/titanic_41/usr/src/uts/common/fs/smbsrv/ |
H A D | smb_user.c | 191 smb_user_t *user; in smb_user_login() local 199 user = kmem_cache_alloc(smb_cache_user, KM_SLEEP); in smb_user_login() 200 bzero(user, sizeof (smb_user_t)); in smb_user_login() 201 user->u_refcnt = 1; in smb_user_login() 202 user->u_session = session; in smb_user_login() 203 user->u_server = session->s_server; in smb_user_login() 204 user->u_logon_time = gethrestime_sec(); in smb_user_login() 205 user->u_flags = flags; in smb_user_login() 206 user->u_name_len = strlen(account_name) + 1; in smb_user_login() 207 user->u_domain_len = strlen(domain_name) + 1; in smb_user_login() [all …]
|
/titanic_41/usr/src/test/zfs-tests/tests/functional/acl/cifs/ |
H A D | cifs_attr_003_pos.ksh | 201 typeset user=$2 204 verify_expect $expect $CHG_USR_EXEC $user \ 206 verify_expect $expect $CHG_USR_EXEC $user \ 221 typeset user=$2 225 verify_expect $expect $CHG_USR_EXEC $user \ 227 verify_expect $expect $CHG_USR_EXEC $user \ 235 typeset user=$2 239 verify_expect $expect $CHG_USR_EXEC $user \ 254 typeset user=$2 260 verify_expect $expect $CHG_USR_EXEC $user \ [all …]
|
H A D | cifs_attr_001_pos.ksh | 70 typeset user=$3 77 if [[ -n $user ]]; then 78 $SU $user -c "$CHMOD S+c${attr} $object" 99 typeset user=$3 106 if [[ -n $user ]]; then 107 $SU $user -c "$CHMOD S-c${attr} $object" 125 typeset user=$1 128 if [[ -z $user || -z $object ]]; then 129 log_fail "User($user), Object($object) not defined." 136 if [[ $user == "root" ]]; then [all …]
|
H A D | cifs_attr_002_pos.ksh | 63 typeset user=$3 # The user to run the command as 75 if [[ $user == 'root' ]]; then 83 log_mustnot $SU $user -c "$cmd" 87 log_must $SU $user -c "$cmd" 89 log_mustnot $SU $user -c "$cmd" 93 log_must $SU $user -c "$cmd" 95 log_must $SU $user -c "$cmd" 97 log_mustnot $SU $user -c "$cmd" 138 typeset user=$1 141 if [[ -z $user || -z $priv ]]; then [all …]
|
/titanic_41/usr/src/test/zfs-tests/tests/functional/delegate/ |
H A D | delegate_common.kshlib | 90 typeset user 91 for user in $@; do 96 check_fs_perm $user $perm $dtst 99 check_vol_perm $user $perm $dtst 104 log_note "Fail: $user should have $perm " \ 134 typeset user 135 for user in $@; do 140 check_fs_perm $user $perm $dtst 143 check_vol_perm $user $perm $dtst 148 log_note "Fail: $user should not have $perm " \ [all …]
|
/titanic_41/usr/src/lib/libsecdb/common/ |
H A D | getuserattr.c | 55 userstr_t user; in getuserattr() local 58 (void) memset(&user, 0, sizeof (userattr_t)); in getuserattr() 59 tmp = _getuserattr(&user, buf, NSS_BUFLEN_USERATTR, &err); in getuserattr() 68 userstr_t user; in fgetuserattr() local 71 (void) memset(&user, 0, sizeof (userattr_t)); in fgetuserattr() 72 tmp = _fgetuserattr(f, &user, buf, NSS_BUFLEN_USERATTR); in fgetuserattr() 82 userstr_t user; in getusernam() local 85 resptr = _getusernam(name, &user, buf, NSS_BUFLEN_USERATTR, &err); in getusernam() 119 free_userattr(userattr_t *user) in free_userattr() argument 121 if (user) { in free_userattr() [all …]
|
/titanic_41/usr/src/cmd/sendmail/libsm/ |
