Searched defs:user (Results 51 - 75 of 283) sorted by relevance

1234567891011>>

/illumos-gate/usr/src/lib/print/libipp-listener/common/
H A Dprint-job.c92 char *user = NULL; local
97 "requesting-user-name", &user) == PAPI_OK) {
99 PAPI_ATTR_REPLACE, "requesting-user-name", user);
/illumos-gate/usr/src/lib/print/libpapi-common/common/
H A Duri.c41 * scheme://[[user[:password]@]host[:port]]/path[[#fragment]|[?query]]
70 char *end = NULL, *user = NULL, *host = NULL, *path = NULL; local
82 /* string to host is the user part */
87 user = string;
92 if (user != NULL) {
95 for (password = user; (password < host - 1); password++)
101 u->user = strndup(user, password - user);
168 ((uri->password != NULL) && (uri->user
[all...]
/illumos-gate/usr/src/lib/libtecla/common/
H A Dhomedir.c90 struct passwd pwd; /* The password entry of a user */
187 * Lookup the home directory of a given user in the password file.
191 * user const char * The name of the user to lookup, or "" to lookup
212 const char *_hd_lookup_home_dir(HomeDir *home, const char *user) argument
214 const char *home_dir; /* A pointer to the home directory of the user */
217 * user.
219 int login_user = !user || *user=='\0';
231 if(!login_user && strcmp(user, "
[all...]
/illumos-gate/usr/src/lib/libwrap/
H A Drfc931.c77 /* rfc931 - return remote user name, given socket structures */
88 char user[256]; /* XXX */ local
172 &rmt_port, &our_port, user) == 3
181 if (cp = strchr(user, '\r'))
183 result = user;
/illumos-gate/usr/src/lib/libnsl/nss/
H A Dgetuserattr.c75 userstr_t *user = (userstr_t *)ent; local
95 user->name = _strtok_escape(buffer, sep, &last);
96 user->qualifier = _strtok_escape(NULL, sep, &last);
97 user->res1 = _strtok_escape(NULL, sep, &last);
98 user->res2 = _strtok_escape(NULL, sep, &last);
99 user->attr = _strtok_escape(NULL, sep, &last);
/illumos-gate/usr/src/lib/libresolv2/common/irs/
H A Dgetnetgrent.c69 const char *user, const char *domain
75 return (innetgr_p(netgroup, host, user, domain, net_data));
79 getnetgrent(NGR_R_CONST char **host, NGR_R_CONST char **user, argument
91 DE_CONST(cu, *user);
119 const char *user, const char *domain,
125 return ((*ng->test)(ng, netgroup, host, user, domain));
129 getnetgrent_p(const char **host, const char **user, const char **domain, argument
135 return ((*ng->next)(ng, host, user, domain));
118 innetgr_p(const char *netgroup, const char *host, const char *user, const char *domain, struct net_data *net_data) argument
H A Dirp_ng.c158 ng_next(struct irs_ng *this, const char **host, const char **user, argument
182 if (irp_unmarshall_ng(host, user, domain, body) == 0) {
201 const char *host, const char *user, const char *domain)
216 if (irp_marshall_ng(host, user, domain, &body, &bodylen) != 0) {
200 ng_test(struct irs_ng *this, const char *name, const char *host, const char *user, const char *domain) argument
H A Dgetnetgrent_r.c45 innetgr_r(const char *netgroup, const char *host, const char *user, argument
51 DE_CONST(user, us);
/illumos-gate/usr/src/lib/libc/port/gen/
H A Devent_port.c59 port_associate(int port, int source, uintptr_t object, int events, void *user) argument
63 (uintptr_t)user);
112 port_send(int port, int events, void *user) argument
115 r.r_vals = _portfs(PORT_SEND, port, events, (uintptr_t)user, NULL,
127 void *user)
132 (uintptr_t)user);
135 source, events, object, (uintptr_t)user);
140 port_sendn(int ports[], int errors[], uint_t nent, int events, void *user) argument
149 (uintptr_t)user);
163 lnent, events, (uintptr_t)user);
126 _port_dispatch(int port, int flags, int source, int events, uintptr_t object, void *user) argument
178 port_alert(int port, int flags, int events, void *user) argument
[all...]
