/illumos-gate/usr/src/uts/common/fs/smbsrv/ |
H A D | smb_user.c | 238 smb_user_t *user; in smb_user_new() local 245 user = kmem_cache_alloc(smb_cache_user, KM_SLEEP); in smb_user_new() 246 gen = (user->u_ssnid + 1) & 7; in smb_user_new() 247 bzero(user, sizeof (smb_user_t)); in smb_user_new() 249 user->u_refcnt = 1; in smb_user_new() 250 user->u_session = session; in smb_user_new() 251 user->u_server = session->s_server; in smb_user_new() 252 user->u_logon_time = gethrestime_sec(); in smb_user_new() 254 if (smb_idpool_alloc(&session->s_uid_pool, &user->u_uid)) in smb_user_new() 256 user->u_ssnid = SMB_USER_SSNID(user) + gen; in smb_user_new() [all …]
|
H A D | smb_authenticate.c | 65 smb_user_t *user = NULL; in smb_authenticate_old() local 68 user = smb_user_new(sr->session); in smb_authenticate_old() 69 if (user == NULL) in smb_authenticate_old() 73 sr->uid_user = user; in smb_authenticate_old() 74 sr->smb_uid = user->u_uid; in smb_authenticate_old() 106 smb_user_logoff(user); in smb_authenticate_old() 230 smb_user_t *user = NULL; in smb_authenticate_ext() local 261 user = smb_user_new(sr->session); in smb_authenticate_ext() 262 if (user == NULL) in smb_authenticate_ext() 266 sr->uid_user = user; in smb_authenticate_ext() [all …]
|
/illumos-gate/usr/src/test/zfs-tests/tests/functional/acl/cifs/ |
H A D | cifs_attr_003_pos.ksh | 201 typeset user=$2 204 verify_expect $expect chg_usr_exec $user \ 206 verify_expect $expect chg_usr_exec $user \ 221 typeset user=$2 225 verify_expect $expect chg_usr_exec $user \ 227 verify_expect $expect chg_usr_exec $user \ 235 typeset user=$2 239 verify_expect $expect chg_usr_exec $user \ 254 typeset user=$2 260 verify_expect $expect chg_usr_exec $user \ [all …]
|
H A D | cifs_attr_001_pos.ksh | 70 typeset user=$3 77 if [[ -n $user ]]; then 78 su $user -c "chmod S+c${attr} $object" 99 typeset user=$3 106 if [[ -n $user ]]; then 107 su $user -c "chmod S-c${attr} $object" 125 typeset user=$1 128 if [[ -z $user || -z $object ]]; then 129 log_fail "User($user), Object($object) not defined." 136 if [[ $user == "root" ]]; then [all …]
|
H A D | cifs_attr_002_pos.ksh | 63 typeset user=$3 # The user to run the command as 75 if [[ $user == 'root' ]]; then 83 log_mustnot su $user -c "$cmd" 87 log_must su $user -c "$cmd" 89 log_mustnot su $user -c "$cmd" 93 log_must su $user -c "$cmd" 95 log_must su $user -c "$cmd" 97 log_mustnot su $user -c "$cmd" 138 typeset user=$1 141 if [[ -z $user || -z $priv ]]; then [all …]
|
/illumos-gate/usr/src/test/zfs-tests/tests/functional/delegate/ |
H A D | delegate_common.kshlib | 92 typeset user 93 for user in $@; do 98 check_fs_perm $user $perm $dtst 101 check_vol_perm $user $perm $dtst 106 log_note "Fail: $user should have $perm " \ 136 typeset user 137 for user in $@; do 142 check_fs_perm $user $perm $dtst 145 check_vol_perm $user $perm $dtst 150 log_note "Fail: $user should not have $perm " \ [all …]
|
/illumos-gate/usr/src/lib/libsecdb/common/ |
