/illumos-gate/usr/src/lib/libsmbfs/smb/ |
H A D | acl_api.c | 243 * Get uid/gid too if pointers != NULL. 275 smbfs_acl_set(int fd, acl_t *acl, uid_t uid, gid_t gid) argument 292 if (uid != (uid_t)-1) 299 if (uid == (uid_t)-1 || gid == (gid_t)-1) { 307 if (uid == (uid_t)-1) 308 uid = st.st_uid; 317 error = smbfs_acl_zfs2sd(acl, uid, gid, selector, &sd);
|
H A D | keychain.c | 57 uid_t uid, 67 pk.pk_uid = uid; 158 smbfs_keychain_add(uid_t uid, const char *dom, const char *usr, argument 173 err = smbfs_keychain_cmn(cmd, uid, dom, usr, lmhash, nthash); 179 smbfs_keychain_addhash(uid_t uid, const char *dom, const char *usr, argument 184 err = smbfs_keychain_cmn(cmd, uid, dom, usr, 191 smbfs_keychain_del(uid_t uid, const char *dom, const char *usr) argument 193 return (smbfs_keychain_cmn(SMBIOC_PK_DEL, uid, dom, usr, NULL, NULL)); 203 uid_t uid = (uid_t)-1; local 204 return (smbfs_keychain_cmn(SMBIOC_PK_CHK, uid, do 55 smbfs_keychain_cmn( int cmd, uid_t uid, const char *dom, const char *usr, uchar_t *lmhash, uchar_t *nthash) argument 214 uid_t uid = (uid_t)-1; local 228 uid_t uid = getuid(); local 240 uid_t uid = getuid(); local [all...] |
/illumos-gate/usr/src/lib/libbsm/common/ |
H A D | audit_rexecd.c | 53 selected(uid, user, event, sf) 54 uid_t uid; 63 if (uid > MAXEPHUID) { 91 audit_rexecd_session_setup(char *name, char *mach, uid_t uid) argument 98 info.ai_auid = uid; 138 uid_t uid; local 168 uid = (uid_t)-1; 171 uid = pwd->pw_uid; 176 if (!selected(uid, user, event, -1)) 196 au_to_subject_ex(uid, ui 249 uid_t uid; local [all...] |
H A D | audit_rshd.c | 104 uid_t uid; local 116 uid = (uid_t)-1; 119 uid = pwd->pw_uid; 123 if (!selected(uid, locuser, rshd_event, sf_flag)) 134 (void) au_write(rd, au_to_subject_ex(uid, uid, gid, uid, gid, pid, pid, 174 selected(uid_t uid, char *locuser, au_event_t event, int sf) argument 180 if (uid > MAXEPHUID) { 204 uid_t uid; local [all...] |
/illumos-gate/usr/src/cmd/sgs/error/common/ |
H A D | errorfilter.c | 60 int uid; local 69 uid = getuid(); 70 if ((passwdentry = getpwuid(uid)) == NULL) {
|
/illumos-gate/usr/src/cmd/getfacl/ |
H A D | getfacl.c | 37 * # owner: uid 40 * user:uid:perm 46 * default:user:uid:perm 175 /* no need to display uid */ 305 pruname(uid_t uid) argument 310 passwdp = getpwuid(uid); 312 /* could not get passwd information: display uid instead */ 313 (void) sprintf(uidp, "%u", uid);
|
/illumos-gate/usr/src/cmd/hal/tools/ |
H A D | hal-is-caller-privileged.c | 77 permission_denied_privilege (const char *privilege, const char *uid) argument 81 fprintf (stderr, "%s refused uid %s\n", privilege, uid);
|
H A D | hal-storage-closetray.c | 64 invalid_closetray_option (const char *option, const char *uid) argument 67 fprintf (stderr, "The option '%s' is not allowed for uid=%s\n", option, uid);
|
H A D | hal-storage-unmount.c | 68 invalid_unmount_option (const char *option, const char *uid) argument 71 fprintf (stderr, "The option '%s' is not allowed for uid=%s\n", option, uid);
