/titanic_51/usr/src/uts/common/fs/smbsrv/ |
H A D | smb_user.c | 104 * - The user is in the list of users for his session. 106 * - This user can not access anything yet. 111 * - The user is in the list of users for his session. 112 * - References will be given out if the user is looked up. 113 * - The user can access files and pipes. 118 * - The user is in the list of users for his session. 119 * - References will not be given out if the user is looked up. 120 * - The trees the user connected are being disconnected. 121 * - The resources associated with the user remain. 126 * - The user i 220 smb_user_t *user; smb_user_new() local 260 smb_user_logon(smb_user_t * user,cred_t * cr,char * domain_name,char * account_name,uint32_t flags,uint32_t privileges,uint32_t audit_sid) smb_user_logon() argument 306 smb_user_logoff(smb_user_t * user) smb_user_logoff() argument 350 smb_user_hold(smb_user_t * user) smb_user_hold() argument 370 smb_user_hold_internal(smb_user_t * user) smb_user_hold_internal() argument 387 smb_user_release(smb_user_t * user) smb_user_release() argument 418 smb_user_is_admin(smb_user_t * user) smb_user_is_admin() argument 472 smb_user_namecmp(smb_user_t * user,const char * name) smb_user_namecmp() argument 504 smb_user_enum(smb_user_t * user,smb_svcenum_t * svcenum) smb_user_enum() argument 529 smb_user_t *user = (smb_user_t *)arg; smb_user_delete() local 557 smb_user_getcred(smb_user_t * user) smb_user_getcred() argument 563 smb_user_getprivcred(smb_user_t * user) smb_user_getprivcred() argument 576 smb_user_setcred(smb_user_t * user,cred_t * cr,uint32_t privileges) smb_user_setcred() argument 611 smb_user_enum_private(smb_user_t * user,smb_svcenum_t * svcenum) smb_user_enum_private() argument 644 smb_user_netinfo_encode(smb_user_t * user,uint8_t * buf,size_t buflen,uint32_t * nbytes) smb_user_netinfo_encode() argument 658 smb_user_netinfo_init(smb_user_t * user,smb_netuserinfo_t * info) smb_user_netinfo_init() argument 710 smb_user_auth_logoff(smb_user_t * user) smb_user_auth_logoff() argument [all...] |
H A D | smb_authenticate.c | 55 * The user information is passed to smbd for authentication. 56 * If smbd can authenticate the user an access token is returned and we 57 * generate a cred and new user based on the token. 62 smb_user_t *user = NULL; in smb_authenticate_old() local 65 user = smb_user_new(sr->session); in smb_authenticate_old() 66 if (user == NULL) in smb_authenticate_old() 69 /* user cleanup in smb_request_free */ in smb_authenticate_old() 70 sr->uid_user = user; in smb_authenticate_old() 71 sr->smb_uid = user->u_uid; in smb_authenticate_old() 78 if ((status = smb_authsock_open(user)) ! in smb_authenticate_old() 117 smb_user_t *user = sr->uid_user; smb_auth_do_oldreq() local 227 smb_user_t *user = NULL; smb_authenticate_ext() local 353 smb_user_t *user = sr->uid_user; smb_auth_do_clinfo() local 386 smb_user_t *user = sr->uid_user; smb_auth_get_token() local 522 smb_authsock_sendrecv(smb_user_t * user,smb_lsa_msg_hdr_t * hdr,void * sndbuf,void ** recvbuf) smb_authsock_sendrecv() argument 597 smb_authsock_open(smb_user_t * user) smb_authsock_open() argument 703 smb_authsock_close(smb_user_t * user) smb_authsock_close() argument [all...] |
/titanic_51/usr/src/test/zfs-tests/tests/functional/acl/cifs/ |