H A D | getuserattr.c | 53 userstr_t user; in getuserattr() local 56 (void) memset(&user, 0, sizeof (userattr_t)); in getuserattr() 57 tmp = _getuserattr(&user, buf, NSS_BUFLEN_USERATTR, &err); in getuserattr() 66 userstr_t user; in fgetuserattr() local 69 (void) memset(&user, 0, sizeof (userattr_t)); in fgetuserattr() 70 tmp = _fgetuserattr(f, &user, buf, NSS_BUFLEN_USERATTR); in fgetuserattr() 80 userstr_t user; in getusernam() local 83 resptr = _getusernam(name, &user, buf, NSS_BUFLEN_USERATTR, &err); in getusernam() 117 free_userattr(userattr_t *user) in free_userattr() argument 119 if (user) { in free_userattr() [all …]
|
/illumos-gate/usr/src/lib/libc/sparc/sys/ |
H A D | ptrace.c | 75 user_t user; /* manufactured u-block */ member 257 data = *((int *)((caddr_t)(&cp->user) + xaddr)); in ptrace() 268 if (xaddr >= (unsigned)cp->user.u_reg[REG_SP] && in ptrace() 269 xaddr < (unsigned)cp->user.u_reg[REG_SP]+16*sizeof (int)) in ptrace() 287 data = (cp->user.u_reg[REG_PS] & in ptrace() 291 cp->user.u_reg[rx] = data; in ptrace() 307 ps->pr_lwp.pr_reg[R_PSR] = cp->user.u_reg[REG_PSR]; in ptrace() 308 ps->pr_lwp.pr_reg[R_PC] = cp->user.u_reg[REG_PC]; in ptrace() 309 ps->pr_lwp.pr_reg[R_nPC] = cp->user.u_reg[REG_nPC]; in ptrace() 310 ps->pr_lwp.pr_reg[R_Y] = cp->user.u_reg[REG_Y]; in ptrace() [all …]
|
/illumos-gate/usr/src/cmd/sendmail/libsm/ |
H A D | mbdb.c | 45 int (*mbdb_lookup) __P((char *name, SM_MBDB_T *user)); 50 static int mbdb_pw_lookup __P((char *name, SM_MBDB_T *user)); 57 static int mbdb_ldap_lookup __P((char *name, SM_MBDB_T *user)); 165 sm_mbdb_lookup(name, user) in sm_mbdb_lookup() argument 167 SM_MBDB_T *user; 172 ret = SmMbdbType->mbdb_lookup(name, user); 188 sm_mbdb_frompw(user, pw) in sm_mbdb_frompw() argument 189 SM_MBDB_T *user; in sm_mbdb_frompw() 192 SM_REQUIRE(user != NULL); 193 (void) sm_strlcpy(user->mbdb_name, pw->pw_name, [all …]
|
/illumos-gate/usr/src/lib/libc/i386/sys/ |
H A D | ptrace.c | 73 user_t user; /* manufactured u-block */ member 255 data = *((int *)((caddr_t)(&cp->user) + xaddr)); in ptrace() 281 data = (cp->user.u_reg[EFL] & ~PSL_USERMASK) | in ptrace() 283 cp->user.u_reg[rx] = data; in ptrace() 299 ps->pr_lwp.pr_reg[GS] = cp->user.u_reg[GS]; in ptrace() 300 ps->pr_lwp.pr_reg[FS] = cp->user.u_reg[FS]; in ptrace() 301 ps->pr_lwp.pr_reg[ES] = cp->user.u_reg[ES]; in ptrace() 302 ps->pr_lwp.pr_reg[DS] = cp->user.u_reg[DS]; in ptrace() 303 ps->pr_lwp.pr_reg[EDI] = cp->user.u_reg[EDI]; in ptrace() 304 ps->pr_lwp.pr_reg[ESI] = cp->user.u_reg[ESI]; in ptrace() [all …]
|
/illumos-gate/usr/src/test/zfs-tests/tests/functional/acl/nontrivial/ |
H A D | zfs_acl_chmod_owner_001_pos.ksh | 118 typeset user=$1 124 if [[ $user == "" || $node == "" ]]; then 128 su $user -c "chown $expect_owner $node" 154 typeset user=$1 160 if [[ $user == "" || $node == "" ]]; then 164 su $user -c "chgrp $expect_group $node" 191 typeset user=$2 197 if [[ $user == root ]]; then 199 elif [[ $user == $new ]] ; then 200 if [[ $user == $old || $acl_target == *:allow ]]; then [all …]
|
