Lines Matching +defs:user +defs:attr
83 #define DTD_ELEM_ATTR (const xmlChar *) "attr"
134 #define DTD_ATTR_USER (const xmlChar *) "user"
965 * The user deals in absolute paths in the running global zone, but the
1483 * the user will need access to the directory so use that as a heuristic.
1762 match_prop(xmlNodePtr cur, const xmlChar *attr, char *user_prop)
1767 gotten_prop = xmlGetProp(cur, attr);
2710 char user[MAXUSERNAME];
2724 if ((fetchprop(cur, DTD_ATTR_USER, user,
2725 sizeof (user)) == Z_OK) &&
2726 (strcmp(tabptr->zone_admin_user, user) == 0)) {
3168 zonecfg_get_attr_boolean(const struct zone_attrtab *attr, boolean_t *value)
3170 if (attr == NULL)
3173 if (strcmp(attr->zone_attr_type, DTD_ENTITY_BOOLEAN) != 0)
3176 if (strcmp(attr->zone_attr_value, DTD_ENTITY_TRUE) == 0) {
3180 if (strcmp(attr->zone_attr_value, DTD_ENTITY_FALSE) == 0) {
3188 zonecfg_get_attr_int(const struct zone_attrtab *attr, int64_t *value)
3193 if (attr == NULL)
3196 if (strcmp(attr->zone_attr_type, DTD_ENTITY_INT) != 0)
3200 result = strtoll(attr->zone_attr_value, &endptr, 10);
3208 zonecfg_get_attr_string(const struct zone_attrtab *attr, char *value,
3211 if (attr == NULL)
3214 if (strcmp(attr->zone_attr_type, DTD_ENTITY_STRING) != 0)
3217 if (strlcpy(value, attr->zone_attr_value, val_sz) >= val_sz)
3223 zonecfg_get_attr_uint(const struct zone_attrtab *attr, uint64_t *value)
3229 if (attr == NULL)
3232 if (strcmp(attr->zone_attr_type, DTD_ENTITY_UINT) != 0)
3236 result = strtoull(attr->zone_attr_value, &endptr, 10);
3240 neg_result = strtoll(attr->zone_attr_value, &endptr, 10);
3841 if (strcmp(nm, "attr") == 0)
4123 * This validation is the one we expect to fail if the user specified
7659 authlist = kva_match(ua_ptr->attr, USERATTR_AUTHS_KW);
7788 * depending on the type of the specified user. It is also
7799 zonecfg_authorize_user_impl(zone_dochandle_t handle, char *user,
7817 * First get the existing authorizations for this user
7823 if ((u = getusernam(user)) != NULL) {
7828 type = kva_match(u->attr, USERATTR_TYPE_KW);
7834 current_auths = kva_match(u->attr, USERATTR_AUTHS_KW);
7848 * user still needs the Zone Management Profile.
7866 * If the user has authorizations
7881 current_profs = kva_match(u->attr, USERATTR_PROFILES_KW);
7889 * user_attr entry for this user
7891 (void) zonecfg_remove_userauths(handle, user, "", B_FALSE);
7921 * If the user's previous authorizations have changed
7931 auths_cmd, new_auths, rbac_profs, user) + 1;
7936 auths_cmd, new_auths, rbac_profs, user);
7952 char user[MAXUSERNAME];
7962 if (fetchprop(cur, DTD_ATTR_USER, user,
7963 sizeof (user)) != Z_OK)
7968 if (zonecfg_authorize_user_impl(handle, user, auths, zonename)
7978 zonecfg_deauthorize_user(zone_dochandle_t handle, char *user, char *zonename)
7980 return (zonecfg_authorize_user_impl(handle, user, "", zonename));
7988 char user[MAXUSERNAME];
7997 if (fetchprop(cur, DTD_ATTR_USER, user,
7998 sizeof (user)) != Z_OK)
8000 if ((err = zonecfg_deauthorize_user(handle, user,
8008 zonecfg_insert_userauths(zone_dochandle_t handle, char *user, char *zonename)
8015 if ((strncmp(next->user, user, MAXUSERNAME) == 0) &&
8019 * user is already in list
8031 (void) strlcpy(new->user, user, sizeof (new->user));
8039 zonecfg_remove_userauths(zone_dochandle_t handle, char *user, char *zonename,
8048 if ((strlen(user) == 0 ||
8049 strncmp(next->user, user, MAXUSERNAME) == 0) &&
8057 new->user, new->zonename);