H A D | cifs_attr_003_pos.ksh | 49 # letting a user/application set them. 65 # 1. Loop super user and non-super user to run the test case. 195 # $2: Execute user 201 typeset user=$2 204 verify_expect $expect $CHG_USR_EXEC $user \ 206 verify_expect $expect $CHG_USR_EXEC $user \ 215 # $2: Execute user 221 typeset user=$2 225 verify_expect $expect $CHG_USR_EXEC $user \ [all...] |
H A D | cifs_attr_001_pos.ksh | 37 # Verify the user with write_attributes permission or 42 # 1. Loop super user and non-super user to run the test case. 44 # 3. Grant user has write_attributes permission or 70 typeset user=$3 77 if [[ -n $user ]]; then 78 $SU $user -c "$CHMOD S+c${attr} $object" 99 typeset user=$3 106 if [[ -n $user ]]; then 107 $SU $user [all...] |
H A D | cifs_attr_002_pos.ksh | 38 # Verify the user with PRIV_FILE_FLAG_SET/PRIV_FILE_FLAG_CLEAR 43 # 1. Loop super user and non-super user to run the test case. 45 # 3. Grant user has PRIV_FILE_FLAG_SET/PRIV_FILE_FLAG_CLEAR separately. 63 typeset user=$3 # The user to run the command as 71 # anything else. A regular user can remove no attributes without the 75 if [[ $user == 'root' ]]; then 83 log_mustnot $SU $user -c "$cmd" 87 log_must $SU $user [all...] |
/titanic_51/usr/src/test/zfs-tests/tests/functional/delegate/ |
H A D | delegate_common.kshlib | 36 # Cleanup exist user/group. 72 # Verify the specified user have permission on the dataset 91 typeset user 92 for user in $@; do 97 check_fs_perm $user $perm $dtst 100 check_vol_perm $user $perm $dtst 105 log_note "Fail: $user should have $perm " \ 116 # Verify the specified user have no permission on the dataset 135 typeset user 136 for user i [all...] |
/titanic_51/usr/src/lib/libsecdb/common/ |
H A D | getuserattr.c | 55 userstr_t user; in getuserattr() local 58 (void) memset(&user, 0, sizeof (userattr_t)); in getuserattr() 59 tmp = _getuserattr(&user, buf, NSS_BUFLEN_USERATTR, &err); in getuserattr() 68 userstr_t user; in fgetuserattr() local 71 (void) memset(&user, 0, sizeof (userattr_t)); in fgetuserattr() 72 tmp = _fgetuserattr(f, &user, buf, NSS_BUFLEN_USERATTR); in fgetuserattr() 82 userstr_t user; in getusernam() local 85 resptr = _getusernam(name, &user, buf, NSS_BUFLEN_USERATTR, &err); in getusernam() 119 free_userattr(userattr_t *user) in free_userattr() argument 121 if (user) { in free_userattr() 133 userstr2attr(userstr_t * user) userstr2attr() argument 154 print_userattr(userattr_t * user) print_userattr() argument [all...] |
/titanic_51/usr/src/cmd/sendmail/libsm/ |
H A D | mbdb.c | 45 int (*mbdb_lookup) __P((char *name, SM_MBDB_T *user)); 50 static int mbdb_pw_lookup __P((char *name, SM_MBDB_T *user)); 57 static int mbdb_ldap_lookup __P((char *name, SM_MBDB_T *user)); 155 ** user -- pointer to structure to fill in on success 158 ** On success, fill in *user and return EX_OK. 159 ** If the user does not exist, return EX_NOUSER. 165 sm_mbdb_lookup(name, user) in sm_mbdb_lookup() argument 167 SM_MBDB_T *user; 172 ret = SmMbdbType->mbdb_lookup(name, user); 180 ** user 188 sm_mbdb_frompw(user,pw) sm_mbdb_frompw() argument 236 sm_pwfullname(gecos,user,buf,buflen) sm_pwfullname() argument 312 mbdb_pw_lookup(name,user) mbdb_pw_lookup() argument 493 mbdb_ldap_lookup(name,user) mbdb_ldap_lookup() argument [all...] |
/titanic_51/usr/src/lib/libc/sparc/sys/ |
