/illumos-gate/usr/src/cmd/tsol/demo/ |
H A D | waitforzone.ksh | 28 user=$1 35 while [ ! -d /home/${user} ]; do 39 # Now, run the command you specified as the specified user 41 su - ${user} -c "${program} -display ${display}"
|
H A D | runinzone.ksh | 33 user=$2 40 zlogin ${zonename} /usr/demo/tsol/waitforzone.ksh ${user} ${program} ${DISPLAY}
|
/illumos-gate/usr/src/lib/libsecdb/common/ |
H A D | getuserattr.c | 55 userstr_t user; local 58 (void) memset(&user, 0, sizeof (userattr_t)); 59 tmp = _getuserattr(&user, buf, NSS_BUFLEN_USERATTR, &err); 68 userstr_t user; local 71 (void) memset(&user, 0, sizeof (userattr_t)); 72 tmp = _fgetuserattr(f, &user, buf, NSS_BUFLEN_USERATTR); 82 userstr_t user; local 85 resptr = _getusernam(name, &user, buf, NSS_BUFLEN_USERATTR, &err); 119 free_userattr(userattr_t *user) argument 121 if (user) { 133 userstr2attr(userstr_t *user) argument 154 print_userattr(userattr_t *user) argument [all...] |
/illumos-gate/usr/src/uts/common/fs/smbsrv/ |
H A D | smb_user.c | 104 * - The user is in the list of users for his session. 106 * - This user can not access anything yet. 111 * - The user is in the list of users for his session. 112 * - References will be given out if the user is looked up. 113 * - The user can access files and pipes. 118 * - The user is in the list of users for his session. 119 * - References will not be given out if the user is looked up. 120 * - The trees the user connected are being disconnected. 121 * - The resources associated with the user remain. 126 * - The user i 220 smb_user_t *user; local 259 smb_user_logon( smb_user_t *user, cred_t *cr, char *domain_name, char *account_name, uint32_t flags, uint32_t privileges, uint32_t audit_sid) argument 305 smb_user_logoff( smb_user_t *user) argument 350 smb_user_hold(smb_user_t *user) argument 370 smb_user_hold_internal(smb_user_t *user) argument 386 smb_user_release( smb_user_t *user) argument 418 smb_user_is_admin(smb_user_t *user) argument 472 smb_user_namecmp(smb_user_t *user, const char *name) argument 504 smb_user_enum(smb_user_t *user, smb_svcenum_t *svcenum) argument 529 smb_user_t *user = (smb_user_t *)arg; local 557 smb_user_getcred(smb_user_t *user) argument 563 smb_user_getprivcred(smb_user_t *user) argument 576 smb_user_setcred(smb_user_t *user, cred_t *cr, uint32_t privileges) argument 611 smb_user_enum_private(smb_user_t *user, smb_svcenum_t *svcenum) argument 644 smb_user_netinfo_encode(smb_user_t *user, uint8_t *buf, size_t buflen, uint32_t *nbytes) argument 658 smb_user_netinfo_init(smb_user_t *user, smb_netuserinfo_t *info) argument 710 smb_user_auth_logoff(smb_user_t *user) argument [all...] |
/illumos-gate/usr/src/test/zfs-tests/tests/functional/acl/cifs/ |
H A D | cifs_attr_003_pos.ksh | 49 # letting a user/application set them. 65 # 1. Loop super user and non-super user to run the test case. 195 # $2: Execute user 201 typeset user=$2 204 verify_expect $expect chg_usr_exec $user \ 206 verify_expect $expect chg_usr_exec $user \ 215 # $2: Execute user 221 typeset user=$2 225 verify_expect $expect chg_usr_exec $user \ [all...] |
H A D | cifs_attr_001_pos.ksh | 37 # Verify the user with write_attributes permission or 42 # 1. Loop super user and non-super user to run the test case. 44 # 3. Grant user has write_attributes permission or 70 typeset user=$3 77 if [[ -n $user ]]; then 78 su $user -c "chmod S+c${attr} $object" 99 typeset user=$3 106 if [[ -n $user ]]; then 107 su $user [all...] |