H A D | zfs_acl_chmod_delete_001_pos.ksh | 103 typeset user=$1 107 if [[ $user == "" || $node == "" ]]; then 111 chgusr_exec $user rm -rf $node ; ret=$? 113 chgusr_exec $user rm -f $node ; ret=$? 135 typeset user=$3 138 if [[ $user == "root" || $acl_target == *":allow"* ]]; then 190 typeset user=${flag#user:} 191 log=$(logname "$acl_parent" $acl_target $user) 192 $log operate_node $user $node 234 typeset user=$2 [all …]
|
/illumos-gate/usr/src/lib/scsi/plugins/smp/sas2/common/ |
H A D | sas2_functions.c | 37 sas2_rq_len(size_t user, smp_target_t *tp) in sas2_rq_len() argument 39 if (user != 0) { in sas2_rq_len() 215 sas2_report_self_config_status_rq_len(size_t user, smp_target_t *tp) in sas2_report_self_config_status_rq_len() argument 217 if (user != 0) { in sas2_report_self_config_status_rq_len() 227 sas2_report_zone_perm_table_rq_len(size_t user, smp_target_t *tp) in sas2_report_zone_perm_table_rq_len() argument 229 if (user != 0) { in sas2_report_zone_perm_table_rq_len() 239 sas2_report_zone_mgr_password_rq_len(size_t user, smp_target_t *tp) in sas2_report_zone_mgr_password_rq_len() argument 241 if (user != 0) { in sas2_report_zone_mgr_password_rq_len() 251 sas2_report_broadcast_rq_len(size_t user, smp_target_t *tp) in sas2_report_broadcast_rq_len() argument 253 if (user != 0) { in sas2_report_broadcast_rq_len() [all …]
|
/illumos-gate/usr/src/cmd/lp/lib/access/ |
H A D | allowed.c | 72 char * user, in is_user_allowed() argument 77 is_user_allowed (user, allow, deny) in is_user_allowed() 78 char *user, in is_user_allowed() 83 if (bangequ(user, LOCAL_LPUSER) || bangequ(user, LOCAL_ROOTUSER)) 86 return (allowed(user, allow, deny)); 96 char * user, in is_user_allowed_form() argument 100 is_user_allowed_form (user, form) in is_user_allowed_form() 101 char *user, in is_user_allowed_form() 111 return (is_user_allowed(user, allow, deny)); 121 char * user, in is_user_allowed_printer() argument [all …]
|
/illumos-gate/usr/src/contrib/ast/src/lib/libast/uwin/ |
H A D | rcmd.c | 383 char *user; in _validuser() local 402 user = p; in _validuser() 406 user = p; in _validuser() 415 if ('+' == user[0] && '\0' == user[1] ) in _validuser() 423 if ('-' == user[0] && '\0' == user[1] ) in _validuser() 437 if ('\0' != *user && user[0] == '-' && user[1] != '@' in _validuser() 438 && !strcmp(&user[1], ruser)) in _validuser() 441 if ('\0' != *user && user[0] == '-' && user[1] == '@' in _validuser() 442 && user[2] != '\0' && _checknetgroupuser(ruser, &user[2])) in _validuser() 450 if ('\0' != *user && user[0] == '+' in _validuser() [all …]
|
/illumos-gate/usr/src/lib/smbsrv/libmlsvc/common/ |
H A D | lsalib.c | 182 char user[SMB_USERNAME_MAXLEN]; in lsa_query_primary_domain_info() local 185 smb_ipc_get_user(user, SMB_USERNAME_MAXLEN); in lsa_query_primary_domain_info() 187 status = lsar_open(server, domain, user, &domain_handle); in lsa_query_primary_domain_info() 211 char user[SMB_USERNAME_MAXLEN]; in lsa_query_account_domain_info() local 214 smb_ipc_get_user(user, SMB_USERNAME_MAXLEN); in lsa_query_account_domain_info() 216 status = lsar_open(server, domain, user, &domain_handle); in lsa_query_account_domain_info() 241 char user[SMB_USERNAME_MAXLEN]; in lsa_query_dns_domain_info() local 244 smb_ipc_get_user(user, SMB_USERNAME_MAXLEN); in lsa_query_dns_domain_info() 246 status = lsar_open(server, domain, user, &domain_handle); in lsa_query_dns_domain_info() 271 char user[SMB_USERNAME_MAXLEN]; in lsa_enum_trusted_domains() local [all …]