H A D | mbdb.c | 45 int (*mbdb_lookup) __P((char *name, SM_MBDB_T *user)); 50 static int mbdb_pw_lookup __P((char *name, SM_MBDB_T *user)); 57 static int mbdb_ldap_lookup __P((char *name, SM_MBDB_T *user)); 165 sm_mbdb_lookup(name, user) in sm_mbdb_lookup() argument 167 SM_MBDB_T *user; 172 ret = SmMbdbType->mbdb_lookup(name, user); 188 sm_mbdb_frompw(user, pw) in sm_mbdb_frompw() argument 189 SM_MBDB_T *user; in sm_mbdb_frompw() 192 SM_REQUIRE(user != NULL); 193 (void) sm_strlcpy(user->mbdb_name, pw->pw_name, [all …]
|
/titanic_41/usr/src/lib/libc/sparc/sys/ |
H A D | ptrace.c | 75 user_t user; /* manufactured u-block */ member 257 data = *((int *)((caddr_t)(&cp->user) + xaddr)); in ptrace() 268 if (xaddr >= (unsigned)cp->user.u_reg[REG_SP] && in ptrace() 269 xaddr < (unsigned)cp->user.u_reg[REG_SP]+16*sizeof (int)) in ptrace() 287 data = (cp->user.u_reg[REG_PS] & in ptrace() 291 cp->user.u_reg[rx] = data; in ptrace() 307 ps->pr_lwp.pr_reg[R_PSR] = cp->user.u_reg[REG_PSR]; in ptrace() 308 ps->pr_lwp.pr_reg[R_PC] = cp->user.u_reg[REG_PC]; in ptrace() 309 ps->pr_lwp.pr_reg[R_nPC] = cp->user.u_reg[REG_nPC]; in ptrace() 310 ps->pr_lwp.pr_reg[R_Y] = cp->user.u_reg[REG_Y]; in ptrace() [all …]
|
/titanic_41/usr/src/test/zfs-tests/tests/functional/acl/nontrivial/ |
H A D | zfs_acl_chmod_owner_001_pos.ksh | 117 typeset user=$1 123 if [[ $user == "" || $node == "" ]]; then 127 $SU $user -c "$CHOWN $expect_owner $node" 153 typeset user=$1 159 if [[ $user == "" || $node == "" ]]; then 163 $SU $user -c "$CHGRP $expect_group $node" 190 typeset user=$2 196 if [[ $user == root ]]; then 198 elif [[ $user == $new ]] ; then 199 if [[ $user == $old || $acl_target == *:allow ]]; then [all …]
|
/titanic_41/usr/src/lib/libc/i386/sys/ |
H A D | ptrace.c | 75 user_t user; /* manufactured u-block */ member 257 data = *((int *)((caddr_t)(&cp->user) + xaddr)); in ptrace() 283 data = (cp->user.u_reg[EFL] & ~PSL_USERMASK) | in ptrace() 285 cp->user.u_reg[rx] = data; in ptrace() 301 ps->pr_lwp.pr_reg[GS] = cp->user.u_reg[GS]; in ptrace() 302 ps->pr_lwp.pr_reg[FS] = cp->user.u_reg[FS]; in ptrace() 303 ps->pr_lwp.pr_reg[ES] = cp->user.u_reg[ES]; in ptrace() 304 ps->pr_lwp.pr_reg[DS] = cp->user.u_reg[DS]; in ptrace() 305 ps->pr_lwp.pr_reg[EDI] = cp->user.u_reg[EDI]; in ptrace() 306 ps->pr_lwp.pr_reg[ESI] = cp->user.u_reg[ESI]; in ptrace() [all …]
|
/titanic_41/usr/src/cmd/lp/lib/access/ |
H A D | allowed.c | 75 char * user, in is_user_allowed() argument 80 is_user_allowed (user, allow, deny) in is_user_allowed() 81 char *user, in is_user_allowed() 86 if (bangequ(user, LOCAL_LPUSER) || bangequ(user, LOCAL_ROOTUSER)) 89 return (allowed(user, allow, deny)); 99 char * user, in is_user_allowed_form() argument 103 is_user_allowed_form (user, form) in is_user_allowed_form() 104 char *user, in is_user_allowed_form() 114 return (is_user_allowed(user, allow, deny)); 124 char * user, in is_user_allowed_printer() argument [all …]
|
/titanic_41/usr/src/lib/scsi/plugins/smp/sas2/common/ |
