/illumos-gate/usr/src/lib/scsi/plugins/smp/sas2/common/ |
H A D | sas2_functions.c | 37 sas2_rq_len(size_t user, smp_target_t *tp) argument 39 if (user != 0) { 89 * most recently executed command. However, if the user has set it 215 sas2_report_self_config_status_rq_len(size_t user, smp_target_t *tp) argument 217 if (user != 0) { 227 sas2_report_zone_perm_table_rq_len(size_t user, smp_target_t *tp) argument 229 if (user != 0) { 239 sas2_report_zone_mgr_password_rq_len(size_t user, smp_target_t *tp) argument 241 if (user != 0) { 251 sas2_report_broadcast_rq_len(size_t user, smp_target_ argument 263 sas2_discover_rq_len(size_t user, smp_target_t *tp) argument 299 sas2_report_phy_error_log_rq_len(size_t user, smp_target_t *tp) argument 335 sas2_report_phy_sata_rq_len(size_t user, smp_target_t *tp) argument 371 sas2_report_route_info_rq_len(size_t user, smp_target_t *tp) argument 407 sas2_report_phy_event_rq_len(size_t user, smp_target_t *tp) argument 419 sas2_discover_list_rq_len(size_t user, smp_target_t *tp) argument 431 sas2_report_phy_event_list_rq_len(size_t user, smp_target_t *tp) argument 443 sas2_report_exp_route_table_list_rq_len(size_t user, smp_target_t *tp) argument 456 sas2_config_general_rq_len(size_t user, smp_target_t *tp) argument 468 sas2_enable_disable_zoning_rq_len(size_t user, smp_target_t *tp) argument 480 sas2_zoned_broadcast_rq_len(size_t user, smp_target_t *tp) argument 496 sas2_zone_lock_rq_len(size_t user, smp_target_t *tp) argument 508 sas2_zone_activate_rq_len(size_t user, smp_target_t *tp) argument 520 sas2_zone_unlock_rq_len(size_t user, smp_target_t *tp) argument 532 sas2_config_zone_manager_password_rq_len(size_t user, smp_target_t *tp) argument 545 sas2_config_zone_phy_info_rq_len(size_t user, smp_target_t *tp) argument 557 sas2_config_zone_perm_table_rq_len(size_t user, smp_target_t *tp) argument 580 sas2_config_route_info_rq_len(size_t user, smp_target_t *tp) argument 592 sas2_phy_control_rq_len(size_t user, smp_target_t *tp) argument 604 sas2_phy_test_function_rq_len(size_t user, smp_target_t *tp) argument 616 sas2_config_phy_event_rq_len(size_t user, smp_target_t *tp) argument [all...] |
/illumos-gate/usr/src/lib/gss_mechs/mech_dh/backend/mech/ |
H A D | name.c | 188 * user name as found in the unix password file. If name is root and 199 char *user, *node, *domain; local 215 user = strdup(uname); 216 if (user == 0) { 223 node = strchr(user, '/'); 226 * user is now just the user portion and node 236 domain = strchr(user, '@'); 243 * See if the node part is important. If the user is root get 247 if (strcmp(user, "roo [all...] |
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/os/ |
H A D | kuserok.c | 52 #define getpwnam(user) getpwnam((char *)user) 247 * determine whether user is authorized to login according to the 333 * the user himself, or by root. Otherwise, don't grant access. 374 const char *user, 380 if (pname == NULL || user == NULL) 400 if (krb5_kuserok(ctxt, (krb5_principal) pname, user)) { 372 krb5_gss_userok(OM_uint32 *minor, const gss_name_t pname, const char *user, int *user_ok) argument
|
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/mech/ |
H A D | krb5_gss_glue.c | 351 const char *, /* local user */ 352 int * /* user ok? */ 1166 const char *user, /* local user */ 1167 int *user_ok /* user ok? */ 1170 return(krb5_gss_userok(minor, pname, user, user_ok)); 1162 k5glue_userok( void *ctxt, OM_uint32 *minor, const gss_name_t pname, const char *user, int *user_ok ) argument
