override the test. 1877 ac_cv_prog_ac_ct_CC="$ac_ct_CC" # Let the user override the test. 1930 ac_cv_prog_CC="$CC" # Let the user override the test. 1970 ac_cv_prog_CC="$CC" # Let the user override the test. 2029 ac_cv_prog_CC="$CC" # Let the user override the test. 2073 ac_cv_prog_ac_ct_CC="$ac_ct_CC" # Let the user override the test. 2198 # so that the user can short-circuit this test for compilers unknown to 3183 # The user i [all...] |
/bind-9.6-ESV-R11/contrib/query-loc-0.4.0/ |
H A D | configure | 86 # The user is always right. 818 --bindir=DIR user executables [EPREFIX/bin] 1302 ac_cv_prog_CC="$CC" # Let the user override the test. 1340 ac_cv_prog_ac_ct_CC="$ac_ct_CC" # Let the user override the test. 1382 ac_cv_prog_CC="$CC" # Let the user override the test. 1420 ac_cv_prog_ac_ct_CC="$ac_ct_CC" # Let the user override the test. 1462 ac_cv_prog_CC="$CC" # Let the user override the test. 1519 ac_cv_prog_CC="$CC" # Let the user override the test. 1561 ac_cv_prog_ac_ct_CC="$ac_ct_CC" # Let the user override the test. 5505 # The user i [all...] |