|
/illumos-gate/usr/src/cmd/getent/ |
H A D | dogetuserattr.c | 36 putuserattr(const userattr_t *user, FILE *fp) in putuserattr() argument 42 if (user == NULL) in putuserattr() 46 user->name != NULL ? user->name : "", in putuserattr() 47 user->qualifier != NULL ? user->res1 : "", in putuserattr() 48 user->res1 != NULL ? user->res1 : "", in putuserattr() 49 user->res2 != NULL ? user->res2 : "") == EOF) in putuserattr() 51 attrs = user->attr; in putuserattr()
|
/illumos-gate/usr/src/lib/pam_modules/krb5/ |
H A D | utils.c | 53 get_pw_uid(const char *user, uid_t *uid) in get_pw_uid() argument 58 if (getpwnam_r(user, &sp, buffer, sizeof (buffer)) == NULL) { in get_pw_uid() 73 get_pw_gid(char *user, gid_t *gid) in get_pw_gid() argument 78 if (getpwnam_r(user, &sp, buffer, sizeof (buffer)) == NULL) { in get_pw_gid() 105 get_kmd_kuser(krb5_context kcontext, const char *user, char *kuser, int length) in get_kmd_kuser() argument 107 if (strcmp(user, ROOT_UNAME) == 0) { in get_kmd_kuser() 133 if (strlcpy(kuser, user, length) >= length) { in get_kmd_kuser() 144 key_in_keytab(const char *user, int debug) in key_in_keytab() argument 159 whoami, user ? user : "<null>"); in key_in_keytab() 161 if (!user) in key_in_keytab() [all …]
|
/illumos-gate/usr/src/lib/pam_modules/smbfs/ |
H A D | smbfs_login.c | 59 const char *user; in pam_sm_setcred() local 84 (void) pam_get_item(pamh, PAM_USER, (const void **)&user); in pam_sm_setcred() 86 if (user == NULL || *user == '\0') { in pam_sm_setcred() 91 if (getpwnam_r(user, &pwbuf, buf, sizeof (buf)) == NULL) { in pam_sm_setcred() 93 "pam_smbfs_login: username %s can't be found", user); in pam_sm_setcred() 114 service, dom, user); in pam_sm_setcred() 117 res = smbfs_keychain_add(uid, dom, user, pw); in pam_sm_setcred() 120 res = smbfs_keychain_del(uid, dom, user); in pam_sm_setcred() 129 "smbfs password successfully stored for %s", user); in pam_sm_setcred() 142 __pam_log(LOG_AUTH | LOG_ERR, "smbfs user %s is invalid", user); in pam_sm_setcred()
|
/illumos-gate/usr/src/lib/pam_modules/ldap/ |
H A D | ldap_authenticate.c | 49 const char *user = NULL; in pam_sm_authenticate() local 61 (err = pam_get_item(pamh, PAM_USER, (const void **)&user)) != in pam_sm_authenticate() 86 service, (user && *user != '\0')?user:"no-user", flags, in pam_sm_authenticate() 89 if (!user || *user == '\0') in pam_sm_authenticate() 98 "AUTHTOK not set", service, user); in pam_sm_authenticate() 107 result = authenticate(&credp, user, password, NULL); in pam_sm_authenticate()
|
/illumos-gate/usr/src/lib/libc/port/gen/ |
