Searched defs:user (Results 101 - 125 of 283) sorted by relevance

1234567891011>>

/illumos-gate/usr/src/lib/scsi/plugins/smp/sas2/common/
H A Dsas2_functions.c37 sas2_rq_len(size_t user, smp_target_t *tp) argument
39 if (user != 0) {
89 * most recently executed command. However, if the user has set it
215 sas2_report_self_config_status_rq_len(size_t user, smp_target_t *tp) argument
217 if (user != 0) {
227 sas2_report_zone_perm_table_rq_len(size_t user, smp_target_t *tp) argument
229 if (user != 0) {
239 sas2_report_zone_mgr_password_rq_len(size_t user, smp_target_t *tp) argument
241 if (user != 0) {
251 sas2_report_broadcast_rq_len(size_t user, smp_target_ argument
263 sas2_discover_rq_len(size_t user, smp_target_t *tp) argument
299 sas2_report_phy_error_log_rq_len(size_t user, smp_target_t *tp) argument
335 sas2_report_phy_sata_rq_len(size_t user, smp_target_t *tp) argument
371 sas2_report_route_info_rq_len(size_t user, smp_target_t *tp) argument
407 sas2_report_phy_event_rq_len(size_t user, smp_target_t *tp) argument
419 sas2_discover_list_rq_len(size_t user, smp_target_t *tp) argument
431 sas2_report_phy_event_list_rq_len(size_t user, smp_target_t *tp) argument
443 sas2_report_exp_route_table_list_rq_len(size_t user, smp_target_t *tp) argument
456 sas2_config_general_rq_len(size_t user, smp_target_t *tp) argument
468 sas2_enable_disable_zoning_rq_len(size_t user, smp_target_t *tp) argument
480 sas2_zoned_broadcast_rq_len(size_t user, smp_target_t *tp) argument
496 sas2_zone_lock_rq_len(size_t user, smp_target_t *tp) argument
508 sas2_zone_activate_rq_len(size_t user, smp_target_t *tp) argument
520 sas2_zone_unlock_rq_len(size_t user, smp_target_t *tp) argument
532 sas2_config_zone_manager_password_rq_len(size_t user, smp_target_t *tp) argument
545 sas2_config_zone_phy_info_rq_len(size_t user, smp_target_t *tp) argument
557 sas2_config_zone_perm_table_rq_len(size_t user, smp_target_t *tp) argument
580 sas2_config_route_info_rq_len(size_t user, smp_target_t *tp) argument
592 sas2_phy_control_rq_len(size_t user, smp_target_t *tp) argument
604 sas2_phy_test_function_rq_len(size_t user, smp_target_t *tp) argument
616 sas2_config_phy_event_rq_len(size_t user, smp_target_t *tp) argument
[all...]
/illumos-gate/usr/src/lib/gss_mechs/mech_dh/backend/mech/
H A Dname.c188 * user name as found in the unix password file. If name is root and
199 char *user, *node, *domain; local
215 user = strdup(uname);
216 if (user == 0) {
223 node = strchr(user, '/');
226 * user is now just the user portion and node
236 domain = strchr(user, '@');
243 * See if the node part is important. If the user is root get
247 if (strcmp(user, "roo
[all...]
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/os/
H A Dkuserok.c52 #define getpwnam(user) getpwnam((char *)user)
247 * determine whether user is authorized to login according to the
333 * the user himself, or by root. Otherwise, don't grant access.
