Home
last modified time | relevance | path

Searched refs:user (Results 1 – 25 of 775) sorted by relevance

12345678910>>...31

/titanic_51/usr/src/uts/common/fs/smbsrv/
H A Dsmb_user.c104 * - The user is in the list of users for his session.
106 * - This user can not access anything yet.
111 * - The user is in the list of users for his session.
112 * - References will be given out if the user is looked up.
113 * - The user can access files and pipes.
118 * - The user is in the list of users for his session.
119 * - References will not be given out if the user is looked up.
120 * - The trees the user connected are being disconnected.
121 * - The resources associated with the user remain.
126 * - The user i
220 smb_user_t *user; smb_user_new() local
260 smb_user_logon(smb_user_t * user,cred_t * cr,char * domain_name,char * account_name,uint32_t flags,uint32_t privileges,uint32_t audit_sid) smb_user_logon() argument
306 smb_user_logoff(smb_user_t * user) smb_user_logoff() argument
350 smb_user_hold(smb_user_t * user) smb_user_hold() argument
370 smb_user_hold_internal(smb_user_t * user) smb_user_hold_internal() argument
387 smb_user_release(smb_user_t * user) smb_user_release() argument
418 smb_user_is_admin(smb_user_t * user) smb_user_is_admin() argument
472 smb_user_namecmp(smb_user_t * user,const char * name) smb_user_namecmp() argument
504 smb_user_enum(smb_user_t * user,smb_svcenum_t * svcenum) smb_user_enum() argument
529 smb_user_t *user = (smb_user_t *)arg; smb_user_delete() local
557 smb_user_getcred(smb_user_t * user) smb_user_getcred() argument
563 smb_user_getprivcred(smb_user_t * user) smb_user_getprivcred() argument
576 smb_user_setcred(smb_user_t * user,cred_t * cr,uint32_t privileges) smb_user_setcred() argument
611 smb_user_enum_private(smb_user_t * user,smb_svcenum_t * svcenum) smb_user_enum_private() argument
644 smb_user_netinfo_encode(smb_user_t * user,uint8_t * buf,size_t buflen,uint32_t * nbytes) smb_user_netinfo_encode() argument
658 smb_user_netinfo_init(smb_user_t * user,smb_netuserinfo_t * info) smb_user_netinfo_init() argument
710 smb_user_auth_logoff(smb_user_t * user) smb_user_auth_logoff() argument
[all...]
H A Dsmb_authenticate.c55 * The user information is passed to smbd for authentication.
56 * If smbd can authenticate the user an access token is returned and we
57 * generate a cred and new user based on the token.
62 smb_user_t *user = NULL; in smb_authenticate_old() local
65 user = smb_user_new(sr->session); in smb_authenticate_old()
66 if (user == NULL) in smb_authenticate_old()
69 /* user cleanup in smb_request_free */ in smb_authenticate_old()
70 sr->uid_user = user; in smb_authenticate_old()
71 sr->smb_uid = user->u_uid; in smb_authenticate_old()
78 if ((status = smb_authsock_open(user)) ! in smb_authenticate_old()
117 smb_user_t *user = sr->uid_user; smb_auth_do_oldreq() local
227 smb_user_t *user = NULL; smb_authenticate_ext() local
353 smb_user_t *user = sr->uid_user; smb_auth_do_clinfo() local
386 smb_user_t *user = sr->uid_user; smb_auth_get_token() local
522 smb_authsock_sendrecv(smb_user_t * user,smb_lsa_msg_hdr_t * hdr,void * sndbuf,void ** recvbuf) smb_authsock_sendrecv() argument
597 smb_authsock_open(smb_user_t * user) smb_authsock_open() argument
703 smb_authsock_close(smb_user_t * user) smb_authsock_close() argument
[all...]
/titanic_51/usr/src/test/zfs-tests/tests/functional/acl/cifs/
H A Dcifs_attr_003_pos.ksh49 # letting a user/application set them.
65 # 1. Loop super user and non-super user to run the test case.
195 # $2: Execute user
201 typeset user=$2
204 verify_expect $expect $CHG_USR_EXEC $user \
206 verify_expect $expect $CHG_USR_EXEC $user \
215 # $2: Execute user
221 typeset user=$2
225 verify_expect $expect $CHG_USR_EXEC $user \
[all...]
H A Dcifs_attr_001_pos.ksh37 # Verify the user with write_attributes permission or
42 # 1. Loop super user and non-super user to run the test case.
44 # 3. Grant user has write_attributes permission or
70 typeset user=$3
77 if [[ -n $user ]]; then
78 $SU $user -c "$CHMOD S+c${attr} $object"
99 typeset user=$3
106 if [[ -n $user ]]; then
107 $SU $user
[all...]
H A Dcifs_attr_002_pos.ksh38 # Verify the user with PRIV_FILE_FLAG_SET/PRIV_FILE_FLAG_CLEAR
43 # 1. Loop super user and non-super user to run the test case.
