Searched defs:user (Results 201 - 225 of 283) sorted by relevance

1234567891011>>

/illumos-gate/usr/src/lib/libast/sparc/include/ast/
H A Dast.h155 char* user; member in struct:__anon2705
/illumos-gate/usr/src/lib/libast/sparcv9/include/ast/
H A Dast.h155 char* user; member in struct:__anon2727
/illumos-gate/usr/src/cmd/lp/cmd/lpsched/
H A Dexec.c149 * If the string contains data from an untrusted origin (user supplied),
715 * Add the system name to the user name (ala system!user)
719 cp = strchr(request->secure->user, '@');
870 av[ac++] = arg_string(UNTRUSTED, "%s", request->request->user);
896 * the user's -o options, to allow the user to override.
908 * Do all of the user's options except the cpi/lpi/etc.
932 * used for this request. It chose form over user,
933 * and user ove
1110 char *user = strdup(request->request->user); local
[all...]
/illumos-gate/usr/src/uts/common/fs/smbsrv/
H A Dsmb_session.c893 * Find a user on the specified session by SMB UID.
906 smb_user_t *user; local
914 user = smb_llist_head(user_list);
915 while (user) {
916 SMB_USER_VALID(user);
917 ASSERT(user->u_session == session);
919 if (user->u_uid == uid && user->u_state == st) {
920 smb_user_hold_internal(user);
924 user
932 smb_session_post_user(smb_session_t *session, smb_user_t *user) argument
1237 smb_user_t *user; local
[all...]
H A Dsmb_tree.c93 * - The tree is queued in the list of trees of its user.
100 * - The tree is queued in the list of trees of its user.
108 * - The tree is queued in the list of trees of its user.
116 * added to the list of trees of a user.
133 * - The list of trees of the user it belongs to.
138 * and there's a lock embedded in the list of trees of a user. To
140 * To insert the tree into the list of trees of the user and to remove
145 * 1) In order to avoid deadlocks, when both (mutex and lock of the user
161 * 2) The tree is queued in the list of trees of the user. The fact of
505 * user i
517 smb_user_t *user; local
598 smb_user_t *user = sr->uid_user; local
649 smb_user_t *user = sr->uid_user; local
767 smb_user_t *user = sr->uid_user; local
841 smb_user_t *user = sr->uid_user; local
1238 smb_user_t *user = sr->uid_user; local
1493 smb_user_t *user = tree->t_owner; local
[all...]
/illumos-gate/usr/src/cmd/idmap/idmap/
H A Dnamemaps.c140 strings2cred(ns_cred_t *nsc, char *user, char *passwd, char *auth) argument
148 if (user != NULL) {
149 nsc->cred.unix_cred.userID = strdup(user);
356 char *user, char *passwd, char *auth, char *windomain,
439 rc = strings2cred(&p->nsc, user, passwd, auth);
1057 is_user == IDMAP_YES ? "UNIX user" : "UNIX group",
355 idmap_init_namemaps(idmap_nm_handle_t **adh, char *user, char *passwd, char *auth, char *windomain, int direction) argument
/illumos-gate/usr/src/cmd/fm/modules/common/ext-event-transport/
H A Dfmevt_inbound.c208 fmevt_detector(nvlist_t *attr, char *ruleset, int user, int priv, argument
265 user ? "userland" : "kernel");
496 int user, priv; local
505 user = (cbarg & CBF_USER) != 0;
530 if ((dtcr = fmevt_detector(rawattr, ruleset, user, priv,
539 ea.pp_user = user;
/illumos-gate/usr/src/lib/sasl_plugins/gssapi/
H A Dgssapi.c169 const char *user; /* hold the userid between steps - client */ member in struct:context
1036 /* If the id contains a realm get the identifier for the user
1579 if (text->user == NULL ||
1595 if (text->user == NULL) {
1596 user_result = _plug_get_userid(params->utils, &text->user,
1606 if (text->user == NULL) {
1609 user_result = _plug_get_userid(params->utils, &text->user,
1877 if (text->user && text->user[0]) {
1879 text->user,
[all...]
/illumos-gate/usr/src/lib/libsasl/include/
H A Dsaslplug.h119 const char *user, unsigned userlen,
188 const char *user; /* canonicalized user name */ member in struct:sasl_out_params
191 unsigned ulen; /* length of canonicalized user name */
265 * Canonicalize a user name from on-wire to internal format
267 * Must be called once user name aquired if canon_user is non-NULL.
269 * in user name from wire protocol (need not be NUL terminated)
270 * len length of user name from wire protocol (0 = strlen(user))
272 * oparams the user, authi
[all...]
