Searched defs:user (Results 226 - 250 of 283) sorted by relevance

1234567891011>>

/illumos-gate/usr/src/lib/libast/amd64/include/ast/
H A Dcdt.h65 Void_t* obj; /* user object */
125 Void_t* user; /* for user's usage */ member in struct:_dt_s
/illumos-gate/usr/src/lib/libast/common/include/
H A Dcdt.h65 Void_t* obj; /* user object */
125 Void_t* user; /* for user's usage */ member in struct:_dt_s
/illumos-gate/usr/src/lib/libast/i386/include/ast/
H A Dcdt.h65 Void_t* obj; /* user object */
125 Void_t* user; /* for user's usage */ member in struct:_dt_s
/illumos-gate/usr/src/lib/libast/sparc/include/ast/
H A Dcdt.h65 Void_t* obj; /* user object */
125 Void_t* user; /* for user's usage */ member in struct:_dt_s
/illumos-gate/usr/src/lib/libast/sparcv9/include/ast/
H A Dcdt.h65 Void_t* obj; /* user object */
125 Void_t* user; /* for user's usage */ member in struct:_dt_s
/illumos-gate/usr/src/cmd/lp/lib/papi/
H A Djob.c216 char *user = "intruder"; /* assume an intruder */ local
219 user = pw->pw_name; /* use the process owner */
224 "user-name", &user);
230 if (strcmp(user, r->user) == 0)
234 * user and r->user might contain the
237 char *token1 = strtok(r->user, "@");
239 char *token3 = strtok(user, "
947 *user = NULL, local
998 char *user = NULL; local
1041 char *user = NULL; local
[all...]
/illumos-gate/usr/src/lib/smbsrv/libmlsvc/common/
H A Dsamr_svc.c34 * - Use domain handles to obtain user handles etc.
72 * DomainDisplayUser All user objects (or those derived from user) with
75 * DomainDisplayMachine All user objects (or those derived from user) with
630 * This is a request to open a user within a specified domain in the
632 * obtained via a successful domain open request. The user is
666 * Request to delete a user within a specified domain in the local
667 * SAM database. The caller should supply a valid user handle.
767 * Request the list of groups of which a user i
1032 struct samr_SidList *user; local
1207 struct user_acct_info *user; local
[all...]
/illumos-gate/usr/src/lib/smbsrv/libsmb/common/
H A Dsmb_pwdutil.c250 * Returns a smb password structure for the given user name.
352 * Update/add the given user to the smbpasswd file.
468 * Updates the password entry of the given user if the user already
469 * has an entry, otherwise it'll add an entry for the user with
604 * <user-name>:<user-id>:<LM hash>:<NTLM hash>
681 /* disable the user */
690 /* enable the user if it's been disabled */
723 * and write them along with user'
1004 smb_luser_t *user; local
[all...]
/illumos-gate/usr/src/uts/common/fs/smbsrv/
H A Dsmb_common_transact.c1075 unsigned char *user; local
1079 &user,
H A Dsmb_server.c201 * enforced in user space.
744 * this info via the ioctl to user land.
873 * Look for sessions to disconnect by client and user name.
1730 smb_user_t *user; local
1740 user = smb_llist_head(ulist);
1742 while (user != NULL) {
1743 if (smb_user_hold(user)) {
1744 rc = smb_user_enum(user, svcenum);
1745 smb_user_release(user);
1750 user
1816 smb_user_t *user; local
[all...]
/illumos-gate/usr/src/cmd/cron/
H A Dat.c65 #define ROOT 0 /* user-id of super-user */
76 #define CANTCHUID "can't change user identifier"
78 #define INVALIDUSER "you are not a valid user (no entry in /etc/passwd)"
131 uid_t user; variable
179 user = getuid();
180 login = getuser(user);
220 gettext("at: user %s is "
239 gettext("at: user %s is "
371 if (chown(tfname, user, getgi
588 char *user; local
[all...]
/illumos-gate/usr/src/cmd/mdb/common/modules/smbsrv/
H A Dsmbsrv.c964 "UID(user): %u (%p)\n",
1063 smb_user_t *user; local
1066 user = mdb_alloc(sizeof (*user), UM_SLEEP | UM_GC);
1067 if (mdb_vread(user, sizeof (*user), addr) == -1) {
1071 account = mdb_zalloc(user->u_domain_len + user->u_name_len + 2,
1074 if (user->u_domain_len)
1075 (void) mdb_vread(account, user
[all...]
/illumos-gate/usr/src/cmd/power/
H A Dpowerd.c685 * Only when everything else is idle, run the user's idlecheck
940 * Execute the user's idlecheck script and set variable PM_IDLETIME.
1007 char *home, *user; local
1032 user = malloc(strlen(pwd->pw_name) + sizeof (euser));
1033 if (home == NULL || user == NULL) {
1035 free(user);
1042 (void) strcpy(user, euser);
1043 (void) strcat(user, pwd->pw_name);
1046 * Need to simulate the user enviroment, minimaly set HOME, and USER.
1050 (void) putenv(user);
[all...]
/illumos-gate/usr/src/cmd/halt/
H A Dhalt.c1446 * For all the other errors, we continue on in case user
1447 * user want to force fast reboot, or fall back to regular
1460 char *user = getlogin(); local
1465 if (user == NULL && (pw = getpwuid(getuid())) != NULL)
1466 user = pw->pw_name;
1467 if (user == NULL)
1468 user = "root";
1473 syslog(LOG_CRIT, "initiated by %s", user);
1475 syslog(LOG_CRIT, "initiated by %s on %s", user, tty);
/illumos-gate/usr/src/head/
H A Dlibzonecfg.h263 char user[MAXUSERNAME]; member in struct:zone_userauths
/illumos-gate/usr/src/lib/libsasl/lib/
H A Dcommon.c775 if(! conn->oparams.user)
