Searched refs:uid (Results 301 - 325 of 547) sorted by relevance

<<11121314151617181920>>

/illumos-gate/usr/src/uts/common/ipp/flowacct/
H A Dflowacct.c202 * attempt to discern the uid and projid of the originator of a packet by
216 header->uid = crgetuid(cr);
219 header->uid = (uid_t)-1;
401 * Checks if the given item (identified by dsfield, project id and uid)
405 flowacct_item_present(flow_t *flow, uint8_t dsfield, pid_t proj_id, uint_t uid) argument
416 (item->uid != uid)) {
490 header->uid);
569 item->uid = header->uid;
[all...]
/illumos-gate/usr/src/lib/gss_mechs/mech_dh/backend/mech/
H A Ddh_gssapi.h113 uid_t uid; /* The uid of this principal */ member in struct:dh_cred_id_desc
307 /* Principal to uid mapping */
310 const gss_name_t pname, uid_t *uid);
/illumos-gate/usr/src/lib/libnsl/rpc/
H A Dkey_prot.c152 if (!xdr_u_int(xdrs, &objp->uid))
164 if (!xdr_u_int(xdrs, &objp->uid))
/illumos-gate/usr/src/cmd/vi/port/
H A Dexpreserve.c278 fprintf(stderr, gettext("Unable to get uid for user.\n"));
395 * Notify user uid that his file fname has been saved.
398 notify(int uid, unsigned char *fname, int flag, int cryflag) argument
403 struct passwd *pp = getpwuid(uid);
/illumos-gate/usr/src/cmd/cron/
H A Datrm.c188 * if argv is a username, compare his/her uid to
189 * the uid of the owner of the file......
376 getname(uid_t uid) argument
381 if ((pwdinfo = getpwuid(uid)) == 0)
/illumos-gate/usr/src/cmd/lvm/rpc.metamedd/
H A Dmed_init.c261 uid_t uid
269 if ((pwp = getpwuid(uid)) == NULL)
/illumos-gate/usr/src/cmd/lvm/rpc.metamhd/
H A Dmhd_init.c255 uid_t uid
263 if ((pwp = getpwuid(uid)) == NULL)
/illumos-gate/usr/src/cmd/fs.d/autofs/
H A Dns_generic.c275 getmapkeys(mapname, list, error, cache_time, stack, stkptr, uid)
281 uid_t uid;
/illumos-gate/usr/src/stand/lib/fs/nfs/
H A Dauth_unix.c82 authunix_create(char *machname, uid_t uid, gid_t gid, int len, gid_t *aup_gids) argument
119 aup.aup_uid = uid;
/illumos-gate/usr/src/uts/common/nfs/
H A Dnfssys.h105 uid_t uid; member in struct:nfs_revauth_args
111 uid32_t uid; member in struct:nfs_revauth_args32
/illumos-gate/usr/src/uts/common/rpc/
H A Dauth.h66 uid_t uid; /* uid of caller for all sec flavors (NFSv4) */ member in struct:sec_data
75 uid_t uid; /* uid of caller for all sec flavors (NFSv4) */ member in struct:sec_data32
309 * AUTH *authsys_create(machname, uid, gid, len, aup_gids)
311 * const uid_t uid;
446 * authkerb_getucred(rqst, uid, gid, grouplen, groups)
448 * uid_t *uid;
476 #define AUTH_SYS 1 /* unix style (uid, gids) */
/illumos-gate/usr/src/uts/common/fs/smbsrv/
H A Dsmb_acl.c469 * Batch all the uid/gid in given ZFS ACL to get their corresponding SIDs.
734 uid_t uid; local
741 uid = owner_sid->ks_id;
761 new_zace->a_who = uid;
777 smb_ace_inherit(dir_zace, new_zace, is_dir, uid, gid);
799 uid, gid);
820 smb_ace_inherit(dir_zace, new_zace, is_dir, uid, gid);
1190 smb_ace_inherit(ace_t *dir_zace, ace_t *zace, int is_dir, uid_t uid, gid_t gid) argument
1211 zace->a_who = uid;
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/pppd/
H A Dmain.c99 static uid_t uid; /* Our real user-id */ variable
106 bool privileged; /* we're running as real uid root */
149 int (*check_options_hook) __P((uid_t uid)) = NULL;
336 uid = getuid();
337 privileged = (uid == 0);
338 (void) slprintf(numbuf, sizeof(numbuf), "%d", uid);
506 (*check_options_hook)(uid) == -1) {
534 pw = getpwuid(uid);
540 syslog(LOG_NOTICE, "pppd %s.%d%s started by %s, uid %d",
541 VERSION, PATCHLEVEL, IMPLEMENTATION, p, uid);
[all...]
/illumos-gate/usr/src/lib/libpkg/common/
H A Dverify.c391 int uid, gid; local
791 uid = status.st_uid;
797 } else if ((uid = pwd->pw_uid) != status.st_uid) {
800 uid = pwd->pw_uid;
823 chown(path, uid, gid) < 0) {
/illumos-gate/usr/src/cmd/krb5/kwarn/
H A Dkwarnd_proc.c678 set_warnd_uid(uid_t uid) argument
