/illumos-gate/usr/src/lib/smbsrv/libsmb/common/ |
H A D | smb_sam.c | 102 smb_sid_t *sid; local 139 sid = smb_sid_splice(di.di_binsid, lwka->lwka_rid); 144 status = smb_sam_lookup_user(name, &sid); 150 status = smb_sam_lookup_group(name, &sid); 157 status = smb_sam_lookup_user(name, &sid); 165 status = smb_sam_lookup_group(name, &sid); 176 account->a_sid = sid; 178 account->a_domsid = smb_sid_split(sid, &account->a_rid); 208 smb_sam_lookup_sid(smb_sid_t *sid, smb_account_t *account) argument 225 if (smb_sid_cmp(sid, d 465 smb_sam_grp_ismember(const char *gname, smb_sid_t *sid) argument 508 smb_sam_lookup_user(char *name, smb_sid_t **sid) argument 532 smb_sam_lookup_group(char *name, smb_sid_t **sid) argument 559 smb_lwka_lookup_sid(smb_sid_t *sid) argument 582 smb_sid_islocal(smb_sid_t *sid) argument [all...] |
H A D | smb_doorclnt.c | 58 smb_lookup_sid(const char *sid, lsa_account_t *acct) argument 62 assert((sid != NULL) && (acct != NULL)); 65 (void) strlcpy(acct->a_sid, sid, SMB_SID_STRSZ);
|
/illumos-gate/usr/src/uts/common/os/ |
H A D | printf.c | 74 const char *suffix, void *site, int mid, int sid, int level, 139 mp = log_makemsg(mid, sid, level, sl, LOG_KERN, bufp, 339 strlog(short mid, short sid, char level, ushort_t sl, char *fmt, ...) argument 344 cprintf(fmt, adx, sl, "", "", caller(), mid, sid, level, 352 vstrlog(short mid, short sid, char level, ushort_t sl, char *fmt, va_list adx) argument 355 cprintf(fmt, adx, sl, "", "", caller(), mid, sid, level, 73 cprintf(const char *fmt, va_list adx, int sl, const char *prefix, const char *suffix, void *site, int mid, int sid, int level, zoneid_t zoneid, dev_info_t *dip) argument
|
/illumos-gate/usr/src/lib/libadutils/common/ |
H A D | adutils_impl.h | 61 char sid[MAXSTRSID]; member in struct:known_domain
|
/illumos-gate/usr/src/lib/smbsrv/libmlsvc/common/ |
H A D | samlib.c | 106 smb_sid_t *sid; local 119 sid = samr_lookup_domain(&samr_handle, domain_name); 120 if (sid == NULL) { 126 (struct samr_sid *)sid, &domain_handle); 146 free(sid);
|
H A D | lsar_clnt.c | 180 lsar_open_account(mlsvc_handle_t *lsa_handle, struct mslsa_sid *sid, argument 187 if (ndr_is_null_handle(lsa_handle) || sid == NULL) 194 arg.sid = sid; 288 * indicating that the domain name and domain sid fields are vaild. If 329 smb_sid_tostr((smb_sid_t *)pd_info->sid, sidstr); 340 smb_sid_tostr((smb_sid_t *)ad_info->sid, sidstr); 352 smb_sid_tostr((smb_sid_t *)dns_info->sid, sidstr); 374 * Lookup a name and obtain the sid/rid. 375 * This is a wrapper for the various lookup sid RPC 715 lsar_lookup_sids(mlsvc_handle_t *lsa_handle, smb_sid_t *sid, smb_account_t *account) argument 752 lsar_lookup_sids1(mlsvc_handle_t *lsa_handle, lsa_sid_t *sid, smb_account_t *account) argument 812 lsar_lookup_sids2(mlsvc_handle_t *lsa_handle, lsa_sid_t *sid, smb_account_t *account) argument 880 lsar_lookup_sids3(mlsvc_handle_t *lsa_handle, lsa_sid_t *sid, smb_account_t *account) argument [all...] |
H A D | lsar_svc.c | 48 char *sid; member in struct:local_group_table 650 info->sid = (struct mslsa_sid *)NDR_SIDDUP(mxa, di.di_binsid); 652 if ((rc == -1) || (info->sid == NULL)) 682 info->sid = (struct mslsa_sid *)NDR_SIDDUP(mxa, di.di_binsid); 684 if ((rc == -1) || (info->sid == NULL)) 770 * This is the service side function for handling sid lookup requests. 794 smb_sid_t *sid; local 820 sid = (smb_sid_t *)param->lup_sid_table.entries[i].psid; 822 result = lsa_lookup_sid(sid, &account); 826 smb_sid_tostr(sid, sidst 946 smb_sid_t *sid; local [all...] |
