/illumos-gate/usr/src/lib/libc/port/gen/ |
H A D | nss_dbdefs.c | 373 * key.uid u 430 *(nssuint_t *)buffer = (nssuint_t)arg->key.uid; 852 * key.uid u 904 arg->key.uid = (uid_t)(*uptr);
|
/illumos-gate/usr/src/cmd/ndmpd/ndmp/ |
H A D | ndmpd_fhistory.c | 177 entry->fstat.uid = file_stat->st_uid; 353 entry->fstat.uid = file_stat->st_uid;
|
H A D | ndmp.x | 1743 u_long uid; 1833 u_long owner; /* uid for UNIX, owner for NT */
|
/illumos-gate/usr/src/cmd/mv/ |
H A D | mv.c | 1395 chg_mode(char *target, uid_t uid, gid_t gid, mode_t mode) argument 1404 if (chown(target, uid, gid) != 0) {
|
/illumos-gate/usr/src/uts/common/fs/zfs/ |
H A D | zfs_vnops.c | 945 * user 0 is not an ephemeral uid. 1387 uid_t uid; local 1401 uid = ksid_getid(ksid); 1403 uid = crgetuid(cr); 1407 IS_EPHEMERAL(uid) || IS_EPHEMERAL(gid))) 1879 uid_t uid; local 1894 uid = ksid_getid(ksid); 1896 uid = crgetuid(cr); 1899 IS_EPHEMERAL(uid) || IS_EPHEMERAL(gid))) 2743 * Make sure that if we have ephemeral uid/gi [all...] |
/illumos-gate/usr/src/uts/common/fs/nfs/ |
H A D | nfs4_vfsops.c | 336 tsecdata->uid = fsecdata->uid; 2451 * If the uid is set then set the creds for secure mounts 2455 if (svp->sv_secdata->uid != 0 && 2458 (void) crsetugid(lcr, svp->sv_secdata->uid, crgetgid(cr)); 3295 * If the uid is set then set the creds for secure mounts 3299 if (svp->sv_secdata->uid != 0) { 3301 (void) crsetugid(lcr, svp->sv_secdata->uid,
|
H A D | nfs3_srv.c | 4134 if (sap->uid.set_it) { 4135 vap->va_uid = (uid_t)sap->uid.uid; 4205 fap->uid = (uid3)NFS_UID_NOBODY; 4207 fap->uid = (uid3)vap->va_uid;
|
H A D | nfs3_vfsops.c | 1153 * If the uid is set then set the creds for secure mounts 1156 if (svp->sv_secdata->uid != 0 && 1159 (void) crsetugid(lcr, svp->sv_secdata->uid, crgetgid(cr));
|
H A D | nfs_vfsops.c | 1258 * If the uid is set then set the creds for secure mounts 1261 if (svp->sv_secdata->uid != 0 && 1264 (void) crsetugid(lcr, svp->sv_secdata->uid, crgetgid(cr));
|
H A D | nfs_subr.c | 2041 sa->uid.set_it = FALSE; 2043 sa->uid.set_it = TRUE; 2044 sa->uid.uid = (uid3)vap->va_uid;
|
/illumos-gate/usr/src/cmd/zdb/ |
H A D | zdb.c | 1592 * print uid or gid information. 1613 dump_uidgid(objset_t *os, uint64_t uid, uint64_t gid) argument 1617 uid_idx = FUID_INDEX(uid); 1633 print_idstr(uid, "uid"); 1644 uint64_t uid, gid, mode, fsize, parent, links; local 1676 SA_ADD_BULK_ATTR(bulk, idx, sa_attr_table[ZPL_UID], NULL, &uid, 8); 1720 dump_uidgid(os, uid, gid);
|
/illumos-gate/usr/src/lib/libc/port/ |
H A D | llib-lc | 525 int getpw(uid_t uid, char *buf); 529 struct passwd *getpwuid(uid_t uid); 1775 extern int __init_daemon_priv(int, uid_t uid, gid_t gid, ...);
|
/illumos-gate/usr/src/cmd/sendmail/src/ |
H A D | queue.c | 476 syserr("!queueup: cannot create queue temp file %s, uid=%d", 521 syserr("!queueup: cannot commit data file %s, uid=%d", 563 syserr("!queueup: cannot create data temp file %s, uid=%d", 598 syserr("!queueup: cannot save data temp file %s, uid=%d", 892 syserr("cannot rename(%s, %s), uid=%d", 979 ** The last control address and uid are saved. 989 uid_t uid; local 1004 /* find the active uid */ 1009 uid = 0; 1015 uid [all...] |
/illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softKeystore.c | 73 uid_t uid; local 82 uid = geteuid(); 83 if (getpwuid_r(uid, &pwd, pwdbuf, PWD_BUFFER_SIZE, &pw) != 0) {
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/pppd/ |
H A D | sys-solaris.c | 3052 * Get a pty master/slave pair and chown the slave side to the uid given. 3056 get_pty(master_fdp, slave_fdp, slave_name, uid) 3060 int uid; 3083 if (chown(pty_name, uid, -1) < 0) {
|
/illumos-gate/usr/src/cmd/idmap/idmap/ |