H A D | cifs_attr_002_pos.ksh | 38 # Verify the user with PRIV_FILE_FLAG_SET/PRIV_FILE_FLAG_CLEAR 43 # 1. Loop super user and non-super user to run the test case. 45 # 3. Grant user has PRIV_FILE_FLAG_SET/PRIV_FILE_FLAG_CLEAR separately. 63 typeset user=$3 # The user to run the command as 71 # anything else. A regular user can remove no attributes without the 75 if [[ $user == 'root' ]]; then 83 log_mustnot su $user -c "$cmd" 87 log_must su $user [all...] |
/illumos-gate/usr/src/lib/libsmbfs/netsmb/ |
H A D | smb_keychain.h | 50 int smbfs_keychain_add(uid_t uid, const char *domain, const char *user, 54 int smbfs_keychain_addhash(uid_t uid, const char *domain, const char *user, 58 int smbfs_keychain_del(uid_t uid, const char *domain, const char *user); 64 int smbfs_keychain_chk(const char *domain, const char *user); 73 * Requires super-user privliege. 80 * provide (editable) defaults for domain/user 82 * Get default domain and user names
|
/illumos-gate/usr/src/lib/libwrap/ |
H A D | hosts_ctl.c | 10 * access control checker. The host name and user name arguments should be 30 int hosts_ctl(daemon, name, addr, user) 34 char *user; 42 RQ_USER, user,
|
/illumos-gate/usr/src/test/zfs-tests/tests/functional/delegate/ |
H A D | delegate_common.kshlib | 36 # Cleanup exist user/group. 72 # Verify the specified user have permission on the dataset 91 typeset user 92 for user in $@; do 97 check_fs_perm $user $perm $dtst 100 check_vol_perm $user $perm $dtst 105 log_note "Fail: $user should have $perm " \ 116 # Verify the specified user have no permission on the dataset 135 typeset user 136 for user i [all...] |
H A D | zfs_allow_005_pos.ksh | 44 # $ROOT_TESTFS/$user. 61 for user in $EVERYONE; do 62 childfs=$ROOT_TESTFS/$user 64 user_run $user zfs create $childfs 70 if [[ $other == $user ]]; then 71 log_must verify_perm $childfs $perms $user
|
/illumos-gate/usr/src/cmd/lp/lib/access/ |
H A D | allowed.c | 61 /* Check that user has print admin authorization */ 75 char * user, 80 is_user_allowed (user, allow, deny) 81 char *user, 86 if (bangequ(user, LOCAL_LPUSER) || bangequ(user, LOCAL_ROOTUSER)) 89 return (allowed(user, allow, deny)); 99 char * user, 103 is_user_allowed_form (user, form) 104 char *user, 74 is_user_allowed( char * user, char ** allow, char ** deny ) argument 98 is_user_allowed_form( char * user, char * form ) argument 123 is_user_allowed_printer( char * user, char * printer ) argument [all...] |
/illumos-gate/usr/src/cmd/mail/ |
H A D | islocal.c | 36 * islocal (char *user, uid_t *puid) - see if user exists on this system 39 islocal(char *user, uid_t *puid) argument 46 (void) snprintf(fname, sizeof (fname), "%s%s", maildir, user); 54 if ((pwd_ptr = getpwnam(user)) == NULL) {
|
H A D | lock.c | 36 lock(char *user) argument 40 switch (maillock(user, 10)) { 46 program, user);
|
H A D | cksaved.c | 32 * void cksaved(char *user) 40 * the end of $MAIL. It is better that a user potentially sees the 48 cksaved(user) 49 char *user; 55 cat(mail, maildir, user); 56 cat(save, mailsave, user); 69 lock(user); 99 "to 0660.\"| mail %s", user); 129 "to your mail box by the mail program.\" | mail %s", user); 133 * Try to send mail to the user whos [all...] |
/illumos-gate/usr/src/lib/pam_modules/ldap/ |
H A D | ldap_authenticate.c | 43 * Authenticate user. 54 char *user = NULL; local 63 /* Get the service and user */ 66 (err = pam_get_item(pamh, PAM_USER, (void **)&user)) != PAM_SUCCESS) 89 service, (user && *user != '\0')?user:"no-user", flags, 92 if (!user || *user [all...] |
