/illumos-gate/usr/src/uts/common/fs/smbclnt/netsmb/ |
H A D | smb_pass.c | 106 * uid/zoneid/username/domainname. 118 * The nodes are added sorted on the uid/zoneid/domainname/username 120 * Compare uid's. The owner who stored the node gets access. 125 if (pa->uid < pb->uid) 127 if (pa->uid > pb->uid) 149 * Initialization of the code that deals with uid and passwords. 209 uid_t uid; local 212 uid 282 uid_t uid; local 336 uid_t uid; local 370 uid_t uid; local [all...] |
H A D | smb_pass.h | 43 uid_t uid; /* User id */ member in struct:smb_passid
|
/illumos-gate/usr/src/cmd/isns/isnsd/ |
H A D | htable.c | 53 * uid - the object UID. 61 const uint32_t uid 67 if (x->uid > uid) { 69 } else if (x->uid < uid) { 86 * uid - the previous object UID. 94 const uint32_t uid 101 if (x->uid > uid) { 467 uint32_t uid = *uid_p; local 544 uint32_t uid; local 708 uint32_t uid = 0; local 835 htab_remove( htab_t *tab, void *p, uint32_t uid, int clone_flag ) argument 960 htab_lookup( htab_t *tab, void *p, uint32_t uid, uint32_t *uid_p, int (*callback)(void *, void *), int rekey ) argument [all...] |
H A D | qry.c | 194 uint32_t uid = lcp->curr_uid; /* last child */ local 201 if (uid == 0) { 210 if (*uids > uid) { 218 uid = tmp_uid; 221 if (uid == 0) { 230 /* save it for returning and querying next uid */ 231 lcp->curr_uid = uid; 241 uint32_t uid; local 245 uid = (uint32_t)cache_lookup(lcp, NULL, 248 uid 264 uint32_t uid = lcp->curr_uid; /* last member */ local 309 uint32_t uid; local 343 uint32_t uid = lcp->curr_uid; /* last pg */ local 376 uint32_t uid = lcp->curr_uid; /* last pg */ local 423 uint32_t uid = lcp->data[0].ui; local 440 uint32_t uid = lcp->curr_uid; /* last pg */ local 495 uint32_t uid = lcp->curr_uid; /* last node */ local 539 uint32_t uid = lcp->curr_uid; /* last portal */ local 719 attrs_match( isns_type_t type, uint32_t uid, isns_attr_t *attrs ) argument 802 uint32_t uid; local 964 get_qry_ops( uint32_t uid, isns_type_t src_type, isns_type_t op_type, uint32_t **op_uids, uint32_t *num_of_ops, uint32_t *size ) argument 1043 uint32_t uid, diff; local 1179 get_qry_attrs( uint32_t uid, isns_type_t type, isns_tlv_t *tlv, uint16_t tlv_len, conn_arg_t *conn ) argument 1203 get_qry_attrs1( uint32_t uid, isns_type_t type, isns_tlv_t *tlv, uint16_t tlv_len, conn_arg_t *conn ) argument [all...] |
H A D | isns_scn.h | 38 uint32_t uid; member in struct:scn_raw 53 uint32_t uid; member in struct:scn_text 64 uint32_t uid; member in struct:scn_portal 96 uint32_t uid; member in struct:scn_registry
|
/illumos-gate/usr/src/uts/common/syscall/ |
H A D | uid.c | 44 setuid(uid_t uid) argument 51 uid_t oldruid = uid; 56 if (!VALID_UID(uid, zone)) 59 if (uid > MAXUID) { 60 if (ksid_lookupbyuid(zone, uid, &ksid) != 0) 83 if ((uid == cr->cr_ruid || uid == cr->cr_suid) && 84 secpolicy_allow_setid(cr, uid, B_TRUE) != 0) { 92 newcr->cr_uid = uid; 95 } else if ((error = secpolicy_allow_setid(cr, uid, B_FALS 189 seteuid(uid_t uid) argument [all...] |