H A D | idmap.c | 49 * unixname, uid, gid, sid or not given at all: 58 #define TYPE_UID 0x001 /* uid */ 83 #define ID_UID "uid" 174 * sid:S-1-2-3-4 -> uid:5678 849 /* Assemble string form uid or gid */ 856 /* ID_UID ":" + uid + '\0' */ 2977 uid_t uid = UNDEFINED_UID; local 2997 &uid, 3063 nm->pid = uid; 3077 * idmapd returns fallback uid/gi [all...] |
/illumos-gate/usr/src/uts/common/fs/autofs/ |
H A D | auto_subr.c | 658 reqst.uid = crgetuid(cred); 756 reqst.uid = crgetuid(cred);
|
/illumos-gate/usr/src/uts/common/os/ |
H A D | policy.c | 97 * checks for uid 0. The rationale behind these is that many root 905 * uid of owner of vnode 1098 * Are we allowed to retain the set-uid/set-gid bits when 1100 * "issuid" should be true when set-uid; only in that case 1380 * ovap. In certain situations set-uid/set-gid bits need to be removed; 1417 * to add the set-uid bit, if we're not the owner. 1418 * In the specific case of creating a set-uid root 1437 * chown to other uid FILE_CHOWN_SELF 1645 * privilege is not sufficient to get uid 0. 1650 * get the powers of root wrt uid 2556 secpolicy_smbfs_login(const cred_t *cr, uid_t uid) argument [all...] |
/illumos-gate/usr/src/uts/common/dtrace/ |
H A D | dtrace.c | 7716 * For DTRACE_PRIV_ALL, the uid and zoneid don't matter. 7779 dtrace_match_priv(const dtrace_probe_t *prp, uint32_t priv, uid_t uid, argument 7803 uid != prp->dtpr_provider->dtpv_priv.dtpp_uid) { 7827 uint32_t priv, uid_t uid, zoneid_t zoneid) 7847 if (dtrace_match_priv(prp, priv, uid, zoneid) == 0) 7993 dtrace_match(const dtrace_probekey_t *pkp, uint32_t priv, uid_t uid, argument 8009 dtrace_match_probe(probe, pkp, priv, uid, zoneid) > 0) { 8052 dtrace_match_probe(probe, pkp, priv, uid, 8077 if (dtrace_match_probe(probe, pkp, priv, uid, zoneid) <= 0) 8826 uid_t uid; local 7826 dtrace_match_probe(const dtrace_probe_t *prp, const dtrace_probekey_t *pkp, uint32_t priv, uid_t uid, zoneid_t zoneid) argument 16072 uid_t uid; local 16574 uid_t uid; local [all...] |
/illumos-gate/usr/src/cmd/ypcmd/yp2lscripts/ |
H A D | ypmap2src.sh | 225 uid=0\(root\)*) return 0 248 # Sort the entries in ascending order of uid 252 # this map, and the passwd map contains "##<uid>" as the passwd.
|
/illumos-gate/usr/src/cmd/rexd/ |
H A D | rpc.rexd.c | 103 extern int ValidUser(char *host, uid_t uid, gid_t gid, 1181 fprintf(stderr, "rexd: invalid uid/gid.\n"); 1204 fprintf(stderr, "rexd: invalid uid/gid.\n"); 1217 fprintf(stderr, "rexd: invalid uid.\n"); 1227 fprintf(stderr, "uid %d gid %d (%d)\n",
|
/illumos-gate/usr/src/cmd/ldap/ns_ldap/ |
H A D | ldapaddent.c | 2197 int buflen, uid, retval = 1, errnum = 0; local 2253 uid = atoi(tmpbuf); 2257 if ((pwd = getpwuid(uid)) == 0) { 2259 gettext("can't map uid %d to username, skipping\n"), 2260 uid); 2977 (void) strlcpy(parse_err_msg, gettext("no uid"), 2989 * uid (col 2) 3065 gettext("invalid uid : %s"), 3124 value = __ns_ldap_getAttr(res->entry, "uid"); 3202 (void) strlcpy(parse_err_msg, gettext("no uid"), [all...] |
/illumos-gate/usr/src/uts/common/inet/ipf/ |
H A D | ip_state.c | 411 /* uid(I) - uid of caller */ 412 /* ctx(I) - pointer to give the uid context */ 417 int fr_state_ioctl(data, cmd, mode, uid, ctx, ifs) 420 int mode, uid; 573 token = ipf_findtoken(IPFGENITER_STATE, uid, ctx, ifs); 587 error = ipf_deltoken(arg, uid, ctx, ifs);
|
/illumos-gate/usr/src/cmd/fs.d/autofs/ |
H A D | autod_nfs.c | 232 uid_t uid, 280 overlay, uid, alp); 639 uid_t uid, 2059 nfs_sec.sc_uid = uid; 227 mount_nfs( struct mapent *me, char *mntpnt, char *prevhost, int overlay, uid_t uid, action_list **alpp) argument 635 nfsmount( struct mapfs *mfs_in, char *mntpnt, char *opts, int overlay, uid_t uid, action_list *alp) argument
|
/illumos-gate/usr/src/uts/common/io/drm/ |
H A D | drmP.h | 496 uid_t uid; member in struct:drm_file
|