/illumos-gate/usr/src/cmd/keyserv/ |
H A D | keyserv.c | 42 * keyserv(1M) performs multiple functions: it stores secret keys per uid; it 621 __key_set_1_svc(uid, key, status) 622 uid_t uid; 627 (void) fprintf(stderr, "set(%d, %.*s) = ", uid, 630 *status = pk_setkey(uid, key); 639 __key_encrypt_pk_2_svc(uid, arg, res) 640 uid_t uid; 646 (void) fprintf(stderr, "encrypt(%d, %s, %08x%08x) = ", uid, 651 res->status = pk_encrypt(uid, arg->remotename, &(arg->remotekey), 667 __key_decrypt_pk_2_svc(uid, ar 900 __key_set_3_svc(uid_t uid, setkeyarg3 *arg, keystatus *status) argument 910 __key_encrypt_3_svc(uid_t uid, cryptkeyarg3 *arg, cryptkeyres3 *res) argument 930 __key_decrypt_3_svc(uid_t uid, cryptkeyarg3 *arg, cryptkeyres3 *res) argument 979 __key_getcred_3_svc(uid_t uid, netnamestr *name, getcredres3 *res) argument 985 __key_encrypt_pk_3_svc(uid_t uid, cryptkeyarg3 *arg, cryptkeyres3 *res) argument 1002 __key_decrypt_pk_3(uid_t uid, cryptkeyarg3 *arg, cryptkeyres3 *res) argument 1019 __key_net_put_3_svc(uid_t uid, key_netstarg3 *arg, keystatus *status) argument 1028 __key_net_get_3_svc(uid_t uid, mechtype *arg, key_netstres3 *keynetname) argument 1049 __key_get_conv_3_svc(uid_t uid, deskeyarg3 *arg, cryptkeyres3 *res) argument 1060 __key_clear_3_svc(uid_t uid, void *arg, keystatus *status) argument 1116 uid_t uid; local [all...] |
/illumos-gate/usr/src/cmd/sqlite/ |
H A D | shell.c | 1102 uid_t uid = getuid(); local 1103 if( (pwent=getpwuid(uid)) != NULL) {
|
/illumos-gate/usr/src/cmd/su/ |
H A D | su.c | 36 * If CONSOLE is defined, all successful attempts to su to uid 0 182 uid_t uid; local 425 uid = pwd.pw_uid; 448 if (setuid(uid) == -1) { 502 envinit[++envidx] = ((uid == (uid_t)ROOT) ? supath : path); 614 if (uid == (uid_t)ROOT) { 671 if ((uid == (uid_t)ROOT) && (strcmp(name, "root") == 0) && 808 /* since proc uid/gid not yet updated */
|
/illumos-gate/usr/src/cmd/tip/ |
H A D | tip.h | 250 int uid, euid; /* real and effective user id's */ variable
|
/illumos-gate/usr/src/uts/common/fs/ufs/ |
H A D | ufs_acl.c | 643 uid_t uid = crgetuid(cr); local 663 if (uid == owner) { 673 if (acl->acl_ic_who == uid) {
|
H A D | ufs_subr.c | 1450 uid_t uid; local 1455 (uid = crgetuid(cr)) != dp->i_uid && 1456 uid != ip->i_uid &&
|
/illumos-gate/usr/src/ucbcmd/ls/ |
H A D | ls.c | 779 int val; /* the uid or gid of this entry */ 810 getname(uid_t uid) argument 815 c = findincache(&names, uid); 817 if ((pw = getpwuid(uid)) != NULL) { 820 (void) sprintf(&c->name[0], "%-8lu ", uid);
|
/illumos-gate/usr/src/uts/common/nfs/ |
H A D | nfssys.h | 105 uid_t uid; member in struct:nfs_revauth_args 111 uid32_t uid; member in struct:nfs_revauth_args32
|
/illumos-gate/usr/src/uts/common/rpc/sec_gss/ |
H A D | rpcsec_gss.c | 114 uid_t uid; member in struct:ga_cache_entry 270 uid_t uid = crgetuid(cr); local 280 if (HASH(cache_key, uid) < 0) { 292 ASSERT(HASH(cache_key, uid) >= 0); 293 head = &ga_cache_table[HASH(cache_key, uid)]; 301 (uid == current->uid) && (zoneid == current->zoneid) && 351 new->uid = uid; 1439 rpc_gss_revauth(uid_t uid, rpc_gss_OI argument [all...] |
/illumos-gate/usr/src/uts/common/ipp/ipgpc/ |