/illumos-gate/usr/src/lib/libsasl/lib/
H A Dserver.c117 const char *user, unsigned userlen,
126 /* set the password for a user
128 * user -- user name
129 * pass -- plaintext password, may be NULL to remove user
138 * SASL_NOVERIFY -- user exists, but no settable password present
142 * SASL_NOUSERPASS -- user-supplied passwords not permitted
149 const char *user,
183 tmpresult = setpass_cb(conn, context, user, pass, passlen,
188 user, tmpresul
148 sasl_setpass(sasl_conn_t *conn, const char *user, const char *pass, unsigned passlen, const char *oldpass, unsigned oldpasslen, unsigned flags) argument
[all...]
/illumos-gate/usr/src/lib/libsasl/plugin/
H A Dplugin_common.c449 * Retrieve the user password.
755 char **user, char **realm, const char *user_realm,
765 if(!user || !serverFQDN) {
772 /* hmmm, the user didn't specify a realm */
781 ret = _plug_strdup(utils, input, user, NULL);
788 *user = utils->malloc(r - input);
789 if (*user) {
790 memcpy(*user, input, r - input - 1);
791 (*user)[r - input - 1] = '\0';
799 *user
754 _plug_parseuser(const sasl_utils_t *utils, char **user, char **realm, const char *user_realm, const char *serverFQDN, const char *input) argument
[all...]
/illumos-gate/usr/src/lib/libsec/common/
H A Dacltext.c121 getsidname(uid_t who, boolean_t user, char **sidp, boolean_t noresolve) argument
137 if (user)
146 if (user)
198 (void) printf("user:%s:%s\t\t",
206 (void) printf("user::%s\n", perm);
231 (void) printf("default:user:%s:%s\n",
236 (void) printf("default:user::%s\n", perm);
299 * compute entry type string, such as user:joe, group:staff,...
311 error = str_append(dstr, "user::");
319 error = str_append(dstr, "user
[all...]
/illumos-gate/usr/src/lib/libsmbfs/smb/
H A Dctx.c168 printf(" dom=\"%s\", user=\"%s\"\n",
269 * Default domain, user, ...
281 * user name, and share name, as needed. We need these
290 * values from RC file (per-user)
460 * "//[[domain;]user[:password]@]host[/share[/path]]"
497 p = tmp + 2; /* user@host... */
509 * 3: trailing "domain;user" (or just user)
513 host = p; /* no user@ prefix */
517 /* may have [[domain;]user[
1598 smbfs_set_default_user(const char *user) argument
[all...]
/illumos-gate/usr/src/lib/libpool/common/
H A Dpool_commit.c1294 pool_value_t *pv, void *user)
1296 pool_elem_t *tgt = (pool_elem_t *)user;
1329 pool_value_t *pv, void *user)
1293 clone_element(pool_conf_t *conf, pool_elem_t *pe, const char *name, pool_value_t *pv, void *user) argument
1328 clean_element(pool_conf_t *conf, pool_elem_t *pe, const char *name, pool_value_t *pv, void *user) argument
/illumos-gate/usr/src/lib/libresolv2/common/irs/
H A Dirpmarshall.c1133 * int irp_marshall_ng(const char *host, const char *user,
1147 irp_marshall_ng(const char *host, const char *user, const char *domain, argument
1159 need += (user == NULL ? 0 : strlen(user));
1188 if (user != NULL)
1189 strcat(*buffer, user);
1204 * int irp_unmarshall_ng(const char **host, const char **user,
1225 char *host, *user, *domain; local
1233 host = user = domain = NULL;
1262 user
[all...]
/illumos-gate/usr/src/lib/libc/port/gen/
H A Dgetutx.c322 * Do not look for an entry if the user sent
492 char user[STRSZ], id[STRSZ], line[STRSZ], pid[STRSZ], type[STRSZ], local
506 (void) strncpy(user, entryx->ut_user, sizeof (entryx->ut_user));
507 user[sizeof (entryx->ut_user)] = '\0';
531 argvec[1] = user;
620 * Copy the user supplied entry into our temporary buffer to
621 * avoid the possibility that the user is actually passing us
671 * Write out the user supplied structure. If the write fails,
672 * then the user probably doesn't have permission to write the
679 * Save the new user structur
[all...]
