/illumos-gate/usr/src/cmd/bnu/ |
H A D | uustat.c | 226 fprintf(stderr, gettext("Invalid user\n")); 471 char fullname[MAXFULLNAME], buf[BUFSIZ], user[9]; local 521 user, opt, file3) <5) { 529 DEBUG(9, "user (%s)", user); 533 if (User[0] != '\0' && (!EQUALS(User, user)) ) 582 sprintf(format_tmp,"%s %s ", user, file1); 587 sprintf(format_tmp,"%s %ld %s ", user, fsize(dir, file3, file1), file1); 596 sprintf(format_tmp,"%s ", user); 618 username = user; 710 char fullname[MAXFULLNAME], buf[BUFSIZ], user[9]; local [all...] |
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/ftp/ |
H A D | ftp.c | 231 * It can even be the case that the "host" supplied by the user 361 char *user, *pass, *acct; local 364 user = pass = acct = 0; 365 if (ruserpass(host, &user, &pass, &acct) < 0) { 370 if (user == NULL) { 386 user = tmp; 388 user = myname; 392 n = command("USER %s", user);
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/pppd/ |
H A D | auth.c | 146 /* Hook for a plugin to check the PAP user and password */ 147 int (*pap_auth_hook) __P((char *user, char *passwd, char **msgp, 151 /* Hook for a plugin to know about the PAP user logout */ 155 int (*pap_passwd_hook) __P((char *user, char *passwd)) = NULL; 260 { "user", o_string, user, 276 "Get PAP user and password from file" }, 320 /* open user info file */ 325 option_error("unable to open user login data file %s", *argv); 331 if (fgets(user, MAXNAMELE 1079 char passwd[256], user[256]; local [all...] |
/illumos-gate/usr/src/cmd/idmap/idmap/ |
H A D | idmap.c | 67 #define IS_USER 0x001 /* mask for user types */ 167 * commands. MAPPING_NAME prefers the string names of the user over 220 char *user; member in struct:__anon650 602 free_null(&namemaps.user); 621 init_nm_command(char *user, char *passwd, char *auth, char *windomain, argument 627 strcmp_null(user, namemaps.user) != 0 || 636 stat = idmap_init_namemaps(&namemaps.handle, user, 647 if (user != NULL && (namemaps.user 3122 flags2cred(flag_t *f, char **user, char **passwd, cmd_pos_t *pos) argument 3219 char *user; local 3276 char *user; local [all...] |
/illumos-gate/usr/src/lib/krb5/plugins/kdb/ldap/libkdb_ldap/ |
H A D | ldap_misc.c | 837 * object (user, policy ...). 1987 /* get the associated directory user information */ 1990 char *user; local 1992 if ((st=krb5_unparse_name(context, princ, &user)) != 0) 1996 if (strcasecmp(values[i], user) == 0) { 2002 free(user); 2022 /* add principalcount, DN and principaltype user information to tl_data */
|
/illumos-gate/usr/src/cmd/login/ |
H A D | login.c | 53 * login: "This user is authenticated." In the case of zlogin that's 203 * The current user name 254 * Strings used to prompt the user. 514 * validate user 522 (void) printf("Login failed: unknown user '%s'.\n", 544 * we are not root then throw the user off the system 568 * Now we set up the environment for the new user, which includes 584 setup_credentials(); /* Set user credentials - exits on failure */ 625 * Display some useful information to the new user like the banner 797 * or garner information from the user 934 char *user; local 1774 char *user; local 2010 char *user; local [all...] |
/illumos-gate/usr/src/lib/smbsrv/libmlsvc/common/ |
H A D | srvsvc_svc.c | 1370 * the user info icon is selected. 1375 * ERROR_ACCESS_DENIED The user does not have access to the requested 1384 * NERR_UserNotFound The user name could not be found. 1499 smb_netuserinfo_t *user; local 1512 user = &item->nsi_un.nsi_user; 1514 workstation = user->ui_workstation; 1516 (void) smb_inet_ntop(&user->ui_ipaddr, ipaddr_buf, 1517 SMB_IPSTRLEN(user->ui_ipaddr.a_family)); 1522 user->ui_domain, user 2681 smb_netuserinfo_t *user = mxa->pipe->np_user; local [all...] |
/illumos-gate/usr/src/lib/smbsrv/libsmbns/common/ |
H A D | smbns_ads.c | 122 * UserAccountControl flags: manipulate user account properties. 156 "user", "computer", NULL 632 * user - the user account for whom the Kerberos TGT ticket and ADS 634 * password - password of the specified user 641 smb_ads_open_main(smb_ads_handle_t **hp, char *domain, char *user, argument 652 if (user != NULL) { 653 err = smb_kinit(domain, user, password); 656 user = NULL; 1616 * Modify the user accoun 1695 smb_ads_join(char *domain, char *user, char *usr_passwd, char *machine_passwd) argument [all...] |
/illumos-gate/usr/src/cmd/smbsrv/smbadm/ |