H A D | samr_clnt.c | 323 struct samr_sid *sid, mlsvc_handle_t *domain_handle) 330 sid == NULL || domain_handle == NULL) { 339 arg.sid = sid; 593 domsid = smb_sid_dup((smb_sid_t *)arg.sid); 322 samr_open_domain(mlsvc_handle_t *samr_handle, DWORD access_mask, struct samr_sid *sid, mlsvc_handle_t *domain_handle) argument
|
H A D | smb_logon.c | 779 smb_token_is_member(smb_token_t *token, smb_sid_t *sid) argument 784 if (token == NULL || sid == NULL) 789 if (smb_sid_cmp(tsid, sid))
|
/illumos-gate/usr/src/uts/common/fs/smbsrv/ |
H A D | smb_quota.c | 44 * - variable length sid - max = 32 bytes 45 * SMB_QUOTA_SIZE_NO_SID is the size of the above, excluding the sid. 59 * Otherwise (type SMB_QUOTA_QUERY_ALL) find the resume sid 61 * resume sid to NULL if request->qq_restart. 69 smb_quota_sid_t *sid; local 86 sid = kmem_zalloc(sizeof (smb_quota_sid_t), KM_SLEEP); 87 list_insert_tail(sid_list, sid); 88 smb_ofile_get_quota_resume(ofile, sid->qs_sidstr, 90 if (*sid->qs_sidstr == '\0') 109 smb_quota_sid_t *sid; local 138 smb_sid_t *sid; local 219 smb_sid_t *sid; local 298 smb_sid_t *sid; local 372 smb_sid_t *sid; local [all...] |
/illumos-gate/usr/src/lib/libnsl/rpc/ |
H A D | svcauth_des.c | 101 static void cache_ref(uint32_t); /* note that sid was ref'd */ 127 uint32_t sid; local 249 sid = cred->adc_nickname; 250 if (sid >= authdes_cachesz) { 256 entry = &_rpc_authdes_cache[sid]; 261 sessionkey = &_rpc_authdes_cache[sid].key; 286 _rpc_authdes_cache[sid].rname); 335 } else sid = cache_spot_id; 338 window = _rpc_authdes_cache[sid].window; 350 _rpc_authdes_cache[sid] 531 cache_ref(uint32_t sid) argument 630 uint32_t sid; local [all...] |
/illumos-gate/usr/src/cmd/ptools/ptree/ |
H A D | ptree.c | 61 pid_t sid; member in struct:ps 235 p->sid = info.pr_sid;
|
/illumos-gate/usr/src/cmd/fm/modules/common/disk-monitor/ |
H A D | dm_platform.c | 263 uint64_t assertmask = 0, deassertmask = 0, sid; local 269 /* We need at least 2 properties: `sid' and (`amask' || `dmask'): */ 273 if (nvlist_lookup_uint64(props, "sid", &sid) != 0 || 278 if (sid > UINT8_MAX) { 280 (longlong_t)sid); 293 sr.iss_id = (uint8_t)sid; 309 entry->ic_data.ic_sensor.iss_id == (uint8_t)sid) 317 entry->ic_data.ic_sensor.iss_id = (uint8_t)sid;
|
/illumos-gate/usr/src/uts/common/inet/kssl/ |
H A D | ksslimpl.h | 79 crypto_session_id_t sid; member in struct:kssl_session_info_s
|
H A D | ksslioctl.c | 87 (void) crypto_session_logout(s->prov, s->sid, NULL); 88 (void) crypto_session_close(s->prov, s->sid, NULL); 709 crypto_session_id_t sid; local 723 rv = crypto_session_open(prov, &sid, NULL); 728 rv = crypto_session_login(prov, sid, CRYPTO_USER, 737 rv = crypto_object_find_init(prov, sid, attrs, count, &cookie, NULL); 752 s->sid = sid; 761 (void) crypto_session_logout(prov, sid, NULL); 763 (void) crypto_session_close(prov, sid, NUL [all...] |
/illumos-gate/usr/src/uts/common/io/ |
H A D | sysevent.c | 291 char *sid; local 303 if (uargs.sid.len > MAX_SUBID_LEN || 307 sid = kmem_alloc(uargs.sid.len, KM_SLEEP); 308 if (copyin((void *)(uintptr_t)uargs.sid.name, 309 sid, uargs.sid.len) != 0) { 310 kmem_free(sid, uargs.sid.len); 313 if (!sysevent_isstrend(sid, uarg 352 char *sid; local [all...] |
