/illumos-gate/usr/src/cmd/bnu/ |
H A D | security.c | 225 * Function: scRequser - log requestor user name 276 * Function: scDest - log destination node, user and file name 280 * destuser: user where the dest file is sent to 369 static char user[MODSTR]; local 374 (void) guinfo(stbuf.st_uid,user); 375 return(user); 408 * clientusr - Client user ID. 409 * serverusr - Server user ID.
|
/illumos-gate/usr/src/cmd/grpck/ |
H A D | grpck.c | 82 char user[1]; member in struct:node 140 strcpy(t->user, pwp->pw_name); 298 if (strcmp(t->user, nptr) == 0) 317 /* Usrname found, so add entry to user-list */ 322 strcpy(t->user, nptr); 377 NGROUPS, t->user, t->ngroups);
|
/illumos-gate/usr/src/cmd/id/ |
H A D | id.c | 80 char *user = NULL; local 146 gettext("id: invalid user name: \"%s\"\n"), 150 user = argv[1]; 171 if (user) 172 i = getusergroups(groupmax, groupids, user, 197 if (user) 198 i = getusergroups(groupmax, groupids, user, 233 if (user) 234 i = getusergroups(groupmax, groupids, user, 266 if (user) { [all...] |
/illumos-gate/usr/src/cmd/latencytop/common/ |
H A D | dwrapper.c | 359 drop_handler(const dtrace_dropdata_t *data, void *user) argument 532 * Worker function to move aggregate data to user space. Called periodically
|
/illumos-gate/usr/src/uts/common/fs/portfs/ |
H A D | port_fd.c | 164 * attached user pointer. 178 void *user) 257 pkevp->portkev_user = user; 292 pkevp->portkev_user = user; 177 port_associate_fd(port_t *pp, int source, uintptr_t object, int events, void *user) argument
|
/illumos-gate/usr/src/uts/common/os/ |
H A D | port_subr.c | 516 * port_init_event(port_event_t *pev, uintptr_t object, void *user, 523 * user : user defined pointer delivered with the association function 527 * The callback function is called in user context and can be 535 port_init_event(port_kevent_t *pkevp, uintptr_t object, void *user, argument 540 pkevp->portkev_user = user;
|
/illumos-gate/usr/src/lib/krb5/plugins/kdb/ldap/libkdb_ldap/ |
H A D | ldap_principal.c | 262 char *user=NULL, *DN=NULL, *strval[10] = {NULL}; local 305 if (((st=krb5_unparse_name(context, searchfor, &user)) != 0) 306 || ((st=krb5_ldap_unparse_principal_name(user)) != 0)) 310 strval[0] = user; 324 * If the Kerberos user principal to be deleted happens to be the last one associated 325 * with the directory user object, then it is time to delete the other kerberos 326 * specific attributes like krbmaxticketlife, i.e, unkerberize the directory user. 327 * From the attrsetmask value, identify the attributes set on the directory user 370 if (user) 371 free (user); [all...] |
/illumos-gate/usr/src/lib/libast/common/uwin/ |
H A D | rcmd.c | 383 char *user; local 402 user = p; 406 user = p; 414 /* enable all user for + entry */ 415 if ('+' == user[0] && '\0' == user[1] ) 422 /* disable all user for - entry */ 423 if ('-' == user[0] && '\0' == user[1] ) 436 /* disable user fro 509 char *host, *user, *domain; local 541 char *host, *user, *domain; local [all...] |
/illumos-gate/usr/src/lib/libast/common/vmalloc/ |
H A D | vmmopen.c | 74 User_t* user; /* some user data */ member in struct:_mmvm_s 142 hdr->user = NIL(User_t*); 303 for(u = mmvm->user; u; u = u->next) 318 u->next = mmvm->user; 319 mmvm->user = u;
|
/illumos-gate/usr/src/uts/common/io/lvm/notify/ |
H A D | md_notify.c | 92 u_longlong_t user) 121 entry->mdn_user = user; 91 md_put_event(md_tags_t tag, set_t sp, md_dev64_t dev, int event, u_longlong_t user) argument
|
/illumos-gate/usr/src/cmd/logadm/ |
H A D | kw.c | 83 static char *user; local 152 if ((user = getenv("USER")) != NULL) 153 Keywords = lut_add(Keywords, "user", STRDUP(user));
|
/illumos-gate/usr/src/cmd/lp/include/ |
H A D | requests.h | 75 char *alert; /* program to run to alert user when done */ 83 char *user; /* user name of person submitting */ member in struct:REQUEST 114 #define RS_CHANGING 0x0020 /* request held pending user change */ 118 #define RS_NOTIFY 0x0400 /* user is to be notified (alert) */