H A D | ptrace.c | 50 #include <sys/user.h> 75 user_t user; /* manufactured u-block */ member 257 data = *((int *)((caddr_t)(&cp->user) + xaddr)); in ptrace() 268 if (xaddr >= (unsigned)cp->user.u_reg[REG_SP] && in ptrace() 269 xaddr < (unsigned)cp->user.u_reg[REG_SP]+16*sizeof (int)) in ptrace() 287 data = (cp->user.u_reg[REG_PS] & in ptrace() 291 cp->user.u_reg[rx] = data; in ptrace() 307 ps->pr_lwp.pr_reg[R_PSR] = cp->user.u_reg[REG_PSR]; in ptrace() 308 ps->pr_lwp.pr_reg[R_PC] = cp->user.u_reg[REG_PC]; in ptrace() 309 ps->pr_lwp.pr_reg[R_nPC] = cp->user in ptrace() [all...] |
/titanic_51/usr/src/test/zfs-tests/tests/functional/acl/nontrivial/ |
H A D | zfs_acl_chmod_owner_001_pos.ksh | 117 typeset user=$1 123 if [[ $user == "" || $node == "" ]]; then 124 log_fail "user, node are not defined." 127 $SU $user -c "$CHOWN $expect_owner $node" 153 typeset user=$1 159 if [[ $user == "" || $node == "" ]]; then 160 log_fail "user, node are not defined." 163 $SU $user -c "$CHGRP $expect_group $node" 190 typeset user=$2 195 # To super user, rea [all...] |
/titanic_51/usr/src/lib/libc/i386/sys/ |
H A D | ptrace.c | 51 #include <sys/user.h> 75 user_t user; /* manufactured u-block */ member 257 data = *((int *)((caddr_t)(&cp->user) + xaddr)); in ptrace() 283 data = (cp->user.u_reg[EFL] & ~PSL_USERMASK) | in ptrace() 285 cp->user.u_reg[rx] = data; in ptrace() 301 ps->pr_lwp.pr_reg[GS] = cp->user.u_reg[GS]; in ptrace() 302 ps->pr_lwp.pr_reg[FS] = cp->user.u_reg[FS]; in ptrace() 303 ps->pr_lwp.pr_reg[ES] = cp->user.u_reg[ES]; in ptrace() 304 ps->pr_lwp.pr_reg[DS] = cp->user.u_reg[DS]; in ptrace() 305 ps->pr_lwp.pr_reg[EDI] = cp->user in ptrace() [all...] |
/titanic_51/usr/src/cmd/lp/lib/access/ |
H A D | allowed.c | 61 /* Check that user has print admin authorization */ in is_user_admin() 75 char * user, in is_user_allowed() argument 80 is_user_allowed (user, allow, deny) in is_user_allowed() 81 char *user, in is_user_allowed() 86 if (bangequ(user, LOCAL_LPUSER) || bangequ(user, LOCAL_ROOTUSER)) 89 return (allowed(user, allow, deny)); 99 char * user, in is_user_allowed_form() argument 103 is_user_allowed_form (user, form) in is_user_allowed_form() 104 char *user, in is_user_allowed_form() 124 is_user_allowed_printer(char * user,char * printer) is_user_allowed_printer() argument [all...] |
/titanic_51/usr/src/lib/scsi/plugins/smp/sas2/common/ |
H A D | sas2_functions.c | 37 sas2_rq_len(size_t user, smp_target_t *tp) in sas2_rq_len() argument 39 if (user != 0) { in sas2_rq_len() 89 * most recently executed command. However, if the user has set it in sas2_rq_setframe() 215 sas2_report_self_config_status_rq_len(size_t user, smp_target_t *tp) in sas2_report_self_config_status_rq_len() argument 217 if (user != 0) { in sas2_report_self_config_status_rq_len() 227 sas2_report_zone_perm_table_rq_len(size_t user, smp_target_t *tp) in sas2_report_zone_perm_table_rq_len() argument 229 if (user != 0) { in sas2_report_zone_perm_table_rq_len() 239 sas2_report_zone_mgr_password_rq_len(size_t user, smp_target_t *tp) in sas2_report_zone_mgr_password_rq_len() argument 241 if (user != 0) { in sas2_report_zone_mgr_password_rq_len() 251 sas2_report_broadcast_rq_len(size_t user, smp_target_ argument 263 sas2_discover_rq_len(size_t user,smp_target_t * tp) sas2_discover_rq_len() argument 299 sas2_report_phy_error_log_rq_len(size_t user,smp_target_t * tp) sas2_report_phy_error_log_rq_len() argument 335 sas2_report_phy_sata_rq_len(size_t user,smp_target_t * tp) sas2_report_phy_sata_rq_len() argument 371 sas2_report_route_info_rq_len(size_t user,smp_target_t * tp) sas2_report_route_info_rq_len() argument 407 sas2_report_phy_event_rq_len(size_t user,smp_target_t * tp) sas2_report_phy_event_rq_len() argument 419 sas2_discover_list_rq_len(size_t user,smp_target_t * tp) sas2_discover_list_rq_len() argument 431 sas2_report_phy_event_list_rq_len(size_t user,smp_target_t * tp) sas2_report_phy_event_list_rq_len() argument 443 sas2_report_exp_route_table_list_rq_len(size_t user,smp_target_t * tp) sas2_report_exp_route_table_list_rq_len() argument 456 sas2_config_general_rq_len(size_t user,smp_target_t * tp) sas2_config_general_rq_len() argument 468 sas2_enable_disable_zoning_rq_len(size_t user,smp_target_t * tp) sas2_enable_disable_zoning_rq_len() argument 480 sas2_zoned_broadcast_rq_len(size_t user,smp_target_t * tp) sas2_zoned_broadcast_rq_len() argument 496 sas2_zone_lock_rq_len(size_t user,smp_target_t * tp) sas2_zone_lock_rq_len() argument 508 sas2_zone_activate_rq_len(size_t user,smp_target_t * tp) sas2_zone_activate_rq_len() argument 520 sas2_zone_unlock_rq_len(size_t user,smp_target_t * tp) sas2_zone_unlock_rq_len() argument 532 sas2_config_zone_manager_password_rq_len(size_t user,smp_target_t * tp) sas2_config_zone_manager_password_rq_len() argument 545 sas2_config_zone_phy_info_rq_len(size_t user,smp_target_t * tp) sas2_config_zone_phy_info_rq_len() argument 557 sas2_config_zone_perm_table_rq_len(size_t user,smp_target_t * tp) sas2_config_zone_perm_table_rq_len() argument 580 sas2_config_route_info_rq_len(size_t user,smp_target_t * tp) sas2_config_route_info_rq_len() argument 592 sas2_phy_control_rq_len(size_t user,smp_target_t * tp) sas2_phy_control_rq_len() argument 604 sas2_phy_test_function_rq_len(size_t user,smp_target_t * tp) sas2_phy_test_function_rq_len() argument 616 sas2_config_phy_event_rq_len(size_t user,smp_target_t * tp) sas2_config_phy_event_rq_len() argument [all...] |
/titanic_51/usr/src/lib/libast/common/uwin/ |
H A D | rcmd.c | 383 char *user; in _validuser() local 402 user = p; in _validuser() 406 user = p; in _validuser() 415 if ('+' == user[0] && '\0' == user[1] ) in _validuser() 423 if ('-' == user[0] && '\0' == user[1] ) in _validuser() 437 if ('\0' != *user && user[0] == '-' && user[1] != '@' in _validuser() 438 && !strcmp(&user[1], ruser)) in _validuser() 441 if ('\0' != *user && user[0] == '-' && user[1] == '@' in _validuser() 442 && user[2] != '\0' && _checknetgroupuser(ruser, &user[2])) in _validuser() 450 if ('\0' != *user && user[0] == '+' in _validuser() [all …]
|
/titanic_51/usr/src/contrib/ast/src/lib/libast/uwin/ |
H A D | rcmd.c | 383 char *user; in _validuser() local 402 user = p; in _validuser() 406 user = p; in _validuser() 414 /* enable all user for + entry */ in _validuser() 415 if ('+' == user[0] && '\0' == user[1] ) in _validuser() 422 /* disable all user for - entry */ in _validuser() 423 if ('-' == user[0] && '\0' == user[1] ) in _validuser() 436 /* disable user fro in _validuser() 509 char *host, *user, *domain; _checknetgrouphost() local 541 char *host, *user, *domain; _checknetgroupuser() local [all...] |
/titanic_51/usr/src/lib/smbsrv/libmlsvc/common/ |