/illumos-gate/usr/src/cmd/gss/gsscred/ |
H A D | gsscred_file.c | 37 * Manages mapping between a security principal name and unix uid. 60 const char *uid, uid_t *uidOut); 68 int file_addGssCredEntry(const gss_buffer_t hexName, const char *uid, argument 85 "%s\t%s\t%s\n", (char *)hexName->value, uid, comment); 98 * To search by uid only, supply a non-null value of uid. 100 int file_getGssCredEntry(const gss_buffer_t name, const char *uid, argument 121 if (name == NULL && uid == NULL) { 126 if (matchEntry(entry, name, uid, NULL)) 138 * GSS entry point for retrieving user uid informatio 173 file_deleteGssCredEntry(const gss_buffer_t name, const char *uid, char **errDetails) argument 258 matchEntry(const char *entry, const gss_buffer_t name, const char *uid, uid_t *uidOut) argument [all...] |
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/os/ |
H A D | safechown.c | 17 * safechown changes the owner ship of src to uid. If the mode parameter 24 safechown(const char *src, uid_t uid, gid_t gid, int mode) argument 57 /* we should probably get the primary group id for uid here */ 58 if (fchown(fd, uid, gid)) { 79 fprintf(stderr, "Usage %s [-u uid] [-m mode] source\n", prg); 87 uid_t uid = 0; local 95 uid = atoi(optarg); 105 if (safechown(argv[optind], uid, getgid(), mode)) {
|
/illumos-gate/usr/src/lib/libbsm/common/ |
H A D | audit_rexecd.c | 53 selected(uid, user, event, sf) 54 uid_t uid; 63 if (uid > MAXEPHUID) { 91 audit_rexecd_session_setup(char *name, char *mach, uid_t uid) argument 98 info.ai_auid = uid; 138 uid_t uid; local 168 uid = (uid_t)-1; 171 uid = pwd->pw_uid; 176 if (!selected(uid, user, event, -1)) 196 au_to_subject_ex(uid, ui 249 uid_t uid; local [all...] |
H A D | audit_rexd.c | 81 selected(uid, user, event, sf) 82 uid_t uid; 91 if (uid > MAXEPHUID) { 119 audit_rexd_session_setup(char *name, char *mach, uid_t uid) argument 130 info.ai_auid = uid; 148 audit_rexd_fail(msg, hostname, user, uid, gid, shell, cmd) 152 uid_t uid; /* user id of user requesting service */ 189 if (!selected(uid, user, event, -1)) 203 au_to_subject_ex(uid, uid, gi [all...] |
/illumos-gate/usr/src/lib/libcmd/common/ |
H A D | chgrp.c | 116 typedef struct Key_s /* uid/gid key */ 118 int uid; /* uid */ member in struct:Key_s 122 typedef struct Map_s /* uid/gid map */ 137 #define OPT_UID (1<<6) /* have uid */ 139 #define OPT_VERBOSE (1<<8) /* have uid */ 150 lchown(const char* path, uid_t uid, gid_t gid) argument 158 * parse uid and gid from s 169 key->uid = key->gid = NOID; 190 key->uid 226 int uid; local [all...] |
/illumos-gate/usr/src/cmd/chown/ |
H A D | chown.c | 37 * chown [-fhR] uid[:gid] file ... 38 * chown -R [-f] [-H|-L|-P] uid[:gid] file ... 62 static uid_t uid = (uid_t)-1; variable 236 if (sid_to_id(argv[0], B_TRUE, &uid)) { 242 uid = pwd->pw_uid; 246 uid = (uid_t)strtoul(argv[0], NULL, 10); 279 LCHOWN(argv[c], uid, gid); 308 uid, gid); 326 CHOWN(argv[c], uid, gid); 333 CHOWN(argv[c], uid, gi 376 chownr(char *dir, uid_t uid, gid_t gid) argument [all...] |
