Searched defs:user (Results 1 - 25 of 283) sorted by path

1234567891011>>

/illumos-gate/usr/src/cmd/acct/
H A Dacctcom.c70 user, variable
88 unkid, /*user doesn't have login on this machine*/
212 fprintf(stderr, "%s: Unknown user %s\n", argv[0], optarg);
216 fprintf(stderr, "%s: Unknown user %s\n", argv[0], optarg);
395 user = expand(a->ac_utime);
396 cpu = sys + user;
439 usertot += (double)user;
572 pf((double)user / HZ);
578 pf((double)user / cpu);
702 diag("-r show CPU factor (user
[all...]
/illumos-gate/usr/src/cmd/auditconfig/
H A Dauditconfig.c179 { "-setumask", " user audit_flags", AC_ARG_SETUMASK, B_FALSE},
204 static uid_t get_user_id(char *user);
244 static void do_setauid(char *user, char **argv);
789 char *user; local
792 user = *argv;
794 do_setauid(user, argv);
1043 * do_conf() - configure the kernel events. The value returned to the user is
1074 * user is for the global zone unless AUDIT_PERZONE is set.
1110 * user is for the global zone unless AUDIT_PERZONE is set.
1352 print_mask(gettext("active user defaul
1802 do_setauid(char *user, char **argv) argument
2277 get_user_id(char *user) argument
[all...]
/illumos-gate/usr/src/cmd/bnu/
H A Dexpfile.c52 char user[NAMESIZE], save[MAXFULLNAME]; local
59 /* find / and copy user part */
60 for (fpart = save + 1, up = user; *fpart != '\0'
64 if ((user[0]=='\0') || (gninfo(user, &uid, file) != 0)){
H A Din.uucpd.c209 char user[64], passwd[64]; local
215 if (readline(user, sizeof (user)) < 0) {
216 fprintf(stderr, "user read\n");
224 if ((pam_start("uucp", user, &conv, &pamh)) != PAM_SUCCESS)
256 if ((pw = getpwnam(user)) == NULL || strcmp(pw->pw_shell, UUCICO)) {
257 /* force a delay if user bad */
266 sprintf(Username, "USER=%s", user);
267 sprintf(Loginname, "LOGNAME=%s", user);
284 if (initgroups(user, p
[all...]
H A Dsecurity.c225 * Function: scRequser - log requestor user name
276 * Function: scDest - log destination node, user and file name
280 * destuser: user where the dest file is sent to
369 static char user[MODSTR]; local
374 (void) guinfo(stbuf.st_uid,user);
375 return(user);
408 * clientusr - Client user ID.
409 * serverusr - Server user ID.
H A Duucleanup.c47 * either user files to be sent or received, or
49 * does not involve sending user files is not checked
50 * for now.) In either of the cases, the user is
387 char buf[BUFSIZ], user[9]; local
424 user, opt, file3) <5) {
442 /* some data was requested -- tell user */
447 ret = sendMail((char *) NULL, user, "", _CantContact);
453 ret = sendMail((char *) NULL, user, "", _CantContact);
483 char buf[BUFSIZ], user[BUFSIZ]; local
520 user, op
[all...]
H A Duudecode.c239 /* handle ~user/file format */
242 struct passwd *user; local
248 gettext("Illegal ~user\n"));
252 user = getpwnam(dest+1);
253 if (user == NULL) {
255 gettext("No such user as %s\n"), dest);
258 (void) strncpy(dnbuf, user->pw_dir, sizeof (dnbuf));
H A Duustat.c226 fprintf(stderr, gettext("Invalid user\n"));
471 char fullname[MAXFULLNAME], buf[BUFSIZ], user[9]; local
521 user, opt, file3) <5) {
529 DEBUG(9, "user (%s)", user);
533 if (User[0] != '\0' && (!EQUALS(User, user)) )
582 sprintf(format_tmp,"%s %s ", user, file1);
587 sprintf(format_tmp,"%s %ld %s ", user, fsize(dir, file3, file1), file1);
596 sprintf(format_tmp,"%s ", user);
618 username = user;
710 char fullname[MAXFULLNAME], buf[BUFSIZ], user[9]; local
[all...]
H A Duuxqt.c167 * determine user who started uuxqt (in principle)
715 * return stuff to user
716 * user -> user to notify
717 * rmt -> system name where user resides
720 * buf -> user friendly face saving uplifting edifying missive
726 retosndr(user, rmt, file, cmd, buf, errfile)
727 char *user, *rmt, *file, *cmd, *buf, *errfile;
738 (void) strlcpy(ruser, user, sizeof (ruser));
740 (void) snprintf(ruser, sizeof (ruser), "%s!%s", rmt, user);
842 char buf[BUFSIZ], user[BUFSIZ], retaddr[BUFSIZ], retuser[BUFSIZ], local
[all...]
/illumos-gate/usr/src/cmd/cmd-crypto/pktool/
H A Dsetpin.c30 * finds the soft token, prompt the user for the old PIN (if
75 /* Get the user's new PIN. */
126 CK_USER_TYPE user = CKU_USER; local
149 * default "changeme". Otherwise, let user type in the correct old
172 /* Get the user's new PIN. */
212 user = CKU_SO;
215 &user, sizeof (user));
302 else if (strcmp(utype, "user") == 0)
/illumos-gate/usr/src/cmd/cmd-inet/sbin/dhcpagent/
H A Dasync.c44 * boolean_t: B_TRUE if the command was started by a user
49 async_start(dhcp_smach_t *dsmp, dhcp_ipc_type_t cmd, boolean_t user) argument
55 dsmp->dsm_async.as_user = user;
98 "async_cancel: cannot abort command %d from user",
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/ftp/
H A Dcmds.c1351 * Send new user information (re-login)
1354 user(int argc, char *argv[]) function
1375 (void) printf("access for user (nil) denied\n");
H A Dftp.c231 * It can even be the case that the "host" supplied by the user
361 char *user, *pass, *acct; local
364 user = pass = acct = 0;
365 if (ruserpass(host, &user, &pass, &acct) < 0) {