/illumos-gate/usr/src/lib/smbsrv/libfksmbsrv/common/ |
H A D | fksmb_cred.c | 37 * Kind of a hack here. In this user-space test implementation, 50 smb_user_setcred(smb_user_t *user, cred_t *cr, uint32_t privileges) argument 52 user->u_cred = cr; 53 user->u_privcred = NULL; 54 user->u_privileges = privileges;
|
/illumos-gate/usr/src/cmd/make/lib/vroot/ |
H A D | chown.cc | 37 vroot_result= chown(path, vroot_args.chown.user, vroot_args.chown.group); 41 int chown_vroot(char *path, int user, int group, pathpt vroot_path, pathpt vroot_vroot) argument 43 vroot_args.chown.user= user;
|
/illumos-gate/usr/src/test/zfs-tests/tests/functional/userquota/ |
H A D | userquota_006_pos.ksh | 37 # Check the invalid parameter of zfs get user|group quota 41 # 1. check the invalid zfs get user|group quota to fs 42 # 2. check the valid zfs get user|group quota to snapshots 56 log_assert "Check the invalid parameter of zfs get user|group quota" 62 for user in "${no_users[@]}"; do 63 log_mustnot eval "id $user >/dev/null 2>&1" 64 log_must eval "zfs get userquota@$user $QFS >/dev/null 2>&1" 65 log_must eval "zfs get userquota@$user $snap_fs >/dev/null 2>&1" 75 log_pass "Check the invalid parameter of zfs get user|group quota pass as expect"
|
/illumos-gate/usr/src/cmd/userattr/ |
H A D | userattr.c | 45 * userattr [-v] attr_name [user] 75 char *user = NULL; local 91 user = argv[opt++]; 96 gettext("Usage: %s [-v] attribute_name [user]\n"), argv[0]); 100 if (user == NULL) { 105 gettext("Cannot find user for uid %d\n"), uid); 108 user = pwd->pw_name; 110 if ((pwd = getpwnam(user)) == NULL) { 112 gettext("No such user %s\n"), user); [all...] |
/illumos-gate/usr/src/cmd/sendmail/cf/sh/ |
H A D | makeinfo.sh | 77 user=`whoami` 79 user=$LOGNAME 92 if [ -n "$user" ]; then 93 echo '#####' built by $user@$host on `date`
|
/illumos-gate/usr/src/cmd/lp/lib/users/ |
H A D | usermgmt.c | 44 int putuser ( char * user, USER * pri_s ) argument 55 if (!add_user(ppri_tbl, user, pri_s->priority_limit)) 67 USER * getuser ( char * user ) 72 if (STREQU(user, "root") || STREQU(user, LPUSER)) 87 if (bang_searchlist(user, ppri_tbl->users[limit - PRI_MIN])) 97 int deluser ( char * user ) 109 del_user(ppri_tbl, user);
|
/illumos-gate/usr/src/cmd/tip/ |
H A D | log.c | 24 char *user, *timestamp; local 36 if ((user = getlogin()) == NOSTR) 38 user = "???"; 40 user = pwd->pw_name; 45 user, timestamp, group,
|
/illumos-gate/usr/src/lib/pam_modules/sample/ |
H A D | sample_acct_mgmt.c | 39 * It may need to force the user to change his/her 50 char *user; local 62 if (pam_get_item(pamh, PAM_USER, (void **)&user) != PAM_SUCCESS) 70 * we want to use the policy of the current user not the "destination" 71 * user. This will enable us to prevent su to root but not to rlogin, 74 * description of problem: user name is the "destination" name. not 76 * current name in the case of su. user is "root" in this case and 77 * we will be getting the root policy instead of the user policy. 86 user = pw->pw_name; 89 if (user [all...] |
/illumos-gate/usr/src/lib/pam_modules/tsol_acct/ |
H A D | tsol_acct.c | 42 * Validates that the user's label range contains 62 char *user; local 83 (void) pam_get_item(pamh, PAM_USER, (void **)&user); 89 "pam_tsol_account: allowed_unlabeled = %d, user %s, " 92 (user == NULL) ? "NULL" : (user == '\0') ? "ZERO" : 93 user, 97 if (user == NULL || *user == '\0') { 99 "pam_tsol_account: no user"); [all...] |