Searched defs:user (Results 126 - 150 of 283) sorted by relevance

1234567891011>>

/illumos-gate/usr/src/cmd/bnu/
H A Dsecurity.c225 * Function: scRequser - log requestor user name
276 * Function: scDest - log destination node, user and file name
280 * destuser: user where the dest file is sent to
369 static char user[MODSTR]; local
374 (void) guinfo(stbuf.st_uid,user);
375 return(user);
408 * clientusr - Client user ID.
409 * serverusr - Server user ID.
/illumos-gate/usr/src/cmd/grpck/
H A Dgrpck.c82 char user[1]; member in struct:node
140 strcpy(t->user, pwp->pw_name);
298 if (strcmp(t->user, nptr) == 0)
317 /* Usrname found, so add entry to user-list */
322 strcpy(t->user, nptr);
377 NGROUPS, t->user, t->ngroups);
/illumos-gate/usr/src/cmd/id/
H A Did.c80 char *user = NULL; local
146 gettext("id: invalid user name: \"%s\"\n"),
150 user = argv[1];
171 if (user)
172 i = getusergroups(groupmax, groupids, user,
197 if (user)
198 i = getusergroups(groupmax, groupids, user,
233 if (user)
234 i = getusergroups(groupmax, groupids, user,
266 if (user) {
[all...]
/illumos-gate/usr/src/cmd/latencytop/common/
H A Ddwrapper.c359 drop_handler(const dtrace_dropdata_t *data, void *user) argument
532 * Worker function to move aggregate data to user space. Called periodically
/illumos-gate/usr/src/uts/common/fs/portfs/
H A Dport_fd.c164 * attached user pointer.
178 void *user)
257 pkevp->portkev_user = user;
292 pkevp->portkev_user = user;
177 port_associate_fd(port_t *pp, int source, uintptr_t object, int events, void *user) argument
/illumos-gate/usr/src/uts/common/os/
H A Dport_subr.c516 * port_init_event(port_event_t *pev, uintptr_t object, void *user,
523 * user : user defined pointer delivered with the association function
527 * The callback function is called in user context and can be
535 port_init_event(port_kevent_t *pkevp, uintptr_t object, void *user, argument
540 pkevp->portkev_user = user;
/illumos-gate/usr/src/lib/krb5/plugins/kdb/ldap/libkdb_ldap/
H A Dldap_principal.c262 char *user=NULL, *DN=NULL, *strval[10] = {NULL}; local
305 if (((st=krb5_unparse_name(context, searchfor, &user)) != 0)
306 || ((st=krb5_ldap_unparse_principal_name(user)) != 0))
310 strval[0] = user;
324 * If the Kerberos user principal to be deleted happens to be the last one associated
325 * with the directory user object, then it is time to delete the other kerberos
326 * specific attributes like krbmaxticketlife, i.e, unkerberize the directory user.
327 * From the attrsetmask value, identify the attributes set on the directory user
370 if (user)
371 free (user);
[all...]
/illumos-gate/usr/src/lib/libast/common/uwin/
H A Drcmd.c383 char *user; local
402 user = p;
406 user = p;
414 /* enable all user for + entry */
415 if ('+' == user[0] && '\0' == user[1] )
422 /* disable all user for - entry */
423 if ('-' == user[0] && '\0' == user[1] )
436 /* disable user fro
509 char *host, *user, *domain; local
541 char *host, *user, *domain; local
[all...]
/illumos-gate/usr/src/lib/libast/common/vmalloc/
H A Dvmmopen.c74 User_t* user; /* some user data */ member in struct:_mmvm_s
142 hdr->user = NIL(User_t*);
303 for(u = mmvm->user; u; u = u->next)
318 u->next = mmvm->user;
319 mmvm->user = u;
/illumos-gate/usr/src/uts/common/io/lvm/notify/
H A Dmd_notify.c92 u_longlong_t user)
121 entry->mdn_user = user;
91 md_put_event(md_tags_t tag, set_t sp, md_dev64_t dev, int event, u_longlong_t user) argument
/illumos-gate/usr/src/cmd/logadm/
H A Dkw.c83 static char *user; local
152 if ((user = getenv("USER")) != NULL)
153 Keywords = lut_add(Keywords, "user", STRDUP(user));
/illumos-gate/usr/src/cmd/lp/include/
H A Drequests.h75 char *alert; /* program to run to alert user when done */
83 char *user; /* user name of person submitting */ member in struct:REQUEST
114 #define RS_CHANGING 0x0020 /* request held pending user change */
118 #define RS_NOTIFY 0x0400 /* user is to be notified (alert) */
/illumos-gate/usr/src/cmd/lp/lib/papi/
H A Dlpsched-jobs.c67 "job-originating-user-name", "job-printer",
71 "requesting-user-name", "job-originating-host-name",
129 if (r->user == NULL) {
132 char *user = "intruder"; local
137 user = pw->pw_name; /* default to the process owner */
144 "job-originating-user-name", &user);
146 "requesting-user-name", &user);
148 snprintf(buf, sizeof (buf), "%s%s%s", user,
370 lpsched_user_to_job_attributes(papi_attribute_t ***list, char *user) argument
470 job_status_to_attributes(job_t *job, char *req_id, char *user, char *slabel, size_t size, time_t date, short state, char *destination, char *form, char *charset, short rank, char *file) argument
[all...]