|
/illumos-gate/usr/src/lib/libsasl/lib/ |
H A D | canonusr.c | 7 /* canonusr.c - user canonicalization support 83 const char *user, unsigned ulen, 99 if(!user || !oparams) return SASL_BADPARAM; 115 if(!ulen) ulen = (unsigned int)strlen(user); 122 user, ulen, 132 user = user_buf; 181 user, ulen, 189 user, ulen, 210 oparams->user = conn->user_buf; 222 oparams->user, oparam 82 _sasl_canon_user(sasl_conn_t *conn, const char *user, unsigned ulen, unsigned flags, sasl_out_params_t *oparams) argument 378 _canonuser_internal(const sasl_utils_t *utils, const char *user, unsigned ulen, unsigned flags __attribute__((unused)), char *out_user, unsigned out_umax, unsigned *out_ulen) argument 454 _cu_internal_server(void *glob_context __attribute__((unused)), sasl_server_params_t *sparams, const char *user, unsigned ulen, unsigned flags, char *out_user, unsigned out_umax, unsigned *out_ulen) argument 466 _cu_internal_client(void *glob_context __attribute__((unused)), sasl_client_params_t *cparams, const char *user, unsigned ulen, unsigned flags, char *out_user, unsigned out_umax, unsigned *out_ulen) argument [all...] |
/illumos-gate/usr/src/lib/libsecdb/common/ |
H A D | getexecattr.c | 122 userstr_t user; local 135 utmp = _getuserattr(&user, buf, NSS_BUFLEN_USERATTR, &err); 148 while ((utmp = _getuserattr(&user, 270 * Check if specified username is valid user
|
/illumos-gate/usr/src/lib/libproject/common/ |
H A D | getprojent.c | 129 * The following routine checks if user specified by the second argument 131 * argument. Information about user's default group and whether or not 132 * the project specified in the first argument is user's default project 133 * (i.e., user_attr, "default", "user.username", or "group.groupname" 135 * then this function returns 1 (true), unless specified user explicitly 136 * excluded with "!user", or "!group" wildcards. 139 ismember(struct project *proj, const char *user, gid_t gid, int is_default) argument 155 * Scan project's user list. 160 (strcmp(member + 1, user) == 0 || 163 if (strcmp(member, "*") == 0 || strcmp(member, user) 197 _getdefaultproj(const char *user, struct project *result, void *buffer, size_t buflen) argument 260 _inproj(const char *user, const char *name, void *buffer, size_t buflen) argument [all...] |
/illumos-gate/usr/src/lib/libresolv2/common/irs/ |
H A D | lcl_ng.c | 181 ng_next(struct irs_ng *this, const char **host, const char **user, argument 188 *user = pvt->nextgrp->ng_str[NG_USER]; 201 const char *host, const char *user, const char *domain) 209 (user == NULL || ng_user == NULL || 210 !strcmp(user, ng_user)) && 200 ng_test(struct irs_ng *this, const char *name, const char *host, const char *user, const char *domain) argument
|
/illumos-gate/usr/src/lib/libbc/libc/gen/common/ |
H A D | getpwaent.c | 176 char *user; local 199 } else if (getnetgrent(&mach,&user,&dom)) { 200 if (user) { 201 pwadj = getnamefromyellow(user, savepwadj); 244 while (getnetgrent(&mach,&user,&dom)) { 245 if (user) { 246 addtominuslist(user);
|
/illumos-gate/usr/src/lib/libbc/libc/net/ |
H A D | rcmd.c | 246 * Read .rhosts as the local user to avoid NFS mapping the root uid 280 char *user; local 299 user = p; 303 user = p; 320 if (user[0]) { 321 if (user[0] == '+' && user[1] == 0) 323 else if (user[0] == '+' && user[1] == '@') 324 usermatch = innetgr(user [all...] |
