/illumos-gate/usr/src/lib/libast/common/misc/ |
H A D | optjoin.c | 57 int user; local 75 user = (*fun)(argv, 0); 84 if (!user)
|
/illumos-gate/usr/src/cmd/lp/lib/access/ |
H A D | allowed.c | 61 /* Check that user has print admin authorization */ 75 char * user, 80 is_user_allowed (user, allow, deny) 81 char *user, 86 if (bangequ(user, LOCAL_LPUSER) || bangequ(user, LOCAL_ROOTUSER)) 89 return (allowed(user, allow, deny)); 99 char * user, 103 is_user_allowed_form (user, form) 104 char *user, 74 is_user_allowed( char * user, char ** allow, char ** deny ) argument 98 is_user_allowed_form( char * user, char * form ) argument 123 is_user_allowed_printer( char * user, char * printer ) argument [all...] |
/illumos-gate/usr/src/cmd/lp/lib/users/ |
H A D | usermgmt.c | 44 int putuser ( char * user, USER * pri_s ) argument 55 if (!add_user(ppri_tbl, user, pri_s->priority_limit)) 67 USER * getuser ( char * user ) 72 if (STREQU(user, "root") || STREQU(user, LPUSER)) 87 if (bang_searchlist(user, ppri_tbl->users[limit - PRI_MIN])) 97 int deluser ( char * user ) 109 del_user(ppri_tbl, user);
|
H A D | loadpri.c | 42 Input: Path name of the user priority file. It has the following 53 list of user names. No white space is allowed 69 Effect: The user priority file is read and parsed. Storage for 78 *user, local 132 if (!(user = next_user(fd, line, &p))) 138 if (!(user = next_user(fd, line, &p))) goto Error; 151 add_user (&pri_tbl, user, pri); 153 while ((user = next_user(fd, line, &p))); 168 Inputs: A pointer to a limit structure, and a user. 170 Effects: Adds <user> t 174 add_user( struct user_priority * ppri_tbl, char * user, int limit ) argument [all...] |
/illumos-gate/usr/src/lib/smbsrv/libmlsvc/common/ |
H A D | smbrdr_glue.c | 78 * asks for this server+user (immediately after this returns), 82 smbrdr_logon(char *srv, char *dom, char *user) argument 87 err = smbrdr_ctx_new(&ctx, srv, dom, user); 107 char *domain, char *user) 116 assert(user != NULL); 125 * Set server, share, domain, user 131 (void) smb_ctx_setuser(ctx, user, B_TRUE); 136 if (user[0] == '\0') { 106 smbrdr_ctx_new(struct smb_ctx **ctx_p, char *server, char *domain, char *user) argument
|
/illumos-gate/usr/src/lib/nsswitch/compat/common/ |
H A D | getuserattr.c | 47 userstr_t *user = (userstr_t *)argp->returnval; local 49 return (user->name); 55 userstr_t *user = (userstr_t *)argp->returnval; local 60 "\n[getuserattr.c: check_name %s with %s]\n", user->name, name); 63 if (strcmp(user->name, name) == 0) {
|
/illumos-gate/usr/src/lib/pam_modules/sample/ |
H A D | sample_acct_mgmt.c | 39 * It may need to force the user to change his/her 50 char *user; local 62 if (pam_get_item(pamh, PAM_USER, (void **)&user) != PAM_SUCCESS) 70 * we want to use the policy of the current user not the "destination" 71 * user. This will enable us to prevent su to root but not to rlogin, 74 * description of problem: user name is the "destination" name. not 76 * current name in the case of su. user is "root" in this case and 77 * we will be getting the root policy instead of the user policy. 86 user = pw->pw_name; 89 if (user [all...] |
H A D | sample_authenticate.c | 62 * pam_sm_authenticate - Authenticate user 72 char *user; local 115 err = pam_get_user(pamh, &user, NULL); 138 * Get the password from the user