/illumos-gate/usr/src/cmd/lp/model/
H A Dlp.tsol_separator.c75 static void ParseUsername(char *input, char *user, char *host);
207 char user[MAXUSERLEN + 1]; local
211 ParseUsername(ArgUser, user, host);
213 (void) printf("\t/Job_User (%s) def\n", user);
299 * Parse input "host!user" to separate host and user names.
303 ParseUsername(char *input, char *user, char *host) argument
308 /* user@host */
311 (void) strlcpy(user, input, MAXUSERLEN + 1);
314 /* host!user */
[all...]
/illumos-gate/usr/src/lib/smbsrv/libmlsvc/common/
H A Dnetr_auth.c138 char user[SMB_USERNAME_MAXLEN]; local
141 smb_ipc_get_user(user, SMB_USERNAME_MAXLEN);
143 status = ndr_rpc_bind(netr_handle, server, domain, user, "NETR");
H A Dsamlib.c110 char user[SMB_USERNAME_MAXLEN]; local
112 smb_ipc_get_user(user, SMB_USERNAME_MAXLEN);
114 rc = samr_open(server, domain_name, user, SAM_LOOKUP_INFORMATION,
172 char user[SMB_USERNAME_MAXLEN]; local
174 smb_ipc_get_user(user, SMB_USERNAME_MAXLEN);
178 rc = samr_open(server, domain_name, user, SAM_LOOKUP_INFORMATION,
220 char user[SMB_USERNAME_MAXLEN]; local
222 smb_ipc_get_user(user, SMB_USERNAME_MAXLEN);
224 rc = samr_open(server, domain_name, user, SAM_ENUM_LOCAL_DOMAIN,
/illumos-gate/usr/src/lib/smbsrv/libsmb/common/
H A Dsmb_kmod.c304 smb_netuserinfo_t *user; local
320 user = &item->nsi_un.nsi_user;
321 free(user->ui_domain);
322 free(user->ui_account);
323 free(user->ui_workstation);
356 smb_netuserinfo_t *user; local
385 user = &items->nsi_un.nsi_user;
386 rc = smb_netuserinfo_decode(user, data, len, &nbytes);
459 * Note: The user-space smbd-d provides it own version of this function
460 * which directly calls the "kernel" module code (in user spac
[all...]
/illumos-gate/usr/src/uts/common/fs/smbsrv/
H A Dsmb_authenticate.c55 * The user information is passed to smbd for authentication.
56 * If smbd can authenticate the user an access token is returned and we
57 * generate a cred and new user based on the token.
62 smb_user_t *user = NULL; local
65 user = smb_user_new(sr->session);
66 if (user == NULL)
69 /* user cleanup in smb_request_free */
70 sr->uid_user = user;
71 sr->smb_uid = user->u_uid;
78 if ((status = smb_authsock_open(user)) !
117 smb_user_t *user = sr->uid_user; local
227 smb_user_t *user = NULL; local
353 smb_user_t *user = sr->uid_user; local
386 smb_user_t *user = sr->uid_user; local
522 smb_authsock_sendrecv(smb_user_t *user, smb_lsa_msg_hdr_t *hdr, void *sndbuf, void **recvbuf) argument
597 smb_authsock_open(smb_user_t *user) argument
703 smb_authsock_close(smb_user_t *user) argument
[all...]
H A Dsmb_user.c104 * - The user is in the list of users for his session.
106 * - This user can not access anything yet.
111 * - The user is in the list of users for his session.
112 * - References will be given out if the user is looked up.
113 * - The user can access files and pipes.
118 * - The user is in the list of users for his session.
119 * - References will not be given out if the user is looked up.
120 * - The trees the user connected are being disconnected.
121 * - The resources associated with the user remain.