/illumos-gate/usr/src/cmd/print/bsd-sysv-commands/
H A Dcancel.c49 fprintf(stdout, "Usage: %s [-u user] (printer|request-id ...)\n", name);
65 cancel_jobs_for_user(char *user, papi_encryption_t encryption, char *pname) { argument
97 &user);
111 char *user = NULL; local
130 user = optarg;
198 if (user == NULL) {
243 /* Purging user's print jobs */
244 exit_code = cancel_jobs_for_user(user,
252 exit_code = cancel_jobs_for_user(user, encryption, NULL);
/illumos-gate/usr/src/cmd/print/printmgr/com/sun/admin/pm/server/
H A DNameService.java37 private String user = null; field in class:NameService
101 user = arg;
118 return (user);
/illumos-gate/usr/src/cmd/tcpd/
H A Dtcpdmatch.c4 * usage: tcpdmatch [-d] [-i inet_conf] daemon[@host] [user@]host
65 char *user; local
123 * Default is to specify a client hostname or address. When user@host is
127 user = argv[optind + 1];
130 user = unknown;
135 * the user about services that may not be wrapped, services that are not
163 request_init(&request, RQ_DAEMON, daemon, RQ_USER, user, RQ_FILE, 1, 0);
168 * most one address. eval_hostname() warns the user about name server
259 fprintf(stderr, "usage: %s [-d] [-i inet_conf] daemon[@host] [user@]host\n",
/illumos-gate/usr/src/cmd/lp/cmd/
H A Dlpusers.c30 /* lpusers [-q priority-level] -u (user-list | "")
60 char *userlist = 0, *user, **users, *p; local
79 (void) printf(gettext("\tlpusers -q priority -u user-list\n"));
86 (void) printf(gettext("\tlpusers -u user-list\n"));
172 while (user = *users++) {
173 if (del_user(ppri_tbl, user) && (limit == -1))
174 LP_ERRMSG1(WARNING, E_LPU_NOUSER, user);
176 if (add_user(ppri_tbl, user, limit))
177 LP_ERRMSG1(WARNING, E_LPU_BADU, user);
/illumos-gate/usr/src/lib/pam_modules/krb5/
H A Dkrb5_acct_mgmt.c152 * Warn the user if their pw is set to expire.
167 char *user,
180 "PAM-KRB5 (acct): exp_warn start: user = '%s'",
181 user ? user : "<null>");
185 if (!pamh || !user || !password) {
217 if ((err = fetch_princ_entry(kmd, user, &prent, debug))
243 /* warn user if principal's pw is set to expire */
294 * - warn user if pw is set to expire
309 char *user local
165 exp_warn( pam_handle_t *pamh, char *user, krb5_module_data_t *kmd, int debug) argument
[all...]
H A Dkrb5_password.c109 char *user,
121 * pwchange verified user sufficiently, so don't request strict
124 login_result = attempt_krb5_auth(pamh, kmd, user, &newpass, 0);
131 * warn the user they have to kinit(1)
156 char *user; local
231 (void) pam_get_item(pamh, PAM_USER, (void **)&user);
233 if (user == NULL || *user == '\0') {
239 if (!get_pw_uid(user, &pw_uid)) {
241 "PAM-KRB5 (password): can't get uid for %s", user);
106 get_set_creds( pam_handle_t *pamh, krb5_module_data_t *kmd, char *user, char *newpass, int debug) argument
[all...]
H A Dkrb5_setcred.c75 char *user = NULL; local
104 (void) pam_get_item(pamh, PAM_USER, (void**) &user);
106 if (user == NULL || *user == '\0')
145 * for the authenticated user. Therefore we should
147 * login process of said user.
158 " gotten but is NULL for user %s", user);
206 * Use the authenticated and validated user, if applicable.
208 if (kmd->user !
285 attempt_refresh_cred( krb5_module_data_t *kmd, char *user, int flag) argument
[all...]
/illumos-gate/usr/src/lib/pam_modules/krb5_migrate/
H A Dkrb5_migrate_authenticate.c45 * principal to kadmind in order to permit the creation of a new user
51 char *user = NULL; local
99 err = pam_get_item(pamh, PAM_USER, (void**)&user);
105 * Check if user name is *not* NULL
107 if (user == NULL || (user[0] == '\0')) {
110 "PAM-KRB5-AUTOMIGRATE (auth): user empty or null");
118 if ((userdata = strdup(user)) == NULL) {
125 * Grok the user password
208 * if the corresponding user principa
[all...]