H A D | event_port.c | 57 port_associate(int port, int source, uintptr_t object, int events, void *user) in port_associate() argument 61 (uintptr_t)user); in port_associate() 110 port_send(int port, int events, void *user) in port_send() argument 113 r.r_vals = _portfs(PORT_SEND, port, events, (uintptr_t)user, 0, 0); in port_send() 124 void *user) in _port_dispatch() argument 129 (uintptr_t)user); in _port_dispatch() 132 source, events, object, (uintptr_t)user); in _port_dispatch() 137 port_sendn(int ports[], int errors[], uint_t nent, int events, void *user) in port_sendn() argument 146 (uintptr_t)user); in port_sendn() 160 lnent, events, (uintptr_t)user); in port_sendn() [all …]
|
/illumos-gate/usr/src/lib/pam_modules/tsol_acct/ |
H A D | tsol_acct.c | 61 const char *user; in pam_sm_acct_mgmt() local 82 (void) pam_get_item(pamh, PAM_USER, (const void **)&user); in pam_sm_acct_mgmt() 91 (user == NULL) ? "NULL" : (*user == '\0') ? "ZERO" : in pam_sm_acct_mgmt() 92 user, in pam_sm_acct_mgmt() 96 if (user == NULL || *user == '\0') { in pam_sm_acct_mgmt() 102 if ((range = getuserrange(user)) == NULL) { in pam_sm_acct_mgmt() 104 "pam_tsol_account: getuserrange(%s) failure", user); in pam_sm_acct_mgmt()
|
/illumos-gate/usr/src/lib/libproject/common/ |
H A D | getprojent.c | 137 ismember(struct project *proj, const char *user, gid_t gid, int is_default) in ismember() argument 158 (strcmp(member + 1, user) == 0 || in ismember() 161 if (strcmp(member, "*") == 0 || strcmp(member, user) == 0) in ismember() 187 if (strcmp(*u, user) == 0) in ismember() 195 _getdefaultproj(const char *user, struct project *result, in _getdefaultproj() argument 210 if (getpwnam_r(user, &p, buffer, buflen) == NULL) in _getdefaultproj() 216 if ((uattr = getusernam(user)) != NULL) { in _getdefaultproj() 232 (void) snprintf(projname, PROJNAME_MAX, "user.%s", user); in _getdefaultproj() 237 ismember(result, user, p.pw_gid, DEFAULT_PROJECT)) in _getdefaultproj() 245 ismember(result, user, p.pw_gid, DEFAULT_PROJECT)) in _getdefaultproj() [all …]
|
/illumos-gate/usr/src/cmd/ypcmd/mknetid/ |
H A D | mknetid.c | 66 char *user; member 246 char user[MAXNAMELEN]; local 253 check_getname(lp, user, WHITE, COLON, ""); /* username */ 254 if (user[0] == '-' || user[0] == '+') { 271 printgroups(user, gid); 431 storegid(gid, user) in storegid() argument 433 char *user; 439 val = hash((unsigned char *) user, GRPTABSIZE); 440 for (g = groups[val]; g != NULL && strcmp(g->user, user); g = g->next) 444 g->user = malloc((unsigned)strlen(user) + 1); [all …]
|
/illumos-gate/usr/src/cmd/lp/lib/users/ |
H A D | loadpri.c | 76 *user, in ld_priority_file() local 130 if (!(user = next_user(fd, line, &p))) in ld_priority_file() 136 if (!(user = next_user(fd, line, &p))) goto Error; in ld_priority_file() 149 add_user (&pri_tbl, user, pri); in ld_priority_file() 151 while ((user = next_user(fd, line, &p))); in ld_priority_file() 172 int add_user ( struct user_priority * ppri_tbl, char * user, int limit ) in add_user() argument 176 addlist (&(ppri_tbl->users[limit - PRI_MIN]), user); in add_user() 241 int del_user ( struct user_priority * ppri_tbl, char * user ) in del_user() argument 246 if (searchlist(user, ppri_tbl->users[limit - PRI_MIN])) in del_user() 248 dellist (&(ppri_tbl->users[limit - PRI_MIN]), user); in del_user()
|