Searched defs:user (Results 26 - 50 of 283) sorted by relevance

1234567891011>>

/illumos-gate/usr/src/lib/libast/common/misc/
H A Doptjoin.c57 int user; local
75 user = (*fun)(argv, 0);
84 if (!user)
/illumos-gate/usr/src/cmd/lp/lib/access/
H A Dallowed.c61 /* Check that user has print admin authorization */
75 char * user,
80 is_user_allowed (user, allow, deny)
81 char *user,
86 if (bangequ(user, LOCAL_LPUSER) || bangequ(user, LOCAL_ROOTUSER))
89 return (allowed(user, allow, deny));
99 char * user,
103 is_user_allowed_form (user, form)
104 char *user,
74 is_user_allowed( char * user, char ** allow, char ** deny ) argument
98 is_user_allowed_form( char * user, char * form ) argument
123 is_user_allowed_printer( char * user, char * printer ) argument
[all...]
/illumos-gate/usr/src/cmd/lp/lib/users/
H A Dusermgmt.c44 int putuser ( char * user, USER * pri_s ) argument
55 if (!add_user(ppri_tbl, user, pri_s->priority_limit))
67 USER * getuser ( char * user )
72 if (STREQU(user, "root") || STREQU(user, LPUSER))
87 if (bang_searchlist(user, ppri_tbl->users[limit - PRI_MIN]))
97 int deluser ( char * user )
109 del_user(ppri_tbl, user);
H A Dloadpri.c42 Input: Path name of the user priority file. It has the following
53 list of user names. No white space is allowed
69 Effect: The user priority file is read and parsed. Storage for
78 *user, local
132 if (!(user = next_user(fd, line, &p)))
138 if (!(user = next_user(fd, line, &p))) goto Error;
151 add_user (&pri_tbl, user, pri);
153 while ((user = next_user(fd, line, &p)));
168 Inputs: A pointer to a limit structure, and a user.
170 Effects: Adds <user> t
174 add_user( struct user_priority * ppri_tbl, char * user, int limit ) argument
[all...]
/illumos-gate/usr/src/lib/smbsrv/libmlsvc/common/
H A Dsmbrdr_glue.c78 * asks for this server+user (immediately after this returns),
82 smbrdr_logon(char *srv, char *dom, char *user) argument
87 err = smbrdr_ctx_new(&ctx, srv, dom, user);
107 char *domain, char *user)
116 assert(user != NULL);
125 * Set server, share, domain, user
131 (void) smb_ctx_setuser(ctx, user, B_TRUE);
136 if (user[0] == '\0') {
106 smbrdr_ctx_new(struct smb_ctx **ctx_p, char *server, char *domain, char *user) argument
/illumos-gate/usr/src/lib/nsswitch/compat/common/
H A Dgetuserattr.c47 userstr_t *user = (userstr_t *)argp->returnval; local
49 return (user->name);
55 userstr_t *user = (userstr_t *)argp->returnval; local
60 "\n[getuserattr.c: check_name %s with %s]\n", user->name, name);
63 if (strcmp(user->name, name) == 0) {
/illumos-gate/usr/src/lib/pam_modules/sample/
H A Dsample_acct_mgmt.c39 * It may need to force the user to change his/her
50 char *user; local
62 if (pam_get_item(pamh, PAM_USER, (void **)&user) != PAM_SUCCESS)
70 * we want to use the policy of the current user not the "destination"
71 * user. This will enable us to prevent su to root but not to rlogin,
74 * description of problem: user name is the "destination" name. not
76 * current name in the case of su. user is "root" in this case and
77 * we will be getting the root policy instead of the user policy.
86 user = pw->pw_name;
89 if (user
[all...]
H A Dsample_authenticate.c62 * pam_sm_authenticate - Authenticate user
72 char *user; local
115 err = pam_get_user(pamh, &user, NULL);
138 * Get the password from the user
/illumos-gate/usr/src/lib/pam_modules/smb/
H A Dsmb_passwd.c83 char *user, *local_user; local
111 (void) pam_get_item(pamh, PAM_USER, (void **)&user);
113 if (user == NULL || *user == '\0') {
127 /* Check to see if this is a local user */
131 res = __user_to_authenticate(user, &files_rep, &local_user,
136 /* if not a local user, ignore */
139 "pam_smb_passwd: %s is not local", user);
150 res = smb_pwd_setpasswd(user, newpw);
155 * now map the various return states to user message
[all...]
/illumos-gate/usr/src/lib/pam_modules/smbfs/
H A Dsmbfs_login.c60 char *user; local
85 (void) pam_get_item(pamh, PAM_USER, (void **)&user);
87 if (user == NULL || *user == '\0') {
92 if (getpwnam_r(user, &pwbuf, buf, sizeof (buf)) == NULL) {
94 "pam_smbfs_login: username %s can't be found", user);
114 "pam_smbfs_login: service %s, dom %s, user %s",
115 service, dom, user);
118 res = smbfs_keychain_add(uid, dom, user, pw);
121 res = smbfs_keychain_del(uid, dom, user);
[all...]
/illumos-gate/usr/src/lib/print/libpapi-dynamic/common/
H A Dpapi_impl.h58 char *user; member in struct:__anon4325
/illumos-gate/usr/src/lib/print/libpapi-ipp/common/
H A Dpapi_impl.h63 char *user; member in struct:__anon4329
/illumos-gate/usr/src/lib/libsecdb/common/
H A Dgetuserattr.c55 userstr_t user; local
58 (void) memset(&user, 0, sizeof (userattr_t));
59 tmp = _getuserattr(&user, buf, NSS_BUFLEN_USERATTR, &err);
68 userstr_t user; local
71 (void) memset(&user, 0, sizeof (userattr_t));