/illumos-gate/usr/src/cmd/idmap/idmapd/ |
H A D | idmapd.c | 54 #include <sys/sid.h> 580 trace_sid(nvlist_t *entry, char *n1, char *n2, idmap_sid *sid) argument 584 (void) asprintf(&str, "%s-%u", sid->prefix, sid->rid); 608 if (id->idmap_id_u.sid.prefix != NULL) { 610 &id->idmap_id_u.sid);
|
H A D | adutils.c | 84 char **sid; /* stringified SID */ member in struct:idmap_q 257 char *sid, 298 if (q->sid) { 299 *q->sid = sid; 300 sid = NULL; 334 free(sid); 394 char *sid = NULL; local 485 if (q->sid != NULL) { 488 sid 251 idmap_setqresults( idmap_q_t *q, char *san, const char *dn, const char *attr, char *value, char *sid, rid_t rid, int sid_type, char *unixname, posix_id_t pid) argument 588 idmap_batch_add1(idmap_query_state_t *state, const char *filter, char *ecanonname, char *edomain, idmap_id_type esidtype, char **dn, char **attr, char **value, char **canonname, char **dname, char **sid, rid_t *rid, idmap_id_type *sid_type, char **unixname, posix_id_t *pid, idmap_retcode *rc) argument 695 idmap_name2sid_batch_add1(idmap_query_state_t *state, const char *name, const char *dname, idmap_id_type esidtype, char **dn, char **attr, char **value, char **canonname, char **sid, rid_t *rid, idmap_id_type *sid_type, char **unixname, posix_id_t *pid, idmap_retcode *rc) argument 768 idmap_sid2name_batch_add1(idmap_query_state_t *state, const char *sid, const rid_t *rid, idmap_id_type esidtype, char **dn, char **attr, char **value, char **name, char **dname, idmap_id_type *sid_type, char **unixname, posix_id_t *pid, idmap_retcode *rc) argument 809 idmap_unixname2sid_batch_add1(idmap_query_state_t *state, const char *unixname, int is_user, int is_wuser, char **dn, char **attr, char **value, char **sid, rid_t *rid, char **name, char **dname, idmap_id_type *sid_type, idmap_retcode *rc) argument 858 idmap_pid2sid_batch_add1(idmap_query_state_t *state, posix_id_t pid, int is_user, char **dn, char **attr, char **value, char **sid, rid_t *rid, char **name, char **dname, idmap_id_type *sid_type, idmap_retcode *rc) argument [all...] |
/illumos-gate/usr/src/lib/libsec/common/ |
H A D | aclutils.c | 748 sid_to_id(char *sid, boolean_t user, uid_t *id) argument 757 if ((domain_start = strchr(sid, '@')) == NULL) { 760 if ((rid_start = strrchr(sid, '-')) == NULL) 770 sid, rid, IDMAP_REQ_FLG_USE_CACHE, 774 sid, rid, IDMAP_REQ_FLG_USE_CACHE, 794 char *name = sid;
|
/illumos-gate/usr/src/lib/libsldap/common/ |
H A D | ns_mapping.c | 219 __s_api_parse_map(char *cp, char **sid, char **origA, char ***mapA) argument 224 *sid = NULL; 233 *sid = (char *)malloc(i); 234 if (*sid == NULL) 236 (void) strlcpy(*sid, sptr, i); 241 free(*sid); 242 *sid = NULL; 248 free(*sid); 249 *sid = NULL; 265 free(*sid); [all...] |
/illumos-gate/usr/src/lib/libsysevent/ |
