Home
last modified time | relevance | path

Searched refs:user (Results 1 – 25 of 762) sorted by relevance

12345678910>>...31

/titanic_41/usr/src/uts/common/fs/smbsrv/
H A Dsmb_user.c191 smb_user_t *user; in smb_user_login() local
199 user = kmem_cache_alloc(smb_cache_user, KM_SLEEP); in smb_user_login()
200 bzero(user, sizeof (smb_user_t)); in smb_user_login()
201 user->u_refcnt = 1; in smb_user_login()
202 user->u_session = session; in smb_user_login()
203 user->u_server = session->s_server; in smb_user_login()
204 user->u_logon_time = gethrestime_sec(); in smb_user_login()
205 user->u_flags = flags; in smb_user_login()
206 user->u_name_len = strlen(account_name) + 1; in smb_user_login()
207 user->u_domain_len = strlen(domain_name) + 1; in smb_user_login()
[all …]
/titanic_41/usr/src/test/zfs-tests/tests/functional/acl/cifs/
H A Dcifs_attr_003_pos.ksh201 typeset user=$2
204 verify_expect $expect $CHG_USR_EXEC $user \
206 verify_expect $expect $CHG_USR_EXEC $user \
221 typeset user=$2
225 verify_expect $expect $CHG_USR_EXEC $user \
227 verify_expect $expect $CHG_USR_EXEC $user \
235 typeset user=$2
239 verify_expect $expect $CHG_USR_EXEC $user \
254 typeset user=$2
260 verify_expect $expect $CHG_USR_EXEC $user \
[all …]
H A Dcifs_attr_001_pos.ksh70 typeset user=$3
77 if [[ -n $user ]]; then
78 $SU $user -c "$CHMOD S+c${attr} $object"
99 typeset user=$3
106 if [[ -n $user ]]; then
107 $SU $user -c "$CHMOD S-c${attr} $object"
125 typeset user=$1
128 if [[ -z $user || -z $object ]]; then
129 log_fail "User($user), Object($object) not defined."
136 if [[ $user == "root" ]]; then
[all …]
H A Dcifs_attr_002_pos.ksh63 typeset user=$3 # The user to run the command as
75 if [[ $user == 'root' ]]; then
83 log_mustnot $SU $user -c "$cmd"
87 log_must $SU $user -c "$cmd"
89 log_mustnot $SU $user -c "$cmd"
93 log_must $SU $user -c "$cmd"
95 log_must $SU $user -c "$cmd"
97 log_mustnot $SU $user -c "$cmd"
138 typeset user=$1
141 if [[ -z $user || -z $priv ]]; then
[all …]
/titanic_41/usr/src/test/zfs-tests/tests/functional/delegate/
H A Ddelegate_common.kshlib90 typeset user
91 for user in $@; do
96 check_fs_perm $user $perm $dtst
99 check_vol_perm $user $perm $dtst
104 log_note "Fail: $user should have $perm " \
134 typeset user
135 for user in $@; do
140 check_fs_perm $user $perm $dtst
143 check_vol_perm $user $perm $dtst
148 log_note "Fail: $user should not have $perm " \
[all …]
/titanic_41/usr/src/lib/libsecdb/common/
H A Dgetuserattr.c55 userstr_t user; in getuserattr() local
58 (void) memset(&user, 0, sizeof (userattr_t)); in getuserattr()
59 tmp = _getuserattr(&user, buf, NSS_BUFLEN_USERATTR, &err); in getuserattr()
68 userstr_t user; in fgetuserattr() local
71 (void) memset(&user, 0, sizeof (userattr_t)); in fgetuserattr()
72 tmp = _fgetuserattr(f, &user, buf, NSS_BUFLEN_USERATTR); in fgetuserattr()
82 userstr_t user; in getusernam() local
85 resptr = _getusernam(name, &user, buf, NSS_BUFLEN_USERATTR, &err); in getusernam()
119 free_userattr(userattr_t *user) in free_userattr() argument
121 if (user) { in free_userattr()
[all …]
/titanic_41/usr/src/cmd/sendmail/libsm/
H A Dmbdb.c45 int (*mbdb_lookup) __P((char *name, SM_MBDB_T *user));
