/illumos-gate/usr/src/lib/libidmap/common/ |
H A D | sidutil.c | 45 * Returns the number of bytes required to hold the sid. 48 sid_len(sid_t *sid) argument 50 if (sid == NULL) 54 + (sid->sid_subauthcnt * sizeof (uint32_t))); 61 * binary sid. 64 sid_tostr(sid_t *sid, char *strsid) argument 69 if (sid == NULL || strsid == NULL) 72 (void) sprintf(p, "S-%d-", sid->sid_revision); 77 if (sid->sid_authority[i] != 0 || i == NT_SID_AUTH_MAX - 1) { 78 (void) sprintf(p, "%d", sid 108 sid_t *sid; local 148 sid_free(sid_t *sid) argument 161 sid_to_le(sid_t *sid) argument 177 sid_from_le(sid_t *sid) argument [all...] |
H A D | directory.h | 146 * Caller must free() the result (sid or name, respectively). 148 directory_error_t directory_sid_from_name(directory_t d, char *name, char **sid, 151 char **sid); 153 char **sid); 154 directory_error_t directory_name_from_sid(directory_t d, char *sid, char **name,
|
H A D | sidutil.h | 88 typedef struct sid { struct
|
H A D | directory_helper.c | 56 char **sid, 73 *sid = NULL; 103 *sid = strdup(text_sid); 104 if (*sid == NULL) 129 char **sid, 132 return (directory_sid_from_name_common(d, name, DIRECTORY_ID_NAME, sid, 137 directory_sid_from_user_name(directory_t d, char *name, char **sid) argument 139 return (directory_sid_from_name_common(d, name, DIRECTORY_ID_USER, sid, 144 directory_sid_from_group_name(directory_t d, char *name, char **sid) argument 146 return (directory_sid_from_name_common(d, name, DIRECTORY_ID_GROUP, sid, 52 directory_sid_from_name_common( directory_t d, char *name, char *type, char **sid, uint64_t *classes) argument 126 directory_sid_from_name( directory_t d, char *name, char **sid, uint64_t *classes) argument 239 directory_name_from_sid( directory_t d, char *sid, char **canon, uint64_t *classes) argument [all...] |
/illumos-gate/usr/src/common/smbsrv/ |
H A D | smb_sid.c | 47 smb_sid_isvalid(smb_sid_t *sid) argument 49 if (sid == NULL) 52 return ((sid->sid_revision == NT_SID_REVISION) && 53 (sid->sid_subauthcnt < NT_SID_SUBAUTH_MAX)); 59 * Returns the number of bytes required to hold the sid. 62 smb_sid_len(smb_sid_t *sid) argument 64 if (sid == NULL) 68 + (sid->sid_subauthcnt * sizeof (uint32_t))); 74 * Make a duplicate of the specified sid. The memory for the new sid 79 smb_sid_dup(smb_sid_t *sid) argument 106 smb_sid_t *sid; local 132 smb_sid_getrid(smb_sid_t *sid, uint32_t *rid) argument 151 smb_sid_split(smb_sid_t *sid, uint32_t *rid) argument 245 smb_sid_indomain(smb_sid_t *domain_sid, smb_sid_t *sid) argument 274 smb_sid_tostr(const smb_sid_t *sid, char *strsid) argument 319 smb_sid_t *sid; local 367 smb_sid_t *sid; local 440 smb_sid_t *sid; local 450 smb_sid_free(smb_sid_t *sid) argument [all...] |
/illumos-gate/usr/src/cmd/dtrace/test/tst/common/scripting/ |
H A D | tst.sid.d | 41 printf("The sid is %d\n", $sid);
|
H A D | tst.sid.ksh | 32 # To verify sid of current process. 54 /\$sid != \$1/ 60 /\$sid == \$1/ 72 sessionid=`ps -o pid,sid | grep "$$ " | awk '{print $2}' 2>/dev/null` 74 print -u2 "unable to get sid of the current process with pid = $$"