/illumos-gate/usr/src/lib/libcmd/common/ |
H A D | id.c | 33 "[+NAME?id - return user identity]" 34 "[+DESCRIPTION?If no \auser\a operand is specified \bid\b writes user and " 35 "group IDs and the corresponding user and group names of the " 40 "the user and group IDs and any supplementary group IDs of the " 41 "selected user will be written to standard output.]" 48 "[u:user?Writes only the user ID.]" 53 "\n[user]\n" 211 uid_t user; local 252 user [all...] |
/illumos-gate/usr/src/cmd/utmp_update/ |
H A D | utmp_update.c | 35 * non-privileged user programs. Normal programs cannot 228 char *user, *id, *line, *pid, *type, *term, *time_usec, local 235 user = argv[1]; 249 (void) strncpy(entryx->ut_user, user, sizeof (entryx->ut_user)); 266 * record so that we know it was written by a normal user. 300 syslog(LOG_ERR, "Wrong number of arguments or invalid user \n"); 315 char *user; local 319 user = malloc(sizeof (entryx->ut_user) +1); 320 (void) strncpy(user, entryx->ut_user, sizeof (entryx->ut_user)); 321 user[sizeo [all...] |
/illumos-gate/usr/src/cmd/wall/ |
H A D | wall.c | 65 * Use the full lengths from utmpx for user and line. 468 char user[NMAX + 1]; local 470 (void) strlcpy(user, name, sizeof (user)); 472 if (strcmp(user, pgrp->gr_mem[i]) == 0)
|
/illumos-gate/usr/src/cmd/who/ |
H A D | who.c | 67 * who -T Displays writeability of each user 103 * Use the full lengths from utmpx for user and line. 119 static struct tm *lptr; /* holds user login time */ 121 static char *mytty; /* holds device user is on */ 140 static char user[sizeof (utmpp->ut_user) + 1]; /* holds user name */ variable 490 * Get and check user name 493 (void) strcpy(user, " ."); 495 (void) strncpy(user, utmpp->ut_user, sizeof (user)); [all...] |
/illumos-gate/usr/src/cmd/ypcmd/ |
H A D | mkalias.c | 30 * inverse map of <user@host> back to <preferred-alias> 63 int Simple = 0; /* Do not do the user name preference step */ 160 char user[PBLKSIZ]; /* unqualified version */ local 168 CopyName(user, key.dptr, key.dsize); 172 if (IsMaint(user)) continue; 175 hostpart, user, address); 187 Compare(partvalue.dptr, user) == 0) { 194 userpart, user, address); 197 DoName(user); 198 key.dptr = user; [all...] |
/illumos-gate/usr/src/cmd/power/ |
H A D | parse.c | 82 set_perm(char *defstr, char *user, int *perm, int cons) argument 104 else if (user != NULL && 106 /* Scan dinfo for a matching user. */ 110 tk, user); 111 if (strcmp(tk, user) == 0) { 121 * Lookup cpr/pm user permissions in "/etc/default/power". 129 char *user; local 135 user = pent->pw_name; 137 user = NULL; 147 set_perm("PMCHANGEPERM=", user, [all...] |
/illumos-gate/usr/src/cmd/print/printmgr/com/sun/admin/pm/server/ |
H A D | DoPrinterNS.c | 45 const char *user, 61 const char *user, 80 const char *user; local 91 user = (*env)->GetStringUTFChars(env, juser, 0); 96 ret = _dorexec(host, user, passwd, cmd, locale);
|
/illumos-gate/usr/src/cmd/rcm_daemon/common/ |
H A D | rcm_impl.c | 395 client_t *user = NULL; local 429 user = rsrc_client_find(modname, pid, &node->users); 430 if ((user != NULL) && 431 ((user->flag & (flag & RCM_REGISTER_MASK)) != 0)) { 434 (user->state == RCM_STATE_REMOVE)) { 435 user->state = RCM_STATE_ONLINE; 746 * In the case of a user who manually intervenes and retries 766 * if the user's intent was to only query the operation.