H A D | classifier-objects.h | 105 uid_t uid; /* uid key, value = exact or IPGPC_WILDCARD */ member in struct:ipgpc_filter_s
|
/illumos-gate/usr/src/uts/common/sys/ |
H A D | stropts.h | 399 o_uid_t uid; /* always ushort */ member in struct:o_strrecvfd 410 uid_t uid; member in struct:k_strrecvfd 428 uid_t uid; member in struct:strrecvfd
|
/illumos-gate/usr/src/uts/common/sys/fs/ |
H A D | hsfs_node.h | 49 uid_t uid; /* owner's user id */ member in struct:hs_direntry 138 uid_t vol_uid; /* uid of volume */
|
/illumos-gate/usr/src/cmd/lp/lib/papi/ |
H A D | job.c | 214 uid_t uid = getuid(); local 218 if ((pw = getpwuid(uid)) != NULL) 221 if ((uid == 0) || (uid == 71)) { /* root/lp can forge this */
|
/illumos-gate/usr/src/lib/libc/port/gen/ |
H A D | privlib.c | 471 * to set the uid they run under. 478 __init_daemon_priv(int flags, uid_t uid, gid_t gid, ...) argument 504 * with sufficient privileges and with the proper uid. We don't 522 if (uid != (uid_t)-1 && setreuid(uid, uid) != 0) 551 if ((uid == (uid_t)-1 ? geteuid() : uid) == 0) { 594 * used by set-uid root programs to limit the privileges acquired 611 /* If we're not set-uid roo [all...] |
/illumos-gate/usr/src/lib/libidmap/common/ |
H A D | idmap_api.c | 858 idmap_id_u.uid; 962 * uid - POSIX UID if stat = 0 968 int flag, uid_t *uid, idmap_stat *stat) 970 return (idmap_getext_uidbysid(gh, sidprefix, rid, flag, uid, 984 * uid - POSIX UID if stat = 0 992 int flag, uid_t *uid, idmap_info *info, idmap_stat *stat) 1000 if (uid == NULL || sidprefix == NULL) 1005 retcode = idmap_cache_lookup_uidbysid(sidprefix, rid, uid); 1029 gh->retlist[gh->next].uid = uid; 967 idmap_get_uidbysid(idmap_get_handle_t *gh, char *sidprefix, idmap_rid_t rid, int flag, uid_t *uid, idmap_stat *stat) argument 991 idmap_getext_uidbysid(idmap_get_handle_t *gh, char *sidprefix, idmap_rid_t rid, int flag, uid_t *uid, idmap_info *info, idmap_stat *stat) argument 1257 idmap_get_sidbyuid(idmap_get_handle_t *gh, uid_t uid, int flag, char **sidprefix, idmap_rid_t *rid, idmap_stat *stat) argument 1281 idmap_getext_sidbyuid(idmap_get_handle_t *gh, uid_t uid, int flag, char **sidprefix, idmap_rid_t *rid, idmap_info *info, idmap_stat *stat) argument 2107 idmap_getuidbywinname(const char *name, const char *domain, int flag, uid_t *uid) argument 2252 idmap_getwinnamebyuid(uid_t uid, int flag, char **name, char **domain) argument [all...] |
/illumos-gate/usr/src/lib/smbsrv/libsmb/common/ |
H A D | smb_pwdutil.c | 307 smb_pwd_getpwuid(uid_t uid, smb_passwd_t *smbpw) argument 315 return (smb_pwd_ops.pwop_getpwuid(uid, smbpw)); 332 if (uid == smbpw->pw_uid) { 1052 "for uid=%u (%d)", smbpw.pw_uid, idm_stat);
|
/illumos-gate/usr/src/cmd/mv/ |
H A D | mv.c | 1395 chg_mode(char *target, uid_t uid, gid_t gid, mode_t mode) argument 1404 if (chown(target, uid, gid) != 0) {
|
/illumos-gate/usr/src/uts/common/fs/nfs/ |