/illumos-gate/usr/src/lib/libnsl/rpc/ |
H A D | netname.c | 43 * Convert from unix names (uid, gid) to network wide names. 108 * 3 pieces of information <opsys type> <uid> <domain>. 112 user2netname_nis(int *err, char netname[MAXNETNAMELEN + 1], uid_t uid, argument 130 "%s.%d@%s", OPSYS, (int)uid, domain); 144 uid_t uid; local 146 uid = geteuid(); 147 if (uid == 0) 149 return (user2netname(name, uid, NULL)); 154 * Figure out the fully qualified network name for the given uid. 158 __getnetnamebyuid(char name[MAXNETNAMELEN + 1], uid_t uid) argument 177 user2netname(char netname[MAXNETNAMELEN + 1], const uid_t uid, const char *domain) argument [all...] |
/illumos-gate/usr/src/cmd/keyserv/ |
H A D | keyserv.c | 42 * keyserv(1M) performs multiple functions: it stores secret keys per uid; it 621 __key_set_1_svc(uid, key, status) 622 uid_t uid; 627 (void) fprintf(stderr, "set(%d, %.*s) = ", uid, 630 *status = pk_setkey(uid, key); 639 __key_encrypt_pk_2_svc(uid, arg, res) 640 uid_t uid; 646 (void) fprintf(stderr, "encrypt(%d, %s, %08x%08x) = ", uid, 651 res->status = pk_encrypt(uid, arg->remotename, &(arg->remotekey), 667 __key_decrypt_pk_2_svc(uid, ar 900 __key_set_3_svc(uid_t uid, setkeyarg3 *arg, keystatus *status) argument 910 __key_encrypt_3_svc(uid_t uid, cryptkeyarg3 *arg, cryptkeyres3 *res) argument 930 __key_decrypt_3_svc(uid_t uid, cryptkeyarg3 *arg, cryptkeyres3 *res) argument 979 __key_getcred_3_svc(uid_t uid, netnamestr *name, getcredres3 *res) argument 985 __key_encrypt_pk_3_svc(uid_t uid, cryptkeyarg3 *arg, cryptkeyres3 *res) argument 1002 __key_decrypt_pk_3(uid_t uid, cryptkeyarg3 *arg, cryptkeyres3 *res) argument 1019 __key_net_put_3_svc(uid_t uid, key_netstarg3 *arg, keystatus *status) argument 1028 __key_net_get_3_svc(uid_t uid, mechtype *arg, key_netstres3 *keynetname) argument 1049 __key_get_conv_3_svc(uid_t uid, deskeyarg3 *arg, cryptkeyres3 *res) argument 1060 __key_clear_3_svc(uid_t uid, void *arg, keystatus *status) argument 1116 uid_t uid; local [all...] |
/illumos-gate/usr/src/cmd/lp/lib/secure/ |
H A D | llib-llpsec | 38 uid_t uid;
|
/illumos-gate/usr/src/cmd/fs.d/smbclnt/chacl/ |
H A D | chacl.c | 75 uid_t uid = (uid_t)-1; local 94 uid = (uid_t)tl; 144 if (uid != (uid_t)-1) 152 chacl(argv[optind], selector, uid, gid, acl); 160 chacl(char *file, uint32_t selector, uid_t uid, gid_t gid, acl_t *acl) argument 178 if (uid == (uid_t)-1 || gid == (gid_t)-1) { 188 if (uid == (uid_t)-1) 189 uid = st.st_uid; 197 error = smbfs_acl_zfs2sd(acl, uid, gid, selector, &sd); 209 if (uid [all...] |
/illumos-gate/usr/src/lib/pam_modules/dhkeys/ |