|
/illumos-gate/usr/src/cmd/lp/lib/papi/ |
H A D | lpsched-jobs.c | 67 "job-originating-user-name", "job-printer", 71 "requesting-user-name", "job-originating-host-name", 129 if (r->user == NULL) { 132 char *user = "intruder"; local 137 user = pw->pw_name; /* default to the process owner */ 144 "job-originating-user-name", &user); 146 "requesting-user-name", &user); 148 snprintf(buf, sizeof (buf), "%s%s%s", user, 370 lpsched_user_to_job_attributes(papi_attribute_t ***list, char *user) argument 470 job_status_to_attributes(job_t *job, char *req_id, char *user, char *slabel, size_t size, time_t date, short state, char *destination, char *form, char *charset, short rank, char *file) argument [all...] |
/illumos-gate/usr/src/cmd/lp/model/ |
H A D | lp.tsol_separator.c | 75 static void ParseUsername(char *input, char *user, char *host); 207 char user[MAXUSERLEN + 1]; local 211 ParseUsername(ArgUser, user, host); 213 (void) printf("\t/Job_User (%s) def\n", user); 299 * Parse input "host!user" to separate host and user names. 303 ParseUsername(char *input, char *user, char *host) argument 308 /* user@host */ 311 (void) strlcpy(user, input, MAXUSERLEN + 1); 314 /* host!user */ [all...] |
/illumos-gate/usr/src/lib/smbsrv/libmlsvc/common/ |
H A D | netr_auth.c | 138 char user[SMB_USERNAME_MAXLEN]; local 141 smb_ipc_get_user(user, SMB_USERNAME_MAXLEN); 143 status = ndr_rpc_bind(netr_handle, server, domain, user, "NETR");
|
H A D | samlib.c | 110 char user[SMB_USERNAME_MAXLEN]; local 112 smb_ipc_get_user(user, SMB_USERNAME_MAXLEN); 114 rc = samr_open(server, domain_name, user, SAM_LOOKUP_INFORMATION, 172 char user[SMB_USERNAME_MAXLEN]; local 174 smb_ipc_get_user(user, SMB_USERNAME_MAXLEN); 178 rc = samr_open(server, domain_name, user, SAM_LOOKUP_INFORMATION, 220 char user[SMB_USERNAME_MAXLEN]; local 222 smb_ipc_get_user(user, SMB_USERNAME_MAXLEN); 224 rc = samr_open(server, domain_name, user, SAM_ENUM_LOCAL_DOMAIN,
|
/illumos-gate/usr/src/lib/smbsrv/libsmb/common/ |
H A D | smb_kmod.c | 304 smb_netuserinfo_t *user; local 320 user = &item->nsi_un.nsi_user; 321 free(user->ui_domain); 322 free(user->ui_account); 323 free(user->ui_workstation); 356 smb_netuserinfo_t *user; local 385 user = &items->nsi_un.nsi_user; 386 rc = smb_netuserinfo_decode(user, data, len, &nbytes); 459 * Note: The user-space smbd-d provides it own version of this function 460 * which directly calls the "kernel" module code (in user spac [all...] |
/illumos-gate/usr/src/uts/common/fs/smbsrv/ |
H A D | smb_authenticate.c | 55 * The user information is passed to smbd for authentication. 56 * If smbd can authenticate the user an access token is returned and we 57 * generate a cred and new user based on the token. 62 smb_user_t *user = NULL; local 65 user = smb_user_new(sr->session); 66 if (user == NULL) 69 /* user cleanup in smb_request_free */ 70 sr->uid_user = user; 71 sr->smb_uid = user->u_uid; 78 if ((status = smb_authsock_open(user)) ! 117 smb_user_t *user = sr->uid_user; local 227 smb_user_t *user = NULL; local 353 smb_user_t *user = sr->uid_user; local 386 smb_user_t *user = sr->uid_user; local 522 smb_authsock_sendrecv(smb_user_t *user, smb_lsa_msg_hdr_t *hdr, void *sndbuf, void **recvbuf) argument 597 smb_authsock_open(smb_user_t *user) argument 703 smb_authsock_close(smb_user_t *user) argument [all...] |