H A D | lsalib.c | 63 * If the name is a domain account, it may refer to a user, group or 145 char user[SMB_USERNAME_MAXLEN]; in lsa_query_primary_domain_info() local 148 smb_ipc_get_user(user, SMB_USERNAME_MAXLEN); in lsa_query_primary_domain_info() 150 status = lsar_open(server, domain, user, &domain_handle); in lsa_query_primary_domain_info() 174 char user[SMB_USERNAME_MAXLEN]; in lsa_query_account_domain_info() local 177 smb_ipc_get_user(user, SMB_USERNAME_MAXLEN); in lsa_query_account_domain_info() 179 status = lsar_open(server, domain, user, &domain_handle); in lsa_query_account_domain_info() 204 char user[SMB_USERNAME_MAXLEN]; in lsa_query_dns_domain_info() local 207 smb_ipc_get_user(user, SMB_USERNAME_MAXLEN); in lsa_query_dns_domain_info() 209 status = lsar_open(server, domain, user, in lsa_query_dns_domain_info() 234 char user[SMB_USERNAME_MAXLEN]; lsa_enum_trusted_domains() local 274 char user[SMB_USERNAME_MAXLEN]; lsa_enum_trusted_domains_ex() local 356 char user[SMB_USERNAME_MAXLEN]; lsa_lookup_name_domain() local 394 char user[SMB_USERNAME_MAXLEN]; lsa_lookup_privs() local 426 char user[SMB_USERNAME_MAXLEN]; lsa_list_privs() local 551 char user[SMB_USERNAME_MAXLEN]; lsa_lookup_sid_domain() local [all...] |
/titanic_51/usr/src/lib/pam_modules/krb5/ |
H A D | utils.c | 48 * To get the uid from the passwd entry for specified user 49 * It returns 0 if the user can't be found, otherwise returns 1. 52 get_pw_uid(char *user, uid_t *uid) in get_pw_uid() argument 57 if (getpwnam_r(user, &sp, buffer, sizeof (buffer)) == NULL) { in get_pw_uid() 68 * To get the gid from the passwd entry for specified user 69 * It returns 0 if the user can't be found, otherwise returns 1. 72 get_pw_gid(char *user, gid_t *gid) in get_pw_gid() argument 77 if (getpwnam_r(user, &sp, buffer, sizeof (buffer)) == NULL) { in get_pw_gid() 89 * To get the kerberos user name for the specified user 104 get_kmd_kuser(krb5_context kcontext,const char * user,char * kuser,int length) get_kmd_kuser() argument 143 key_in_keytab(const char * user,int debug) key_in_keytab() argument [all...] |
/titanic_51/usr/src/lib/pam_modules/smbfs/ |
H A D | smbfs_login.c | 60 char *user; in pam_sm_setcred() local 85 (void) pam_get_item(pamh, PAM_USER, (void **)&user); in pam_sm_setcred() 87 if (user == NULL || *user == '\0') { in pam_sm_setcred() 92 if (getpwnam_r(user, &pwbuf, buf, sizeof (buf)) == NULL) { in pam_sm_setcred() 94 "pam_smbfs_login: username %s can't be found", user); in pam_sm_setcred() 114 "pam_smbfs_login: service %s, dom %s, user %s", in pam_sm_setcred() 115 service, dom, user); in pam_sm_setcred() 118 res = smbfs_keychain_add(uid, dom, user, pw); in pam_sm_setcred() 121 res = smbfs_keychain_del(uid, dom, user); in pam_sm_setcred() [all...] |
/titanic_51/usr/src/lib/pam_modules/ldap/ |
H A D | ldap_authenticate.c | 43 * Authenticate user. 54 char *user = NULL; in pam_sm_authenticate() local 63 /* Get the service and user */ in pam_sm_authenticate() 66 (err = pam_get_item(pamh, PAM_USER, (void **)&user)) != PAM_SUCCESS) in pam_sm_authenticate() 89 service, (user && *user != '\0')?user:"no-user", flags, in pam_sm_authenticate() 92 if (!user || *user in pam_sm_authenticate() [all...] |
/titanic_51/usr/src/lib/pam_modules/tsol_acct/ |
H A D | tsol_acct.c | 42 * Validates that the user's label range contains 62 char *user; in pam_sm_acct_mgmt() local 83 (void) pam_get_item(pamh, PAM_USER, (void **)&user); in pam_sm_acct_mgmt() 89 "pam_tsol_account: allowed_unlabeled = %d, user %s, " in pam_sm_acct_mgmt() 92 (user == NULL) ? "NULL" : (user == '\0') ? "ZERO" : in pam_sm_acct_mgmt() 93 user, in pam_sm_acct_mgmt() 97 if (user == NULL || *user == '\0') { in pam_sm_acct_mgmt() 99 "pam_tsol_account: no user"); in pam_sm_acct_mgmt() [all...] |
/titanic_51/usr/src/lib/libc/port/gen/ |