H A D | nfs_auth.c | 293 cred_t *cr, uid_t *uid, gid_t *gid, uint_t *ngids, gid_t **gids) 297 access = nfsauth_access(exi, req, cr, uid, gid, ngids, gids); 632 uid_t uid; local 704 p->auth_clnt_cred, &uid, &gid, &ngids, &gids); 728 p->auth_srv_uid = uid; 821 cred_t *cr, uid_t *uid, gid_t *gid, uint_t *ngids, gid_t **gids) 1008 if (uid != NULL) 1009 *uid = tmpuid; 1052 if (uid != NULL) 1053 *uid 292 nfsauth4_access(struct exportinfo *exi, vnode_t *vp, struct svc_req *req, cred_t *cr, uid_t *uid, gid_t *gid, uint_t *ngids, gid_t **gids) argument 820 nfsauth_cache_get(struct exportinfo *exi, struct svc_req *req, int flavor, cred_t *cr, uid_t *uid, gid_t *gid, uint_t *ngids, gid_t **gids) argument 1206 nfsauth_access(struct exportinfo *exi, struct svc_req *req, cred_t *cr, uid_t *uid, gid_t *gid, uint_t *ngids, gid_t **gids) argument [all...] |
H A D | nfs4_srv_attr.c | 2039 uid_t uid; local 2056 * side GETATTR when uid to attribute string conversion cannot 2122 error = nfs_idmap_str_uid(&na->owner, &uid, TRUE); 2130 else if (sarg->vap->va_uid != uid)
|
/illumos-gate/usr/src/cmd/ndmpd/tlm/ |
H A D | tlm_backup_reader.c | 303 NDMP_LOG(LOG_DEBUG, "xattr_hdr: %s size %d mode %06o uid %d gid %d", 359 uid_t uid; local 385 if ((ulong_t)(uid = attr->st_uid) > (ulong_t)OCTAL7CHAR) 386 uid = UID_NOBODY; 414 "%06o ", uid); 457 "%06o ", uid); 542 uid);
|
/illumos-gate/usr/src/uts/common/c2/ |
H A D | audit_token.c | 249 au_to_process(uid_t uid, gid_t gid, uid_t ruid, gid_t rgid, pid_t pid, argument 266 return (au_to_any_process(data_header, uid, gid, ruid, 271 au_to_subject(uid_t uid, gid_t gid, uid_t ruid, gid_t rgid, pid_t pid, argument 287 return (au_to_any_process(data_header, uid, gid, ruid, 294 uid_t uid, gid_t gid, uid_t ruid, gid_t rgid, pid_t pid, 307 value = (int32_t)uid; 293 au_to_any_process(char data_header, uid_t uid, gid_t gid, uid_t ruid, gid_t rgid, pid_t pid, au_id_t auid, au_asid_t asid, const au_tid_addr_t *atid) argument
|
/illumos-gate/usr/src/cmd/auditreduce/ |
H A D | token.c | 528 * ace who adr_u_int32 (uid/gid) 552 * uid adr_int32 566 int32_t uid; local 569 adrm_int32(adr, &uid, 1); 576 if (m_usere == uid) 589 (obj_owner == uid)) 599 * uid adr_int32 613 int32_t uid; local 616 adrm_int32(adr, &uid, 1); 623 if (m_usere == uid) 660 int32_t uid; local 839 int32_t uid, gid, cuid, cgid, mode, seq; local 1815 uid_t uid; local 1876 int32_t uid; local 1900 int32_t uid; local [all...] |
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/ccache/ |
H A D | cc_file.c | 1226 uid_t uid, euid; local 1305 * Check if the cc filename uid matches owner of file. 1306 * Expects cc file to be in the form of /tmp/krb5cc_<uid>, 1318 /* make sure the uid part is all digits */
|
/illumos-gate/usr/src/lib/libbsm/common/ |
H A D | adt.c | 182 adt_get_mask_from_user(uid_t uid, au_mask_t *mask) argument 193 } else if (uid <= MAXUID) { 202 if (getpwuid_r(uid, &pwd, pwd_buff, (int)buff_sz) == NULL) { 233 adt_get_unique_id(au_id_t uid) argument 260 MD5Update(&context, (unsigned char *) &uid, sizeof (uid_t)); 1400 * from the proc and picking up current uid/tid information. 1587 * ADT_NO_ATTRIB is a valid uid/gid meaning "not known" or 1590 * ADT_NO_CHANGE is a valid uid/gid meaning "do not change this value"
|
/illumos-gate/usr/src/cmd/zlogin/ |
H A D | zlogin.c | 1706 uid_t uid; local 1718 uid = getuid(); 1719 if ((nptr = getpwuid(uid)) == NULL) {
|