370 if (user == NULL) {
386 user = tmp;
388 user = myname;
392 n = command("USER %s", user);
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/pppd/
H A Dauth.c146 /* Hook for a plugin to check the PAP user and password */
147 int (*pap_auth_hook) __P((char *user, char *passwd, char **msgp,
151 /* Hook for a plugin to know about the PAP user logout */
155 int (*pap_passwd_hook) __P((char *user, char *passwd)) = NULL;
260 { "user", o_string, user,
276 "Get PAP user and password from file" },
320 /* open user info file */
325 option_error("unable to open user login data file %s", *argv);
331 if (fgets(user, MAXNAMELE
1079 char passwd[256], user[256]; local
[all...]
H A Doptions.c96 char user[MAXNAMELEN]; /* Username for PAP */ variable
145 bool log_to_specific_fd; /* log_to_fd was specified by user option */
559 * options_from_user - see if the user has a ~/.ppprc file, and if so,
566 char *user, *path, *file; local
572 if (pw == NULL || (user = pw->pw_dir) == NULL || user[0] == '\0')
575 pl = strlen(user) + strlen(file) + 2;
579 (void) slprintf(path, pl, "%s/%s", user, file);
H A Dupap.c168 upap_authwithpeer(unit, user, password)
170 char *user, *password;
175 u->us_user = user;
176 u->us_userlen = strlen(user);
423 * Parse user/passwd.
577 if ((*pap_passwd_hook)(user, passwd) >= 0) {
672 char *user, *pwd, *msg; local
700 user = (char *) (p + 1);
704 printer(arg, " user=");
705 print_string(user, ule
[all...]
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/pppd/plugins/
H A Dpassprompt.c27 static int promptpass(char *user, char *passwd) argument
38 if (user != NULL && passwd == NULL)
71 argv[1] = user == NULL ? "" : user;
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/rdist/
H A Dmain.c47 char user[10]; /* user's name */ variable
48 char homedir[128]; /* user's home directory */
120 strncpy(user, pw->pw_name, sizeof (user));
121 user[sizeof (user) - 1] = '\0';
282 * if the user disables krb5 on the cmdline (-K), then skip
285 * if the user does not disable krb5 or enable krb5 on the
H A Dserver.c306 #define protoname() (pw ? pw->pw_name : user)
325 static char user[15], group[15]; local
352 sprintf(user, ":%d", stb.st_uid);
1169 extern char user[];
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/
H A Drsh.c209 char *host = NULL, *user = NULL; local
326 user = optarg;
416 if (user == NULL)
417 user = pwd->pw_name;
420 * if the user disables krb5 on the cmdline (-K), then skip
423 * if the user does not disable krb5 or enable krb5 on the
568 pwd->pw_name, user,
653 rem = rcmd_af(&host, portnumber, pwd->pw_name, user, args,
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/telnet/
H A Dcommands.c85 * Number of maximum IPv4 gateways user can specify. This number is limited by
90 * Number of maximum IPv6 gateways user can specify. This number is limited by
375 char *name; /* How user refers to it (case independent) */
866 "output of \"netdata\" to user readable format (debugging)",
869 "print user readable output for \"netdata\"" },
2463 * Parse the user input (cmd_line_input) which should:
2945 char *user = NULL; local
3013 user = *argv++;
3042 "usage: %s [-l user] [-a] host-name [port]\n", cmd);
3089 * user i
[all...]
H A Dmain.c99 "\n\t[-e char] [-k realm] [-l user] [-n tracefile] [-X atype]"
113 char *user; local
135 user = NULL;
233 user = optarg;
263 if (user) {
265 *argp++ = user;
/illumos-gate/usr/src/cmd/cmd-inet/usr.sbin/
H A Din.rexecd.c106 * in.rexecd has been modified to run as the user invoking it. Hence there is no
165 char user[16]; local
269 getstr(user, sizeof (user), "username");
273 pwd = getpwnam_r(user, &pw_data, pwdbuf, sizeof (pwdbuf));
275 (void) audit_rexecd_fail("Login incorrect", hostname, user,
294 if (pam_start("rexec", user, &conv, &pamh) != PAM_SUCCESS) {
305 user, cmdbuf); /* BSM */
310 user, cmdbuf); /* BSM */
318 hostname, user, cmdbu
[all...]
H A Din.rlogind.c530 /* Get the Unix username of the remote user */
533 /* Get the Kerberos principal name string of the remote user */
997 * allow a unprivileged user to originate a connection
1194 lusername, /* local user */
1510 char user[sizeof (up->ut_user) + 1]; local
1525 * the utmpx user entry from type LOGIN_PROCESS
1530 (void) strlcpy(user, up->ut_user,
1531 sizeof (user));
1541 if ((pam_start(pam_prog_name, user, NULL,
H A Din.telnetd.c320 echotoggle, /* last time user entered echo character */
510 * This verifies that the user is valid on the local system,
515 * NOTE: the user must be in the gsscred table in order to map
725 "\tKerberos5 identifies user as ``%s''\r\n",
946 "auth_level = %d user = %s\n",
2221 } else if (strcasecmp(optarg, "user") == 0) {
2533 * Now check to see if the user is valid or not
2539 * We cant be VALID until the user status is
3047 * only if the user did not automatically authenticate.
3053 * If the user automaticall
4475 char user[sizeof (up->ut_user) + 1]; local
[all...]

Completed in 760 milliseconds

1234567891011>>