/illumos-gate/usr/src/lib/print/libipp-listener/common/ |
H A D | print-job.c | 92 char *user = NULL; local 97 "requesting-user-name", &user) == PAPI_OK) { 99 PAPI_ATTR_REPLACE, "requesting-user-name", user);
|
/illumos-gate/usr/src/lib/print/libpapi-common/common/ |
H A D | uri.c | 41 * scheme://[[user[:password]@]host[:port]]/path[[#fragment]|[?query]] 70 char *end = NULL, *user = NULL, *host = NULL, *path = NULL; local 82 /* string to host is the user part */ 87 user = string; 92 if (user != NULL) { 95 for (password = user; (password < host - 1); password++) 101 u->user = strndup(user, password - user); 168 ((uri->password != NULL) && (uri->user [all...] |
/illumos-gate/usr/src/lib/libtecla/common/ |
H A D | homedir.c | 90 struct passwd pwd; /* The password entry of a user */ 187 * Lookup the home directory of a given user in the password file. 191 * user const char * The name of the user to lookup, or "" to lookup 212 const char *_hd_lookup_home_dir(HomeDir *home, const char *user) argument 214 const char *home_dir; /* A pointer to the home directory of the user */ 217 * user. 219 int login_user = !user || *user=='\0'; 231 if(!login_user && strcmp(user, " [all...] |
/illumos-gate/usr/src/lib/libwrap/ |
H A D | rfc931.c | 77 /* rfc931 - return remote user name, given socket structures */ 88 char user[256]; /* XXX */ local 172 &rmt_port, &our_port, user) == 3 181 if (cp = strchr(user, '\r')) 183 result = user;
|
/illumos-gate/usr/src/lib/libnsl/nss/ |
H A D | getuserattr.c | 75 userstr_t *user = (userstr_t *)ent; local 95 user->name = _strtok_escape(buffer, sep, &last); 96 user->qualifier = _strtok_escape(NULL, sep, &last); 97 user->res1 = _strtok_escape(NULL, sep, &last); 98 user->res2 = _strtok_escape(NULL, sep, &last); 99 user->attr = _strtok_escape(NULL, sep, &last);
|
/illumos-gate/usr/src/lib/libresolv2/common/irs/ |
H A D | getnetgrent.c | 69 const char *user, const char *domain 75 return (innetgr_p(netgroup, host, user, domain, net_data)); 79 getnetgrent(NGR_R_CONST char **host, NGR_R_CONST char **user, argument 91 DE_CONST(cu, *user); 119 const char *user, const char *domain, 125 return ((*ng->test)(ng, netgroup, host, user, domain)); 129 getnetgrent_p(const char **host, const char **user, const char **domain, argument 135 return ((*ng->next)(ng, host, user, domain)); 118 innetgr_p(const char *netgroup, const char *host, const char *user, const char *domain, struct net_data *net_data) argument
|
H A D | irp_ng.c | 158 ng_next(struct irs_ng *this, const char **host, const char **user, argument 182 if (irp_unmarshall_ng(host, user, domain, body) == 0) { 201 const char *host, const char *user, const char *domain) 216 if (irp_marshall_ng(host, user, domain, &body, &bodylen) != 0) { 200 ng_test(struct irs_ng *this, const char *name, const char *host, const char *user, const char *domain) argument
|
H A D | getnetgrent_r.c | 45 innetgr_r(const char *netgroup, const char *host, const char *user, argument 51 DE_CONST(user, us);
|
/illumos-gate/usr/src/lib/libc/port/gen/ |
H A D | event_port.c | 59 port_associate(int port, int source, uintptr_t object, int events, void *user) argument 63 (uintptr_t)user); 112 port_send(int port, int events, void *user) argument 115 r.r_vals = _portfs(PORT_SEND, port, events, (uintptr_t)user, NULL, 127 void *user) 132 (uintptr_t)user); 135 source, events, object, (uintptr_t)user); 140 port_sendn(int ports[], int errors[], uint_t nent, int events, void *user) argument 149 (uintptr_t)user); 163 lnent, events, (uintptr_t)user); 126 _port_dispatch(int port, int flags, int source, int events, uintptr_t object, void *user) argument 178 port_alert(int port, int flags, int events, void *user) argument [all...] |
/illumos-gate/usr/src/cmd/print/bsd-sysv-commands/ |