|
/illumos-gate/usr/src/cmd/lastcomm/ |
H A D | lc_exacct.c | 47 ok(int argc, char *argv[], int index, uid_t uid, dev_t tty, char *command) argument 52 if (strcmp(getname(uid), argv[j]) && 72 uid_t uid = 0; local 90 uid = curr_obj.eo_item.ei_uint32; 145 if (argc > index && !ok(argc, argv, index, uid, tty, command)) 154 flagbits(flag), NMAX, getname(uid), LMAX, getdev(tty),
|
/illumos-gate/usr/src/uts/common/fs/tmpfs/ |
H A D | tmp_subr.c | 79 uid_t uid = crgetuid(cr); local 82 uid != dir->tn_uid && 83 uid != entry->tn_uid &&
|
/illumos-gate/usr/src/tools/protolist/ |
H A D | protolist.c | 45 const char *uid, *gid; local 132 uid = stdfindbyvalue(st->st_uid, usernames); 133 if (uid == NULL) 134 uid = "NO_SUCH_UID"; 145 ftype, name, symsrc, st->st_mode % 010000, uid, gid,
|
/illumos-gate/usr/src/uts/common/ipp/ipgpc/ |
H A D | classifier.h | 70 uid_t uid; /* user id for packet */ member in struct:ipgpc_packet_s
|
/illumos-gate/usr/src/uts/common/sys/fs/ |
H A D | smbfs_mount.h | 74 uid_t uid; /* octal user id */ member in struct:smbfs_args 91 uid32_t uid; /* octal user id */ member in struct:smbfs_args32
|
/illumos-gate/usr/src/lib/libadm/common/ |
H A D | ckuid.c | 148 ckuid(char *uid, short disp, char *defstr, char *error, char *help, argument 170 (void) strcpy(uid, defstr); 192 (void) strcpy(uid, input);
|
/illumos-gate/usr/src/cmd/idmap/idmapd/ |
H A D | init.c | 434 create_directory(const char *path, uid_t uid, gid_t gid) argument 444 if (lchown(path, uid, gid) < 0) {
|
/illumos-gate/usr/src/lib/nsswitch/compat/common/ |
H A D | getpwent.c | 39 * bogus uid/gid values. 70 * Validates passwd entry replacing uid/gid > MAXUID by ID_NOBODY. 76 uid_t uid; local 96 uidl = strtoul(uidp, (char **)&linep, 10); /* grab uid */ 109 uid = (uidl > MAXUID) ? UID_NOBODY : (uid_t)uidl; 113 idlen = snprintf(NULL, 0, "%u:%u", uid, gid); 120 (void) snprintf(uidp, idlen + 1, "%u:%u", uid, gid); 161 return (p->pw_uid == argp->key.uid); 171 if (argp->key.uid > MAXUID) 198 * - uid [all...] |
/illumos-gate/usr/src/lib/nsswitch/files/common/ |
H A D | getpwnam.c | 69 return ((uint_t)argp->key.uid); 78 /* uid */ 82 /* empty uid */ 146 /* uid */ 150 /* check if the uid is empty or overflows */ 154 return ((uid_t)pw_uid == argp->key.uid); 164 if (argp->key.uid > MAXUID) 170 * Validates passwd entry replacing uid/gid > MAXUID by ID_NOBODY. 176 uid_t uid; local 183 * +name entries in passwd(4) do not override uid an [all...] |
/illumos-gate/usr/src/lib/pam_modules/dhkeys/ |
