/illumos-gate/usr/src/lib/libast/sparc/include/ast/ |
H A D | ast.h | 155 char* user; member in struct:__anon2705
|
/illumos-gate/usr/src/lib/libast/sparcv9/include/ast/ |
H A D | ast.h | 155 char* user; member in struct:__anon2727
|
/illumos-gate/usr/src/cmd/lp/cmd/lpsched/ |
H A D | exec.c | 149 * If the string contains data from an untrusted origin (user supplied), 715 * Add the system name to the user name (ala system!user) 719 cp = strchr(request->secure->user, '@'); 870 av[ac++] = arg_string(UNTRUSTED, "%s", request->request->user); 896 * the user's -o options, to allow the user to override. 908 * Do all of the user's options except the cpi/lpi/etc. 932 * used for this request. It chose form over user, 933 * and user ove 1110 char *user = strdup(request->request->user); local [all...] |
/illumos-gate/usr/src/uts/common/fs/smbsrv/ |
H A D | smb_session.c | 893 * Find a user on the specified session by SMB UID. 906 smb_user_t *user; local 914 user = smb_llist_head(user_list); 915 while (user) { 916 SMB_USER_VALID(user); 917 ASSERT(user->u_session == session); 919 if (user->u_uid == uid && user->u_state == st) { 920 smb_user_hold_internal(user); 924 user 932 smb_session_post_user(smb_session_t *session, smb_user_t *user) argument 1237 smb_user_t *user; local [all...] |
H A D | smb_tree.c | 93 * - The tree is queued in the list of trees of its user. 100 * - The tree is queued in the list of trees of its user. 108 * - The tree is queued in the list of trees of its user. 116 * added to the list of trees of a user. 133 * - The list of trees of the user it belongs to. 138 * and there's a lock embedded in the list of trees of a user. To 140 * To insert the tree into the list of trees of the user and to remove 145 * 1) In order to avoid deadlocks, when both (mutex and lock of the user 161 * 2) The tree is queued in the list of trees of the user. The fact of 505 * user i 517 smb_user_t *user; local 598 smb_user_t *user = sr->uid_user; local 649 smb_user_t *user = sr->uid_user; local 767 smb_user_t *user = sr->uid_user; local 841 smb_user_t *user = sr->uid_user; local 1238 smb_user_t *user = sr->uid_user; local 1493 smb_user_t *user = tree->t_owner; local [all...] |
/illumos-gate/usr/src/cmd/idmap/idmap/ |
H A D | namemaps.c | 140 strings2cred(ns_cred_t *nsc, char *user, char *passwd, char *auth) argument 148 if (user != NULL) { 149 nsc->cred.unix_cred.userID = strdup(user); 356 char *user, char *passwd, char *auth, char *windomain, 439 rc = strings2cred(&p->nsc, user, passwd, auth); 1057 is_user == IDMAP_YES ? "UNIX user" : "UNIX group", 355 idmap_init_namemaps(idmap_nm_handle_t **adh, char *user, char *passwd, char *auth, char *windomain, int direction) argument
|
/illumos-gate/usr/src/cmd/fm/modules/common/ext-event-transport/ |
H A D | fmevt_inbound.c | 208 fmevt_detector(nvlist_t *attr, char *ruleset, int user, int priv, argument 265 user ? "userland" : "kernel"); 496 int user, priv; local 505 user = (cbarg & CBF_USER) != 0; 530 if ((dtcr = fmevt_detector(rawattr, ruleset, user, priv, 539 ea.pp_user = user;
|
/illumos-gate/usr/src/lib/sasl_plugins/gssapi/ |
H A D | gssapi.c | 169 const char *user; /* hold the userid between steps - client */ member in struct:context 1036 /* If the id contains a realm get the identifier for the user 1579 if (text->user == NULL || 1595 if (text->user == NULL) { 1596 user_result = _plug_get_userid(params->utils, &text->user, 1606 if (text->user == NULL) { 1609 user_result = _plug_get_userid(params->utils, &text->user, 1877 if (text->user && text->user[0]) { 1879 text->user, [all...] |
/illumos-gate/usr/src/lib/libsasl/include/ |
H A D | saslplug.h | 119 const char *user, unsigned userlen, 188 const char *user; /* canonicalized user name */ member in struct:sasl_out_params 191 unsigned ulen; /* length of canonicalized user name */ 265 * Canonicalize a user name from on-wire to internal format 267 * Must be called once user name aquired if canon_user is non-NULL. 269 * in user name from wire protocol (need not be NUL terminated) 270 * len length of user name from wire protocol (0 = strlen(user)) 272 * oparams the user, authi [all...] |