H A D | cancel.c | 49 fprintf(stdout, "Usage: %s [-u user] (printer|request-id ...)\n", name); 65 cancel_jobs_for_user(char *user, papi_encryption_t encryption, char *pname) { argument 97 &user); 111 char *user = NULL; local 130 user = optarg; 198 if (user == NULL) { 243 /* Purging user's print jobs */ 244 exit_code = cancel_jobs_for_user(user, 252 exit_code = cancel_jobs_for_user(user, encryption, NULL);
|
/illumos-gate/usr/src/cmd/print/printmgr/com/sun/admin/pm/server/ |
H A D | NameService.java | 37 private String user = null; field in class:NameService 101 user = arg; 118 return (user);
|
/illumos-gate/usr/src/cmd/tcpd/ |
H A D | tcpdmatch.c | 4 * usage: tcpdmatch [-d] [-i inet_conf] daemon[@host] [user@]host 65 char *user; local 123 * Default is to specify a client hostname or address. When user@host is 127 user = argv[optind + 1]; 130 user = unknown; 135 * the user about services that may not be wrapped, services that are not 163 request_init(&request, RQ_DAEMON, daemon, RQ_USER, user, RQ_FILE, 1, 0); 168 * most one address. eval_hostname() warns the user about name server 259 fprintf(stderr, "usage: %s [-d] [-i inet_conf] daemon[@host] [user@]host\n",
|
/illumos-gate/usr/src/cmd/lp/cmd/ |
H A D | lpusers.c | 30 /* lpusers [-q priority-level] -u (user-list | "") 60 char *userlist = 0, *user, **users, *p; local 79 (void) printf(gettext("\tlpusers -q priority -u user-list\n")); 86 (void) printf(gettext("\tlpusers -u user-list\n")); 172 while (user = *users++) { 173 if (del_user(ppri_tbl, user) && (limit == -1)) 174 LP_ERRMSG1(WARNING, E_LPU_NOUSER, user); 176 if (add_user(ppri_tbl, user, limit)) 177 LP_ERRMSG1(WARNING, E_LPU_BADU, user);
|
/illumos-gate/usr/src/lib/pam_modules/krb5/ |
H A D | krb5_acct_mgmt.c | 152 * Warn the user if their pw is set to expire. 167 char *user, 180 "PAM-KRB5 (acct): exp_warn start: user = '%s'", 181 user ? user : "<null>"); 185 if (!pamh || !user || !password) { 217 if ((err = fetch_princ_entry(kmd, user, &prent, debug)) 243 /* warn user if principal's pw is set to expire */ 294 * - warn user if pw is set to expire 309 char *user local 165 exp_warn( pam_handle_t *pamh, char *user, krb5_module_data_t *kmd, int debug) argument [all...] |
H A D | krb5_password.c | 109 char *user, 121 * pwchange verified user sufficiently, so don't request strict 124 login_result = attempt_krb5_auth(pamh, kmd, user, &newpass, 0); 131 * warn the user they have to kinit(1) 156 char *user; local 231 (void) pam_get_item(pamh, PAM_USER, (void **)&user); 233 if (user == NULL || *user == '\0') { 239 if (!get_pw_uid(user, &pw_uid)) { 241 "PAM-KRB5 (password): can't get uid for %s", user); 106 get_set_creds( pam_handle_t *pamh, krb5_module_data_t *kmd, char *user, char *newpass, int debug) argument [all...] |
H A D | krb5_setcred.c | 75 char *user = NULL; local 104 (void) pam_get_item(pamh, PAM_USER, (void**) &user); 106 if (user == NULL || *user == '\0') 145 * for the authenticated user. Therefore we should 147 * login process of said user. 158 " gotten but is NULL for user %s", user); 206 * Use the authenticated and validated user, if applicable. 208 if (kmd->user ! 285 attempt_refresh_cred( krb5_module_data_t *kmd, char *user, int flag) argument [all...] |
/illumos-gate/usr/src/lib/pam_modules/krb5_migrate/ |
H A D | krb5_migrate_authenticate.c | 45 * principal to kadmind in order to permit the creation of a new user 51 char *user = NULL; local 99 err = pam_get_item(pamh, PAM_USER, (void**)&user); 105 * Check if user name is *not* NULL 107 if (user == NULL || (user[0] == '\0')) { 110 "PAM-KRB5-AUTOMIGRATE (auth): user empty or null"); 118 if ((userdata = strdup(user)) == NULL) { 125 * Grok the user password 208 * if the corresponding user principa [all...] |
/illumos-gate/usr/src/lib/pam_modules/ldap/ |