|
/illumos-gate/usr/src/lib/pysolaris/common/ |
H A D | misc.c | 32 extern int sid_to_id(char *sid, boolean_t user, uid_t *id); 37 char *sid; local 41 if (!PyArg_ParseTuple(args, "si", &sid, &isuser)) 44 err = sid_to_id(sid, isuser, &id); 46 PyErr_SetString(PyExc_KeyError, sid); 54 * Translate the sid string ("S-1-...") to the user@domain name, if 61 char *name, *sid; local 66 if (!PyArg_ParseTuple(args, "si", &sid, &isuser)) 69 err = sid_to_id(sid, isuser, &pid); 71 PyErr_SetString(PyExc_KeyError, sid); [all...] |
/illumos-gate/usr/src/cmd/ttymon/ |
H A D | tmlock.c | 105 pid_t sid; local 107 if (ioctl(fd, TIOCGSID, &sid) == -1) 109 else if (sid == 0)
|
/illumos-gate/usr/src/uts/common/fs/smbsrv/ |
H A D | smb_quota.c | 44 * - variable length sid - max = 32 bytes 45 * SMB_QUOTA_SIZE_NO_SID is the size of the above, excluding the sid. 59 * Otherwise (type SMB_QUOTA_QUERY_ALL) find the resume sid 61 * resume sid to NULL if request->qq_restart. 69 smb_quota_sid_t *sid; local 86 sid = kmem_zalloc(sizeof (smb_quota_sid_t), KM_SLEEP); 87 list_insert_tail(sid_list, sid); 88 smb_ofile_get_quota_resume(ofile, sid->qs_sidstr, 90 if (*sid->qs_sidstr == '\0') 109 smb_quota_sid_t *sid; local 138 smb_sid_t *sid; local 219 smb_sid_t *sid; local 298 smb_sid_t *sid; local 372 smb_sid_t *sid; local [all...] |
H A D | smb_idmap.c | 68 #include <sys/sid.h> 80 smb_idmap_getsid(uid_t id, int idtype, smb_sid_t **sid) argument 117 *sid = smb_sid_splice(sim.sim_sid, sim.sim_rid); 119 if (*sid == NULL) 132 smb_idmap_getid(smb_sid_t *sid, uid_t *id, int *idtype) argument 137 smb_sid_tostr(sid, sidstr); 247 smb_sid_t *sid, int idtype) 254 ASSERT(sid); 256 smb_sid_tostr(sid, strsid); 389 smb_sid_t *sid; local 246 smb_idmap_batch_getid(idmap_get_handle_t *idmaph, smb_idmap_t *sim, smb_sid_t *sid, int idtype) argument [all...] |
/illumos-gate/usr/src/lib/smbsrv/libsmb/common/ |
H A D | smb_sam.c | 102 smb_sid_t *sid; local 139 sid = smb_sid_splice(di.di_binsid, lwka->lwka_rid); 144 status = smb_sam_lookup_user(name, &sid); 150 status = smb_sam_lookup_group(name, &sid); 157 status = smb_sam_lookup_user(name, &sid); 165 status = smb_sam_lookup_group(name, &sid); 176 account->a_sid = sid; 178 account->a_domsid = smb_sid_split(sid, &account->a_rid); 208 smb_sam_lookup_sid(smb_sid_t *sid, smb_account_t *account) argument 225 if (smb_sid_cmp(sid, d 465 smb_sam_grp_ismember(const char *gname, smb_sid_t *sid) argument 508 smb_sam_lookup_user(char *name, smb_sid_t **sid) argument 532 smb_sam_lookup_group(char *name, smb_sid_t **sid) argument 559 smb_lwka_lookup_sid(smb_sid_t *sid) argument 582 smb_sid_islocal(smb_sid_t *sid) argument [all...] |
H A D | smb_idmap.c | 70 smb_idmap_getsid(uid_t id, int idtype, smb_sid_t **sid) argument 94 *sid = smb_sid_dup(sib.sib_maps[0].sim_sid); 107 smb_idmap_getid(smb_sid_t *sid, uid_t *id, int *id_type) argument 119 stat = smb_idmap_batch_getid(sib.sib_idmaph, sim, sid, *id_type); 221 smb_sid_t *sid, int idtype) 227 if (idmaph == NULL || sim == NULL || sid == NULL) 230 smb_sid_tostr(sid, sidstr); 379 smb_sid_t *sid; local 392 sid = smb_sid_fromstr(sim->sim_domsid); 393 if (sid 220 smb_idmap_batch_getid(idmap_get_handle_t *idmaph, smb_idmap_t *sim, smb_sid_t *sid, int idtype) argument [all...] |
