/illumos-gate/usr/src/cmd/acct/ |
H A D | acctcom.c | 70 user, variable 88 unkid, /*user doesn't have login on this machine*/ 212 fprintf(stderr, "%s: Unknown user %s\n", argv[0], optarg); 216 fprintf(stderr, "%s: Unknown user %s\n", argv[0], optarg); 395 user = expand(a->ac_utime); 396 cpu = sys + user; 439 usertot += (double)user; 572 pf((double)user / HZ); 578 pf((double)user / cpu); 702 diag("-r show CPU factor (user [all...] |
/illumos-gate/usr/src/cmd/auditconfig/ |
H A D | auditconfig.c | 179 { "-setumask", " user audit_flags", AC_ARG_SETUMASK, B_FALSE}, 204 static uid_t get_user_id(char *user); 244 static void do_setauid(char *user, char **argv); 789 char *user; local 792 user = *argv; 794 do_setauid(user, argv); 1043 * do_conf() - configure the kernel events. The value returned to the user is 1074 * user is for the global zone unless AUDIT_PERZONE is set. 1110 * user is for the global zone unless AUDIT_PERZONE is set. 1352 print_mask(gettext("active user defaul 1802 do_setauid(char *user, char **argv) argument 2277 get_user_id(char *user) argument [all...] |
/illumos-gate/usr/src/cmd/bnu/ |
H A D | expfile.c | 52 char user[NAMESIZE], save[MAXFULLNAME]; local 59 /* find / and copy user part */ 60 for (fpart = save + 1, up = user; *fpart != '\0' 64 if ((user[0]=='\0') || (gninfo(user, &uid, file) != 0)){
|
H A D | in.uucpd.c | 209 char user[64], passwd[64]; local 215 if (readline(user, sizeof (user)) < 0) { 216 fprintf(stderr, "user read\n"); 224 if ((pam_start("uucp", user, &conv, &pamh)) != PAM_SUCCESS) 256 if ((pw = getpwnam(user)) == NULL || strcmp(pw->pw_shell, UUCICO)) { 257 /* force a delay if user bad */ 266 sprintf(Username, "USER=%s", user); 267 sprintf(Loginname, "LOGNAME=%s", user); 284 if (initgroups(user, p [all...] |
H A D | security.c | 225 * Function: scRequser - log requestor user name 276 * Function: scDest - log destination node, user and file name 280 * destuser: user where the dest file is sent to 369 static char user[MODSTR]; local 374 (void) guinfo(stbuf.st_uid,user); 375 return(user); 408 * clientusr - Client user ID. 409 * serverusr - Server user ID.
|
H A D | uucleanup.c | 47 * either user files to be sent or received, or 49 * does not involve sending user files is not checked 50 * for now.) In either of the cases, the user is 387 char buf[BUFSIZ], user[9]; local 424 user, opt, file3) <5) { 442 /* some data was requested -- tell user */ 447 ret = sendMail((char *) NULL, user, "", _CantContact); 453 ret = sendMail((char *) NULL, user, "", _CantContact); 483 char buf[BUFSIZ], user[BUFSIZ]; local 520 user, op [all...] |
H A D | uudecode.c | 239 /* handle ~user/file format */ 242 struct passwd *user; local 248 gettext("Illegal ~user\n")); 252 user = getpwnam(dest+1); 253 if (user == NULL) { 255 gettext("No such user as %s\n"), dest); 258 (void) strncpy(dnbuf, user->pw_dir, sizeof (dnbuf));
|
H A D | uustat.c | 226 fprintf(stderr, gettext("Invalid user\n")); 471 char fullname[MAXFULLNAME], buf[BUFSIZ], user[9]; local 521 user, opt, file3) <5) { 529 DEBUG(9, "user (%s)", user); 533 if (User[0] != '\0' && (!EQUALS(User, user)) ) 582 sprintf(format_tmp,"%s %s ", user, file1); 587 sprintf(format_tmp,"%s %ld %s ", user, fsize(dir, file3, file1), file1); 596 sprintf(format_tmp,"%s ", user); 618 username = user; 710 char fullname[MAXFULLNAME], buf[BUFSIZ], user[9]; local [all...] |