/illumos-gate/usr/src/lib/libsasl/lib/ |
H A D | server.c | 117 const char *user, unsigned userlen, 126 /* set the password for a user 128 * user -- user name 129 * pass -- plaintext password, may be NULL to remove user 138 * SASL_NOVERIFY -- user exists, but no settable password present 142 * SASL_NOUSERPASS -- user-supplied passwords not permitted 149 const char *user, 183 tmpresult = setpass_cb(conn, context, user, pass, passlen, 188 user, tmpresul 148 sasl_setpass(sasl_conn_t *conn, const char *user, const char *pass, unsigned passlen, const char *oldpass, unsigned oldpasslen, unsigned flags) argument [all...] |
/illumos-gate/usr/src/lib/libsasl/plugin/ |
H A D | plugin_common.c | 449 * Retrieve the user password. 755 char **user, char **realm, const char *user_realm, 765 if(!user || !serverFQDN) { 772 /* hmmm, the user didn't specify a realm */ 781 ret = _plug_strdup(utils, input, user, NULL); 788 *user = utils->malloc(r - input); 789 if (*user) { 790 memcpy(*user, input, r - input - 1); 791 (*user)[r - input - 1] = '\0'; 799 *user 754 _plug_parseuser(const sasl_utils_t *utils, char **user, char **realm, const char *user_realm, const char *serverFQDN, const char *input) argument [all...] |
/illumos-gate/usr/src/lib/libsec/common/ |
H A D | acltext.c | 121 getsidname(uid_t who, boolean_t user, char **sidp, boolean_t noresolve) argument 137 if (user) 146 if (user) 198 (void) printf("user:%s:%s\t\t", 206 (void) printf("user::%s\n", perm); 231 (void) printf("default:user:%s:%s\n", 236 (void) printf("default:user::%s\n", perm); 299 * compute entry type string, such as user:joe, group:staff,... 311 error = str_append(dstr, "user::"); 319 error = str_append(dstr, "user [all...] |
/illumos-gate/usr/src/lib/libsmbfs/smb/ |
H A D | ctx.c | 168 printf(" dom=\"%s\", user=\"%s\"\n", 269 * Default domain, user, ... 281 * user name, and share name, as needed. We need these 290 * values from RC file (per-user) 460 * "//[[domain;]user[:password]@]host[/share[/path]]" 497 p = tmp + 2; /* user@host... */ 509 * 3: trailing "domain;user" (or just user) 513 host = p; /* no user@ prefix */ 517 /* may have [[domain;]user[ 1598 smbfs_set_default_user(const char *user) argument [all...] |
/illumos-gate/usr/src/lib/libpool/common/ |
H A D | pool_commit.c | 1294 pool_value_t *pv, void *user) 1296 pool_elem_t *tgt = (pool_elem_t *)user; 1329 pool_value_t *pv, void *user) 1293 clone_element(pool_conf_t *conf, pool_elem_t *pe, const char *name, pool_value_t *pv, void *user) argument 1328 clean_element(pool_conf_t *conf, pool_elem_t *pe, const char *name, pool_value_t *pv, void *user) argument
|
/illumos-gate/usr/src/lib/libresolv2/common/irs/ |
H A D | irpmarshall.c | 1133 * int irp_marshall_ng(const char *host, const char *user, 1147 irp_marshall_ng(const char *host, const char *user, const char *domain, argument 1159 need += (user == NULL ? 0 : strlen(user)); 1188 if (user != NULL) 1189 strcat(*buffer, user); 1204 * int irp_unmarshall_ng(const char **host, const char **user, 1225 char *host, *user, *domain; local 1233 host = user = domain = NULL; 1262 user [all...] |
/illumos-gate/usr/src/lib/libc/port/gen/ |
H A D | getutx.c | 322 * Do not look for an entry if the user sent 492 char user[STRSZ], id[STRSZ], line[STRSZ], pid[STRSZ], type[STRSZ], local 506 (void) strncpy(user, entryx->ut_user, sizeof (entryx->ut_user)); 507 user[sizeof (entryx->ut_user)] = '\0'; 531 argvec[1] = user; 620 * Copy the user supplied entry into our temporary buffer to 621 * avoid the possibility that the user is actually passing us 671 * Write out the user supplied structure. If the write fails, 672 * then the user probably doesn't have permission to write the 679 * Save the new user structur [all...] |
/illumos-gate/usr/src/lib/libipmi/common/ |
H A D | ipmi_lan.c | 810 char *hostname, *user, *authcode; local 827 nvlist_lookup_string(params, IPMI_LAN_USER, &user) || 834 (void) strncpy(ilp->il_user, user, 16);
|