778 *((const char **)pvalue) = conn->oparams.user;
1084 /* this is apparently no longer a user function */
1149 case SASL_INTERACT: s = gettext("needs user interaction");
1160 case SASL_TOOWEAK: s = gettext("mechanism too weak for this user");
1164 case SASL_TRANS: s = gettext("One time use of a plaintext password will enable requested mechanism for user");
1170 case SASL_NOUSER: s = gettext("user not found");
1176 case SASL_NOVERIFY: s = gettext("user exists, but no verifier for user");
1184 case SASL_NOUSERPASS: s = gettext("user supplie
2509 sasl_listmech(sasl_conn_t *conn, const char *user, const char *prefix, const char *sep, const char *suffix, const char **result, unsigned *plen, int *pcount) argument
[all...]
/illumos-gate/usr/src/lib/libpam/
H A Dpam_framework.c55 /* PAM_USER */ "user",
286 pam_start(const char *service, const char *user, argument
296 service ? service : "NULL", user ? user : "NULL", (void *)pam_conv,
310 if ((err = pam_set_item(*pamh, PAM_USER, (void *)user))
611 * parse_user_name - process the user response: ignore
612 * '\t' or ' ' before or after a user name.
614 * *ret_username will be the user name.
629 * the user name.
673 * to prompt for the user
680 pam_get_user(pam_handle_t *pamh, char **user, const char *prompt_override) argument
[all...]
/illumos-gate/usr/src/lib/libpool/common/
H A Dpool.c265 pool_value_t *pval, void *user)
272 char_buf_t *cb = (char_buf_t *)user;
959 * ensure that we are happy with what the user is doing.
1117 * ensure that we are happy with what the user is doing.
1669 * Walk the properties of the supplied elem, calling the user supplied
1670 * function repeatedly as long as the user function returns
1694 * Walk the properties of the supplied elem, calling the user supplied
1695 * function repeatedly as long as the user function returns
2570 * Walk all the pools of the configuration calling the user supplied function
2571 * as long as the user functio
264 prop_buf_build_cb(pool_conf_t *UNUSED, pool_elem_t *pe, const char *name, pool_value_t *pval, void *user) argument
[all...]
/illumos-gate/usr/src/cmd/pools/poold/com/sun/solaris/service/pools/
H A DPoolInternal.java128 long user, long callback);
155 final static native int pool_walk_pools(long conf, long user, argument
158 long user, long callback);
160 long user, long callback);
127 pool_walk_properties(long conf, long elem, long user, long callback) argument
157 pool_walk_resources(long conf, long pool, long user, long callback) argument
159 pool_walk_components(long conf, long res, long user, long callback) argument
/illumos-gate/usr/src/cmd/pools/poold/libjpool/
H A Djpool.c1607 pool_value_t *pv, void *user)
1611 struct pool_callback *pc = (struct pool_callback *)user;
1606 pool_property_walker(pool_conf_t *conf, pool_elem_t *pe, const char *name, pool_value_t *pv, void *user) argument
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/pppd/
H A Doptions.c96 char user[MAXNAMELEN]; /* Username for PAP */ variable
145 bool log_to_specific_fd; /* log_to_fd was specified by user option */
559 * options_from_user - see if the user has a ~/.ppprc file, and if so,
566 char *user, *path, *file; local
572 if (pw == NULL || (user = pw->pw_dir) == NULL || user[0] == '\0')
575 pl = strlen(user) + strlen(file) + 2;
579 (void) slprintf(path, pl, "%s/%s", user, file);
/illumos-gate/usr/src/cmd/cmd-inet/usr.sbin/
H A Din.rlogind.c530 /* Get the Unix username of the remote user */
533 /* Get the Kerberos principal name string of the remote user */
997 * allow a unprivileged user to originate a connection
1194 lusername, /* local user */
1510 char user[sizeof (up->ut_user) + 1]; local
1525 * the utmpx user entry from type LOGIN_PROCESS
1530 (void) strlcpy(user, up->ut_user,
1531 sizeof (user));
1541 if ((pam_start(pam_prog_name, user, NULL,
/illumos-gate/usr/src/cmd/dtrace/
H A Ddtrace.c492 char *user; local
517 user = "userland ";
519 user = "";
523 oprintf("\t\targs[%d]: %s%s\n", i, user, buf);
/illumos-gate/usr/src/cmd/sendmail/src/
H A Ddeliver.c896 message("deliverable: mailer %s, host %s, user %s",
901 message("deliverable: mailer %s, user %s",
1229 ** user on the head of the list. It is clever about mailers
1292 char *user; /* user being sent to */ local
1303 volatile bool clever = false; /* running user smtp to this mailer */
1352 sm_dprintf("\n--deliver, id=%s, mailer=%s, host=`%s', first user=`%s'\n",
1460 ** If we have no substitution for the user name in the argument
1568 user = to->q_user;
1661 stripquotes(user);
2370 char *user = NULL; local
[all...]
H A Dsrvrsmtp.c594 char *user; local
867 user = NULL;
1360 user = macvalue(macid("{auth_authen}"), e);
1367 (void **)&user);
1370 user = "";
1380 xtextify(user, "<>\")"));
1448 shortenstring(user, 128),
2729 /* If discarding, don't bother to verify user */
2927 message("252 2.5.2 Cannot VRFY user; try RCPT to attempt delivery (or try finger)");
3119 case CMDHELP: /* help -- give user inf
[all...]

Completed in 1087 milliseconds

1234567891011>>