374 const char *user,
380 if (pname == NULL || user == NULL)
400 if (krb5_kuserok(ctxt, (krb5_principal) pname, user)) {
372 krb5_gss_userok(OM_uint32 *minor, const gss_name_t pname, const char *user, int *user_ok) argument
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/mech/
H A Dkrb5_gss_glue.c351 const char *, /* local user */
352 int * /* user ok? */
1166 const char *user, /* local user */
1167 int *user_ok /* user ok? */
1170 return(krb5_gss_userok(minor, pname, user, user_ok));
1162 k5glue_userok( void *ctxt, OM_uint32 *minor, const gss_name_t pname, const char *user, int *user_ok ) argument
/illumos-gate/usr/src/lib/libsasl/lib/
H A Dcanonusr.c7 /* canonusr.c - user canonicalization support
83 const char *user, unsigned ulen,
99 if(!user || !oparams) return SASL_BADPARAM;
115 if(!ulen) ulen = (unsigned int)strlen(user);
122 user, ulen,
132 user = user_buf;
181 user, ulen,
189 user, ulen,
210 oparams->user = conn->user_buf;
222 oparams->user, oparam
82 _sasl_canon_user(sasl_conn_t *conn, const char *user, unsigned ulen, unsigned flags, sasl_out_params_t *oparams) argument
378 _canonuser_internal(const sasl_utils_t *utils, const char *user, unsigned ulen, unsigned flags __attribute__((unused)), char *out_user, unsigned out_umax, unsigned *out_ulen) argument
454 _cu_internal_server(void *glob_context __attribute__((unused)), sasl_server_params_t *sparams, const char *user, unsigned ulen, unsigned flags, char *out_user, unsigned out_umax, unsigned *out_ulen) argument
466 _cu_internal_client(void *glob_context __attribute__((unused)), sasl_client_params_t *cparams, const char *user, unsigned ulen, unsigned flags, char *out_user, unsigned out_umax, unsigned *out_ulen) argument
[all...]
/illumos-gate/usr/src/lib/libsecdb/common/
H A Dgetexecattr.c122 userstr_t user; local
135 utmp = _getuserattr(&user, buf, NSS_BUFLEN_USERATTR, &err);
148 while ((utmp = _getuserattr(&user,
270 * Check if specified username is valid user
/illumos-gate/usr/src/lib/libproject/common/
H A Dgetprojent.c129 * The following routine checks if user specified by the second argument
131 * argument. Information about user's default group and whether or not
132 * the project specified in the first argument is user's default project
133 * (i.e., user_attr, "default", "user.username", or "group.groupname"
135 * then this function returns 1 (true), unless specified user explicitly
136 * excluded with "!user", or "!group" wildcards.
139 ismember(struct project *proj, const char *user, gid_t gid, int is_default) argument
155 * Scan project's user list.
160 (strcmp(member + 1, user) == 0 ||
163 if (strcmp(member, "*") == 0 || strcmp(member, user)
197 _getdefaultproj(const char *user, struct project *result, void *buffer, size_t buflen) argument
260 _inproj(const char *user, const char *name, void *buffer, size_t buflen) argument
[all...]
/illumos-gate/usr/src/lib/libresolv2/common/irs/
H A Dlcl_ng.c181 ng_next(struct irs_ng *this, const char **host, const char **user, argument
188 *user = pvt->nextgrp->ng_str[NG_USER];
201 const char *host, const char *user, const char *domain)
209 (user == NULL || ng_user == NULL ||
210 !strcmp(user, ng_user)) &&
200 ng_test(struct irs_ng *this, const char *name, const char *host, const char *user, const char *domain) argument
/illumos-gate/usr/src/lib/libbc/libc/gen/common/
H A Dgetpwaent.c176 char *user; local
199 } else if (getnetgrent(&mach,&user,&dom)) {
200 if (user) {
201 pwadj = getnamefromyellow(user, savepwadj);
244 while (getnetgrent(&mach,&user,&dom)) {
245 if (user) {
246 addtominuslist(user);
/illumos-gate/usr/src/lib/libbc/libc/net/
H A Drcmd.c246 * Read .rhosts as the local user to avoid NFS mapping the root uid
280 char *user; local
299 user = p;
303 user = p;
320 if (user[0]) {
321 if (user[0] == '+' && user[1] == 0)
323 else if (user[0] == '+' && user[1] == '@')
324 usermatch = innetgr(user
[all...]