H A D | key_call_uid.c | 45 * authsys_create_uid(uid_t uid) 47 * Create SYS (UNIX) style authenticator for the given uid/gid 52 authsys_create_uid(uid_t uid, gid_t gid) argument 64 res = authsys_create(host, uid, gid, 0, (gid_t *)NULL); 78 xdrproc_t xdr_rslt, char *rslt, uid_t uid, gid_t gid) 88 r = (*__key_encryptsession_pk_LOCAL)(uid, arg, &res); 99 r = (*__key_decryptsession_pk_LOCAL)(uid, arg, &res); 110 r = (*__key_gendes_LOCAL)(uid, 0, &res); 131 clnt->cl_auth = authsys_create_uid(uid, gid); 143 key_setnet_uid(struct key_netstarg *arg, uid_t uid, gid_ argument 77 my_key_call(rpcproc_t proc, xdrproc_t xdr_arg, char *arg, xdrproc_t xdr_rslt, char *rslt, uid_t uid, gid_t gid) argument 159 key_setnet_g_uid(const char *netname, const char *skey, keylen_t skeylen, const char *pkey, keylen_t pkeylen, algtype_t algtype, uid_t uid, gid_t gid) argument 236 key_secretkey_is_set_uid(uid_t uid, gid_t gid) argument 256 key_removesecret_g_uid(uid_t uid, gid_t gid) argument [all...] |
/illumos-gate/usr/src/lib/pam_modules/timestamp/ |
H A D | pam_timestamp.c | 32 #define ROOT_UID 0 /* root uid */ 39 uid_t uid; /* user's uid */ member in struct:user_info 292 info.uid != getuid() || info.ts.tv_sec != tty.st_ctim.tv_sec || 391 info.uid = getuid();
|
/illumos-gate/usr/src/lib/policykit/libpolkit/common/ |
H A D | libpolkit-rbac.c | 129 uid_t uid; local 137 uid = (uid_t)atol (user); 138 if ((pw = getpwuid (uid)) == NULL) {
|
/illumos-gate/usr/src/lib/libshell/common/bltins/ |
H A D | regress.c | 81 "[102:euid?The intercept effective uid is set to \aoriginal-euid\a. The " 82 "effective uid of the underlying system process is not affected. The " 86 "[+geteuid()?The intercept effecive uid is returned. The " 87 "\bsetuid\b() intercept may change this between the real uid and " 89 "[+setuid(uid)?Sets the intercept effective uid to \auid\a. " 90 "Fails if \auid\a is neither the real uid nor " 94 "than the non-privileged-uid disable the priveleged mode. The intercepts " 95 "are:]#?[non-privileged-uid:=1]" 211 int setuid(uid_t uid) argument [all...] |
/illumos-gate/usr/src/lib/libnsl/rpc/ |
H A D | netname.c | 43 * Convert from unix names (uid, gid) to network wide names. 108 * 3 pieces of information <opsys type> <uid> <domain>. 112 user2netname_nis(int *err, char netname[MAXNETNAMELEN + 1], uid_t uid, argument 130 "%s.%d@%s", OPSYS, (int)uid, domain); 144 uid_t uid; local 146 uid = geteuid(); 147 if (uid == 0) 149 return (user2netname(name, uid, NULL)); 154 * Figure out the fully qualified network name for the given uid. 158 __getnetnamebyuid(char name[MAXNETNAMELEN + 1], uid_t uid) argument 177 user2netname(char netname[MAXNETNAMELEN + 1], const uid_t uid, const char *domain) argument [all...] |
/illumos-gate/usr/src/lib/libnwam/common/ |
H A D | libnwam_backend.c | 58 * Check if uid has proper auths. flags is used to check auths for 62 nwam_check_auths(uid_t uid, boolean_t write, uint64_t flags) argument 67 if ((pwd = getpwuid(uid)) == NULL) { 215 uid_t uid; local 231 uid = ucred_getruid(ucr); 235 if ((err = nwam_check_auths(uid, write, req->nwbda_flags))
|
/illumos-gate/usr/src/lib/libbc/inc/include/rpc/ |
H A D | key_prot.h | 93 u_int uid; member in struct:unixcred
|