Searched defs:uid (Results 301 - 325 of 388) sorted by relevance

<<111213141516

/illumos-gate/usr/src/cmd/keyserv/
H A Dkeyserv.c42 * keyserv(1M) performs multiple functions: it stores secret keys per uid; it
621 __key_set_1_svc(uid, key, status)
622 uid_t uid;
627 (void) fprintf(stderr, "set(%d, %.*s) = ", uid,
630 *status = pk_setkey(uid, key);
639 __key_encrypt_pk_2_svc(uid, arg, res)
640 uid_t uid;
646 (void) fprintf(stderr, "encrypt(%d, %s, %08x%08x) = ", uid,
651 res->status = pk_encrypt(uid, arg->remotename, &(arg->remotekey),
667 __key_decrypt_pk_2_svc(uid, ar
900 __key_set_3_svc(uid_t uid, setkeyarg3 *arg, keystatus *status) argument
910 __key_encrypt_3_svc(uid_t uid, cryptkeyarg3 *arg, cryptkeyres3 *res) argument
930 __key_decrypt_3_svc(uid_t uid, cryptkeyarg3 *arg, cryptkeyres3 *res) argument
979 __key_getcred_3_svc(uid_t uid, netnamestr *name, getcredres3 *res) argument
985 __key_encrypt_pk_3_svc(uid_t uid, cryptkeyarg3 *arg, cryptkeyres3 *res) argument
1002 __key_decrypt_pk_3(uid_t uid, cryptkeyarg3 *arg, cryptkeyres3 *res) argument
1019 __key_net_put_3_svc(uid_t uid, key_netstarg3 *arg, keystatus *status) argument
1028 __key_net_get_3_svc(uid_t uid, mechtype *arg, key_netstres3 *keynetname) argument
1049 __key_get_conv_3_svc(uid_t uid, deskeyarg3 *arg, cryptkeyres3 *res) argument
1060 __key_clear_3_svc(uid_t uid, void *arg, keystatus *status) argument
1116 uid_t uid; local
[all...]
/illumos-gate/usr/src/cmd/sqlite/
H A Dshell.c1102 uid_t uid = getuid(); local
1103 if( (pwent=getpwuid(uid)) != NULL) {
/illumos-gate/usr/src/cmd/su/
H A Dsu.c36 * If CONSOLE is defined, all successful attempts to su to uid 0
182 uid_t uid; local
425 uid = pwd.pw_uid;
448 if (setuid(uid) == -1) {
502 envinit[++envidx] = ((uid == (uid_t)ROOT) ? supath : path);
614 if (uid == (uid_t)ROOT) {
671 if ((uid == (uid_t)ROOT) && (strcmp(name, "root") == 0) &&
808 /* since proc uid/gid not yet updated */
/illumos-gate/usr/src/cmd/tip/
H A Dtip.h250 int uid, euid; /* real and effective user id's */ variable
/illumos-gate/usr/src/uts/common/fs/ufs/
H A Dufs_acl.c643 uid_t uid = crgetuid(cr); local
663 if (uid == owner) {
673 if (acl->acl_ic_who == uid) {
H A Dufs_subr.c1450 uid_t uid; local
1455 (uid = crgetuid(cr)) != dp->i_uid &&
1456 uid != ip->i_uid &&
/illumos-gate/usr/src/ucbcmd/ls/
H A Dls.c779 int val; /* the uid or gid of this entry */
810 getname(uid_t uid) argument
815 c = findincache(&names, uid);
817 if ((pw = getpwuid(uid)) != NULL) {
820 (void) sprintf(&c->name[0], "%-8lu ", uid);
/illumos-gate/usr/src/uts/common/nfs/
H A Dnfssys.h105 uid_t uid; member in struct:nfs_revauth_args
111 uid32_t uid; member in struct:nfs_revauth_args32
/illumos-gate/usr/src/uts/common/rpc/sec_gss/
H A Drpcsec_gss.c114 uid_t uid; member in struct:ga_cache_entry
270 uid_t uid = crgetuid(cr); local
280 if (HASH(cache_key, uid) < 0) {
292 ASSERT(HASH(cache_key, uid) >= 0);
293 head = &ga_cache_table[HASH(cache_key, uid)];
301 (uid == current->uid) && (zoneid == current->zoneid) &&
351 new->uid = uid;
1439 rpc_gss_revauth(uid_t uid, rpc_gss_OI argument
[all...]
