Searched refs:user (Results 1 - 25 of 776) sorted by relevance

1234567891011>>

/illumos-gate/usr/src/cmd/tsol/demo/
H A Dwaitforzone.ksh28 user=$1
35 while [ ! -d /home/${user} ]; do
39 # Now, run the command you specified as the specified user
41 su - ${user} -c "${program} -display ${display}"
H A Druninzone.ksh33 user=$2
40 zlogin ${zonename} /usr/demo/tsol/waitforzone.ksh ${user} ${program} ${DISPLAY}
/illumos-gate/usr/src/lib/libsecdb/common/
H A Dgetuserattr.c55 userstr_t user; local
58 (void) memset(&user, 0, sizeof (userattr_t));
59 tmp = _getuserattr(&user, buf, NSS_BUFLEN_USERATTR, &err);
68 userstr_t user; local
71 (void) memset(&user, 0, sizeof (userattr_t));
72 tmp = _fgetuserattr(f, &user, buf, NSS_BUFLEN_USERATTR);
82 userstr_t user; local
85 resptr = _getusernam(name, &user, buf, NSS_BUFLEN_USERATTR, &err);
119 free_userattr(userattr_t *user) argument
121 if (user) {
133 userstr2attr(userstr_t *user) argument
154 print_userattr(userattr_t *user) argument
[all...]
/illumos-gate/usr/src/uts/common/fs/smbsrv/
H A Dsmb_user.c104 * - The user is in the list of users for his session.
106 * - This user can not access anything yet.
111 * - The user is in the list of users for his session.
112 * - References will be given out if the user is looked up.
113 * - The user can access files and pipes.
118 * - The user is in the list of users for his session.
119 * - References will not be given out if the user is looked up.
120 * - The trees the user connected are being disconnected.
121 * - The resources associated with the user remain.
126 * - The user i
220 smb_user_t *user; local
259 smb_user_logon( smb_user_t *user, cred_t *cr, char *domain_name, char *account_name, uint32_t flags, uint32_t privileges, uint32_t audit_sid) argument
305 smb_user_logoff( smb_user_t *user) argument
350 smb_user_hold(smb_user_t *user) argument
370 smb_user_hold_internal(smb_user_t *user) argument
386 smb_user_release( smb_user_t *user) argument
418 smb_user_is_admin(smb_user_t *user) argument
472 smb_user_namecmp(smb_user_t *user, const char *name) argument
504 smb_user_enum(smb_user_t *user, smb_svcenum_t *svcenum) argument
529 smb_user_t *user = (smb_user_t *)arg; local
557 smb_user_getcred(smb_user_t *user) argument
563 smb_user_getprivcred(smb_user_t *user) argument
576 smb_user_setcred(smb_user_t *user, cred_t *cr, uint32_t privileges) argument
611 smb_user_enum_private(smb_user_t *user, smb_svcenum_t *svcenum) argument
644 smb_user_netinfo_encode(smb_user_t *user, uint8_t *buf, size_t buflen, uint32_t *nbytes) argument
658 smb_user_netinfo_init(smb_user_t *user, smb_netuserinfo_t *info) argument
710 smb_user_auth_logoff(smb_user_t *user) argument
[all...]
/illumos-gate/usr/src/test/zfs-tests/tests/functional/acl/cifs/
H A Dcifs_attr_003_pos.ksh49 # letting a user/application set them.
65 # 1. Loop super user and non-super user to run the test case.
195 # $2: Execute user
201 typeset user=$2
204 verify_expect $expect chg_usr_exec $user \
206 verify_expect $expect chg_usr_exec $user \
215 # $2: Execute user
221 typeset user=$2
225 verify_expect $expect chg_usr_exec $user \
[all...]
H A Dcifs_attr_001_pos.ksh37 # Verify the user with write_attributes permission or
42 # 1. Loop super user and non-super user to run the test case.
44 # 3. Grant user has write_attributes permission or
70 typeset user=$3
77 if [[ -n $user ]]; then
78 su $user -c "chmod S+c${attr} $object"
99 typeset user=$3
106 if [[ -n $user ]]; then
107 su $user
[all...]
