/illumos-gate/usr/src/lib/libast/amd64/include/ast/ |
H A D | cdt.h | 65 Void_t* obj; /* user object */ 125 Void_t* user; /* for user's usage */ member in struct:_dt_s
|
/illumos-gate/usr/src/lib/libast/common/include/ |
H A D | cdt.h | 65 Void_t* obj; /* user object */ 125 Void_t* user; /* for user's usage */ member in struct:_dt_s
|
/illumos-gate/usr/src/lib/libast/i386/include/ast/ |
H A D | cdt.h | 65 Void_t* obj; /* user object */ 125 Void_t* user; /* for user's usage */ member in struct:_dt_s
|
/illumos-gate/usr/src/lib/libast/sparc/include/ast/ |
H A D | cdt.h | 65 Void_t* obj; /* user object */ 125 Void_t* user; /* for user's usage */ member in struct:_dt_s
|
/illumos-gate/usr/src/lib/libast/sparcv9/include/ast/ |
H A D | cdt.h | 65 Void_t* obj; /* user object */ 125 Void_t* user; /* for user's usage */ member in struct:_dt_s
|
/illumos-gate/usr/src/cmd/lp/lib/papi/ |
H A D | job.c | 216 char *user = "intruder"; /* assume an intruder */ local 219 user = pw->pw_name; /* use the process owner */ 224 "user-name", &user); 230 if (strcmp(user, r->user) == 0) 234 * user and r->user might contain the 237 char *token1 = strtok(r->user, "@"); 239 char *token3 = strtok(user, " 947 *user = NULL, local 998 char *user = NULL; local 1041 char *user = NULL; local [all...] |
/illumos-gate/usr/src/lib/smbsrv/libmlsvc/common/ |
H A D | samr_svc.c | 34 * - Use domain handles to obtain user handles etc. 72 * DomainDisplayUser All user objects (or those derived from user) with 75 * DomainDisplayMachine All user objects (or those derived from user) with 630 * This is a request to open a user within a specified domain in the 632 * obtained via a successful domain open request. The user is 666 * Request to delete a user within a specified domain in the local 667 * SAM database. The caller should supply a valid user handle. 767 * Request the list of groups of which a user i 1032 struct samr_SidList *user; local 1207 struct user_acct_info *user; local [all...] |
/illumos-gate/usr/src/lib/smbsrv/libsmb/common/ |
H A D | smb_pwdutil.c | 250 * Returns a smb password structure for the given user name. 352 * Update/add the given user to the smbpasswd file. 468 * Updates the password entry of the given user if the user already 469 * has an entry, otherwise it'll add an entry for the user with 604 * <user-name>:<user-id>:<LM hash>:<NTLM hash> 681 /* disable the user */ 690 /* enable the user if it's been disabled */ 723 * and write them along with user' 1004 smb_luser_t *user; local [all...] |
/illumos-gate/usr/src/uts/common/fs/smbsrv/ |
H A D | smb_common_transact.c | 1075 unsigned char *user; local 1079 &user,
|
H A D | smb_server.c | 201 * enforced in user space. 744 * this info via the ioctl to user land. 873 * Look for sessions to disconnect by client and user name. 1730 smb_user_t *user; local 1740 user = smb_llist_head(ulist); 1742 while (user != NULL) { 1743 if (smb_user_hold(user)) { 1744 rc = smb_user_enum(user, svcenum); 1745 smb_user_release(user); 1750 user 1816 smb_user_t *user; local [all...] |
/illumos-gate/usr/src/cmd/cron/ |
H A D | at.c | 65 #define ROOT 0 /* user-id of super-user */ 76 #define CANTCHUID "can't change user identifier" 78 #define INVALIDUSER "you are not a valid user (no entry in /etc/passwd)" 131 uid_t user; variable 179 user = getuid(); 180 login = getuser(user); 220 gettext("at: user %s is " 239 gettext("at: user %s is " 371 if (chown(tfname, user, getgi 588 char *user; local [all...] |
/illumos-gate/usr/src/cmd/mdb/common/modules/smbsrv/ |
H A D | smbsrv.c | 964 "UID(user): %u (%p)\n", 1063 smb_user_t *user; local 1066 user = mdb_alloc(sizeof (*user), UM_SLEEP | UM_GC); 1067 if (mdb_vread(user, sizeof (*user), addr) == -1) { 1071 account = mdb_zalloc(user->u_domain_len + user->u_name_len + 2, 1074 if (user->u_domain_len) 1075 (void) mdb_vread(account, user [all...] |
/illumos-gate/usr/src/cmd/power/ |
H A D | powerd.c | 685 * Only when everything else is idle, run the user's idlecheck 940 * Execute the user's idlecheck script and set variable PM_IDLETIME. 1007 char *home, *user; local 1032 user = malloc(strlen(pwd->pw_name) + sizeof (euser)); 1033 if (home == NULL || user == NULL) { 1035 free(user); 1042 (void) strcpy(user, euser); 1043 (void) strcat(user, pwd->pw_name); 1046 * Need to simulate the user enviroment, minimaly set HOME, and USER. 1050 (void) putenv(user); [all...] |
/illumos-gate/usr/src/cmd/halt/ |
H A D | halt.c | 1446 * For all the other errors, we continue on in case user 1447 * user want to force fast reboot, or fall back to regular 1460 char *user = getlogin(); local 1465 if (user == NULL && (pw = getpwuid(getuid())) != NULL) 1466 user = pw->pw_name; 1467 if (user == NULL) 1468 user = "root"; 1473 syslog(LOG_CRIT, "initiated by %s", user); 1475 syslog(LOG_CRIT, "initiated by %s on %s", user, tty);
|
/illumos-gate/usr/src/head/ |
H A D | libzonecfg.h | 263 char user[MAXUSERNAME]; member in struct:zone_userauths
|
/illumos-gate/usr/src/lib/libsasl/lib/ |