72 tmp = _fgetuserattr(f, &user, buf, NSS_BUFLEN_USERATTR);
82 userstr_t user; local
85 resptr = _getusernam(name, &user, buf, NSS_BUFLEN_USERATTR, &err);
119 free_userattr(userattr_t *user) argument
121 if (user) {
133 userstr2attr(userstr_t *user) argument
154 print_userattr(userattr_t *user) argument
[all...]
/illumos-gate/usr/src/lib/libresolv2/common/irs/
H A Dgen_ng.c107 ng_next(struct irs_ng *this, const char **host, const char **user, argument
115 if ((*ng->next)(ng, host, user, domain) == 1)
130 const char *user, const char *host, const char *domain)
140 rval = (*ng->test)(ng, name, user, host, domain);
129 ng_test(struct irs_ng *this, const char *name, const char *user, const char *host, const char *domain) argument
/illumos-gate/usr/src/lib/libgss/
H A Dg_userok.c42 const char *user,
54 gss_user.value = (void *)user;
84 *user_ok = 1; /* remote user is a-ok */
95 const char *user,
107 if (name == NULL || user == NULL)
127 user, user_ok);
130 name, user, user_ok);
39 compare_names(OM_uint32 *minor, const gss_OID mech_type, const gss_name_t name, const char *user, int *user_ok) argument
93 __gss_userok(OM_uint32 *minor, const gss_name_t name, const char *user, int *user_ok) argument
/illumos-gate/usr/src/lib/libmail/common/
H A Dmaillock.c60 maillock(char *user, int retrycnt) argument
71 (void) strcat(file, user);
/illumos-gate/usr/src/cmd/userattr/
H A Duserattr.c45 * userattr [-v] attr_name [user]
75 char *user = NULL; local
91 user = argv[opt++];
96 gettext("Usage: %s [-v] attribute_name [user]\n"), argv[0]);
100 if (user == NULL) {
105 gettext("Cannot find user for uid %d\n"), uid);
108 user = pwd->pw_name;
110 if ((pwd = getpwnam(user)) == NULL) {
112 gettext("No such user %s\n"), user);
[all...]
/illumos-gate/usr/src/cmd/policykit/
H A Dpolkit-is-privileged.c4 * polkit-is-privileged.c : Determine if a user has privileges
48 " -u, --user Username or user id\n"
56 "Queries system policy whether a given user is allowed for a given\n"
65 char *user = NULL; local
70 {"user", required_argument, NULL, 'u'},
103 user = g_strdup (optarg);
134 if (user == NULL || privilege == NULL) {
140 printf ("user = '%s'\n", user);
[all...]
/illumos-gate/usr/src/cmd/lp/include/
H A Dsecure.h46 # define SC_UID 1 /* Originator's user ID */
62 char *user; member in struct:SECURE
/illumos-gate/usr/src/lib/pam_modules/unix_session/
H A Dunix_session.c91 char *ttyn, *rhost, *user; local
116 (error = pam_get_item(pamh, PAM_USER, (void **)&user))
123 if (user == NULL || *user == '\0')
130 if (getpwnam_r(user, &pwd, buffer, sizeof (buffer)) == NULL) {
180 "user = %s, time = %s, tty = %s, host = %s.",
181 user, buf, newll.ll_line, newll.ll_host);
/illumos-gate/usr/src/lib/pam_modules/authtok_get/
H A Dauthtok_get.c63 * the user used to authenticate in OLDAUTHTOK, so it is available
158 * All we need to do, is make sure that the user re-enters
217 * Read authentication token from user.
223 char *user; local
242 if ((res = pam_get_user(pamh, &user, NULL)) != PAM_SUCCESS) {
245 "pam_authtok_get: get user failed: %s",
250 if (user == NULL || *user == '\0') {
290 res = __get_authtoken_attr(user, pwu_rep, al);
319 "%s from %s.", service, user, rhos
[all...]
/illumos-gate/usr/src/lib/pam_modules/authtok_store/
H A Dauthtok_store.c98 char *user; local
142 res = pam_get_item(pamh, PAM_USER, (void **)&user);
148 if (user == NULL || *user == '\0') {
201 res = __set_authtoken_attr(user, oldpw, pwu_rep, &l, &updated_reps);
206 * now map the various passwdutil return states to user messages
216 service, user);
244 service, auth_rep->type, user);
247 "%s: %s does not exist."), service, user);
/illumos-gate/usr/src/lib/pam_modules/dial_auth/
H A Ddial_auth.c57 char *ttyn, *user; local
77 if ((retcode = pam_get_user(pamh, &user, NULL))
85 "Dialpass authenticate user = %s, ttyn = %s",
86 user ? user : "NULL", ttyn ? ttyn : "NULL");
98 if (getpwnam_r(user, &pwd, pwd_buffer, sizeof (pwd_buffer)) == NULL)
/illumos-gate/usr/src/lib/pam_modules/krb5/
H A Dutils.c48 * To get the uid from the passwd entry for specified user
49 * It returns 0 if the user can't be found, otherwise returns 1.
52 get_pw_uid(char *user, uid_t *uid) argument
57 if (getpwnam_r(user, &sp, buffer, sizeof (buffer)) == NULL) {
68 * To get the gid from the passwd entry for specified user
69 * It returns 0 if the user can't be found, otherwise returns 1.
72 get_pw_gid(char *user, gid_t *gid) argument
77 if (getpwnam_r(user, &sp, buffer, sizeof (buffer)) == NULL) {
89 * To get the kerberos user name for the specified user
104 get_kmd_kuser(krb5_context kcontext, const char *user, char *kuser, int length) argument
143 key_in_keytab(const char *user, int debug) argument
[all...]
H A Dutils.h46 char *user; member in struct:__anon4258

Completed in 802 milliseconds

1234567891011>>