/illumos-gate/usr/src/lib/pam_modules/ldap/
H A Dldap_acct_mgmt.c42 * warn_user_passwd_will_expire - warn the user when the password will
130 * warn_user_passwd_expired - warn the user that the password has expired
152 * display_passwd_reset_msg - tell user that password has been reset by
168 * Retreives account management related attributes for the user using
183 get_account_mgmt(char *user, int *seconds, int *grace) argument
190 if ((rc = __ns_ldap_getAcctMgmt(user, &acctResp))
194 user, rc);
235 * trying to authenticate the user and
251 char *user = NULL; local
275 if ((result = pam_get_item(pamh, PAM_USER, (void **)&user))
[all...]
/illumos-gate/usr/src/lib/pam_modules/passwd_auth/
H A Dpasswd_auth.c62 * Read authentication token from user.
68 char *user; local
102 if ((res = pam_get_user(pamh, &user, NULL)) != PAM_SUCCESS) {
105 "get user failed: %s", pam_strerror(pamh, res));
109 if (user == NULL || *user == '\0') {
143 res = __user_to_authenticate(user, pwu_rep, &auth_user, &privileged);
175 * own password, and users updating other an user's password
211 * Non privileged user: so we need to check the old password
235 * if repository isn't files|nis, and user want
[all...]
/illumos-gate/usr/src/lib/pam_modules/timestamp/
H A Dpam_timestamp.c39 uid_t uid; /* user's uid */
53 char *user; local
57 /* get user, auser and users's tty */
58 (void) pam_get_item(pamh, PAM_USER, (void **)&user);
62 if (user == NULL || *user == '\0') {
82 "user = %s, auser = %s, tty = %s", user, auser, ttyn);
96 auser, ttyn, user);
167 * Read authentication from user, usin
[all...]
/illumos-gate/usr/src/lib/pam_modules/unix_auth/
H A Dunix_auth.c68 get_max_failed(char *user) argument
77 if ((uattr = getusernam(user)) != NULL)
132 * PAM_AUTHTOK item is indeed the password that belongs to the user
145 char *user; local
174 if (pam_get_item(pamh, PAM_USER, (void **)&user) != PAM_SUCCESS) {
179 if (user == NULL || *user == '\0') {
218 result = __get_authtoken_attr(user, pwu_rep, attr_pw);
225 "pam_unix_auth: user %s not found\n", user);
[all...]
/illumos-gate/usr/src/lib/policykit/libpolkit/common/
H A Dlibpolkit-rbac.c92 const char *user,
118 const char *user,
137 uid = (uid_t)atol (user);
211 const char *user,
91 libpolkit_get_allowed_resources_for_privilege_for_uid(LibPolKitContext *ctx, const char *user, const char *privilege, GList **resources, GList **restrictions, int *num_non_temporary) argument
116 libpolkit_is_uid_allowed_for_privilege(LibPolKitContext *ctx, const char *system_bus_unique_name, const char *user, const char *privilege, const char *resource, gboolean *out_is_allowed, gboolean *out_is_temporary, char **out_is_privileged_but_restricted_to_system_bus_unique_name) argument
210 libpolkit_revoke_temporary_privilege(LibPolKitContext *ctx, const char *user, const char *privilege, const char *resource, gboolean *result) argument
/illumos-gate/usr/src/lib/libsasl/lib/
H A Dexternal.c137 /* The user's trying to authorize as someone they didn't
279 const char *user = NULL; local
302 if (user == NULL) {
303 user_result = _plug_get_userid(params->utils, &user, prompt_need);
340 *clientoutlen = user ? strlen(user) : 0;
351 if (user && *user) {
353 user, 0, SASL_CU_AUTHZID, oparams);
361 memcpy(text->out_buf, user, *clientoutle
[all...]
/illumos-gate/usr/src/lib/libsec/common/
H A Daclcheck.c33 * If there are any USER entries, then the user id must be unique.
54 struct entry user; member in struct:entry_stat
139 cnt = (tally.user.count)++;
140 idp = &(tally.user.id);
211 /* If there are group or user entries, there must be one class entry */
212 if (tally.user.count > 0 || tally.group.count > 0)
272 if ((tallyp->user).count > 0)
273 free((tallyp->user).id);
/illumos-gate/usr/src/lib/libbsm/common/
H A Daudit_crontab.c253 * audited, then the ruid of the user doing the editing must be the owner
263 audit_crontab_not_allowed(uid_t ruid, char *user) { argument
269 if (getpwnam_r(user, &pwd, buffer, PWD_BUFFER_SIZE) == NULL) {

Completed in 2142 milliseconds

1234567891011>>