name 107 anacron/runjob.c char *name = NULL, *val = NULL; name 123 anacron/runjob.c name = malloc((eq_index + 1) * sizeof(char)); name 124 anacron/runjob.c if (name == NULL) { name 133 anacron/runjob.c strncpy(name, s, eq_index); name 134 anacron/runjob.c name[eq_index] = '\0'; name 137 anacron/runjob.c if (setenv(name, val, 1)) { name 141 anacron/runjob.c free(name); name 62 src/bitstring.h #define bit_decl(name, nbits) \ name 63 src/bitstring.h (name)[bitstr_size(nbits)] name 66 src/bitstring.h #define bit_test(name, bit) \ name 67 src/bitstring.h ((name)[_bit_byte(bit)] & _bit_mask(bit)) name 70 src/bitstring.h #define bit_set(name, bit) \ name 71 src/bitstring.h (name)[_bit_byte(bit)] |= (bitstr_t)_bit_mask(bit) name 74 src/bitstring.h #define bit_clear(name, bit) \ name 75 src/bitstring.h (name)[_bit_byte(bit)] &= (bitstr_t)~_bit_mask(bit) name 78 src/bitstring.h #define bit_nclear(name, start, stop) { \ name 79 src/bitstring.h register bitstr_t *_name = name; \ name 95 src/bitstring.h #define bit_nset(name, start, stop) { \ name 96 src/bitstring.h register bitstr_t *_name = name; \ name 112 src/bitstring.h #define bit_ffc(name, nbits, value) { \ name 113 src/bitstring.h register bitstr_t *_name = name; \ name 127 src/bitstring.h #define bit_ffs(name, nbits, value) { \ name 128 src/bitstring.h register bitstr_t *_name = name; \ name 55 src/cronnext.c int get_security_context(const char *name, int crontab_fd, name 58 src/cronnext.c (void)name; name 114 src/cronnext.c printf(" - user: \"%s\"\n", u->name); name 235 src/cronnext.c if (include && !matchuser(u->name, include)) name 237 src/cronnext.c if (exclude && matchuser(u->name, exclude)) name 442 src/database.c Debug(DLOAD, ("\t%s\n", u->name)); name 612 src/database.c user *find_user(cron_db * db, const char *name, const char *tabname) { name 616 src/database.c if ((strcmp(u->name, name) == 0) name 52 src/do_command.c (long) pid, e->cmd, u->name, name 142 src/env.c const char **name; name 146 src/env.c for (name = names; *name != NULL; ++name) { name 149 src/env.c namelen = strlen(*name); name 150 src/env.c if (strncmp(*name, *procenv, namelen) == 0 name 184 src/env.c char name[MAX_ENVSTR], val[MAX_ENVSTR]; name 195 src/env.c memset(name, 0, sizeof name); name 198 src/env.c str = name; name 285 src/env.c if (!glue_strings(envstr, MAX_ENVSTR, name, val, '=')) name 287 src/env.c Debug(DPARS, ("load_env, <%s> <%s> -> <%s>\n", name, val, envstr)); name 291 src/env.c char *env_get(const char *name, char **envp) { name 292 src/env.c size_t len = strlen(name); name 298 src/env.c if ((q - p) == len && !strncmp(p, name, len)) name 115 src/funcs.h int get_security_context(const char *name, name 361 src/security.c log_it(u->name, getpid(), "context_new FAILED for MLS_LEVEL", name 368 src/security.c log_it(u->name, getpid(), name 375 src/security.c log_it(u->name, getpid(), "context_str FAILED for MLS_LEVEL", name 382 src/security.c log_it(u->name, getpid(), "strdup FAILED for MLS_LEVEL", range, 0); name 392 src/security.c log_it(u->name, getpid(), "strdup FAILED for MLS_LEVEL", range, 0); name 409 src/security.c log_it(u->name, getpid(), "NULL security context for user", "", 0); name 413 src/security.c log_it(u->name, getpid(), name 426 src/security.c u->name, (char *) ucontext, u->scontext) >= 0) { name 437 src/security.c log_it(u->name, getpid(), "ERROR", msg, 0); name 448 src/security.c log_it(u->name, getpid(), "WARNING", msg, 0); name 460 src/security.c log_it(u->name, getpid(), "ERROR", msg, 0); name 471 src/security.c log_it(u->name, getpid(), "WARNING", msg, 0); name 483 src/security.c get_security_context(const char *name, int crontab_fd, name 499 src/security.c if (name != NULL) { name 500 src/security.c if (getseuserbyname(name, &seuser, &level) < 0) { name 501 src/security.c log_it(name, getpid(), "getseuserbyname FAILED", name, 0); name 510 src/security.c log_it(name, getpid(), "getcon FAILED", "", 0); name 516 src/security.c log_it(name, getpid(), "context_new FAILED", current_context_str, 0); name 537 src/security.c log_it(name, getpid(), "No SELinux security context", tabname, 0); name 541 src/security.c log_it(name, getpid(), name 550 src/security.c log_it(name, getpid(), "getfilecon FAILED", tabname, 0); name 555 src/security.c log_it(name, getpid(), name 567 src/security.c log_it(name, getpid(), msg, tabname, 0); name 570 src/security.c log_it(name, getpid(), "Unauthorized SELinux context", tabname, 0); name 578 src/security.c log_it(name, getpid(), name 65 src/structs.h char *name; name 51 src/user.c free(u->name); name 90 src/user.c if (((u->name = strdup(fname)) == NULL)