H A D | smbadm.c | 132 { "disable-user", smbadm_user_disable, HELP_USER_DISABLE, 134 { "enable-user", smbadm_user_enable, HELP_USER_ENABLE, 224 (void) fprintf(fp, gettext("\t%s user\n"), cmd->name); 255 gettext("\t%s user-or-group-name\n"), 367 * specified, which will be used if the user presses <enter> without 714 * We want to process the user and domain names as separate strings. 809 * Lookup the SID for a given account (user or group) 1464 char *user = NULL; local 1466 user = argv[optind]; 1467 if (optind >= argc || user 1485 char *user = NULL; local [all...] |
/illumos-gate/usr/src/cmd/syseventd/modules/sysevent_conf_mod/ |
H A D | sysevent_conf_mod.c | 35 * data, and a user specification so that commands can be invoked 450 * class subclass vendor publisher user reserved1 reserved path arguments 472 * user 473 * The name of the user under which the command should be 475 * other than those for root. The user field should be '-' 501 char *user; local 543 if ((user = next_field(&lp)) == NULL) 554 * validate user 557 if ((strcmp(user, "-") != 0) && (strcmp(user, "roo [all...] |
/illumos-gate/usr/src/lib/libpool/common/ |
H A D | pool_kernel.c | 730 * load_group to allocate the user-land representation of the 876 pool_value_t *pval, void *user) 878 struct knl_to_xml *info = (struct knl_to_xml *)user; 2990 * however the kernel update is delayed until the user calls 875 prop_build_cb(pool_conf_t *UNUSED, pool_elem_t *pe, const char *name, pool_value_t *pval, void *user) argument
|
/illumos-gate/usr/src/cmd/stat/iostat/ |
H A D | iostat.c | 948 "\t\t\tin user/system/dtrace/idle mode\n" 1570 uint64_t user; local 1585 user = kstat_delta(oldks, &newss->s_sys.ss_agg_sys, "cpu_ticks_user"); 1591 push_out(fstr, user * percent, kern * percent,
|
/illumos-gate/usr/src/common/acl/ |
H A D | acl_common.c | 140 avl_tree_t user; member in struct:ace_list 527 * user|group for the mask (the group_obj was added 1133 for (vals = avl_first(&list->user); vals != NULL; 1134 vals = AVL_NEXT(&list->user, vals)) { 1232 while ((node = avl_destroy_nodes(&al->user, &cookie)) != NULL) 1238 avl_destroy(&al->user); 1295 avl_create(&normacl->user, acevals_compare, sizeof (acevals_t), 1306 avl_create(&dfacl->user, acevals_compare, sizeof (acevals_t), 1388 vals = acevals_find(acep, &acl->user,
|
/illumos-gate/usr/src/common/ficl/ |
H A D | ficl.h | 264 * Enables user variables: per-instance variables bound to the VM. 285 * OOP support requires locals and user variables! 1014 ficlCell user[FICL_USER_CELLS]; member in struct:ficlVm 1039 /* user wants to quit */ 1117 * FICL_VM_STATUS_USER_EXIT means that the user executed the "bye" command 1186 * For precompiled words, the code is all there is. For user defined 1505 * by default, user can redefine to guarantee exclusive dictionary
|
/illumos-gate/usr/src/uts/common/fs/zfs/ |
H A D | dbuf.c | 319 /* Only data blocks support the attachment of user data. */ 322 /* Clients must resolve a dbuf before attaching user data. */ 2877 dmu_buf_set_user(dmu_buf_t *db_fake, dmu_buf_user_t *user) argument 2879 return (dmu_buf_replace_user(db_fake, NULL, user)); 2883 dmu_buf_set_user_ie(dmu_buf_t *db_fake, dmu_buf_user_t *user) argument 2888 return (dmu_buf_set_user(db_fake, user)); 2892 dmu_buf_remove_user(dmu_buf_t *db_fake, dmu_buf_user_t *user) argument 2894 return (dmu_buf_replace_user(db_fake, user, NULL));
|
H A D | dmu_objset.c | 1071 * dnode and user/group accounting objects). 1291 uint64_t user, uint64_t group, boolean_t subtract) 1298 userquota_update_cache(&cache->uqc_user_deltas, user, delta); 1324 /* Allocate the user/groupused objects if necessary. */ 1415 uint64_t *user = NULL; local 1460 user = &dn->dn_olduid; 1463 user = &dn->dn_newuid; 1472 user, group); 1290 do_userquota_update(userquota_cache_t *cache, uint64_t used, uint64_t flags, uint64_t user, uint64_t group, boolean_t subtract) argument
|
/illumos-gate/usr/src/lib/libsldap/common/ |
H A D | ns_reads.c | 3244 /* Copy results back to user */ 3816 /* identify self as a getent user */ 4008 /* Copy results back to user */ 5219 * a user to do local account checking. 5650 getAcctMgmt(const char *user, AcctUsableResponse_t *acctResp, argument 5662 if (user == NULL || acctResp == NULL) 5744 (void) snprintf(ldapfilter, sizeof (ldapfilter), "(uid=%s)", user); 5758 /* Copy results back to user */ 5780 * for retrieving accounting information of users with no user password - 5782 * request to do a search on the server for the user i 5790 __ns_ldap_getAcctMgmt(const char *user, AcctUsableResponse_t *acctResp) argument [all...] |