H A D | common.c | 775 if(! conn->oparams.user) 778 *((const char **)pvalue) = conn->oparams.user; 1084 /* this is apparently no longer a user function */ 1149 case SASL_INTERACT: s = gettext("needs user interaction"); 1160 case SASL_TOOWEAK: s = gettext("mechanism too weak for this user"); 1164 case SASL_TRANS: s = gettext("One time use of a plaintext password will enable requested mechanism for user"); 1170 case SASL_NOUSER: s = gettext("user not found"); 1176 case SASL_NOVERIFY: s = gettext("user exists, but no verifier for user"); 1184 case SASL_NOUSERPASS: s = gettext("user supplie 2509 sasl_listmech(sasl_conn_t *conn, const char *user, const char *prefix, const char *sep, const char *suffix, const char **result, unsigned *plen, int *pcount) argument [all...] |
/illumos-gate/usr/src/lib/libpam/ |
H A D | pam_framework.c | 55 /* PAM_USER */ "user", 286 pam_start(const char *service, const char *user, argument 296 service ? service : "NULL", user ? user : "NULL", (void *)pam_conv, 310 if ((err = pam_set_item(*pamh, PAM_USER, (void *)user)) 611 * parse_user_name - process the user response: ignore 612 * '\t' or ' ' before or after a user name. 614 * *ret_username will be the user name. 629 * the user name. 673 * to prompt for the user 680 pam_get_user(pam_handle_t *pamh, char **user, const char *prompt_override) argument [all...] |
/illumos-gate/usr/src/lib/libpool/common/ |
H A D | pool.c | 265 pool_value_t *pval, void *user) 272 char_buf_t *cb = (char_buf_t *)user; 959 * ensure that we are happy with what the user is doing. 1117 * ensure that we are happy with what the user is doing. 1669 * Walk the properties of the supplied elem, calling the user supplied 1670 * function repeatedly as long as the user function returns 1694 * Walk the properties of the supplied elem, calling the user supplied 1695 * function repeatedly as long as the user function returns 2570 * Walk all the pools of the configuration calling the user supplied function 2571 * as long as the user functio 264 prop_buf_build_cb(pool_conf_t *UNUSED, pool_elem_t *pe, const char *name, pool_value_t *pval, void *user) argument [all...] |
/illumos-gate/usr/src/cmd/pools/poold/com/sun/solaris/service/pools/ |
H A D | PoolInternal.java | 128 long user, long callback); 155 final static native int pool_walk_pools(long conf, long user, argument 158 long user, long callback); 160 long user, long callback); 127 pool_walk_properties(long conf, long elem, long user, long callback) argument 157 pool_walk_resources(long conf, long pool, long user, long callback) argument 159 pool_walk_components(long conf, long res, long user, long callback) argument
|
/illumos-gate/usr/src/cmd/pools/poold/libjpool/ |
H A D | jpool.c | 1607 pool_value_t *pv, void *user) 1611 struct pool_callback *pc = (struct pool_callback *)user; 1606 pool_property_walker(pool_conf_t *conf, pool_elem_t *pe, const char *name, pool_value_t *pv, void *user) argument
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/pppd/ |
H A D | options.c | 96 char user[MAXNAMELEN]; /* Username for PAP */ variable 145 bool log_to_specific_fd; /* log_to_fd was specified by user option */ 559 * options_from_user - see if the user has a ~/.ppprc file, and if so, 566 char *user, *path, *file; local 572 if (pw == NULL || (user = pw->pw_dir) == NULL || user[0] == '\0') 575 pl = strlen(user) + strlen(file) + 2; 579 (void) slprintf(path, pl, "%s/%s", user, file);
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.sbin/ |
H A D | in.rlogind.c | 530 /* Get the Unix username of the remote user */ 533 /* Get the Kerberos principal name string of the remote user */ 997 * allow a unprivileged user to originate a connection 1194 lusername, /* local user */ 1510 char user[sizeof (up->ut_user) + 1]; local 1525 * the utmpx user entry from type LOGIN_PROCESS 1530 (void) strlcpy(user, up->ut_user, 1531 sizeof (user)); 1541 if ((pam_start(pam_prog_name, user, NULL,
|
/illumos-gate/usr/src/cmd/dtrace/ |
H A D | dtrace.c | 492 char *user; local 517 user = "userland "; 519 user = ""; 523 oprintf("\t\targs[%d]: %s%s\n", i, user, buf);
|
/illumos-gate/usr/src/cmd/sendmail/src/ |
H A D | deliver.c | 896 message("deliverable: mailer %s, host %s, user %s", 901 message("deliverable: mailer %s, user %s", 1229 ** user on the head of the list. It is clever about mailers 1292 char *user; /* user being sent to */ local 1303 volatile bool clever = false; /* running user smtp to this mailer */ 1352 sm_dprintf("\n--deliver, id=%s, mailer=%s, host=`%s', first user=`%s'\n", 1460 ** If we have no substitution for the user name in the argument 1568 user = to->q_user; 1661 stripquotes(user); 2370 char *user = NULL; local [all...] |
H A D | srvrsmtp.c | 594 char *user; local 867 user = NULL; 1360 user = macvalue(macid("{auth_authen}"), e); 1367 (void **)&user); 1370 user = ""; 1380 xtextify(user, "<>\")")); 1448 shortenstring(user, 128), 2729 /* If discarding, don't bother to verify user */ 2927 message("252 2.5.2 Cannot VRFY user; try RCPT to attempt delivery (or try finger)"); 3119 case CMDHELP: /* help -- give user inf [all...] |