H A D | event_port.c | 59 port_associate(int port, int source, uintptr_t object, int events, void *user) in port_associate() argument 63 (uintptr_t)user); in port_associate() 112 port_send(int port, int events, void *user) in port_send() argument 115 r.r_vals = _portfs(PORT_SEND, port, events, (uintptr_t)user, NULL, in port_send() 127 void *user) in _port_dispatch() argument 132 (uintptr_t)user); in _port_dispatch() 135 source, events, object, (uintptr_t)user); in _port_dispatch() 140 port_sendn(int ports[], int errors[], uint_t nent, int events, void *user) in port_sendn() argument 149 (uintptr_t)user); in port_sendn() 163 lnent, events, (uintptr_t)user); in port_sendn() 178 port_alert(int port,int flags,int events,void * user) port_alert() argument [all...] |
/titanic_51/usr/src/cmd/userattr/ |
H A D | userattr.c | 45 * userattr [-v] attr_name [user] 75 char *user = NULL; in main() local 91 user = argv[opt++]; in main() 96 gettext("Usage: %s [-v] attribute_name [user]\n"), argv[0]); in main() 100 if (user == NULL) { in main() 105 gettext("Cannot find user for uid %d\n"), uid); in main() 108 user = pwd->pw_name; in main() 110 if ((pwd = getpwnam(user)) == NULL) { in main() 112 gettext("No such user %s\n"), user); in main() [all...] |
/titanic_51/usr/src/cmd/lp/lib/users/ |
H A D | loadpri.c | 42 Input: Path name of the user priority file. It has the following 53 list of user names. No white space is allowed 69 Effect: The user priority file is read and parsed. Storage for 78 *user, in ld_priority_file() local 132 if (!(user = next_user(fd, line, &p))) in ld_priority_file() 138 if (!(user = next_user(fd, line, &p))) goto Error; in ld_priority_file() 151 add_user (&pri_tbl, user, pri); in ld_priority_file() 153 while ((user = next_user(fd, line, &p))); in ld_priority_file() 168 Inputs: A pointer to a limit structure, and a user. 170 Effects: Adds <user> t 174 add_user(struct user_priority * ppri_tbl,char * user,int limit) add_user() argument 243 del_user(struct user_priority * ppri_tbl,char * user) del_user() argument [all...] |
H A D | usermgmt.c | 44 int putuser ( char * user, USER * pri_s ) in putuser() argument 55 if (!add_user(ppri_tbl, user, pri_s->priority_limit)) in putuser() 67 USER * getuser ( char * user ) in getuser() argument 72 if (STREQU(user, "root") || STREQU(user, LPUSER)) in getuser() 87 if (bang_searchlist(user, ppri_tbl->users[limit - PRI_MIN])) in getuser() 97 int deluser ( char * user ) in deluser() argument 109 del_user(ppri_tbl, user); in deluser()
|
/titanic_51/usr/src/lib/libproject/common/ |
H A D | getprojent.c | 129 * The following routine checks if user specified by the second argument 131 * argument. Information about user's default group and whether or not 132 * the project specified in the first argument is user's default project 133 * (i.e., user_attr, "default", "user.username", or "group.groupname" 135 * then this function returns 1 (true), unless specified user explicitly 136 * excluded with "!user", or "!group" wildcards. 139 ismember(struct project *proj, const char *user, gid_t gid, int is_default) in ismember() argument 155 * Scan project's user list. in ismember() 160 (strcmp(member + 1, user) == 0 || in ismember() 163 if (strcmp(member, "*") == 0 || strcmp(member, user) in ismember() 197 _getdefaultproj(const char * user,struct project * result,void * buffer,size_t buflen) _getdefaultproj() argument 260 _inproj(const char * user,const char * name,void * buffer,size_t buflen) _inproj() argument [all...] |