/illumos-gate/usr/src/lib/libzonestat/common/ |
H A D | libzonestat.c | 2816 zs_resource_used_uint64(zs_usage_t *u, int res, int user) argument 2822 switch (user) { 2840 switch (user) { 2858 switch (user) { 2876 switch (user) { 2894 switch (user) { 2909 switch (user) { 2925 switch (user) { 2941 switch (user) { 2958 switch (user) { 3032 zs_resource_used_pct(zs_usage_t *u, int res, int user) argument 3375 zs_resource_used_time(zs_usage_t *u, int res, int user, timestruc_t *t) argument 3921 zs_pset_used_time(zs_pset_t *pset, int user, timestruc_t *t) argument 3949 zs_pset_used_cpus(zs_pset_t *pset, int user) argument 3975 zs_pset_used_pct(zs_pset_t *pset, int user) argument [all...] |
/illumos-gate/usr/src/lib/libkmf/plugins/kmf_pkcs11/common/ |
H A D | pkcs11_spi.c | 3033 * a private or secred key, or if the user passed in credentials. 3549 * This may override what the user gave on the 3748 CK_USER_TYPE user = CKU_USER; local 3766 * If a slot wasn't given, the user must pass 3779 (void *)&user, NULL); 3781 user = CKU_USER; 3791 rv = C_Login(session, user, (CK_BYTE *)oldcred->cred,
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/telnet/ |
H A D | commands.c | 85 * Number of maximum IPv4 gateways user can specify. This number is limited by 90 * Number of maximum IPv6 gateways user can specify. This number is limited by 375 char *name; /* How user refers to it (case independent) */ 866 "output of \"netdata\" to user readable format (debugging)", 869 "print user readable output for \"netdata\"" }, 2463 * Parse the user input (cmd_line_input) which should: 2945 char *user = NULL; local 3013 user = *argv++; 3042 "usage: %s [-l user] [-a] host-name [port]\n", cmd); 3089 * user i [all...] |
/illumos-gate/usr/src/cmd/auditconfig/ |
H A D | auditconfig.c | 179 { "-setumask", " user audit_flags", AC_ARG_SETUMASK, B_FALSE}, 204 static uid_t get_user_id(char *user); 244 static void do_setauid(char *user, char **argv); 789 char *user; local 792 user = *argv; 794 do_setauid(user, argv); 1043 * do_conf() - configure the kernel events. The value returned to the user is 1074 * user is for the global zone unless AUDIT_PERZONE is set. 1110 * user is for the global zone unless AUDIT_PERZONE is set. 1352 print_mask(gettext("active user defaul 1802 do_setauid(char *user, char **argv) argument 2277 get_user_id(char *user) argument [all...] |
/illumos-gate/usr/src/lib/libdtrace/common/ |
H A D | dt_parser.c | 675 boolean_t user) 707 if (user) 761 * Here we have a 32-bit user pointer that is being used with a 64-bit 1341 * Explicit references to user types (C or D) are assigned the default 2652 * If two marks in a row are found, set 'uref' (user symbol reference). 2736 static const char *const kunames[] = { "kernel", "user" }; 4126 * up and report failure back to the user. There are five possible paths: 4144 * user can simply use the D variable declaration syntax to work around them. 674 dt_node_type_assign(dt_node_t *dnp, ctf_file_t *fp, ctf_id_t type, boolean_t user) argument
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.sbin/ |
H A D | in.telnetd.c | 320 echotoggle, /* last time user entered echo character */ 510 * This verifies that the user is valid on the local system, 515 * NOTE: the user must be in the gsscred table in order to map 725 "\tKerberos5 identifies user as ``%s''\r\n", 946 "auth_level = %d user = %s\n", 2221 } else if (strcasecmp(optarg, "user") == 0) { 2533 * Now check to see if the user is valid or not 2539 * We cant be VALID until the user status is 3047 * only if the user did not automatically authenticate. 3053 * If the user automaticall 4475 char user[sizeof (up->ut_user) + 1]; local [all...] |
/illumos-gate/usr/src/cmd/sendmail/src/ |
H A D | map.c | 6179 ** USER_MAP_OPEN -- open user map 6228 ** USER_MAP_LOOKUP -- look up a user in the passwd file. 6240 SM_MBDB_T user; local 6246 *statp = finduser(key, &fuzzy, &user); 6260 rwval = user.mbdb_name; 6269 (int) user.mbdb_uid); 6275 (int) user.mbdb_gid); 6280 rwval = user.mbdb_fullname; 6284 rwval = user.mbdb_homedir; 6288 rwval = user [all...] |
H A D | queue.c | 302 ** C controlling user 987 char *user; local 1008 user = NULL; 1014 user = q->q_ruser != NULL ? q->q_ruser : q->q_user; 1027 if (uid == 0 || user == NULL || user[0] == '\0') 1031 denlstring(user, true, false), (long) uid, 4194 case 'C': /* specify controlling user */ 5055 case 'C': /* controlling user */ 5502 ** used as a "controlling user" fo [all...] |