H A D | smb_sd.c | 282 smb_sid_t *sid; local 307 sid = sd->sd_owner; 308 if (!smb_sid_isvalid(sid)) 312 idm_stat = smb_idmap_getid(sid, &fs_sd->sd_uid, &idtype); 320 sid = sd->sd_group; 321 if (!smb_sid_isvalid(sid)) 325 idm_stat = smb_idmap_getid(sid, &fs_sd->sd_gid, &idtype); 373 smb_sid_t *sid; local 384 SMB_IDMAP_USER, &sid); 391 sd->sd_owner = sid; [all...] |
/illumos-gate/usr/src/cmd/ndmpd/ndmp/ |
H A D | ndmpd_scsi.c | 56 ushort_t controller, ushort_t sid, ushort_t lun); 416 int sid, lun; local 431 sid = lun = -1; 433 scsi_find_sid_lun(sa, devname, &sid, &lun); 434 if (ndmp_open_list_find(devname, sid, lun) == NULL && 450 switch (ndmp_open_list_add(connection, adptnm, sid, lun, devid)) { 471 if (sid != -1) { 472 session->ns_scsi.sd_sid = sid; 493 * sid (input) - SCSI target ID. 503 ushort_t controller, ushort_t sid, ushort_ 502 common_set_target(ndmp_connection_t *connection, char *device, ushort_t controller, ushort_t sid, ushort_t lun) argument 576 scsi_find_sid_lun(scsi_adapter_t *sa, char *devname, int *sid, int *lun) argument [all...] |
/illumos-gate/usr/src/uts/common/crypto/api/ |
H A D | kcf_keys.c | 40 crypto_key_generate(crypto_provider_t provider, crypto_session_id_t sid, argument 61 rv = KCF_PROV_KEY_GENERATE(real_provider, sid, 65 KCF_WRAP_KEY_OPS_PARAMS(¶ms, KCF_OP_KEY_GENERATE, sid, 77 crypto_key_generate_pair(crypto_provider_t provider, crypto_session_id_t sid, argument 100 rv = KCF_PROV_KEY_GENERATE_PAIR(real_provider, sid, mech, 106 sid, mech, pub_attrs, pub_count, pub_handle, pri_attrs, 118 crypto_key_wrap(crypto_provider_t provider, crypto_session_id_t sid, argument 140 rv = KCF_PROV_KEY_WRAP(real_provider, sid, mech, wrapping_key, 144 KCF_WRAP_KEY_OPS_PARAMS(¶ms, KCF_OP_KEY_WRAP, sid, mech, 157 crypto_key_unwrap(crypto_provider_t provider, crypto_session_id_t sid, argument 198 crypto_key_derive(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *base_key, crypto_object_attribute_t *attrs, uint_t count, crypto_object_id_t *new_key, crypto_call_req_t *crq) argument [all...] |
H A D | kcf_session.c | 82 crypto_session_close(crypto_provider_t provider, crypto_session_id_t sid, argument 107 sid, KCF_SWFP_RHNDL(crq), pd); 111 KCF_OP_SESSION_CLOSE, NULL, sid, 122 crypto_session_login(crypto_provider_t provider, crypto_session_id_t sid, argument 142 rv = KCF_PROV_SESSION_LOGIN(real_provider, sid, 147 NULL, sid, type, pin, len, real_provider); 158 crypto_session_logout(crypto_provider_t provider, crypto_session_id_t sid, argument 178 rv = KCF_PROV_SESSION_LOGOUT(real_provider, sid, 183 NULL, sid, 0, NULL, 0, real_provider);
|