45 # 3. Grant user has PRIV_FILE_FLAG_SET/PRIV_FILE_FLAG_CLEAR separately.
63 typeset user=$3 # The user to run the command as
71 # anything else. A regular user can remove no attributes without the
75 if [[ $user == 'root' ]]; then
83 log_mustnot $SU $user -c "$cmd"
87 log_must $SU $user
[all...]
/titanic_51/usr/src/test/zfs-tests/tests/functional/delegate/
H A Ddelegate_common.kshlib36 # Cleanup exist user/group.
72 # Verify the specified user have permission on the dataset
91 typeset user
92 for user in $@; do
97 check_fs_perm $user $perm $dtst
100 check_vol_perm $user $perm $dtst
105 log_note "Fail: $user should have $perm " \
116 # Verify the specified user have no permission on the dataset
135 typeset user
136 for user i
[all...]
/titanic_51/usr/src/lib/libsecdb/common/
H A Dgetuserattr.c55 userstr_t user; in getuserattr() local
58 (void) memset(&user, 0, sizeof (userattr_t)); in getuserattr()
59 tmp = _getuserattr(&user, buf, NSS_BUFLEN_USERATTR, &err); in getuserattr()
68 userstr_t user; in fgetuserattr() local
71 (void) memset(&user, 0, sizeof (userattr_t)); in fgetuserattr()
72 tmp = _fgetuserattr(f, &user, buf, NSS_BUFLEN_USERATTR); in fgetuserattr()
82 userstr_t user; in getusernam() local
85 resptr = _getusernam(name, &user, buf, NSS_BUFLEN_USERATTR, &err); in getusernam()
119 free_userattr(userattr_t *user) in free_userattr() argument
121 if (user) { in free_userattr()
133 userstr2attr(userstr_t * user) userstr2attr() argument
154 print_userattr(userattr_t * user) print_userattr() argument
[all...]
/titanic_51/usr/src/cmd/sendmail/libsm/
H A Dmbdb.c45 int (*mbdb_lookup) __P((char *name, SM_MBDB_T *user));
50 static int mbdb_pw_lookup __P((char *name, SM_MBDB_T *user));
57 static int mbdb_ldap_lookup __P((char *name, SM_MBDB_T *user));
155 ** user -- pointer to structure to fill in on success
158 ** On success, fill in *user and return EX_OK.
159 ** If the user does not exist, return EX_NOUSER.
165 sm_mbdb_lookup(name, user) in sm_mbdb_lookup() argument
167 SM_MBDB_T *user;
172 ret = SmMbdbType->mbdb_lookup(name, user);
180 ** user
188 sm_mbdb_frompw(user,pw) sm_mbdb_frompw() argument
236 sm_pwfullname(gecos,user,buf,buflen) sm_pwfullname() argument
312 mbdb_pw_lookup(name,user) mbdb_pw_lookup() argument
493 mbdb_ldap_lookup(name,user) mbdb_ldap_lookup() argument
[all...]
/titanic_51/usr/src/lib/libc/sparc/sys/
H A Dptrace.c50 #include <sys/user.h>
75 user_t user; /* manufactured u-block */ member
257 data = *((int *)((caddr_t)(&cp->user) + xaddr)); in ptrace()
268 if (xaddr >= (unsigned)cp->user.u_reg[REG_SP] && in ptrace()
269 xaddr < (unsigned)cp->user.u_reg[REG_SP]+16*sizeof (int)) in ptrace()
287 data = (cp->user.u_reg[REG_PS] & in ptrace()
291 cp->user.u_reg[rx] = data; in ptrace()
307 ps->pr_lwp.pr_reg[R_PSR] = cp->user.u_reg[REG_PSR]; in ptrace()
308 ps->pr_lwp.pr_reg[R_PC] = cp->user.u_reg[REG_PC]; in ptrace()
309 ps->pr_lwp.pr_reg[R_nPC] = cp->user in ptrace()
[all...]
/titanic_51/usr/src/test/zfs-tests/tests/functional/acl/nontrivial/
H A Dzfs_acl_chmod_owner_001_pos.ksh117 typeset user=$1
123 if [[ $user == "" || $node == "" ]]; then
124 log_fail "user, node are not defined."
127 $SU $user -c "$CHOWN $expect_owner $node"
153 typeset user=$1
159 if [[ $user == "" || $node == "" ]]; then
160 log_fail "user, node are not defined."
163 $SU $user -c "$CHGRP $expect_group $node"
190 typeset user=$2
195 # To super user, rea
[all...]