/illumos-gate/usr/src/uts/common/ipp/ipgpc/
H A Dclassifier-objects.h105 uid_t uid; /* uid key, value = exact or IPGPC_WILDCARD */ member in struct:ipgpc_filter_s
/illumos-gate/usr/src/uts/common/sys/
H A Dstropts.h399 o_uid_t uid; /* always ushort */ member in struct:o_strrecvfd
410 uid_t uid; member in struct:k_strrecvfd
428 uid_t uid; member in struct:strrecvfd
/illumos-gate/usr/src/uts/common/sys/fs/
H A Dhsfs_node.h49 uid_t uid; /* owner's user id */ member in struct:hs_direntry
138 uid_t vol_uid; /* uid of volume */
/illumos-gate/usr/src/cmd/lp/lib/papi/
H A Djob.c214 uid_t uid = getuid(); local
218 if ((pw = getpwuid(uid)) != NULL)
221 if ((uid == 0) || (uid == 71)) { /* root/lp can forge this */
/illumos-gate/usr/src/lib/libc/port/gen/
H A Dprivlib.c471 * to set the uid they run under.
478 __init_daemon_priv(int flags, uid_t uid, gid_t gid, ...) argument
504 * with sufficient privileges and with the proper uid. We don't
522 if (uid != (uid_t)-1 && setreuid(uid, uid) != 0)
551 if ((uid == (uid_t)-1 ? geteuid() : uid) == 0) {
594 * used by set-uid root programs to limit the privileges acquired
611 /* If we're not set-uid roo
[all...]
/illumos-gate/usr/src/lib/libidmap/common/
H A Didmap_api.c858 idmap_id_u.uid;
962 * uid - POSIX UID if stat = 0
968 int flag, uid_t *uid, idmap_stat *stat)
970 return (idmap_getext_uidbysid(gh, sidprefix, rid, flag, uid,
984 * uid - POSIX UID if stat = 0
992 int flag, uid_t *uid, idmap_info *info, idmap_stat *stat)
1000 if (uid == NULL || sidprefix == NULL)
1005 retcode = idmap_cache_lookup_uidbysid(sidprefix, rid, uid);
1029 gh->retlist[gh->next].uid = uid;
967 idmap_get_uidbysid(idmap_get_handle_t *gh, char *sidprefix, idmap_rid_t rid, int flag, uid_t *uid, idmap_stat *stat) argument
991 idmap_getext_uidbysid(idmap_get_handle_t *gh, char *sidprefix, idmap_rid_t rid, int flag, uid_t *uid, idmap_info *info, idmap_stat *stat) argument
1257 idmap_get_sidbyuid(idmap_get_handle_t *gh, uid_t uid, int flag, char **sidprefix, idmap_rid_t *rid, idmap_stat *stat) argument
1281 idmap_getext_sidbyuid(idmap_get_handle_t *gh, uid_t uid, int flag, char **sidprefix, idmap_rid_t *rid, idmap_info *info, idmap_stat *stat) argument
2107 idmap_getuidbywinname(const char *name, const char *domain, int flag, uid_t *uid) argument
2252 idmap_getwinnamebyuid(uid_t uid, int flag, char **name, char **domain) argument
[all...]
/illumos-gate/usr/src/lib/smbsrv/libsmb/common/
H A Dsmb_pwdutil.c307 smb_pwd_getpwuid(uid_t uid, smb_passwd_t *smbpw) argument
315 return (smb_pwd_ops.pwop_getpwuid(uid, smbpw));
332 if (uid == smbpw->pw_uid) {
1052 "for uid=%u (%d)", smbpw.pw_uid, idm_stat);
/illumos-gate/usr/src/cmd/mv/
H A Dmv.c1395 chg_mode(char *target, uid_t uid, gid_t gid, mode_t mode) argument
1404 if (chown(target, uid, gid) != 0) {
/illumos-gate/usr/src/uts/common/fs/nfs/
H A Dnfs_auth.c293 cred_t *cr, uid_t *uid, gid_t *gid, uint_t *ngids, gid_t **gids)
297 access = nfsauth_access(exi, req, cr, uid, gid, ngids, gids);
632 uid_t uid; local
704 p->auth_clnt_cred, &uid, &gid, &ngids, &gids);
728 p->auth_srv_uid = uid;
821 cred_t *cr, uid_t *uid, gid_t *gid, uint_t *ngids, gid_t **gids)
1008 if (uid != NULL)
1009 *uid = tmpuid;
1052 if (uid != NULL)
1053 *uid
292 nfsauth4_access(struct exportinfo *exi, vnode_t *vp, struct svc_req *req, cred_t *cr, uid_t *uid, gid_t *gid, uint_t *ngids, gid_t **gids) argument
820 nfsauth_cache_get(struct exportinfo *exi, struct svc_req *req, int flavor, cred_t *cr, uid_t *uid, gid_t *gid, uint_t *ngids, gid_t **gids) argument
1206 nfsauth_access(struct exportinfo *exi, struct svc_req *req, cred_t *cr, uid_t *uid, gid_t *gid, uint_t *ngids, gid_t **gids) argument
[all...]