H A D | uuxqt.c | 167 * determine user who started uuxqt (in principle) 715 * return stuff to user 716 * user -> user to notify 717 * rmt -> system name where user resides 720 * buf -> user friendly face saving uplifting edifying missive 726 retosndr(user, rmt, file, cmd, buf, errfile) 727 char *user, *rmt, *file, *cmd, *buf, *errfile; 738 (void) strlcpy(ruser, user, sizeof (ruser)); 740 (void) snprintf(ruser, sizeof (ruser), "%s!%s", rmt, user); 842 char buf[BUFSIZ], user[BUFSIZ], retaddr[BUFSIZ], retuser[BUFSIZ], local [all...] |
/illumos-gate/usr/src/cmd/cmd-crypto/pktool/ |
H A D | setpin.c | 30 * finds the soft token, prompt the user for the old PIN (if 75 /* Get the user's new PIN. */ 126 CK_USER_TYPE user = CKU_USER; local 149 * default "changeme". Otherwise, let user type in the correct old 172 /* Get the user's new PIN. */ 212 user = CKU_SO; 215 &user, sizeof (user)); 302 else if (strcmp(utype, "user") == 0)
|
/illumos-gate/usr/src/cmd/cmd-inet/sbin/dhcpagent/ |
H A D | async.c | 44 * boolean_t: B_TRUE if the command was started by a user 49 async_start(dhcp_smach_t *dsmp, dhcp_ipc_type_t cmd, boolean_t user) argument 55 dsmp->dsm_async.as_user = user; 98 "async_cancel: cannot abort command %d from user",
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/ftp/ |
H A D | cmds.c | 1351 * Send new user information (re-login) 1354 user(int argc, char *argv[]) function 1375 (void) printf("access for user (nil) denied\n");
|
H A D | ftp.c | 231 * It can even be the case that the "host" supplied by the user 361 char *user, *pass, *acct; local 364 user = pass = acct = 0; 365 if (ruserpass(host, &user, &pass, &acct) < 0) { 370 if (user == NULL) { 386 user = tmp; 388 user = myname; 392 n = command("USER %s", user);
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/pppd/ |
H A D | auth.c | 146 /* Hook for a plugin to check the PAP user and password */ 147 int (*pap_auth_hook) __P((char *user, char *passwd, char **msgp, 151 /* Hook for a plugin to know about the PAP user logout */ 155 int (*pap_passwd_hook) __P((char *user, char *passwd)) = NULL; 260 { "user", o_string, user, 276 "Get PAP user and password from file" }, 320 /* open user info file */ 325 option_error("unable to open user login data file %s", *argv); 331 if (fgets(user, MAXNAMELE 1079 char passwd[256], user[256]; local [all...] |
H A D | options.c | 96 char user[MAXNAMELEN]; /* Username for PAP */ variable 145 bool log_to_specific_fd; /* log_to_fd was specified by user option */ 559 * options_from_user - see if the user has a ~/.ppprc file, and if so, 566 char *user, *path, *file; local 572 if (pw == NULL || (user = pw->pw_dir) == NULL || user[0] == '\0') 575 pl = strlen(user) + strlen(file) + 2; 579 (void) slprintf(path, pl, "%s/%s", user, file);
|
H A D | upap.c | 168 upap_authwithpeer(unit, user, password) 170 char *user, *password; 175 u->us_user = user; 176 u->us_userlen = strlen(user); 423 * Parse user/passwd. 577 if ((*pap_passwd_hook)(user, passwd) >= 0) { 672 char *user, *pwd, *msg; local 700 user = (char *) (p + 1); 704 printer(arg, " user="); 705 print_string(user, ule [all...] |
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/pppd/plugins/ |
H A D | passprompt.c | 27 static int promptpass(char *user, char *passwd) argument 38 if (user != NULL && passwd == NULL) 71 argv[1] = user == NULL ? "" : user;