126 * - The user i
220 smb_user_t *user; local
259 smb_user_logon( smb_user_t *user, cred_t *cr, char *domain_name, char *account_name, uint32_t flags, uint32_t privileges, uint32_t audit_sid) argument
305 smb_user_logoff( smb_user_t *user) argument
350 smb_user_hold(smb_user_t *user) argument
370 smb_user_hold_internal(smb_user_t *user) argument
386 smb_user_release( smb_user_t *user) argument
418 smb_user_is_admin(smb_user_t *user) argument
472 smb_user_namecmp(smb_user_t *user, const char *name) argument
504 smb_user_enum(smb_user_t *user, smb_svcenum_t *svcenum) argument
529 smb_user_t *user = (smb_user_t *)arg; local
557 smb_user_getcred(smb_user_t *user) argument
563 smb_user_getprivcred(smb_user_t *user) argument
576 smb_user_setcred(smb_user_t *user, cred_t *cr, uint32_t privileges) argument
611 smb_user_enum_private(smb_user_t *user, smb_svcenum_t *svcenum) argument
644 smb_user_netinfo_encode(smb_user_t *user, uint8_t *buf, size_t buflen, uint32_t *nbytes) argument
658 smb_user_netinfo_init(smb_user_t *user, smb_netuserinfo_t *info) argument
710 smb_user_auth_logoff(smb_user_t *user) argument
[all...]
/illumos-gate/usr/src/cmd/ptools/ptime/
H A Dptime.c197 timestruc_t real, user, sys; local
220 user = pup->pr_utime;
231 prtime("user", &user);
/illumos-gate/usr/src/cmd/isns/isnsd/
H A Ddoor.c915 uid_t user; local
935 user = ucred_getruid(uc);
936 ret = getpwuid_r(user, &pwds, buf_pwd, sizeof (buf_pwd), &pwd);
/illumos-gate/usr/src/lib/pam_modules/krb5/
H A Dkrb5_authenticate.c85 * pam_sm_authenticate - Authenticate user
94 char *user = NULL; local
182 (void) pam_get_item(pamh, PAM_USER, (void**) &user);
184 if (user == NULL || *user == '\0') {
187 * If doing PKINIT it is okay to prompt for the user
190 if ((err = pam_get_user(pamh, &user, NULL)) !=
194 "PAM-KRB5 (auth): get user failed: "
202 "PAM-KRB5 (auth): user empty or null");
207 /* make sure a password entry exists for this user */
500 attempt_krb5_auth( pam_handle_t *pamh, krb5_module_data_t *kmd, char *user, char **krb5_pass, boolean_t verify_tik) argument
[all...]
/illumos-gate/usr/src/lib/passwdutil/
H A Dfiles_attr.c41 #include <limits.h> /* LOGNAME_MAX -- max Solaris user name */
47 int files_checkhistory(char *user, char *passwd, pwu_repository_t *rep);
131 * Are we a privileged user with regard to the files repository?
322 * Determine which user needs to be authenticated. For files, the
325 * PWU_SUCCESS and (auth_user == NULL || auth_user = user)
331 files_user_to_authenticate(char *user, pwu_repository_t *rep, argument
338 /* check to see if target user is present in files */
339 res = files_getpwnam(user, &attr_tmp[0], rep, (void **)&pwbuf);
350 if ((*auth_user = strdup(user)) == NULL) {
371 * user
405 files_checkhistory(char *user, char *passwd, pwu_repository_t *rep) argument
1184 char *user; local
[all...]
/illumos-gate/usr/src/lib/libsecdb/common/
H A Dchkauthattr.c147 * associated with the user.
399 is_cons_user(const char *user) argument
405 if (user == NULL) {
411 if (getpwnam_r(user, &pw, pwbuf, sizeof (pwbuf)) == NULL) {
434 get_default_attrs(const char *user) argument
451 for (i = is_cons_user(user) ? 0 : 1; i < NDFLTPLY; i++) {
/illumos-gate/usr/src/lib/libsmbfs/smb/
H A Dntlm.c371 * Compute an NTLMv2 hash given the NTLMv1 hash, the user name,
378 * user: User name, UPPER-case UTF-8 string.
383 const char *user, const char *destination)
392 * v2hash = HMACT64(v1hash, 16, concat(upcase(user), dest))
394 * Note: user name is converted to upper-case by the caller.
397 /* utf8data = concat(user, dest) */
398 ulen = strlen(user);
403 bcopy(user, utf8data, ulen);
484 char *ucuser = NULL; /* upper-case user name */
489 * Convert the user nam
382 ntlm_v2_hash(uchar_t *v2hash, const uchar_t *v1hash, const char *user, const char *destination) argument
[all...]

Completed in 999 milliseconds

1234567891011>>