Lines Matching defs:user

135 #define	DTD_ATTR_USER		(const xmlChar *) "user"
970 * The user deals in absolute paths in the running global zone, but the
1488 * the user will need access to the directory so use that as a heuristic.
2716 char user[MAXUSERNAME];
2730 if ((fetchprop(cur, DTD_ATTR_USER, user,
2731 sizeof (user)) == Z_OK) &&
2732 (strcmp(tabptr->zone_admin_user, user) == 0)) {
4283 * This validation is the one we expect to fail if the user specified
8003 * depending on the type of the specified user. It is also
8014 zonecfg_authorize_user_impl(zone_dochandle_t handle, char *user,
8032 * First get the existing authorizations for this user
8038 if ((u = getusernam(user)) != NULL) {
8063 * user still needs the Zone Management Profile.
8081 * If the user has authorizations
8104 * user_attr entry for this user
8106 (void) zonecfg_remove_userauths(handle, user, "", B_FALSE);
8136 * If the user's previous authorizations have changed
8146 auths_cmd, new_auths, rbac_profs, user) + 1;
8151 auths_cmd, new_auths, rbac_profs, user);
8167 char user[MAXUSERNAME];
8177 if (fetchprop(cur, DTD_ATTR_USER, user,
8178 sizeof (user)) != Z_OK)
8183 if (zonecfg_authorize_user_impl(handle, user, auths, zonename)
8193 zonecfg_deauthorize_user(zone_dochandle_t handle, char *user, char *zonename)
8195 return (zonecfg_authorize_user_impl(handle, user, "", zonename));
8203 char user[MAXUSERNAME];
8212 if (fetchprop(cur, DTD_ATTR_USER, user,
8213 sizeof (user)) != Z_OK)
8215 if ((err = zonecfg_deauthorize_user(handle, user,
8223 zonecfg_insert_userauths(zone_dochandle_t handle, char *user, char *zonename)
8230 if ((strncmp(next->user, user, MAXUSERNAME) == 0) &&
8234 * user is already in list
8246 (void) strlcpy(new->user, user, sizeof (new->user));
8254 zonecfg_remove_userauths(zone_dochandle_t handle, char *user, char *zonename,
8263 if ((strlen(user) == 0 ||
8264 strncmp(next->user, user, MAXUSERNAME) == 0) &&
8272 new->user, new->zonename);