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/rdist/ |
H A D | main.c | 47 char user[10]; /* user's name */ variable 48 char homedir[128]; /* user's home directory */ 120 strncpy(user, pw->pw_name, sizeof (user)); 121 user[sizeof (user) - 1] = '\0'; 282 * if the user disables krb5 on the cmdline (-K), then skip 285 * if the user does not disable krb5 or enable krb5 on the
|
H A D | server.c | 306 #define protoname() (pw ? pw->pw_name : user) 325 static char user[15], group[15]; local 352 sprintf(user, ":%d", stb.st_uid); 1169 extern char user[];
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/ |
H A D | rsh.c | 209 char *host = NULL, *user = NULL; local 326 user = optarg; 416 if (user == NULL) 417 user = pwd->pw_name; 420 * if the user disables krb5 on the cmdline (-K), then skip 423 * if the user does not disable krb5 or enable krb5 on the 568 pwd->pw_name, user, 653 rem = rcmd_af(&host, portnumber, pwd->pw_name, user, args,
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/telnet/ |
H A D | commands.c | 85 * Number of maximum IPv4 gateways user can specify. This number is limited by 90 * Number of maximum IPv6 gateways user can specify. This number is limited by 375 char *name; /* How user refers to it (case independent) */ 866 "output of \"netdata\" to user readable format (debugging)", 869 "print user readable output for \"netdata\"" }, 2463 * Parse the user input (cmd_line_input) which should: 2945 char *user = NULL; local 3013 user = *argv++; 3042 "usage: %s [-l user] [-a] host-name [port]\n", cmd); 3089 * user i [all...] |
H A D | main.c | 99 "\n\t[-e char] [-k realm] [-l user] [-n tracefile] [-X atype]" 113 char *user; local 135 user = NULL; 233 user = optarg; 263 if (user) { 265 *argp++ = user;
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.sbin/ |
H A D | in.rexecd.c | 106 * in.rexecd has been modified to run as the user invoking it. Hence there is no 165 char user[16]; local 269 getstr(user, sizeof (user), "username"); 273 pwd = getpwnam_r(user, &pw_data, pwdbuf, sizeof (pwdbuf)); 275 (void) audit_rexecd_fail("Login incorrect", hostname, user, 294 if (pam_start("rexec", user, &conv, &pamh) != PAM_SUCCESS) { 305 user, cmdbuf); /* BSM */ 310 user, cmdbuf); /* BSM */ 318 hostname, user, cmdbu [all...] |
H A D | in.rlogind.c | 530 /* Get the Unix username of the remote user */ 533 /* Get the Kerberos principal name string of the remote user */ 997 * allow a unprivileged user to originate a connection 1194 lusername, /* local user */ 1510 char user[sizeof (up->ut_user) + 1]; local 1525 * the utmpx user entry from type LOGIN_PROCESS 1530 (void) strlcpy(user, up->ut_user, 1531 sizeof (user)); 1541 if ((pam_start(pam_prog_name, user, NULL,
|
H A D | in.telnetd.c | 320 echotoggle, /* last time user entered echo character */ 510 * This verifies that the user is valid on the local system, 515 * NOTE: the user must be in the gsscred table in order to map 725 "\tKerberos5 identifies user as ``%s''\r\n", 946 "auth_level = %d user = %s\n", 2221 } else if (strcasecmp(optarg, "user") == 0) { 2533 * Now check to see if the user is valid or not 2539 * We cant be VALID until the user status is 3047 * only if the user did not automatically authenticate. 3053 * If the user automaticall 4475 char user[sizeof (up->ut_user) + 1]; local [all...] |