H A D | sas2_functions.c | 37 sas2_rq_len(size_t user, smp_target_t *tp) in sas2_rq_len() argument 39 if (user != 0) { in sas2_rq_len() 215 sas2_report_self_config_status_rq_len(size_t user, smp_target_t *tp) in sas2_report_self_config_status_rq_len() argument 217 if (user != 0) { in sas2_report_self_config_status_rq_len() 227 sas2_report_zone_perm_table_rq_len(size_t user, smp_target_t *tp) in sas2_report_zone_perm_table_rq_len() argument 229 if (user != 0) { in sas2_report_zone_perm_table_rq_len() 239 sas2_report_zone_mgr_password_rq_len(size_t user, smp_target_t *tp) in sas2_report_zone_mgr_password_rq_len() argument 241 if (user != 0) { in sas2_report_zone_mgr_password_rq_len() 251 sas2_report_broadcast_rq_len(size_t user, smp_target_t *tp) in sas2_report_broadcast_rq_len() argument 253 if (user != 0) { in sas2_report_broadcast_rq_len() [all …]
|
/titanic_41/usr/src/lib/libast/common/uwin/ |
H A D | rcmd.c | 383 char *user; in _validuser() local 402 user = p; in _validuser() 406 user = p; in _validuser() 415 if ('+' == user[0] && '\0' == user[1] ) in _validuser() 423 if ('-' == user[0] && '\0' == user[1] ) in _validuser() 437 if ('\0' != *user && user[0] == '-' && user[1] != '@' in _validuser() 438 && !strcmp(&user[1], ruser)) in _validuser() 441 if ('\0' != *user && user[0] == '-' && user[1] == '@' in _validuser() 442 && user[2] != '\0' && _checknetgroupuser(ruser, &user[2])) in _validuser() 450 if ('\0' != *user && user[0] == '+' in _validuser() [all …]
|
/titanic_41/usr/src/cmd/ssh/sshd/ |
H A D | auth-sia.c | 56 char *user = authctxt->user; in auth_sia_password() local 60 if (!user || !pass || pass[0] == '\0') in auth_sia_password() 63 if (sia_ses_init(&ent, saved_argc, saved_argv, host, user, NULL, 0, in auth_sia_password() 68 error("Couldn't authenticate %s from %s", user, host); in auth_sia_password() 80 session_setup_sia(char *user, char *tty) in session_setup_sia() argument 88 if (sia_ses_init(&ent, saved_argc, saved_argv, host, user, tty, 0, in session_setup_sia() 93 if ((pw = getpwnam(user)) == NULL) { in session_setup_sia() 95 fatal("getpwnam: no user: %s", user); in session_setup_sia() 104 fatal("Couldn't establish session for %s from %s", user, in session_setup_sia() 114 fatal("Couldn't launch session for %s from %s", user, host); in session_setup_sia()
|
H A D | auth2.c | 159 char *user, *service, *method, *style = NULL; in input_userauth_request() local 165 user = packet_get_string(NULL); in input_userauth_request() 168 debug("userauth-request for user %s service %s method %s", user, in input_userauth_request() 176 if ((style = strchr(user, ':')) != NULL) in input_userauth_request() 184 run_auth_hook(options.pre_userauth_hook, user, m->name) != 0) { in input_userauth_request() 192 authctxt->pw = getpwnamallow(user); in input_userauth_request() 199 debug2("input_userauth_request: setting up authctxt for %s", user); in input_userauth_request() 201 log("input_userauth_request: illegal user %s", user); in input_userauth_request() 203 setproctitle("%s", authctxt->pw ? user : "unknown"); in input_userauth_request() 204 authctxt->user = xstrdup(user); in input_userauth_request() [all …]
|
/titanic_41/usr/src/lib/smbsrv/libmlsvc/common/ |