|
/illumos-gate/usr/src/lib/pam_modules/smb/ |
H A D | smb_passwd.c | 83 char *user, *local_user; local 111 (void) pam_get_item(pamh, PAM_USER, (void **)&user); 113 if (user == NULL || *user == '\0') { 127 /* Check to see if this is a local user */ 131 res = __user_to_authenticate(user, &files_rep, &local_user, 136 /* if not a local user, ignore */ 139 "pam_smb_passwd: %s is not local", user); 150 res = smb_pwd_setpasswd(user, newpw); 155 * now map the various return states to user message [all...] |
/illumos-gate/usr/src/lib/pam_modules/smbfs/ |
H A D | smbfs_login.c | 60 char *user; local 85 (void) pam_get_item(pamh, PAM_USER, (void **)&user); 87 if (user == NULL || *user == '\0') { 92 if (getpwnam_r(user, &pwbuf, buf, sizeof (buf)) == NULL) { 94 "pam_smbfs_login: username %s can't be found", user); 114 "pam_smbfs_login: service %s, dom %s, user %s", 115 service, dom, user); 118 res = smbfs_keychain_add(uid, dom, user, pw); 121 res = smbfs_keychain_del(uid, dom, user); [all...] |
/illumos-gate/usr/src/lib/print/libpapi-dynamic/common/ |
H A D | papi_impl.h | 58 char *user; member in struct:__anon4325
|
/illumos-gate/usr/src/lib/print/libpapi-ipp/common/ |
H A D | papi_impl.h | 63 char *user; member in struct:__anon4329
|
/illumos-gate/usr/src/lib/libsecdb/common/ |
H A D | getuserattr.c | 55 userstr_t user; local 58 (void) memset(&user, 0, sizeof (userattr_t)); 59 tmp = _getuserattr(&user, buf, NSS_BUFLEN_USERATTR, &err); 68 userstr_t user; local 71 (void) memset(&user, 0, sizeof (userattr_t)); 72 tmp = _fgetuserattr(f, &user, buf, NSS_BUFLEN_USERATTR); 82 userstr_t user; local 85 resptr = _getusernam(name, &user, buf, NSS_BUFLEN_USERATTR, &err); 119 free_userattr(userattr_t *user) argument 121 if (user) { 133 userstr2attr(userstr_t *user) argument 154 print_userattr(userattr_t *user) argument [all...] |
/illumos-gate/usr/src/lib/libresolv2/common/irs/ |
H A D | gen_ng.c | 107 ng_next(struct irs_ng *this, const char **host, const char **user, argument 115 if ((*ng->next)(ng, host, user, domain) == 1) 130 const char *user, const char *host, const char *domain) 140 rval = (*ng->test)(ng, name, user, host, domain); 129 ng_test(struct irs_ng *this, const char *name, const char *user, const char *host, const char *domain) argument
|
/illumos-gate/usr/src/lib/libgss/ |
H A D | g_userok.c | 42 const char *user, 54 gss_user.value = (void *)user; 84 *user_ok = 1; /* remote user is a-ok */ 95 const char *user, 107 if (name == NULL || user == NULL) 127 user, user_ok); 130 name, user, user_ok); 39 compare_names(OM_uint32 *minor, const gss_OID mech_type, const gss_name_t name, const char *user, int *user_ok) argument 93 __gss_userok(OM_uint32 *minor, const gss_name_t name, const char *user, int *user_ok) argument
|
/illumos-gate/usr/src/lib/libmail/common/ |
H A D | maillock.c | 60 maillock(char *user, int retrycnt) argument 71 (void) strcat(file, user);
|
/illumos-gate/usr/src/cmd/userattr/ |
H A D | userattr.c | 45 * userattr [-v] attr_name [user] 75 char *user = NULL; local 91 user = argv[opt++]; 96 gettext("Usage: %s [-v] attribute_name [user]\n"), argv[0]); 100 if (user == NULL) { 105 gettext("Cannot find user for uid %d\n"), uid); 108 user = pwd->pw_name; 110 if ((pwd = getpwnam(user)) == NULL) { 112 gettext("No such user %s\n"), user); [all...] |