|
/illumos-gate/usr/src/cmd/rexd/ |
H A D | unix_login.c | 87 char UserName[256]; /* saves the user name for loging */ 106 extern void setproctitle(char *user, char *host); 118 * Check for user being able to run on this machine. 120 * copies name of shell and home directory if user is valid. 139 audit_rexd_fail("user id is not valid", 156 audit_rexd_fail("user id is not valid", 193 audit_rexd_fail("user account expired", 347 char *user; local 357 pam_get_item(pamh, PAM_USER, (void **) &user) != PAM_SUCCESS || 380 (void) strcpy(set_utmp.ut_user, user); 420 char user[sizeof (ut.ut_user) + 1]; local [all...] |
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/pppd/ |
H A D | upap.c | 168 upap_authwithpeer(unit, user, password) 170 char *user, *password; 175 u->us_user = user; 176 u->us_userlen = strlen(user); 423 * Parse user/passwd. 577 if ((*pap_passwd_hook)(user, passwd) >= 0) { 672 char *user, *pwd, *msg; local 700 user = (char *) (p + 1); 704 printer(arg, " user="); 705 print_string(user, ule [all...] |
/illumos-gate/usr/src/cmd/cron/ |
H A D | atrm.c | 17 * synopsis: atrm [-f] [-i] [-a] [[job #] [user] ...] 43 #define SUPERUSER 0 /* is user super-user? */ 47 uid_t user; /* person requesting removal */ variable 54 #define INVALIDUSER "you are not a valid user (no entry in /etc/passwd)" 74 int allflag = 0; /* remove all jobs belonging to user? */ 82 * If job number, user name, or "-" is not specified, just print 92 pp = getuser((user = getuid())); 135 * If only certain jobs are to be removed and no job #'s or user 155 * If all jobs belonging to the user ar 247 removentry(char *filename, struct stat *statptr, uid_t user) argument [all...] |
/illumos-gate/usr/src/cmd/sendmail/src/ |
H A D | envelope.c | 769 ** gets sent back to the user on error (because it is 932 ** Under certain circumstances allow the user to say who 934 ** 1. The user's uid is zero (root). 935 ** 2. The user's login name is in an approved list (typically 937 ** 3. The address the user is trying to claim has a 990 ** Figure out the real user executing us. 1089 SM_MBDB_T user; local 1093 /* if the user already given fullname don't redefine */ 1106 sm_mbdb_lookup(e->e_from.q_user, &user) == EX_OK) 1113 if (*user [all...] |
H A D | err.c | 134 char *user; local 209 user = pw->pw_name; 212 user = ubuf; 220 user, errtxt); 261 ** USRERR -- Signal user error. 263 ** This is much like syserr except it is for user errors. 346 ** USRERRENH -- Signal user error. 891 ** 252 Cannot VRFY user, but will accept message and attempt delivery
|
H A D | savemail.c | 26 ** dead.letter in the user's home directory (if he exists on 69 SM_MBDB_T user; local 177 ** If the user is still logged in on the same terminal, 343 ** If we weren't mailing back, and the user is 355 else if (sm_mbdb_lookup(e->e_from.q_user, &user) 357 *user.mbdb_homedir != '\0') 358 p = user.mbdb_homedir; 1709 ** form: "<@[IPv6:::1]:user@host>" and the first ':' in inside
|
/illumos-gate/usr/src/cmd/bnu/ |
H A D | in.uucpd.c | 209 char user[64], passwd[64]; local 215 if (readline(user, sizeof (user)) < 0) { 216 fprintf(stderr, "user read\n"); 224 if ((pam_start("uucp", user, &conv, &pamh)) != PAM_SUCCESS) 256 if ((pw = getpwnam(user)) == NULL || strcmp(pw->pw_shell, UUCICO)) { 257 /* force a delay if user bad */ 266 sprintf(Username, "USER=%s", user); 267 sprintf(Loginname, "LOGNAME=%s", user); 284 if (initgroups(user, p [all...] |