685 printf("set_warnd_uid called with uid = %d\n", uid);
686 krb5_cc_uid = uid;
695 * entered. This is the value of the uid under which the
702 printf("app_krb5_user_uid called and returning uid = %d\n",
709 getpruid(char *pr, uid_t *uid) argument
722 *uid = pw->pw_uid;
745 printf("renew start: uid=%d\n", app_krb5_user_uid());
815 printf("renew end: code=%s, uid
[all...]
/illumos-gate/usr/src/uts/common/ipp/ipgpc/
H A Dclassifier.c107 ipgpc_findfilters(IPGPC_TABLE_UID, packet->uid, fid_table);
580 * attempt to discern the uid and projid of the originator of a packet by
594 packet->uid = crgetuid(cr);
597 packet->uid = (uid_t)-1;
682 ", dport = %u, proto = %u, dsfield = %x, uid = %d," \
685 pkt->dsfield, pkt->uid, pkt->if_index,
694 ", dport = %u, proto = %u, dsfield = %x, uid = %d," \
697 pkt->dsfield, pkt->uid, pkt->if_index,
/illumos-gate/usr/src/uts/common/fs/zfs/
H A Ddsl_deleg.c122 * perms for their uid.
672 boolean_t dosets, uint64_t uid, dmu_tx_t *tx)
695 ZFS_DELEG_LOCAL, &uid);
720 uint64_t uid = crgetuid(cr); local
732 copy_create_perms(sdd, pzapobj, B_FALSE, uid, tx);
733 copy_create_perms(sdd, pzapobj, B_TRUE, uid, tx);
671 copy_create_perms(dsl_dir_t *dd, uint64_t pzapobj, boolean_t dosets, uint64_t uid, dmu_tx_t *tx) argument
/illumos-gate/usr/src/head/rpcsvc/
H A Dnfs_prot.x124 unsigned uid; /* owner user id */
142 unsigned uid; /* owner user id */
466 uid3 uid;
528 uid3 uid;
563 set_uid3 uid;
/illumos-gate/usr/src/lib/librestart/common/
H A Dlibrestart.c2043 if (mcp->pwbuf != NULL && mcp->pwd.pw_uid == mcp->uid)
2056 pwdp = getpwuid_r(mcp->uid, &mcp->pwd, mcp->pwbuf,
2089 * ERANGE the uid is too big
2090 * EINVAL the string starts with a digit, but is not a valid uid
2100 uid_t uid; local
2104 uid = strtol(str, &cp, 10);
2106 if (uid == 0 && errno != 0) {
2115 if (uid > UID_MAX)
2118 *uidp = uid;
2219 if (cip->uid
[all...]
/illumos-gate/usr/src/cmd/saf/
H A Dpmadm.c113 uid_t uid; /* invoker's real uid */ local
285 uid = getuid();
308 if (uid) {
317 if (uid) {
326 if (uid) {
335 if (uid) {
352 if (script && uid) {
/illumos-gate/usr/src/cmd/hal/tools/
H A Dhal-storage-mount.c107 invalid_mount_option (const char *option, const char *uid) argument
110 fprintf (stderr, "The option '%s' is not allowed for uid=%s\n", option, uid);
149 permission_denied_privilege (const char *privilege, const char *uid) argument
152 fprintf (stderr, "%s refused uid %s\n", privilege, uid);
501 printf ("invoked by uid = %s\n", invoked_by_uid);
748 if (strcmp (allow, "uid=") == 0) {
749 uid_t uid; local
751 /* check for uid
[all...]
/illumos-gate/usr/src/lib/passwdutil/
H A Dswitch_utils.c349 p = next; /* uid */
359 /* uid field should be nonempty */
364 * for the uid being negative, or being greater
366 * these conditions, the uid was translated to 60001.
645 getpwuid_from(uid_t uid, pwu_repository_t *rep, int reptype) argument
654 arg.key.uid = uid;
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/profile/
H A Dprof_file.c221 uid_t uid; local
225 uid = getuid();
226 if (!k5_getpwuid_r(uid, &pwx, pwbuf, sizeof(pwbuf), &pw)
253 /* Check that current uid has read access. */
/illumos-gate/usr/src/lib/libgss/
H A Dgssd_pname_to_uid.c430 * This routine accepts a unix uid, and retrieves the group id
431 * and supplamentery group ids for that uid.
436 gss_get_group_info(uid, gidOut, gids, gidsLen)
437 const uid_t uid;
457 if ((pw = getpwuid(uid)) == NULL)
/illumos-gate/usr/src/cmd/vscan/vscand/
H A Dvs_main.c182 * MUST be done BEFORE vscand_daemonize_init resets uid/gid.
313 * failure to access a uid/gid results in the default (0) being used.
438 * create specified file and set its uid, gid and mode
441 vscand_init_file(char *filepath, uid_t uid, gid_t gid, mode_t access_mode) argument
458 if ((stat_buf.st_uid != uid) ||
460 if (fchown(fd, uid, gid) != 0)

Completed in 127 milliseconds

<<11121314151617181920>>