H A D | smb_user.c | 104 * - The user is in the list of users for his session. 106 * - This user can not access anything yet. 111 * - The user is in the list of users for his session. 112 * - References will be given out if the user is looked up. 113 * - The user can access files and pipes. 118 * - The user is in the list of users for his session. 119 * - References will not be given out if the user is looked up. 120 * - The trees the user connected are being disconnected. 121 * - The resources associated with the user remain. 126 * - The user i 220 smb_user_t *user; local 259 smb_user_logon( smb_user_t *user, cred_t *cr, char *domain_name, char *account_name, uint32_t flags, uint32_t privileges, uint32_t audit_sid) argument 305 smb_user_logoff( smb_user_t *user) argument 350 smb_user_hold(smb_user_t *user) argument 370 smb_user_hold_internal(smb_user_t *user) argument 386 smb_user_release( smb_user_t *user) argument 418 smb_user_is_admin(smb_user_t *user) argument 472 smb_user_namecmp(smb_user_t *user, const char *name) argument 504 smb_user_enum(smb_user_t *user, smb_svcenum_t *svcenum) argument 529 smb_user_t *user = (smb_user_t *)arg; local 557 smb_user_getcred(smb_user_t *user) argument 563 smb_user_getprivcred(smb_user_t *user) argument 576 smb_user_setcred(smb_user_t *user, cred_t *cr, uint32_t privileges) argument 611 smb_user_enum_private(smb_user_t *user, smb_svcenum_t *svcenum) argument 644 smb_user_netinfo_encode(smb_user_t *user, uint8_t *buf, size_t buflen, uint32_t *nbytes) argument 658 smb_user_netinfo_init(smb_user_t *user, smb_netuserinfo_t *info) argument 710 smb_user_auth_logoff(smb_user_t *user) argument [all...] |
/illumos-gate/usr/src/cmd/ptools/ptime/ |
H A D | ptime.c | 197 timestruc_t real, user, sys; local 220 user = pup->pr_utime; 231 prtime("user", &user);
|
/illumos-gate/usr/src/cmd/isns/isnsd/ |
H A D | door.c | 915 uid_t user; local 935 user = ucred_getruid(uc); 936 ret = getpwuid_r(user, &pwds, buf_pwd, sizeof (buf_pwd), &pwd);
|
/illumos-gate/usr/src/lib/pam_modules/krb5/ |
H A D | krb5_authenticate.c | 85 * pam_sm_authenticate - Authenticate user 94 char *user = NULL; local 182 (void) pam_get_item(pamh, PAM_USER, (void**) &user); 184 if (user == NULL || *user == '\0') { 187 * If doing PKINIT it is okay to prompt for the user 190 if ((err = pam_get_user(pamh, &user, NULL)) != 194 "PAM-KRB5 (auth): get user failed: " 202 "PAM-KRB5 (auth): user empty or null"); 207 /* make sure a password entry exists for this user */ 500 attempt_krb5_auth( pam_handle_t *pamh, krb5_module_data_t *kmd, char *user, char **krb5_pass, boolean_t verify_tik) argument [all...] |
/illumos-gate/usr/src/lib/passwdutil/ |
H A D | files_attr.c | 41 #include <limits.h> /* LOGNAME_MAX -- max Solaris user name */ 47 int files_checkhistory(char *user, char *passwd, pwu_repository_t *rep); 131 * Are we a privileged user with regard to the files repository? 322 * Determine which user needs to be authenticated. For files, the 325 * PWU_SUCCESS and (auth_user == NULL || auth_user = user) 331 files_user_to_authenticate(char *user, pwu_repository_t *rep, argument 338 /* check to see if target user is present in files */ 339 res = files_getpwnam(user, &attr_tmp[0], rep, (void **)&pwbuf); 350 if ((*auth_user = strdup(user)) == NULL) { 371 * user 405 files_checkhistory(char *user, char *passwd, pwu_repository_t *rep) argument 1184 char *user; local [all...] |
/illumos-gate/usr/src/lib/libsecdb/common/ |
H A D | chkauthattr.c | 147 * associated with the user. 399 is_cons_user(const char *user) argument 405 if (user == NULL) { 411 if (getpwnam_r(user, &pw, pwbuf, sizeof (pwbuf)) == NULL) { 434 get_default_attrs(const char *user) argument 451 for (i = is_cons_user(user) ? 0 : 1; i < NDFLTPLY; i++) {
|
/illumos-gate/usr/src/lib/libsmbfs/smb/ |
H A D | ntlm.c | 371 * Compute an NTLMv2 hash given the NTLMv1 hash, the user name, 378 * user: User name, UPPER-case UTF-8 string. 383 const char *user, const char *destination) 392 * v2hash = HMACT64(v1hash, 16, concat(upcase(user), dest)) 394 * Note: user name is converted to upper-case by the caller. 397 /* utf8data = concat(user, dest) */ 398 ulen = strlen(user); 403 bcopy(user, utf8data, ulen); 484 char *ucuser = NULL; /* upper-case user name */ 489 * Convert the user nam 382 ntlm_v2_hash(uchar_t *v2hash, const uchar_t *v1hash, const char *user, const char *destination) argument [all...] |