/illumos-gate/usr/src/lib/libldap5/sources/ldap/common/ |
H A D | digest_md5.c | 74 const char *realm, *nonce, *cnonce, *qop, *user, *resp, *dom; member in struct:__anon3486 205 * Compute MD5( "<user>:<realm>:<pass>" ) 206 * if use8859_1 is non-zero, then user/realm is 8859-1 charset 211 digest_hash_pass(const char *user, int ulen, const char *realm, int rlen, argument 218 if (ulen == 0) ulen = strlen(user); 220 MD5Update(&ctx, (CONST_UCHAR *) user, ulen); 222 MD5_UTF8_8859_1(&ctx, (CONST_UCHAR *) user, ulen); 411 sprintf(scan, prefix, attr->ulen, attr->user, 582 attr_out->user = val; 631 attrs.user [all...] |
/illumos-gate/usr/src/cmd/passmgmt/ |
H A D | passmgmt.c | 104 char defdir[] = "/home/"; /* default home directory for new user */ 173 putuserattrent(userattr_t *user, FILE *f) argument 184 if (user->attr == NULL) 187 kv_pair = user->attr->data; 189 for (i = j = 0; i < user->attr->length; i++) { 203 (void) fprintf(f, "%s:%s:%s:%s:", user->name, user->qualifier, 204 user->res1, user->res2); 206 for (i = j = 0; i < user 222 assign_attr(userattr_t *user, const char *newkey, char *val) argument 250 unassign_role(userattr_t *user, char *rolelist, char *role) argument [all...] |
/illumos-gate/usr/src/cmd/rcm_daemon/common/ |
H A D | rcm_subr.c | 410 * Gather usage info be passed back to requester. Discard info if user does 1192 client_t *user; local 1198 user = rsrc_client_find(modname, pid, &node->users); 1209 if (user != NULL) { 1211 if (user->flag & (flag & RCM_REGISTER_MASK)) { 1216 (user->state != RCM_STATE_REMOVE)) { 1220 user->flag |= (flag & RCM_REGISTER_MASK); 1222 (user->state == RCM_STATE_REMOVE)) { 1223 user->state = RCM_STATE_ONLINE; 1232 if ((user 1247 client_t *user; local 1765 client_t *user; local [all...] |
H A D | ttymux_rcm.c | 327 add_dependency(rsrc_t *user, rsrc_t *used) argument 332 if (user == NULL || used == NULL) 335 if (user->id && used->id && strcmp(user->id, used->id) == 0) { 342 * Search for all resources that this resource user is depending 345 linkhead = user->dependencies; 362 _msg(6, ("TTYMUX: New link user %s used %s\n", user->id, used->id)); 364 link->user = user; 966 rsrc_t *rsrc, *user; local 1348 rsrc_t *rsrc, *user; local [all...] |
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/ftp/ |
H A D | cmds.c | 1351 * Send new user information (re-login) 1354 user(int argc, char *argv[]) function 1375 (void) printf("access for user (nil) denied\n");
|
/illumos-gate/usr/src/cmd/su/ |
H A D | su.c | 34 * If SULOG is defined, all attempts to su to another user are 273 * mode read/write user. Change owner and group to root 321 /* call pam_authenticate() to authenticate the user through PAM */ 326 } else /* root user does not need to authenticate */ 333 * 3rd step: print out message to user. 393 * Prompt for password if invoking user is not root or 394 * if specified(new) user requires a password 434 /* set user and group ids to specified user */ 454 * If new user' 1007 audit_failure(int pw_change, struct passwd *pwd, char *user, int pamerr) argument [all...] |
/illumos-gate/usr/src/cmd/latencytop/common/ |
H A D | stat.c | 38 lt_stat_collection_t *stat, void *user); 180 check_process(gpointer key, lt_stat_collection_t *stat, void *user) argument 193 check_thread(gpointer key, lt_stat_collection_t *stat, void *user) argument 240 clear_stat(gpointer key, lt_stat_collection_t *stat, void *user) argument
|
/illumos-gate/usr/src/uts/common/fs/portfs/ |
H A D | port_fop.c | 71 * port_associate(int port, PORT_SOURCE_FILE, (uintptr_t)&fobj, events, user) 73 * 'user' is the user pointer to be returned with the event. 1105 uintptr_t object, int events, void *user, char *cname, int clen, 1147 pkevp->portkev_user = user; 1257 void *user) 1372 events, user, cname, clen, dvp)) { 1104 port_pfp_setup(portfop_t **pfpp, port_t *pp, vnode_t *vp, portfop_cache_t *pfcp, uintptr_t object, int events, void *user, char *cname, int clen, vnode_t *dvp) argument 1256 port_associate_fop(port_t *pp, int source, uintptr_t object, int events, void *user) argument
|