H A D | ldap_acct_mgmt.c | 42 * warn_user_passwd_will_expire - warn the user when the password will 130 * warn_user_passwd_expired - warn the user that the password has expired 152 * display_passwd_reset_msg - tell user that password has been reset by 168 * Retreives account management related attributes for the user using 183 get_account_mgmt(char *user, int *seconds, int *grace) argument 190 if ((rc = __ns_ldap_getAcctMgmt(user, &acctResp)) 194 user, rc); 235 * trying to authenticate the user and 251 char *user = NULL; local 275 if ((result = pam_get_item(pamh, PAM_USER, (void **)&user)) [all...] |
/illumos-gate/usr/src/lib/pam_modules/passwd_auth/ |
H A D | passwd_auth.c | 62 * Read authentication token from user. 68 char *user; local 102 if ((res = pam_get_user(pamh, &user, NULL)) != PAM_SUCCESS) { 105 "get user failed: %s", pam_strerror(pamh, res)); 109 if (user == NULL || *user == '\0') { 143 res = __user_to_authenticate(user, pwu_rep, &auth_user, &privileged); 175 * own password, and users updating other an user's password 211 * Non privileged user: so we need to check the old password 235 * if repository isn't files|nis, and user want [all...] |
/illumos-gate/usr/src/lib/pam_modules/timestamp/ |
H A D | pam_timestamp.c | 39 uid_t uid; /* user's uid */ 53 char *user; local 57 /* get user, auser and users's tty */ 58 (void) pam_get_item(pamh, PAM_USER, (void **)&user); 62 if (user == NULL || *user == '\0') { 82 "user = %s, auser = %s, tty = %s", user, auser, ttyn); 96 auser, ttyn, user); 167 * Read authentication from user, usin [all...] |
/illumos-gate/usr/src/lib/pam_modules/unix_auth/ |
H A D | unix_auth.c | 68 get_max_failed(char *user) argument 77 if ((uattr = getusernam(user)) != NULL) 132 * PAM_AUTHTOK item is indeed the password that belongs to the user 145 char *user; local 174 if (pam_get_item(pamh, PAM_USER, (void **)&user) != PAM_SUCCESS) { 179 if (user == NULL || *user == '\0') { 218 result = __get_authtoken_attr(user, pwu_rep, attr_pw); 225 "pam_unix_auth: user %s not found\n", user); [all...] |
/illumos-gate/usr/src/lib/policykit/libpolkit/common/ |
H A D | libpolkit-rbac.c | 92 const char *user, 118 const char *user, 137 uid = (uid_t)atol (user); 211 const char *user, 91 libpolkit_get_allowed_resources_for_privilege_for_uid(LibPolKitContext *ctx, const char *user, const char *privilege, GList **resources, GList **restrictions, int *num_non_temporary) argument 116 libpolkit_is_uid_allowed_for_privilege(LibPolKitContext *ctx, const char *system_bus_unique_name, const char *user, const char *privilege, const char *resource, gboolean *out_is_allowed, gboolean *out_is_temporary, char **out_is_privileged_but_restricted_to_system_bus_unique_name) argument 210 libpolkit_revoke_temporary_privilege(LibPolKitContext *ctx, const char *user, const char *privilege, const char *resource, gboolean *result) argument
|
/illumos-gate/usr/src/lib/libsasl/lib/ |
H A D | external.c | 137 /* The user's trying to authorize as someone they didn't 279 const char *user = NULL; local 302 if (user == NULL) { 303 user_result = _plug_get_userid(params->utils, &user, prompt_need); 340 *clientoutlen = user ? strlen(user) : 0; 351 if (user && *user) { 353 user, 0, SASL_CU_AUTHZID, oparams); 361 memcpy(text->out_buf, user, *clientoutle [all...] |
/illumos-gate/usr/src/lib/libsec/common/ |
H A D | aclcheck.c | 33 * If there are any USER entries, then the user id must be unique. 54 struct entry user; member in struct:entry_stat 139 cnt = (tally.user.count)++; 140 idp = &(tally.user.id); 211 /* If there are group or user entries, there must be one class entry */ 212 if (tally.user.count > 0 || tally.group.count > 0) 272 if ((tallyp->user).count > 0) 273 free((tallyp->user).id);
|
/illumos-gate/usr/src/lib/libbsm/common/ |
H A D | audit_crontab.c | 253 * audited, then the ruid of the user doing the editing must be the owner 263 audit_crontab_not_allowed(uid_t ruid, char *user) { argument 269 if (getpwnam_r(user, &pwd, buffer, PWD_BUFFER_SIZE) == NULL) {
|