name              107 anacron/runjob.c     char *name = NULL, *val = NULL;
name              123 anacron/runjob.c     name = malloc((eq_index + 1) * sizeof(char));
name              124 anacron/runjob.c     if (name == NULL) {
name              133 anacron/runjob.c     strncpy(name, s, eq_index);
name              134 anacron/runjob.c     name[eq_index] = '\0';
name              137 anacron/runjob.c     if (setenv(name, val, 1)) {
name              141 anacron/runjob.c     free(name);
name               62 src/bitstring.h #define	bit_decl(name, nbits) \
name               63 src/bitstring.h 	(name)[bitstr_size(nbits)]
name               66 src/bitstring.h #define	bit_test(name, bit) \
name               67 src/bitstring.h 	((name)[_bit_byte(bit)] & _bit_mask(bit))
name               70 src/bitstring.h #define	bit_set(name, bit) \
name               71 src/bitstring.h 	(name)[_bit_byte(bit)] |= (bitstr_t)_bit_mask(bit)
name               74 src/bitstring.h #define	bit_clear(name, bit) \
name               75 src/bitstring.h 	(name)[_bit_byte(bit)] &= (bitstr_t)~_bit_mask(bit)
name               78 src/bitstring.h #define	bit_nclear(name, start, stop) { \
name               79 src/bitstring.h 	register bitstr_t *_name = name; \
name               95 src/bitstring.h #define	bit_nset(name, start, stop) { \
name               96 src/bitstring.h 	register bitstr_t *_name = name; \
name              112 src/bitstring.h #define	bit_ffc(name, nbits, value) { \
name              113 src/bitstring.h 	register bitstr_t *_name = name; \
name              127 src/bitstring.h #define	bit_ffs(name, nbits, value) { \
name              128 src/bitstring.h 	register bitstr_t *_name = name; \
name               55 src/cronnext.c int get_security_context(const char *name, int crontab_fd,
name               58 src/cronnext.c 	(void)name;
name              114 src/cronnext.c 	printf("  - user: \"%s\"\n", u->name);
name              235 src/cronnext.c 		if (include && !matchuser(u->name, include))
name              237 src/cronnext.c 		if (exclude && matchuser(u->name, exclude))
name              442 src/database.c 		Debug(DLOAD, ("\t%s\n", u->name));
name              612 src/database.c user *find_user(cron_db * db, const char *name, const char *tabname) {
name              616 src/database.c 		if ((strcmp(u->name, name) == 0)
name               52 src/do_command.c 			(long) pid, e->cmd, u->name,
name              142 src/env.c      	const char **name;
name              146 src/env.c      		for (name = names; *name != NULL; ++name) {
name              149 src/env.c      			namelen = strlen(*name);
name              150 src/env.c      			if (strncmp(*name, *procenv, namelen) == 0 
name              184 src/env.c      	char name[MAX_ENVSTR], val[MAX_ENVSTR];
name              195 src/env.c      	memset(name, 0, sizeof name);
name              198 src/env.c      	str = name;
name              285 src/env.c      	if (!glue_strings(envstr, MAX_ENVSTR, name, val, '='))
name              287 src/env.c      	Debug(DPARS, ("load_env, <%s> <%s> -> <%s>\n", name, val, envstr));
name              291 src/env.c      char *env_get(const char *name, char **envp) {
name              292 src/env.c      	size_t len = strlen(name);
name              298 src/env.c      		if ((q - p) == len && !strncmp(p, name, len))
name              115 src/funcs.h    int get_security_context(const char *name, 
name              361 src/security.c 			log_it(u->name, getpid(), "context_new FAILED for MLS_LEVEL",
name              368 src/security.c 			log_it(u->name, getpid(),
name              375 src/security.c 			log_it(u->name, getpid(), "context_str FAILED for MLS_LEVEL",
name              382 src/security.c 			log_it(u->name, getpid(), "strdup FAILED for MLS_LEVEL", range, 0);
name              392 src/security.c 		log_it(u->name, getpid(), "strdup FAILED for MLS_LEVEL", range, 0);
name              409 src/security.c 			log_it(u->name, getpid(), "NULL security context for user", "", 0);
name              413 src/security.c 			log_it(u->name, getpid(),
name              426 src/security.c 						u->name, (char *) ucontext, u->scontext) >= 0) {
name              437 src/security.c 					log_it(u->name, getpid(), "ERROR", msg, 0);
name              448 src/security.c 					log_it(u->name, getpid(), "WARNING", msg, 0);
name              460 src/security.c 				log_it(u->name, getpid(), "ERROR", msg, 0);
name              471 src/security.c 				log_it(u->name, getpid(), "WARNING", msg, 0);
name              483 src/security.c get_security_context(const char *name, int crontab_fd,
name              499 src/security.c 	if (name != NULL) {
name              500 src/security.c 		if (getseuserbyname(name, &seuser, &level) < 0) {
name              501 src/security.c 			log_it(name, getpid(), "getseuserbyname FAILED", name, 0);
name              510 src/security.c 			log_it(name, getpid(), "getcon FAILED", "", 0);
name              516 src/security.c 			log_it(name, getpid(), "context_new FAILED", current_context_str, 0);
name              537 src/security.c 			log_it(name, getpid(), "No SELinux security context", tabname, 0);
name              541 src/security.c 			log_it(name, getpid(),
name              550 src/security.c 			log_it(name, getpid(), "getfilecon FAILED", tabname, 0);
name              555 src/security.c 			log_it(name, getpid(),
name              567 src/security.c 			log_it(name, getpid(), msg, tabname, 0);
name              570 src/security.c 			log_it(name, getpid(), "Unauthorized SELinux context", tabname, 0);
name              578 src/security.c 			log_it(name, getpid(),
name               65 src/structs.h  	char		*name;
name               51 src/user.c     	free(u->name);
name               90 src/user.c     	if (((u->name = strdup(fname)) == NULL)