H A D | key_call_uid.c | 45 * authsys_create_uid(uid_t uid) 47 * Create SYS (UNIX) style authenticator for the given uid/gid 52 authsys_create_uid(uid_t uid, gid_t gid) argument 64 res = authsys_create(host, uid, gid, 0, (gid_t *)NULL); 78 xdrproc_t xdr_rslt, char *rslt, uid_t uid, gid_t gid) 88 r = (*__key_encryptsession_pk_LOCAL)(uid, arg, &res); 99 r = (*__key_decryptsession_pk_LOCAL)(uid, arg, &res); 110 r = (*__key_gendes_LOCAL)(uid, 0, &res); 131 clnt->cl_auth = authsys_create_uid(uid, gid); 143 key_setnet_uid(struct key_netstarg *arg, uid_t uid, gid_ argument 77 my_key_call(rpcproc_t proc, xdrproc_t xdr_arg, char *arg, xdrproc_t xdr_rslt, char *rslt, uid_t uid, gid_t gid) argument 159 key_setnet_g_uid(const char *netname, const char *skey, keylen_t skeylen, const char *pkey, keylen_t pkeylen, algtype_t algtype, uid_t uid, gid_t gid) argument 236 key_secretkey_is_set_uid(uid_t uid, gid_t gid) argument 256 key_removesecret_g_uid(uid_t uid, gid_t gid) argument [all...] |
/illumos-gate/usr/src/lib/libsmbfs/smb/ |
H A D | keychain.c | 57 uid_t uid, 67 pk.pk_uid = uid; 158 smbfs_keychain_add(uid_t uid, const char *dom, const char *usr, argument 173 err = smbfs_keychain_cmn(cmd, uid, dom, usr, lmhash, nthash); 179 smbfs_keychain_addhash(uid_t uid, const char *dom, const char *usr, argument 184 err = smbfs_keychain_cmn(cmd, uid, dom, usr, 191 smbfs_keychain_del(uid_t uid, const char *dom, const char *usr) argument 193 return (smbfs_keychain_cmn(SMBIOC_PK_DEL, uid, dom, usr, NULL, NULL)); 203 uid_t uid = (uid_t)-1; local 204 return (smbfs_keychain_cmn(SMBIOC_PK_CHK, uid, do 55 smbfs_keychain_cmn( int cmd, uid_t uid, const char *dom, const char *usr, uchar_t *lmhash, uchar_t *nthash) argument 214 uid_t uid = (uid_t)-1; local 228 uid_t uid = getuid(); local 240 uid_t uid = getuid(); local [all...] |
/illumos-gate/usr/src/lib/libbc/inc/include/sys/ |
H A D | ipc.h | 33 ushort uid; /* owner's user id */ member in struct:ipc_perm
|
/illumos-gate/usr/src/cmd/nscd/ |
H A D | getpw.c | 71 return (_NSC_INT_KEY_CMP(e1->key.uid, e2->key.uid)); 76 return ((uint_t)key->uid % htsize); 81 (void) snprintf(whoami, len, "%s [key=%d]", name, argp->key.uid);
|
/illumos-gate/usr/src/cmd/sendmail/db/include/ |
H A D | log_auto.h | 21 DBT uid; member in struct:_log_register_args
|
/illumos-gate/usr/src/cmd/sendmail/db/log/ |
H A D | log_auto.c | 24 opcode, name, uid, id, ftype) 31 const DBT *uid; 52 + sizeof(u_int32_t) + (uid == NULL ? 0 : uid->size) 77 if (uid == NULL) { 82 memcpy(bp, &uid->size, sizeof(uid->size)); 83 bp += sizeof(uid->size); 84 memcpy(bp, uid->data, uid [all...] |
/illumos-gate/usr/src/cmd/acct/ |
H A D | accton.c | 53 uid_t uid; local 55 uid = getuid(); 57 perror("cannot determine adm's uid"), exit(1); 60 if (uid == ROOT || uid == admuid) {
|
/illumos-gate/usr/src/cmd/lp/include/ |
H A D | secure.h | 58 uid_t uid; member in struct:SECURE
|
/illumos-gate/usr/src/lib/nsswitch/nis/common/ |
H A D | getpwnam.c | 50 if (argp->key.uid > MAXUID) 52 (void) snprintf(uidstr, 12, "%u", argp->key.uid); 57 * Validates passwd entry replacing uid/gid > MAXUID by ID_NOBODY. 63 uid_t uid; local 84 uidl = strtoul(uidp, (char **)&linep, 10); /* grab uid */ 97 uid = (uidl > MAXUID) ? UID_NOBODY : (uid_t)uidl; 101 idlen = snprintf(NULL, 0, "%u:%u", uid, gid); 110 *linepp, uid, gid, linep); 119 (void) snprintf(uidp, idlen + 1, "%u:%u", uid, gid);
|