H A D | lsalib.c | 144 char user[SMB_USERNAME_MAXLEN]; in lsa_query_primary_domain_info() local 146 smb_ipc_get_user(user, SMB_USERNAME_MAXLEN); in lsa_query_primary_domain_info() 148 if ((lsar_open(server, domain, user, &domain_handle)) != 0) in lsa_query_primary_domain_info() 172 char user[SMB_USERNAME_MAXLEN]; in lsa_query_account_domain_info() local 174 smb_ipc_get_user(user, SMB_USERNAME_MAXLEN); in lsa_query_account_domain_info() 176 if ((lsar_open(server, domain, user, &domain_handle)) != 0) in lsa_query_account_domain_info() 201 char user[SMB_USERNAME_MAXLEN]; in lsa_query_dns_domain_info() local 203 smb_ipc_get_user(user, SMB_USERNAME_MAXLEN); in lsa_query_dns_domain_info() 205 if ((lsar_open(server, domain, user, &domain_handle)) != 0) in lsa_query_dns_domain_info() 231 char user[SMB_USERNAME_MAXLEN]; in lsa_enum_trusted_domains() local [all …]
|
/titanic_41/usr/src/lib/pam_modules/krb5/ |
H A D | utils.c | 52 get_pw_uid(char *user, uid_t *uid) in get_pw_uid() argument 57 if (getpwnam_r(user, &sp, buffer, sizeof (buffer)) == NULL) { in get_pw_uid() 72 get_pw_gid(char *user, gid_t *gid) in get_pw_gid() argument 77 if (getpwnam_r(user, &sp, buffer, sizeof (buffer)) == NULL) { in get_pw_gid() 104 get_kmd_kuser(krb5_context kcontext, const char *user, char *kuser, int length) in get_kmd_kuser() argument 106 if (strcmp(user, ROOT_UNAME) == 0) { in get_kmd_kuser() 132 if (strlcpy(kuser, user, length) >= length) { in get_kmd_kuser() 143 key_in_keytab(const char *user, int debug) in key_in_keytab() argument 158 whoami, user ? user : "<null>"); in key_in_keytab() 160 if (!user) in key_in_keytab() [all …]
|
/titanic_41/usr/src/lib/pam_modules/smbfs/ |
H A D | smbfs_login.c | 60 char *user; in pam_sm_setcred() local 85 (void) pam_get_item(pamh, PAM_USER, (void **)&user); in pam_sm_setcred() 87 if (user == NULL || *user == '\0') { in pam_sm_setcred() 92 if (getpwnam_r(user, &pwbuf, buf, sizeof (buf)) == NULL) { in pam_sm_setcred() 94 "pam_smbfs_login: username %s can't be found", user); in pam_sm_setcred() 115 service, dom, user); in pam_sm_setcred() 118 res = smbfs_keychain_add(uid, dom, user, pw); in pam_sm_setcred() 121 res = smbfs_keychain_del(uid, dom, user); in pam_sm_setcred() 130 "smbfs password successfully stored for %s", user); in pam_sm_setcred() 143 __pam_log(LOG_AUTH | LOG_ERR, "smbfs user %s is invalid", user); in pam_sm_setcred()
|
/titanic_41/usr/src/lib/pam_modules/ldap/ |
H A D | ldap_authenticate.c | 54 char *user = NULL; in pam_sm_authenticate() local 66 (err = pam_get_item(pamh, PAM_USER, (void **)&user)) != PAM_SUCCESS) in pam_sm_authenticate() 89 service, (user && *user != '\0')?user:"no-user", flags, in pam_sm_authenticate() 92 if (!user || *user == '\0') in pam_sm_authenticate() 101 "AUTHTOK not set", service, user); in pam_sm_authenticate() 110 result = authenticate(&credp, user, password, NULL); in pam_sm_authenticate()
|
/titanic_41/usr/src/lib/pam_modules/tsol_acct/ |
H A D | tsol_acct.c | 62 char *user; in pam_sm_acct_mgmt() local 83 (void) pam_get_item(pamh, PAM_USER, (void **)&user); in pam_sm_acct_mgmt() 92 (user == NULL) ? "NULL" : (user == '\0') ? "ZERO" : in pam_sm_acct_mgmt() 93 user, in pam_sm_acct_mgmt() 97 if (user == NULL || *user == '\0') { in pam_sm_acct_mgmt() 103 if ((range = getuserrange(user)) == NULL) { in pam_sm_acct_mgmt() 105 "pam_tsol_account: getuserrange(%s) failure", user); in pam_sm_acct_mgmt()
|
/titanic_41/usr/src/lib/libc/port/gen/ |