50 static int mbdb_pw_lookup __P((char *name, SM_MBDB_T *user));
57 static int mbdb_ldap_lookup __P((char *name, SM_MBDB_T *user));
165 sm_mbdb_lookup(name, user) in sm_mbdb_lookup() argument
167 SM_MBDB_T *user;
172 ret = SmMbdbType->mbdb_lookup(name, user);
188 sm_mbdb_frompw(user, pw) in sm_mbdb_frompw() argument
189 SM_MBDB_T *user; in sm_mbdb_frompw()
192 SM_REQUIRE(user != NULL);
193 (void) sm_strlcpy(user->mbdb_name, pw->pw_name,
[all …]
/titanic_41/usr/src/lib/libc/sparc/sys/
H A Dptrace.c75 user_t user; /* manufactured u-block */ member
257 data = *((int *)((caddr_t)(&cp->user) + xaddr)); in ptrace()
268 if (xaddr >= (unsigned)cp->user.u_reg[REG_SP] && in ptrace()
269 xaddr < (unsigned)cp->user.u_reg[REG_SP]+16*sizeof (int)) in ptrace()
287 data = (cp->user.u_reg[REG_PS] & in ptrace()
291 cp->user.u_reg[rx] = data; in ptrace()
307 ps->pr_lwp.pr_reg[R_PSR] = cp->user.u_reg[REG_PSR]; in ptrace()
308 ps->pr_lwp.pr_reg[R_PC] = cp->user.u_reg[REG_PC]; in ptrace()
309 ps->pr_lwp.pr_reg[R_nPC] = cp->user.u_reg[REG_nPC]; in ptrace()
310 ps->pr_lwp.pr_reg[R_Y] = cp->user.u_reg[REG_Y]; in ptrace()
[all …]
/titanic_41/usr/src/test/zfs-tests/tests/functional/acl/nontrivial/
H A Dzfs_acl_chmod_owner_001_pos.ksh117 typeset user=$1
123 if [[ $user == "" || $node == "" ]]; then
127 $SU $user -c "$CHOWN $expect_owner $node"
153 typeset user=$1
159 if [[ $user == "" || $node == "" ]]; then
163 $SU $user -c "$CHGRP $expect_group $node"
190 typeset user=$2
196 if [[ $user == root ]]; then
198 elif [[ $user == $new ]] ; then
199 if [[ $user == $old || $acl_target == *:allow ]]; then
[all …]
/titanic_41/usr/src/lib/libc/i386/sys/
H A Dptrace.c75 user_t user; /* manufactured u-block */ member
257 data = *((int *)((caddr_t)(&cp->user) + xaddr)); in ptrace()
283 data = (cp->user.u_reg[EFL] & ~PSL_USERMASK) | in ptrace()
285 cp->user.u_reg[rx] = data; in ptrace()
301 ps->pr_lwp.pr_reg[GS] = cp->user.u_reg[GS]; in ptrace()
302 ps->pr_lwp.pr_reg[FS] = cp->user.u_reg[FS]; in ptrace()
303 ps->pr_lwp.pr_reg[ES] = cp->user.u_reg[ES]; in ptrace()
304 ps->pr_lwp.pr_reg[DS] = cp->user.u_reg[DS]; in ptrace()
305 ps->pr_lwp.pr_reg[EDI] = cp->user.u_reg[EDI]; in ptrace()
306 ps->pr_lwp.pr_reg[ESI] = cp->user.u_reg[ESI]; in ptrace()
[all …]
/titanic_41/usr/src/cmd/lp/lib/access/
H A Dallowed.c75 char * user, in is_user_allowed() argument
80 is_user_allowed (user, allow, deny) in is_user_allowed()
81 char *user, in is_user_allowed()
86 if (bangequ(user, LOCAL_LPUSER) || bangequ(user, LOCAL_ROOTUSER))
89 return (allowed(user, allow, deny));
99 char * user, in is_user_allowed_form() argument
103 is_user_allowed_form (user, form) in is_user_allowed_form()
104 char *user, in is_user_allowed_form()
114 return (is_user_allowed(user, allow, deny));
124 char * user, in is_user_allowed_printer() argument
[all …]
/titanic_41/usr/src/lib/scsi/plugins/smp/sas2/common/
H A Dsas2_functions.c37 sas2_rq_len(size_t user, smp_target_t *tp) in sas2_rq_len() argument
39 if (user != 0) { in sas2_rq_len()
215 sas2_report_self_config_status_rq_len(size_t user, smp_target_t *tp) in sas2_report_self_config_status_rq_len() argument