H A Dcifs_attr_002_pos.ksh38 # Verify the user with PRIV_FILE_FLAG_SET/PRIV_FILE_FLAG_CLEAR
43 # 1. Loop super user and non-super user to run the test case.
45 # 3. Grant user has PRIV_FILE_FLAG_SET/PRIV_FILE_FLAG_CLEAR separately.
63 typeset user=$3 # The user to run the command as
71 # anything else. A regular user can remove no attributes without the
75 if [[ $user == 'root' ]]; then
83 log_mustnot su $user -c "$cmd"
87 log_must su $user
[all...]
/illumos-gate/usr/src/lib/libsmbfs/netsmb/
H A Dsmb_keychain.h50 int smbfs_keychain_add(uid_t uid, const char *domain, const char *user,
54 int smbfs_keychain_addhash(uid_t uid, const char *domain, const char *user,
58 int smbfs_keychain_del(uid_t uid, const char *domain, const char *user);
64 int smbfs_keychain_chk(const char *domain, const char *user);
73 * Requires super-user privliege.
80 * provide (editable) defaults for domain/user
82 * Get default domain and user names
/illumos-gate/usr/src/lib/libwrap/
H A Dhosts_ctl.c10 * access control checker. The host name and user name arguments should be
30 int hosts_ctl(daemon, name, addr, user)
34 char *user;
42 RQ_USER, user,
/illumos-gate/usr/src/test/zfs-tests/tests/functional/delegate/
H A Ddelegate_common.kshlib36 # Cleanup exist user/group.
72 # Verify the specified user have permission on the dataset
91 typeset user
92 for user in $@; do
97 check_fs_perm $user $perm $dtst
100 check_vol_perm $user $perm $dtst
105 log_note "Fail: $user should have $perm " \
116 # Verify the specified user have no permission on the dataset
135 typeset user
136 for user i
[all...]
H A Dzfs_allow_005_pos.ksh44 # $ROOT_TESTFS/$user.
61 for user in $EVERYONE; do
62 childfs=$ROOT_TESTFS/$user
64 user_run $user zfs create $childfs
70 if [[ $other == $user ]]; then
71 log_must verify_perm $childfs $perms $user
/illumos-gate/usr/src/cmd/lp/lib/access/
H A Dallowed.c61 /* Check that user has print admin authorization */
75 char * user,
80 is_user_allowed (user, allow, deny)
81 char *user,
86 if (bangequ(user, LOCAL_LPUSER) || bangequ(user, LOCAL_ROOTUSER))
89 return (allowed(user, allow, deny));
99 char * user,
103 is_user_allowed_form (user, form)
104 char *user,
74 is_user_allowed( char * user, char ** allow, char ** deny ) argument
98 is_user_allowed_form( char * user, char * form ) argument
123 is_user_allowed_printer( char * user, char * printer ) argument
[all...]
/illumos-gate/usr/src/cmd/mail/
H A Dislocal.c36 * islocal (char *user, uid_t *puid) - see if user exists on this system
39 islocal(char *user, uid_t *puid) argument
46 (void) snprintf(fname, sizeof (fname), "%s%s", maildir, user);
54 if ((pwd_ptr = getpwnam(user)) == NULL) {
H A Dlock.c36 lock(char *user) argument
40 switch (maillock(user, 10)) {
46 program, user);
H A Dcksaved.c32 * void cksaved(char *user)
40 * the end of $MAIL. It is better that a user potentially sees the
48 cksaved(user)
49 char *user;
55 cat(mail, maildir, user);
56 cat(save, mailsave, user);
69 lock(user);
99 "to 0660.\"| mail %s", user);
129 "to your mail box by the mail program.\" | mail %s", user);
133 * Try to send mail to the user whos
[all...]
/illumos-gate/usr/src/lib/pam_modules/ldap/
H A Dldap_authenticate.c43 * Authenticate user.
54 char *user = NULL; local
63 /* Get the service and user */
66 (err = pam_get_item(pamh, PAM_USER, (void **)&user)) != PAM_SUCCESS)
89 service, (user && *user != '\0')?user:"no-user", flags,
92 if (!user || *user
[all...]