/illumos-gate/usr/src/lib/libipmi/common/
H A Dipmi_lan.c810 char *hostname, *user, *authcode; local
827 nvlist_lookup_string(params, IPMI_LAN_USER, &user) ||
834 (void) strncpy(ilp->il_user, user, 16);
/illumos-gate/usr/src/lib/libldap5/sources/ldap/common/
H A Ddigest_md5.c74 const char *realm, *nonce, *cnonce, *qop, *user, *resp, *dom; member in struct:__anon3486
205 * Compute MD5( "<user>:<realm>:<pass>" )
206 * if use8859_1 is non-zero, then user/realm is 8859-1 charset
211 digest_hash_pass(const char *user, int ulen, const char *realm, int rlen, argument
218 if (ulen == 0) ulen = strlen(user);
220 MD5Update(&ctx, (CONST_UCHAR *) user, ulen);
222 MD5_UTF8_8859_1(&ctx, (CONST_UCHAR *) user, ulen);
411 sprintf(scan, prefix, attr->ulen, attr->user,
582 attr_out->user = val;
631 attrs.user
[all...]
/illumos-gate/usr/src/cmd/passmgmt/
H A Dpassmgmt.c104 char defdir[] = "/home/"; /* default home directory for new user */
173 putuserattrent(userattr_t *user, FILE *f) argument
184 if (user->attr == NULL)
187 kv_pair = user->attr->data;
189 for (i = j = 0; i < user->attr->length; i++) {
203 (void) fprintf(f, "%s:%s:%s:%s:", user->name, user->qualifier,
204 user->res1, user->res2);
206 for (i = j = 0; i < user
222 assign_attr(userattr_t *user, const char *newkey, char *val) argument
250 unassign_role(userattr_t *user, char *rolelist, char *role) argument
[all...]
/illumos-gate/usr/src/cmd/rcm_daemon/common/
H A Drcm_subr.c410 * Gather usage info be passed back to requester. Discard info if user does
1192 client_t *user; local
1198 user = rsrc_client_find(modname, pid, &node->users);
1209 if (user != NULL) {
1211 if (user->flag & (flag & RCM_REGISTER_MASK)) {
1216 (user->state != RCM_STATE_REMOVE)) {
1220 user->flag |= (flag & RCM_REGISTER_MASK);
1222 (user->state == RCM_STATE_REMOVE)) {
1223 user->state = RCM_STATE_ONLINE;
1232 if ((user
1247 client_t *user; local
1765 client_t *user; local
[all...]
H A Dttymux_rcm.c327 add_dependency(rsrc_t *user, rsrc_t *used) argument
332 if (user == NULL || used == NULL)
335 if (user->id && used->id && strcmp(user->id, used->id) == 0) {
342 * Search for all resources that this resource user is depending
345 linkhead = user->dependencies;
362 _msg(6, ("TTYMUX: New link user %s used %s\n", user->id, used->id));
364 link->user = user;
966 rsrc_t *rsrc, *user; local
1348 rsrc_t *rsrc, *user; local
[all...]
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/ftp/
H A Dcmds.c1351 * Send new user information (re-login)
1354 user(int argc, char *argv[]) function
1375 (void) printf("access for user (nil) denied\n");
/illumos-gate/usr/src/cmd/su/
H A Dsu.c34 * If SULOG is defined, all attempts to su to another user are
273 * mode read/write user. Change owner and group to root
321 /* call pam_authenticate() to authenticate the user through PAM */
326 } else /* root user does not need to authenticate */
333 * 3rd step: print out message to user.
393 * Prompt for password if invoking user is not root or
394 * if specified(new) user requires a password
434 /* set user and group ids to specified user */
454 * If new user'
1007 audit_failure(int pw_change, struct passwd *pwd, char *user, int pamerr) argument
[all...]
/illumos-gate/usr/src/cmd/latencytop/common/
H A Dstat.c38 lt_stat_collection_t *stat, void *user);
180 check_process(gpointer key, lt_stat_collection_t *stat, void *user) argument
193 check_thread(gpointer key, lt_stat_collection_t *stat, void *user) argument
240 clear_stat(gpointer key, lt_stat_collection_t *stat, void *user) argument
/illumos-gate/usr/src/uts/common/fs/portfs/
H A Dport_fop.c71 * port_associate(int port, PORT_SOURCE_FILE, (uintptr_t)&fobj, events, user)
73 * 'user' is the user pointer to be returned with the event.
1105 uintptr_t object, int events, void *user, char *cname, int clen,
1147 pkevp->portkev_user = user;
1257 void *user)
1372 events, user, cname, clen, dvp)) {
1104 port_pfp_setup(portfop_t **pfpp, port_t *pp, vnode_t *vp, portfop_cache_t *pfcp, uintptr_t object, int events, void *user, char *cname, int clen, vnode_t *dvp) argument
1256 port_associate_fop(port_t *pp, int source, uintptr_t object, int events, void *user) argument

Completed in 2586 milliseconds

1234567891011>>