217 if (user != 0) { in sas2_report_self_config_status_rq_len()
227 sas2_report_zone_perm_table_rq_len(size_t user, smp_target_t *tp) in sas2_report_zone_perm_table_rq_len() argument
229 if (user != 0) { in sas2_report_zone_perm_table_rq_len()
239 sas2_report_zone_mgr_password_rq_len(size_t user, smp_target_t *tp) in sas2_report_zone_mgr_password_rq_len() argument
241 if (user != 0) { in sas2_report_zone_mgr_password_rq_len()
251 sas2_report_broadcast_rq_len(size_t user, smp_target_t *tp) in sas2_report_broadcast_rq_len() argument
253 if (user != 0) { in sas2_report_broadcast_rq_len()
[all …]
/titanic_41/usr/src/lib/libast/common/uwin/
H A Drcmd.c383 char *user; in _validuser() local
402 user = p; in _validuser()
406 user = p; in _validuser()
415 if ('+' == user[0] && '\0' == user[1] ) in _validuser()
423 if ('-' == user[0] && '\0' == user[1] ) in _validuser()
437 if ('\0' != *user && user[0] == '-' && user[1] != '@' in _validuser()
438 && !strcmp(&user[1], ruser)) in _validuser()
441 if ('\0' != *user && user[0] == '-' && user[1] == '@' in _validuser()
442 && user[2] != '\0' && _checknetgroupuser(ruser, &user[2])) in _validuser()
450 if ('\0' != *user && user[0] == '+' in _validuser()
[all …]
/titanic_41/usr/src/cmd/ssh/sshd/
H A Dauth-sia.c56 char *user = authctxt->user; in auth_sia_password() local
60 if (!user || !pass || pass[0] == '\0') in auth_sia_password()
63 if (sia_ses_init(&ent, saved_argc, saved_argv, host, user, NULL, 0, in auth_sia_password()
68 error("Couldn't authenticate %s from %s", user, host); in auth_sia_password()
80 session_setup_sia(char *user, char *tty) in session_setup_sia() argument
88 if (sia_ses_init(&ent, saved_argc, saved_argv, host, user, tty, 0, in session_setup_sia()
93 if ((pw = getpwnam(user)) == NULL) { in session_setup_sia()
95 fatal("getpwnam: no user: %s", user); in session_setup_sia()
104 fatal("Couldn't establish session for %s from %s", user, in session_setup_sia()
114 fatal("Couldn't launch session for %s from %s", user, host); in session_setup_sia()
H A Dauth2.c159 char *user, *service, *method, *style = NULL; in input_userauth_request() local
165 user = packet_get_string(NULL); in input_userauth_request()
168 debug("userauth-request for user %s service %s method %s", user, in input_userauth_request()
176 if ((style = strchr(user, ':')) != NULL) in input_userauth_request()
184 run_auth_hook(options.pre_userauth_hook, user, m->name) != 0) { in input_userauth_request()
192 authctxt->pw = getpwnamallow(user); in input_userauth_request()
199 debug2("input_userauth_request: setting up authctxt for %s", user); in input_userauth_request()
201 log("input_userauth_request: illegal user %s", user); in input_userauth_request()
203 setproctitle("%s", authctxt->pw ? user : "unknown"); in input_userauth_request()
204 authctxt->user = xstrdup(user); in input_userauth_request()
[all …]
/titanic_41/usr/src/lib/smbsrv/libmlsvc/common/
H A Dlsalib.c144 char user[SMB_USERNAME_MAXLEN]; in lsa_query_primary_domain_info() local
146 smb_ipc_get_user(user, SMB_USERNAME_MAXLEN); in lsa_query_primary_domain_info()
148 if ((lsar_open(server, domain, user, &domain_handle)) != 0) in lsa_query_primary_domain_info()
