Searched defs:uid (Results 51 - 75 of 388) sorted by relevance

1234567891011>>

/illumos-gate/usr/src/lib/libsmbfs/smb/
H A Dacl_api.c243 * Get uid/gid too if pointers != NULL.
275 smbfs_acl_set(int fd, acl_t *acl, uid_t uid, gid_t gid) argument
292 if (uid != (uid_t)-1)
299 if (uid == (uid_t)-1 || gid == (gid_t)-1) {
307 if (uid == (uid_t)-1)
308 uid = st.st_uid;
317 error = smbfs_acl_zfs2sd(acl, uid, gid, selector, &sd);
H A Dkeychain.c57 uid_t uid,
67 pk.pk_uid = uid;
158 smbfs_keychain_add(uid_t uid, const char *dom, const char *usr, argument
173 err = smbfs_keychain_cmn(cmd, uid, dom, usr, lmhash, nthash);
179 smbfs_keychain_addhash(uid_t uid, const char *dom, const char *usr, argument
184 err = smbfs_keychain_cmn(cmd, uid, dom, usr,
191 smbfs_keychain_del(uid_t uid, const char *dom, const char *usr) argument
193 return (smbfs_keychain_cmn(SMBIOC_PK_DEL, uid, dom, usr, NULL, NULL));
203 uid_t uid = (uid_t)-1; local
204 return (smbfs_keychain_cmn(SMBIOC_PK_CHK, uid, do
55 smbfs_keychain_cmn( int cmd, uid_t uid, const char *dom, const char *usr, uchar_t *lmhash, uchar_t *nthash) argument
214 uid_t uid = (uid_t)-1; local
228 uid_t uid = getuid(); local
240 uid_t uid = getuid(); local
[all...]
/illumos-gate/usr/src/lib/libbsm/common/
H A Daudit_rexecd.c53 selected(uid, user, event, sf)
54 uid_t uid;
63 if (uid > MAXEPHUID) {
91 audit_rexecd_session_setup(char *name, char *mach, uid_t uid) argument
98 info.ai_auid = uid;
138 uid_t uid; local
168 uid = (uid_t)-1;
171 uid = pwd->pw_uid;
176 if (!selected(uid, user, event, -1))
196 au_to_subject_ex(uid, ui
249 uid_t uid; local
[all...]
H A Daudit_rshd.c104 uid_t uid; local
116 uid = (uid_t)-1;
119 uid = pwd->pw_uid;
123 if (!selected(uid, locuser, rshd_event, sf_flag))
134 (void) au_write(rd, au_to_subject_ex(uid, uid, gid, uid, gid, pid, pid,
174 selected(uid_t uid, char *locuser, au_event_t event, int sf) argument
180 if (uid > MAXEPHUID) {
204 uid_t uid; local
[all...]
/illumos-gate/usr/src/cmd/sgs/error/common/
H A Derrorfilter.c60 int uid; local
69 uid = getuid();
70 if ((passwdentry = getpwuid(uid)) == NULL) {
/illumos-gate/usr/src/cmd/getfacl/
H A Dgetfacl.c37 * # owner: uid
40 * user:uid:perm
46 * default:user:uid:perm
175 /* no need to display uid */
305 pruname(uid_t uid) argument
310 passwdp = getpwuid(uid);
312 /* could not get passwd information: display uid instead */
313 (void) sprintf(uidp, "%u", uid);
/illumos-gate/usr/src/cmd/hal/tools/
H A Dhal-is-caller-privileged.c77 permission_denied_privilege (const char *privilege, const char *uid) argument
81 fprintf (stderr, "%s refused uid %s\n", privilege, uid);
H A Dhal-storage-closetray.c64 invalid_closetray_option (const char *option, const char *uid) argument
67 fprintf (stderr, "The option '%s' is not allowed for uid=%s\n", option, uid);
H A Dhal-storage-unmount.c68 invalid_unmount_option (const char *option, const char *uid) argument
71 fprintf (stderr, "The option '%s' is not allowed for uid=%s\n", option, uid);
/illumos-gate/usr/src/cmd/lastcomm/
H A Dlc_exacct.c47 ok(int argc, char *argv[], int index, uid_t uid, dev_t tty, char *command) argument
52 if (strcmp(getname(uid), argv[j]) &&
72 uid_t uid = 0; local
90 uid = curr_obj.eo_item.ei_uint32;
145 if (argc > index && !ok(argc, argv, index, uid, tty, command))
154 flagbits(flag), NMAX, getname(uid), LMAX, getdev(tty),
/illumos-gate/usr/src/uts/common/fs/tmpfs/
H A Dtmp_subr.c79 uid_t uid = crgetuid(cr); local
82 uid != dir->tn_uid &&
83 uid != entry->tn_uid &&
/illumos-gate/usr/src/tools/protolist/
H A Dprotolist.c45 const char *uid, *gid; local
132 uid = stdfindbyvalue(st->st_uid, usernames);
133 if (uid == NULL)
134 uid = "NO_SUCH_UID";
145 ftype, name, symsrc, st->st_mode % 010000, uid, gid,
/illumos-gate/usr/src/uts/common/ipp/ipgpc/
H A Dclassifier.h70 uid_t uid; /* user id for packet */ member in struct:ipgpc_packet_s
/illumos-gate/usr/src/uts/common/sys/fs/
H A Dsmbfs_mount.h74 uid_t uid; /* octal user id */ member in struct:smbfs_args
91 uid32_t uid; /* octal user id */ member in struct:smbfs_args32
/illumos-gate/usr/src/lib/libadm/common/
H A Dckuid.c148 ckuid(char *uid, short disp, char *defstr, char *error, char *help, argument
170 (void) strcpy(uid, defstr);
192 (void) strcpy(uid, input);
/illumos-gate/usr/src/cmd/idmap/idmapd/