H A D | libevchannel.c | 220 uargs.sid.name = NULL; 221 uargs.sid.len = 0; 446 sysevent_evc_subscribe_cmn(evchan_t *scp, const char *sid, const char *class, argument 457 if (scp == NULL || misaligned(scp) || sid == NULL || class == NULL) { 466 if ((sid_len = strlen(sid) + 1) > MAX_SUBID_LEN || sid_len == 1 || 472 if (!strisprint(sid)) { 488 if ((subp->evsub_sid = strdup(sid)) == NULL) { 539 uargs.sid.name = (uintptr_t)sid; 540 uargs.sid 571 sysevent_evc_subscribe(evchan_t *scp, const char *sid, const char *class, int (*event_handler)(sysevent_t *ev, void *cookie), void *cookie, uint32_t flags) argument 600 sysevent_evc_xsubscribe(evchan_t *scp, const char *sid, const char *class, int (*event_handler)(sysevent_t *ev, void *cookie), void *cookie, uint32_t flags, sysevent_subattr_t *attr) argument 686 sysevent_evc_unsubscribe(evchan_t *scp, const char *sid) argument [all...] |
/illumos-gate/usr/src/lib/libbsm/common/ |
H A D | adt_token.c | 511 au_asid_t sid; local 527 sid = ((union convert *)p_data)->tuint32; 552 if (sid == 0) 553 sid = info.ap_asid; 559 au_to_process_ex(auid, euid, egid, ruid, rgid, pid, sid, tid));
|
/illumos-gate/usr/src/uts/common/crypto/api/ |
H A D | kcf_dual.c | 44 crypto_session_id_t sid, crypto_mechanism_t *, crypto_mechanism_t *, 50 crypto_encrypt_mac_prov(crypto_provider_t provider, crypto_session_id_t sid, argument 134 rv = KCF_PROV_ENCRYPT_MAC_ATOMIC(real_provider, sid, 141 sid, encr_key, mac_key, pt, ct, mac, spi_encr_tmpl, 415 crypto_session_id_t sid, crypto_mechanism_t *encr_mech, 487 ctx = kcf_new_ctx(cr, real_provider, sid); 515 sid, encr_key, mac_key, NULL, NULL, NULL, 1080 crypto_mac_decrypt_prov(crypto_provider_t provider, crypto_session_id_t sid, argument 1086 return (crypto_mac_decrypt_common_prov(provider, sid, mac_mech, 1110 crypto_session_id_t sid, crypto_mechanism_ 414 crypto_encrypt_mac_init_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *encr_mech, crypto_mechanism_t *mac_mech, crypto_key_t *encr_key, crypto_key_t *mac_key, crypto_ctx_template_t encr_tmpl, crypto_ctx_template_t mac_tmpl, crypto_context_t *ctxp, crypto_call_req_t *cr) argument 1109 crypto_mac_verify_decrypt_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mac_mech, crypto_mechanism_t *decr_mech, crypto_dual_data_t *ct, crypto_key_t *mac_key, crypto_key_t *decr_key, crypto_ctx_template_t mac_tmpl, crypto_ctx_template_t decr_tmpl, crypto_data_t *mac, crypto_data_t *pt, crypto_call_req_t *crq) argument 1388 crypto_mac_decrypt_common_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mac_mech, crypto_mechanism_t *decr_mech, crypto_dual_data_t *ct, crypto_key_t *mac_key, crypto_key_t *decr_key, crypto_ctx_template_t mac_tmpl, crypto_ctx_template_t decr_tmpl, crypto_data_t *mac, crypto_data_t *pt, crypto_call_req_t *crq, boolean_t do_verify) argument 1836 crypto_mac_decrypt_init_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mac_mech, crypto_mechanism_t *decr_mech, crypto_key_t *mac_key, crypto_key_t *decr_key, crypto_ctx_template_t mac_tmpl, crypto_ctx_template_t decr_tmpl, crypto_context_t *ctxp, crypto_call_req_t *cr) argument [all...] |
/illumos-gate/usr/src/uts/common/crypto/io/ |
H A D | swrand.c | 283 swrand_seed_random(crypto_provider_handle_t provider, crypto_session_id_t sid, argument 298 crypto_session_id_t sid, uchar_t *buf, size_t len, crypto_req_handle_t req) 297 swrand_generate_random(crypto_provider_handle_t provider, crypto_session_id_t sid, uchar_t *buf, size_t len, crypto_req_handle_t req) argument
|
/illumos-gate/usr/src/uts/common/inet/nca/ |
H A D | ncadoorhdr.h | 222 uint32_t sid; /* server instance id */ member in struct:nca_io2_s
|