172 char user[SMB_USERNAME_MAXLEN]; in lsa_query_account_domain_info() local
174 smb_ipc_get_user(user, SMB_USERNAME_MAXLEN); in lsa_query_account_domain_info()
176 if ((lsar_open(server, domain, user, &domain_handle)) != 0) in lsa_query_account_domain_info()
201 char user[SMB_USERNAME_MAXLEN]; in lsa_query_dns_domain_info() local
203 smb_ipc_get_user(user, SMB_USERNAME_MAXLEN); in lsa_query_dns_domain_info()
205 if ((lsar_open(server, domain, user, &domain_handle)) != 0) in lsa_query_dns_domain_info()
231 char user[SMB_USERNAME_MAXLEN]; in lsa_enum_trusted_domains() local
[all …]
/titanic_41/usr/src/lib/pam_modules/krb5/
H A Dutils.c52 get_pw_uid(char *user, uid_t *uid) in get_pw_uid() argument
57 if (getpwnam_r(user, &sp, buffer, sizeof (buffer)) == NULL) { in get_pw_uid()
72 get_pw_gid(char *user, gid_t *gid) in get_pw_gid() argument
77 if (getpwnam_r(user, &sp, buffer, sizeof (buffer)) == NULL) { in get_pw_gid()
104 get_kmd_kuser(krb5_context kcontext, const char *user, char *kuser, int length) in get_kmd_kuser() argument
106 if (strcmp(user, ROOT_UNAME) == 0) { in get_kmd_kuser()
132 if (strlcpy(kuser, user, length) >= length) { in get_kmd_kuser()
143 key_in_keytab(const char *user, int debug) in key_in_keytab() argument
158 whoami, user ? user : "<null>"); in key_in_keytab()
160 if (!user) in key_in_keytab()
[all …]
/titanic_41/usr/src/lib/pam_modules/smbfs/
H A Dsmbfs_login.c60 char *user; in pam_sm_setcred() local
85 (void) pam_get_item(pamh, PAM_USER, (void **)&user); in pam_sm_setcred()
87 if (user == NULL || *user == '\0') { in pam_sm_setcred()
92 if (getpwnam_r(user, &pwbuf, buf, sizeof (buf)) == NULL) { in pam_sm_setcred()
94 "pam_smbfs_login: username %s can't be found", user); in pam_sm_setcred()
115 service, dom, user); in pam_sm_setcred()
118 res = smbfs_keychain_add(uid, dom, user, pw); in pam_sm_setcred()
121 res = smbfs_keychain_del(uid, dom, user); in pam_sm_setcred()
130 "smbfs password successfully stored for %s", user); in pam_sm_setcred()
143 __pam_log(LOG_AUTH | LOG_ERR, "smbfs user %s is invalid", user); in pam_sm_setcred()
/titanic_41/usr/src/lib/pam_modules/ldap/
H A Dldap_authenticate.c54 char *user = NULL; in pam_sm_authenticate() local
66 (err = pam_get_item(pamh, PAM_USER, (void **)&user)) != PAM_SUCCESS) in pam_sm_authenticate()
89 service, (user && *user != '\0')?user:"no-user", flags, in pam_sm_authenticate()
92 if (!user || *user == '\0') in pam_sm_authenticate()
101 "AUTHTOK not set", service, user); in pam_sm_authenticate()
110 result = authenticate(&credp, user, password, NULL); in pam_sm_authenticate()
/titanic_41/usr/src/lib/pam_modules/tsol_acct/
H A Dtsol_acct.c62 char *user; in pam_sm_acct_mgmt() local
83 (void) pam_get_item(pamh, PAM_USER, (void **)&user); in pam_sm_acct_mgmt()
92 (user == NULL) ? "NULL" : (user == '\0') ? "ZERO" : in pam_sm_acct_mgmt()
93 user, in pam_sm_acct_mgmt()
97 if (user == NULL || *user == '\0') { in pam_sm_acct_mgmt()
103 if ((range = getuserrange(user)) == NULL) { in pam_sm_acct_mgmt()
105 "pam_tsol_account: getuserrange(%s) failure", user); in pam_sm_acct_mgmt()
/titanic_41/usr/src/lib/libc/port/gen/