/illumos-gate/usr/src/cmd/policykit/ |
H A D | polkit-is-privileged.c | 4 * polkit-is-privileged.c : Determine if a user has privileges 48 " -u, --user Username or user id\n" 56 "Queries system policy whether a given user is allowed for a given\n" 65 char *user = NULL; local 70 {"user", required_argument, NULL, 'u'}, 103 user = g_strdup (optarg); 134 if (user == NULL || privilege == NULL) { 140 printf ("user = '%s'\n", user); [all...] |
/illumos-gate/usr/src/cmd/lp/include/ |
H A D | secure.h | 46 # define SC_UID 1 /* Originator's user ID */ 62 char *user; member in struct:SECURE
|
/illumos-gate/usr/src/lib/pam_modules/unix_session/ |
H A D | unix_session.c | 91 char *ttyn, *rhost, *user; local 116 (error = pam_get_item(pamh, PAM_USER, (void **)&user)) 123 if (user == NULL || *user == '\0') 130 if (getpwnam_r(user, &pwd, buffer, sizeof (buffer)) == NULL) { 180 "user = %s, time = %s, tty = %s, host = %s.", 181 user, buf, newll.ll_line, newll.ll_host);
|
/illumos-gate/usr/src/lib/pam_modules/authtok_get/ |
H A D | authtok_get.c | 63 * the user used to authenticate in OLDAUTHTOK, so it is available 158 * All we need to do, is make sure that the user re-enters 217 * Read authentication token from user. 223 char *user; local 242 if ((res = pam_get_user(pamh, &user, NULL)) != PAM_SUCCESS) { 245 "pam_authtok_get: get user failed: %s", 250 if (user == NULL || *user == '\0') { 290 res = __get_authtoken_attr(user, pwu_rep, al); 319 "%s from %s.", service, user, rhos [all...] |
/illumos-gate/usr/src/lib/pam_modules/authtok_store/ |
H A D | authtok_store.c | 98 char *user; local 142 res = pam_get_item(pamh, PAM_USER, (void **)&user); 148 if (user == NULL || *user == '\0') { 201 res = __set_authtoken_attr(user, oldpw, pwu_rep, &l, &updated_reps); 206 * now map the various passwdutil return states to user messages 216 service, user); 244 service, auth_rep->type, user); 247 "%s: %s does not exist."), service, user);
|
/illumos-gate/usr/src/lib/pam_modules/dial_auth/ |
H A D | dial_auth.c | 57 char *ttyn, *user; local 77 if ((retcode = pam_get_user(pamh, &user, NULL)) 85 "Dialpass authenticate user = %s, ttyn = %s", 86 user ? user : "NULL", ttyn ? ttyn : "NULL"); 98 if (getpwnam_r(user, &pwd, pwd_buffer, sizeof (pwd_buffer)) == NULL)
|
/illumos-gate/usr/src/lib/pam_modules/krb5/ |
H A D | utils.c | 48 * To get the uid from the passwd entry for specified user 49 * It returns 0 if the user can't be found, otherwise returns 1. 52 get_pw_uid(char *user, uid_t *uid) argument 57 if (getpwnam_r(user, &sp, buffer, sizeof (buffer)) == NULL) { 68 * To get the gid from the passwd entry for specified user 69 * It returns 0 if the user can't be found, otherwise returns 1. 72 get_pw_gid(char *user, gid_t *gid) argument 77 if (getpwnam_r(user, &sp, buffer, sizeof (buffer)) == NULL) { 89 * To get the kerberos user name for the specified user 104 get_kmd_kuser(krb5_context kcontext, const char *user, char *kuser, int length) argument 143 key_in_keytab(const char *user, int debug) argument [all...] |
H A D | utils.h | 46 char *user; member in struct:__anon4258
|