/illumos-gate/usr/src/lib/libcmd/common/
H A Did.c33 "[+NAME?id - return user identity]"
34 "[+DESCRIPTION?If no \auser\a operand is specified \bid\b writes user and "
35 "group IDs and the corresponding user and group names of the "
40 "the user and group IDs and any supplementary group IDs of the "
41 "selected user will be written to standard output.]"
48 "[u:user?Writes only the user ID.]"
53 "\n[user]\n"
211 uid_t user; local
252 user
[all...]
/illumos-gate/usr/src/cmd/utmp_update/
H A Dutmp_update.c35 * non-privileged user programs. Normal programs cannot
228 char *user, *id, *line, *pid, *type, *term, *time_usec, local
235 user = argv[1];
249 (void) strncpy(entryx->ut_user, user, sizeof (entryx->ut_user));
266 * record so that we know it was written by a normal user.
300 syslog(LOG_ERR, "Wrong number of arguments or invalid user \n");
315 char *user; local
319 user = malloc(sizeof (entryx->ut_user) +1);
320 (void) strncpy(user, entryx->ut_user, sizeof (entryx->ut_user));
321 user[sizeo
[all...]
/illumos-gate/usr/src/cmd/wall/
H A Dwall.c65 * Use the full lengths from utmpx for user and line.
468 char user[NMAX + 1]; local
470 (void) strlcpy(user, name, sizeof (user));
472 if (strcmp(user, pgrp->gr_mem[i]) == 0)
/illumos-gate/usr/src/cmd/who/
H A Dwho.c67 * who -T Displays writeability of each user
103 * Use the full lengths from utmpx for user and line.
119 static struct tm *lptr; /* holds user login time */
121 static char *mytty; /* holds device user is on */
140 static char user[sizeof (utmpp->ut_user) + 1]; /* holds user name */ variable
490 * Get and check user name
493 (void) strcpy(user, " .");
495 (void) strncpy(user, utmpp->ut_user, sizeof (user));
[all...]
/illumos-gate/usr/src/cmd/ypcmd/
H A Dmkalias.c30 * inverse map of <user@host> back to <preferred-alias>
63 int Simple = 0; /* Do not do the user name preference step */
160 char user[PBLKSIZ]; /* unqualified version */ local
168 CopyName(user, key.dptr, key.dsize);
172 if (IsMaint(user)) continue;
175 hostpart, user, address);
187 Compare(partvalue.dptr, user) == 0) {
194 userpart, user, address);
197 DoName(user);
198 key.dptr = user;
[all...]
/illumos-gate/usr/src/cmd/power/
H A Dparse.c82 set_perm(char *defstr, char *user, int *perm, int cons) argument
104 else if (user != NULL &&
106 /* Scan dinfo for a matching user. */
110 tk, user);
111 if (strcmp(tk, user) == 0) {
121 * Lookup cpr/pm user permissions in "/etc/default/power".
129 char *user; local
135 user = pent->pw_name;
137 user = NULL;
147 set_perm("PMCHANGEPERM=", user,
[all...]
/illumos-gate/usr/src/cmd/print/printmgr/com/sun/admin/pm/server/
H A DDoPrinterNS.c45 const char *user,
61 const char *user,
80 const char *user; local
91 user = (*env)->GetStringUTFChars(env, juser, 0);
96 ret = _dorexec(host, user, passwd, cmd, locale);
/illumos-gate/usr/src/cmd/rcm_daemon/common/
H A Drcm_impl.c395 client_t *user = NULL; local
429 user = rsrc_client_find(modname, pid, &node->users);
430 if ((user != NULL) &&
431 ((user->flag & (flag & RCM_REGISTER_MASK)) != 0)) {
434 (user->state == RCM_STATE_REMOVE)) {
435 user->state = RCM_STATE_ONLINE;
746 * In the case of a user who manually intervenes and retries
766 * if the user's intent was to only query the operation.