H A Dnfs4_srv_attr.c2039 uid_t uid; local
2056 * side GETATTR when uid to attribute string conversion cannot
2122 error = nfs_idmap_str_uid(&na->owner, &uid, TRUE);
2130 else if (sarg->vap->va_uid != uid)
/illumos-gate/usr/src/cmd/ndmpd/tlm/
H A Dtlm_backup_reader.c303 NDMP_LOG(LOG_DEBUG, "xattr_hdr: %s size %d mode %06o uid %d gid %d",
359 uid_t uid; local
385 if ((ulong_t)(uid = attr->st_uid) > (ulong_t)OCTAL7CHAR)
386 uid = UID_NOBODY;
414 "%06o ", uid);
457 "%06o ", uid);
542 uid);
/illumos-gate/usr/src/uts/common/c2/
H A Daudit_token.c249 au_to_process(uid_t uid, gid_t gid, uid_t ruid, gid_t rgid, pid_t pid, argument
266 return (au_to_any_process(data_header, uid, gid, ruid,
271 au_to_subject(uid_t uid, gid_t gid, uid_t ruid, gid_t rgid, pid_t pid, argument
287 return (au_to_any_process(data_header, uid, gid, ruid,
294 uid_t uid, gid_t gid, uid_t ruid, gid_t rgid, pid_t pid,
307 value = (int32_t)uid;
293 au_to_any_process(char data_header, uid_t uid, gid_t gid, uid_t ruid, gid_t rgid, pid_t pid, au_id_t auid, au_asid_t asid, const au_tid_addr_t *atid) argument
/illumos-gate/usr/src/cmd/auditreduce/
H A Dtoken.c528 * ace who adr_u_int32 (uid/gid)
552 * uid adr_int32
566 int32_t uid; local
569 adrm_int32(adr, &uid, 1);
576 if (m_usere == uid)
589 (obj_owner == uid))
599 * uid adr_int32
613 int32_t uid; local
616 adrm_int32(adr, &uid, 1);
623 if (m_usere == uid)
660 int32_t uid; local
839 int32_t uid, gid, cuid, cgid, mode, seq; local
1815 uid_t uid; local
1876 int32_t uid; local
1900 int32_t uid; local
[all...]
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/ccache/
H A Dcc_file.c1226 uid_t uid, euid; local
1305 * Check if the cc filename uid matches owner of file.
1306 * Expects cc file to be in the form of /tmp/krb5cc_<uid>,
1318 /* make sure the uid part is all digits */
/illumos-gate/usr/src/lib/libbsm/common/
H A Dadt.c182 adt_get_mask_from_user(uid_t uid, au_mask_t *mask) argument
193 } else if (uid <= MAXUID) {
202 if (getpwuid_r(uid, &pwd, pwd_buff, (int)buff_sz) == NULL) {
233 adt_get_unique_id(au_id_t uid) argument
260 MD5Update(&context, (unsigned char *) &uid, sizeof (uid_t));
1400 * from the proc and picking up current uid/tid information.
1587 * ADT_NO_ATTRIB is a valid uid/gid meaning "not known" or
1590 * ADT_NO_CHANGE is a valid uid/gid meaning "do not change this value"
/illumos-gate/usr/src/cmd/zlogin/
H A Dzlogin.c1706 uid_t uid; local
1718 uid = getuid();
1719 if ((nptr = getpwuid(uid)) == NULL) {

Completed in 153 milliseconds

<<111213141516