H A D | kcf_object.c | 41 crypto_object_create(crypto_provider_t provider, crypto_session_id_t sid, argument 62 rv = KCF_PROV_OBJECT_CREATE(real_provider, sid, 67 sid, 0, attrs, count, object_handle, 0, 79 crypto_object_destroy(crypto_provider_t provider, crypto_session_id_t sid, argument 99 rv = KCF_PROV_OBJECT_DESTROY(real_provider, sid, 104 sid, object_handle, NULL, 0, NULL, 0, 116 crypto_object_copy(crypto_provider_t provider, crypto_session_id_t sid, argument 137 rv = KCF_PROV_OBJECT_COPY(real_provider, sid, 143 sid, object_handle, attrs, count, 156 crypto_session_id_t sid, crypto_object_id_ 155 crypto_object_get_attribute_value(crypto_provider_t provider, crypto_session_id_t sid, crypto_object_id_t object_handle, crypto_object_attribute_t *attrs, uint_t count, crypto_call_req_t *crq) argument 194 crypto_object_set_attribute_value(crypto_provider_t provider, crypto_session_id_t sid, crypto_object_id_t object_handle, crypto_object_attribute_t *attrs, uint_t count, crypto_call_req_t *crq) argument 233 crypto_object_get_size(crypto_provider_t provider, crypto_session_id_t sid, crypto_object_id_t object_handle, size_t *size, crypto_call_req_t *crq) argument 270 crypto_object_find_init(crypto_provider_t provider, crypto_session_id_t sid, crypto_object_attribute_t *attrs, uint_t count, void **cookie, crypto_call_req_t *crq) argument [all...] |
/illumos-gate/usr/src/uts/common/io/ |
H A D | sysevent.c | 291 char *sid; local 303 if (uargs.sid.len > MAX_SUBID_LEN || 307 sid = kmem_alloc(uargs.sid.len, KM_SLEEP); 308 if (copyin((void *)(uintptr_t)uargs.sid.name, 309 sid, uargs.sid.len) != 0) { 310 kmem_free(sid, uargs.sid.len); 313 if (!sysevent_isstrend(sid, uarg 352 char *sid; local [all...] |
/illumos-gate/usr/src/cmd/idmap/idmapd/ |
H A D | adutils.h | 107 * The caller must free() *sid. 112 char **sid, rid_t *rid, idmap_id_type *sid_type, 118 * - 'rid' is optional; if NULL then 'sid' is expected to have the 119 * user/group RID present, else 'sid' is expected not to have it, and 120 * *rid will be used to qualify the given 'sid' 130 const char *sid, const rid_t *rid, idmap_id_type esidtype, 140 char **dn, char **attr, char **value, char **sid, rid_t *rid, 149 char **dn, char **attr, char **value, char **sid, rid_t *rid,
|
H A D | adutils.c | 84 char **sid; /* stringified SID */ member in struct:idmap_q 257 char *sid, 298 if (q->sid) { 299 *q->sid = sid; 300 sid = NULL; 334 free(sid); 394 char *sid = NULL; local 485 if (q->sid != NULL) { 488 sid 251 idmap_setqresults( idmap_q_t *q, char *san, const char *dn, const char *attr, char *value, char *sid, rid_t rid, int sid_type, char *unixname, posix_id_t pid) argument 588 idmap_batch_add1(idmap_query_state_t *state, const char *filter, char *ecanonname, char *edomain, idmap_id_type esidtype, char **dn, char **attr, char **value, char **canonname, char **dname, char **sid, rid_t *rid, idmap_id_type *sid_type, char **unixname, posix_id_t *pid, idmap_retcode *rc) argument 695 idmap_name2sid_batch_add1(idmap_query_state_t *state, const char *name, const char *dname, idmap_id_type esidtype, char **dn, char **attr, char **value, char **canonname, char **sid, rid_t *rid, idmap_id_type *sid_type, char **unixname, posix_id_t *pid, idmap_retcode *rc) argument 768 idmap_sid2name_batch_add1(idmap_query_state_t *state, const char *sid, const rid_t *rid, idmap_id_type esidtype, char **dn, char **attr, char **value, char **name, char **dname, idmap_id_type *sid_type, char **unixname, posix_id_t *pid, idmap_retcode *rc) argument 809 idmap_unixname2sid_batch_add1(idmap_query_state_t *state, const char *unixname, int is_user, int is_wuser, char **dn, char **attr, char **value, char **sid, rid_t *rid, char **name, char **dname, idmap_id_type *sid_type, idmap_retcode *rc) argument 858 idmap_pid2sid_batch_add1(idmap_query_state_t *state, posix_id_t pid, int is_user, char **dn, char **attr, char **value, char **sid, rid_t *rid, char **name, char **dname, idmap_id_type *sid_type, idmap_retcode *rc) argument [all...] |
/illumos-gate/usr/src/cmd/lms/tools/ |
H A D | daemonize.cpp | 68 pid_t pid, sid, parent; local 111 sid = setsid(); 112 if (sid < 0) {
|
/illumos-gate/usr/src/lib/smbsrv/libfksmbsrv/common/ |
H A D | fksmb_idmap.c | 73 smb_idmap_getsid(uid_t id, int idtype, smb_sid_t **sid) argument 97 *sid = smb_sid_dup(sib.sib_maps[0].sim_sid); 110 smb_idmap_getid(smb_sid_t *sid, uid_t *id, int *id_type) argument 122 stat = smb_idmap_batch_getid(sib.sib_idmaph, sim, sid, *id_type); 222 smb_sid_t *sid, int idtype) 228 if (idmaph == NULL || sim == NULL || sid == NULL) 231 smb_sid_tostr(sid, sidstr); 382 smb_sid_t *sid; local 395 sid = smb_sid_fromstr(sim->sim_domsid); 396 if (sid 221 smb_idmap_batch_getid(idmap_get_handle_t *idmaph, smb_idmap_t *sim, smb_sid_t *sid, int idtype) argument [all...] |
/illumos-gate/usr/src/lib/libsysevent/ |
H A D | libevchannel.c | 220 uargs.sid.name = NULL; 221 uargs.sid.len = 0; 446 sysevent_evc_subscribe_cmn(evchan_t *scp, const char *sid, const char *class, argument 457 if (scp == NULL || misaligned(scp) || sid == NULL || class == NULL) { 466 if ((sid_len = strlen(sid) + 1) > MAX_SUBID_LEN || sid_len == 1 || 472 if (!strisprint(sid)) { 488 if ((subp->evsub_sid = strdup(sid)) == NULL) { 539 uargs.sid.name = (uintptr_t)sid; 540 uargs.sid 571 sysevent_evc_subscribe(evchan_t *scp, const char *sid, const char *class, int (*event_handler)(sysevent_t *ev, void *cookie), void *cookie, uint32_t flags) argument 600 sysevent_evc_xsubscribe(evchan_t *scp, const char *sid, const char *class, int (*event_handler)(sysevent_t *ev, void *cookie), void *cookie, uint32_t flags, sysevent_subattr_t *attr) argument 686 sysevent_evc_unsubscribe(evchan_t *scp, const char *sid) argument [all...] |
/illumos-gate/usr/src/lib/libnsl/rpc/ |
H A D | svcauth_des.c | 101 static void cache_ref(uint32_t); /* note that sid was ref'd */ 127 uint32_t sid; local 249 sid = cred->adc_nickname; 250 if (sid >= authdes_cachesz) { 256 entry = &_rpc_authdes_cache[sid]; 261 sessionkey = &_rpc_authdes_cache[sid].key; 286 _rpc_authdes_cache[sid].rname); 335 } else sid = cache_spot_id; 338 window = _rpc_authdes_cache[sid].window; 350 _rpc_authdes_cache[sid] 531 cache_ref(uint32_t sid) argument 630 uint32_t sid; local [all...] |