/illumos-gate/usr/src/cmd/rexd/
H A Dunix_login.c87 char UserName[256]; /* saves the user name for loging */
106 extern void setproctitle(char *user, char *host);
118 * Check for user being able to run on this machine.
120 * copies name of shell and home directory if user is valid.
139 audit_rexd_fail("user id is not valid",
156 audit_rexd_fail("user id is not valid",
193 audit_rexd_fail("user account expired",
347 char *user; local
357 pam_get_item(pamh, PAM_USER, (void **) &user) != PAM_SUCCESS ||
380 (void) strcpy(set_utmp.ut_user, user);
420 char user[sizeof (ut.ut_user) + 1]; local
[all...]
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/pppd/
H A Dupap.c168 upap_authwithpeer(unit, user, password)
170 char *user, *password;
175 u->us_user = user;
176 u->us_userlen = strlen(user);
423 * Parse user/passwd.
577 if ((*pap_passwd_hook)(user, passwd) >= 0) {
672 char *user, *pwd, *msg; local
700 user = (char *) (p + 1);
704 printer(arg, " user=");
705 print_string(user, ule
[all...]
/illumos-gate/usr/src/cmd/cron/
H A Datrm.c17 * synopsis: atrm [-f] [-i] [-a] [[job #] [user] ...]
43 #define SUPERUSER 0 /* is user super-user? */
47 uid_t user; /* person requesting removal */ variable
54 #define INVALIDUSER "you are not a valid user (no entry in /etc/passwd)"
74 int allflag = 0; /* remove all jobs belonging to user? */
82 * If job number, user name, or "-" is not specified, just print
92 pp = getuser((user = getuid()));
135 * If only certain jobs are to be removed and no job #'s or user
155 * If all jobs belonging to the user ar
247 removentry(char *filename, struct stat *statptr, uid_t user) argument
[all...]
/illumos-gate/usr/src/cmd/sendmail/src/
H A Denvelope.c769 ** gets sent back to the user on error (because it is
932 ** Under certain circumstances allow the user to say who
934 ** 1. The user's uid is zero (root).
935 ** 2. The user's login name is in an approved list (typically
937 ** 3. The address the user is trying to claim has a
990 ** Figure out the real user executing us.
1089 SM_MBDB_T user; local
1093 /* if the user already given fullname don't redefine */
1106 sm_mbdb_lookup(e->e_from.q_user, &user) == EX_OK)
1113 if (*user
[all...]
H A Derr.c134 char *user; local
209 user = pw->pw_name;
212 user = ubuf;
220 user, errtxt);
261 ** USRERR -- Signal user error.
263 ** This is much like syserr except it is for user errors.
346 ** USRERRENH -- Signal user error.
891 ** 252 Cannot VRFY user, but will accept message and attempt delivery
H A Dsavemail.c26 ** dead.letter in the user's home directory (if he exists on
69 SM_MBDB_T user; local
177 ** If the user is still logged in on the same terminal,
343 ** If we weren't mailing back, and the user is
355 else if (sm_mbdb_lookup(e->e_from.q_user, &user)
357 *user.mbdb_homedir != '\0')
358 p = user.mbdb_homedir;
1709 ** form: "<@[IPv6:::1]:user@host>" and the first ':' in inside
/illumos-gate/usr/src/cmd/bnu/
H A Din.uucpd.c209 char user[64], passwd[64]; local
215 if (readline(user, sizeof (user)) < 0) {
216 fprintf(stderr, "user read\n");
224 if ((pam_start("uucp", user, &conv, &pamh)) != PAM_SUCCESS)
256 if ((pw = getpwnam(user)) == NULL || strcmp(pw->pw_shell, UUCICO)) {
257 /* force a delay if user bad */
266 sprintf(Username, "USER=%s", user);
267 sprintf(Loginname, "LOGNAME=%s", user);
284 if (initgroups(user, p
[all...]

Completed in 957 milliseconds

1234567891011>>