/illumos-gate/usr/src/lib/smbsrv/libfksmbsrv/common/
H A Dfksmb_cred.c37 * Kind of a hack here. In this user-space test implementation,
50 smb_user_setcred(smb_user_t *user, cred_t *cr, uint32_t privileges) argument
52 user->u_cred = cr;
53 user->u_privcred = NULL;
54 user->u_privileges = privileges;
/illumos-gate/usr/src/cmd/make/lib/vroot/
H A Dchown.cc37 vroot_result= chown(path, vroot_args.chown.user, vroot_args.chown.group);
41 int chown_vroot(char *path, int user, int group, pathpt vroot_path, pathpt vroot_vroot) argument
43 vroot_args.chown.user= user;
/illumos-gate/usr/src/test/zfs-tests/tests/functional/userquota/
H A Duserquota_006_pos.ksh37 # Check the invalid parameter of zfs get user|group quota
41 # 1. check the invalid zfs get user|group quota to fs
42 # 2. check the valid zfs get user|group quota to snapshots
56 log_assert "Check the invalid parameter of zfs get user|group quota"
62 for user in "${no_users[@]}"; do
63 log_mustnot eval "id $user >/dev/null 2>&1"
64 log_must eval "zfs get userquota@$user $QFS >/dev/null 2>&1"
65 log_must eval "zfs get userquota@$user $snap_fs >/dev/null 2>&1"
75 log_pass "Check the invalid parameter of zfs get user|group quota pass as expect"
/illumos-gate/usr/src/cmd/userattr/
H A Duserattr.c45 * userattr [-v] attr_name [user]
75 char *user = NULL; local
91 user = argv[opt++];
96 gettext("Usage: %s [-v] attribute_name [user]\n"), argv[0]);
100 if (user == NULL) {
105 gettext("Cannot find user for uid %d\n"), uid);
108 user = pwd->pw_name;
110 if ((pwd = getpwnam(user)) == NULL) {
112 gettext("No such user %s\n"), user);
[all...]
/illumos-gate/usr/src/cmd/sendmail/cf/sh/
H A Dmakeinfo.sh77 user=`whoami`
79 user=$LOGNAME
92 if [ -n "$user" ]; then
93 echo '#####' built by $user@$host on `date`
/illumos-gate/usr/src/cmd/lp/lib/users/
H A Dusermgmt.c44 int putuser ( char * user, USER * pri_s ) argument
55 if (!add_user(ppri_tbl, user, pri_s->priority_limit))
67 USER * getuser ( char * user )
72 if (STREQU(user, "root") || STREQU(user, LPUSER))
87 if (bang_searchlist(user, ppri_tbl->users[limit - PRI_MIN]))
97 int deluser ( char * user )
109 del_user(ppri_tbl, user);
/illumos-gate/usr/src/cmd/tip/
H A Dlog.c24 char *user, *timestamp; local
36 if ((user = getlogin()) == NOSTR)
38 user = "???";
40 user = pwd->pw_name;
45 user, timestamp, group,
/illumos-gate/usr/src/lib/pam_modules/sample/
H A Dsample_acct_mgmt.c39 * It may need to force the user to change his/her
50 char *user; local
62 if (pam_get_item(pamh, PAM_USER, (void **)&user) != PAM_SUCCESS)
70 * we want to use the policy of the current user not the "destination"
71 * user. This will enable us to prevent su to root but not to rlogin,
74 * description of problem: user name is the "destination" name. not
76 * current name in the case of su. user is "root" in this case and
77 * we will be getting the root policy instead of the user policy.
86 user = pw->pw_name;
89 if (user
[all...]
/illumos-gate/usr/src/lib/pam_modules/tsol_acct/
H A Dtsol_acct.c42 * Validates that the user's label range contains
62 char *user; local
83 (void) pam_get_item(pamh, PAM_USER, (void **)&user);
89 "pam_tsol_account: allowed_unlabeled = %d, user %s, "
92 (user == NULL) ? "NULL" : (user == '\0') ? "ZERO" :
93 user,
97 if (user == NULL || *user == '\0') {
99 "pam_tsol_account: no user");
[all...]

Completed in 217 milliseconds

1234567891011>>