H A Devent_port.c59 port_associate(int port, int source, uintptr_t object, int events, void *user) in port_associate() argument
63 (uintptr_t)user); in port_associate()
112 port_send(int port, int events, void *user) in port_send() argument
115 r.r_vals = _portfs(PORT_SEND, port, events, (uintptr_t)user, NULL, in port_send()
127 void *user) in _port_dispatch() argument
132 (uintptr_t)user); in _port_dispatch()
135 source, events, object, (uintptr_t)user); in _port_dispatch()
140 port_sendn(int ports[], int errors[], uint_t nent, int events, void *user) in port_sendn() argument
149 (uintptr_t)user); in port_sendn()
163 lnent, events, (uintptr_t)user); in port_sendn()
[all …]
/titanic_41/usr/src/cmd/lp/lib/users/
H A Dloadpri.c78 *user, in ld_priority_file() local
132 if (!(user = next_user(fd, line, &p))) in ld_priority_file()
138 if (!(user = next_user(fd, line, &p))) goto Error; in ld_priority_file()
151 add_user (&pri_tbl, user, pri); in ld_priority_file()
153 while ((user = next_user(fd, line, &p))); in ld_priority_file()
174 int add_user ( struct user_priority * ppri_tbl, char * user, int limit ) in add_user() argument
178 addlist (&(ppri_tbl->users[limit - PRI_MIN]), user); in add_user()
243 int del_user ( struct user_priority * ppri_tbl, char * user ) in del_user() argument
248 if (searchlist(user, ppri_tbl->users[limit - PRI_MIN])) in del_user()
250 dellist (&(ppri_tbl->users[limit - PRI_MIN]), user); in del_user()
/titanic_41/usr/src/cmd/userattr/
H A Duserattr.c75 char *user = NULL; in main() local
91 user = argv[opt++]; in main()
100 if (user == NULL) { in main()
108 user = pwd->pw_name; in main()
110 if ((pwd = getpwnam(user)) == NULL) { in main()
112 gettext("No such user %s\n"), user); in main()
117 (void) _enum_attrs(user, attr, NULL, NULL); in main()
122 user); in main()
/titanic_41/usr/src/test/test-runner/cmd/
H A Drun.py117 def __init__(self, pathname, outputdir=None, timeout=None, user=None): argument
121 self.user = user or ''
127 self.pathname, self.outputdir, self.timeout, self.user)
135 do_sudo = len(self.user) != 0
148 def update_cmd_privs(self, cmd, user): argument
156 if not user or user is me:
159 ret = '%s -E -u %s %s' % (SUDO, user, cmd)
191 privcmd = self.update_cmd_privs(self.pathname, self.user)
238 user = ' (run as %s)' % (self.user if len(self.user) else logname)
239 msga = 'Test: %s%s ' % (self.pathname, user)
[all …]
/titanic_41/usr/src/lib/libproject/common/
H A Dgetprojent.c139 ismember(struct project *proj, const char *user, gid_t gid, int is_default) in ismember() argument
160 (strcmp(member + 1, user) == 0 || in ismember()
163 if (strcmp(member, "*") == 0 || strcmp(member, user) == 0) in ismember()
189 if (strcmp(*u, user) == 0) in ismember()
197 _getdefaultproj(const char *user, struct project *result, in _getdefaultproj() argument
212 if (getpwnam_r(user, &p, buffer, buflen) == NULL) in _getdefaultproj()
218 if ((uattr = getusernam(user)) != NULL) { in _getdefaultproj()
234 (void) snprintf(projname, PROJNAME_MAX, "user.%s", user); in _getdefaultproj()
239 ismember(result, user, p.pw_gid, DEFAULT_PROJECT)) in _getdefaultproj()
247 ismember(result, user, p.pw_gid, DEFAULT_PROJECT)) in _getdefaultproj()
[all …]

12345678910>>...31