H A D | event_port.c | 59 port_associate(int port, int source, uintptr_t object, int events, void *user) in port_associate() argument 63 (uintptr_t)user); in port_associate() 112 port_send(int port, int events, void *user) in port_send() argument 115 r.r_vals = _portfs(PORT_SEND, port, events, (uintptr_t)user, NULL, in port_send() 127 void *user) in _port_dispatch() argument 132 (uintptr_t)user); in _port_dispatch() 135 source, events, object, (uintptr_t)user); in _port_dispatch() 140 port_sendn(int ports[], int errors[], uint_t nent, int events, void *user) in port_sendn() argument 149 (uintptr_t)user); in port_sendn() 163 lnent, events, (uintptr_t)user); in port_sendn() [all …]
|
/titanic_41/usr/src/cmd/lp/lib/users/ |
H A D | loadpri.c | 78 *user, in ld_priority_file() local 132 if (!(user = next_user(fd, line, &p))) in ld_priority_file() 138 if (!(user = next_user(fd, line, &p))) goto Error; in ld_priority_file() 151 add_user (&pri_tbl, user, pri); in ld_priority_file() 153 while ((user = next_user(fd, line, &p))); in ld_priority_file() 174 int add_user ( struct user_priority * ppri_tbl, char * user, int limit ) in add_user() argument 178 addlist (&(ppri_tbl->users[limit - PRI_MIN]), user); in add_user() 243 int del_user ( struct user_priority * ppri_tbl, char * user ) in del_user() argument 248 if (searchlist(user, ppri_tbl->users[limit - PRI_MIN])) in del_user() 250 dellist (&(ppri_tbl->users[limit - PRI_MIN]), user); in del_user()
|
/titanic_41/usr/src/cmd/userattr/ |
H A D | userattr.c | 75 char *user = NULL; in main() local 91 user = argv[opt++]; in main() 100 if (user == NULL) { in main() 108 user = pwd->pw_name; in main() 110 if ((pwd = getpwnam(user)) == NULL) { in main() 112 gettext("No such user %s\n"), user); in main() 117 (void) _enum_attrs(user, attr, NULL, NULL); in main() 122 user); in main()
|
/titanic_41/usr/src/test/test-runner/cmd/ |
H A D | run.py | 117 def __init__(self, pathname, outputdir=None, timeout=None, user=None): argument 121 self.user = user or '' 127 self.pathname, self.outputdir, self.timeout, self.user) 135 do_sudo = len(self.user) != 0 148 def update_cmd_privs(self, cmd, user): argument 156 if not user or user is me: 159 ret = '%s -E -u %s %s' % (SUDO, user, cmd) 191 privcmd = self.update_cmd_privs(self.pathname, self.user) 238 user = ' (run as %s)' % (self.user if len(self.user) else logname) 239 msga = 'Test: %s%s ' % (self.pathname, user) [all …]
|
/titanic_41/usr/src/lib/libproject/common/ |
H A D | getprojent.c | 139 ismember(struct project *proj, const char *user, gid_t gid, int is_default) in ismember() argument 160 (strcmp(member + 1, user) == 0 || in ismember() 163 if (strcmp(member, "*") == 0 || strcmp(member, user) == 0) in ismember() 189 if (strcmp(*u, user) == 0) in ismember() 197 _getdefaultproj(const char *user, struct project *result, in _getdefaultproj() argument 212 if (getpwnam_r(user, &p, buffer, buflen) == NULL) in _getdefaultproj() 218 if ((uattr = getusernam(user)) != NULL) { in _getdefaultproj() 234 (void) snprintf(projname, PROJNAME_MAX, "user.%s", user); in _getdefaultproj() 239 ismember(result, user, p.pw_gid, DEFAULT_PROJECT)) in _getdefaultproj() 247 ismember(result, user, p.pw_gid, DEFAULT_PROJECT)) in _getdefaultproj() [all …]
|