H A Dinit.c434 create_directory(const char *path, uid_t uid, gid_t gid) argument
444 if (lchown(path, uid, gid) < 0) {
/illumos-gate/usr/src/lib/nsswitch/compat/common/
H A Dgetpwent.c39 * bogus uid/gid values.
70 * Validates passwd entry replacing uid/gid > MAXUID by ID_NOBODY.
76 uid_t uid; local
96 uidl = strtoul(uidp, (char **)&linep, 10); /* grab uid */
109 uid = (uidl > MAXUID) ? UID_NOBODY : (uid_t)uidl;
113 idlen = snprintf(NULL, 0, "%u:%u", uid, gid);
120 (void) snprintf(uidp, idlen + 1, "%u:%u", uid, gid);
161 return (p->pw_uid == argp->key.uid);
171 if (argp->key.uid > MAXUID)
198 * - uid
[all...]
/illumos-gate/usr/src/lib/nsswitch/files/common/
H A Dgetpwnam.c69 return ((uint_t)argp->key.uid);
78 /* uid */
82 /* empty uid */
146 /* uid */
150 /* check if the uid is empty or overflows */
154 return ((uid_t)pw_uid == argp->key.uid);
164 if (argp->key.uid > MAXUID)
170 * Validates passwd entry replacing uid/gid > MAXUID by ID_NOBODY.
176 uid_t uid; local
183 * +name entries in passwd(4) do not override uid an
[all...]
/illumos-gate/usr/src/lib/pam_modules/dhkeys/
H A Dkey_call_uid.c45 * authsys_create_uid(uid_t uid)
47 * Create SYS (UNIX) style authenticator for the given uid/gid
52 authsys_create_uid(uid_t uid, gid_t gid) argument
64 res = authsys_create(host, uid, gid, 0, (gid_t *)NULL);
78 xdrproc_t xdr_rslt, char *rslt, uid_t uid, gid_t gid)
88 r = (*__key_encryptsession_pk_LOCAL)(uid, arg, &res);
99 r = (*__key_decryptsession_pk_LOCAL)(uid, arg, &res);
110 r = (*__key_gendes_LOCAL)(uid, 0, &res);
131 clnt->cl_auth = authsys_create_uid(uid, gid);
143 key_setnet_uid(struct key_netstarg *arg, uid_t uid, gid_ argument
77 my_key_call(rpcproc_t proc, xdrproc_t xdr_arg, char *arg, xdrproc_t xdr_rslt, char *rslt, uid_t uid, gid_t gid) argument
159 key_setnet_g_uid(const char *netname, const char *skey, keylen_t skeylen, const char *pkey, keylen_t pkeylen, algtype_t algtype, uid_t uid, gid_t gid) argument
236 key_secretkey_is_set_uid(uid_t uid, gid_t gid) argument
256 key_removesecret_g_uid(uid_t uid, gid_t gid) argument
[all...]
/illumos-gate/usr/src/lib/pam_modules/timestamp/
H A Dpam_timestamp.c32 #define ROOT_UID 0 /* root uid */
39 uid_t uid; /* user's uid */ member in struct:user_info
292 info.uid != getuid() || info.ts.tv_sec != tty.st_ctim.tv_sec ||
391 info.uid = getuid();
/illumos-gate/usr/src/lib/policykit/libpolkit/common/
H A Dlibpolkit-rbac.c129 uid_t uid; local
137 uid = (uid_t)atol (user);
138 if ((pw = getpwuid (uid)) == NULL) {
/illumos-gate/usr/src/lib/libshell/common/bltins/
H A Dregress.c81 "[102:euid?The intercept effective uid is set to \aoriginal-euid\a. The "
82 "effective uid of the underlying system process is not affected. The "
86 "[+geteuid()?The intercept effecive uid is returned. The "
87 "\bsetuid\b() intercept may change this between the real uid and "
89 "[+setuid(uid)?Sets the intercept effective uid to \auid\a. "
90 "Fails if \auid\a is neither the real uid nor "
94 "than the non-privileged-uid disable the priveleged mode. The intercepts "
95 "are:]#?[non-privileged-uid:=1]"
211 int setuid(uid_t uid) argument
[all...]
/illumos-gate/usr/src/lib/libnsl/rpc/
H A Dnetname.c43 * Convert from unix names (uid, gid) to network wide names.
108 * 3 pieces of information <opsys type> <uid> <domain>.
112 user2netname_nis(int *err, char netname[MAXNETNAMELEN + 1], uid_t uid, argument
130 "%s.%d@%s", OPSYS, (int)uid, domain);
144 uid_t uid; local
146 uid = geteuid();
147 if (uid == 0)
149 return (user2netname(name, uid, NULL));
154 * Figure out the fully qualified network name for the given uid.
158 __getnetnamebyuid(char name[MAXNETNAMELEN + 1], uid_t uid) argument
177 user2netname(char netname[MAXNETNAMELEN + 1], const uid_t uid, const char *domain) argument
[all...]
/illumos-gate/usr/src/lib/libnwam/common/
H A Dlibnwam_backend.c58 * Check if uid has proper auths. flags is used to check auths for
62 nwam_check_auths(uid_t uid, boolean_t write, uint64_t flags) argument
67 if ((pwd = getpwuid(uid)) == NULL) {
215 uid_t uid; local
231 uid = ucred_getruid(ucr);
235 if ((err = nwam_check_auths(uid, write, req->nwbda_flags))
/illumos-gate/usr/src/lib/libbc/inc/include/rpc/
H A Dkey_prot.h93 u_int uid; member in struct:unixcred

Completed in 297 milliseconds

1234567891011>>