/titanic_51/usr/src/lib/libc/i386/sys/
H A Dptrace.c51 #include <sys/user.h>
75 user_t user; /* manufactured u-block */ member
257 data = *((int *)((caddr_t)(&cp->user) + xaddr)); in ptrace()
283 data = (cp->user.u_reg[EFL] & ~PSL_USERMASK) | in ptrace()
285 cp->user.u_reg[rx] = data; in ptrace()
301 ps->pr_lwp.pr_reg[GS] = cp->user.u_reg[GS]; in ptrace()
302 ps->pr_lwp.pr_reg[FS] = cp->user.u_reg[FS]; in ptrace()
303 ps->pr_lwp.pr_reg[ES] = cp->user.u_reg[ES]; in ptrace()
304 ps->pr_lwp.pr_reg[DS] = cp->user.u_reg[DS]; in ptrace()
305 ps->pr_lwp.pr_reg[EDI] = cp->user in ptrace()
[all...]
/titanic_51/usr/src/cmd/lp/lib/access/
H A Dallowed.c61 /* Check that user has print admin authorization */ in is_user_admin()
75 char * user, in is_user_allowed() argument
80 is_user_allowed (user, allow, deny) in is_user_allowed()
81 char *user, in is_user_allowed()
86 if (bangequ(user, LOCAL_LPUSER) || bangequ(user, LOCAL_ROOTUSER))
89 return (allowed(user, allow, deny));
99 char * user, in is_user_allowed_form() argument
103 is_user_allowed_form (user, form) in is_user_allowed_form()
104 char *user, in is_user_allowed_form()
124 is_user_allowed_printer(char * user,char * printer) is_user_allowed_printer() argument
[all...]
/titanic_51/usr/src/lib/scsi/plugins/smp/sas2/common/
H A Dsas2_functions.c37 sas2_rq_len(size_t user, smp_target_t *tp) in sas2_rq_len() argument
39 if (user != 0) { in sas2_rq_len()
89 * most recently executed command. However, if the user has set it in sas2_rq_setframe()
215 sas2_report_self_config_status_rq_len(size_t user, smp_target_t *tp) in sas2_report_self_config_status_rq_len() argument
217 if (user != 0) { in sas2_report_self_config_status_rq_len()
227 sas2_report_zone_perm_table_rq_len(size_t user, smp_target_t *tp) in sas2_report_zone_perm_table_rq_len() argument
229 if (user != 0) { in sas2_report_zone_perm_table_rq_len()
239 sas2_report_zone_mgr_password_rq_len(size_t user, smp_target_t *tp) in sas2_report_zone_mgr_password_rq_len() argument
241 if (user != 0) { in sas2_report_zone_mgr_password_rq_len()
251 sas2_report_broadcast_rq_len(size_t user, smp_target_ argument
263 sas2_discover_rq_len(size_t user,smp_target_t * tp) sas2_discover_rq_len() argument
299 sas2_report_phy_error_log_rq_len(size_t user,smp_target_t * tp) sas2_report_phy_error_log_rq_len() argument
335 sas2_report_phy_sata_rq_len(size_t user,smp_target_t * tp) sas2_report_phy_sata_rq_len() argument
371 sas2_report_route_info_rq_len(size_t user,smp_target_t * tp) sas2_report_route_info_rq_len() argument
407 sas2_report_phy_event_rq_len(size_t user,smp_target_t * tp) sas2_report_phy_event_rq_len() argument
419 sas2_discover_list_rq_len(size_t user,smp_target_t * tp) sas2_discover_list_rq_len() argument
431 sas2_report_phy_event_list_rq_len(size_t user,smp_target_t * tp) sas2_report_phy_event_list_rq_len() argument
443 sas2_report_exp_route_table_list_rq_len(size_t user,smp_target_t * tp) sas2_report_exp_route_table_list_rq_len() argument
456 sas2_config_general_rq_len(size_t user,smp_target_t * tp) sas2_config_general_rq_len() argument
468 sas2_enable_disable_zoning_rq_len(size_t user,smp_target_t * tp) sas2_enable_disable_zoning_rq_len() argument
480 sas2_zoned_broadcast_rq_len(size_t user,smp_target_t * tp) sas2_zoned_broadcast_rq_len() argument
496 sas2_zone_lock_rq_len(size_t user,smp_target_t * tp) sas2_zone_lock_rq_len() argument
508 sas2_zone_activate_rq_len(size_t user,smp_target_t * tp) sas2_zone_activate_rq_len() argument
520 sas2_zone_unlock_rq_len(size_t user,smp_target_t * tp) sas2_zone_unlock_rq_len() argument
532 sas2_config_zone_manager_password_rq_len(size_t user,smp_target_t * tp) sas2_config_zone_manager_password_rq_len() argument
545 sas2_config_zone_phy_info_rq_len(size_t user,smp_target_t * tp) sas2_config_zone_phy_info_rq_len() argument
557 sas2_config_zone_perm_table_rq_len(size_t user,smp_target_t * tp) sas2_config_zone_perm_table_rq_len() argument
580 sas2_config_route_info_rq_len(size_t user,smp_target_t * tp) sas2_config_route_info_rq_len() argument
592 sas2_phy_control_rq_len(size_t user,smp_target_t * tp) sas2_phy_control_rq_len() argument
604 sas2_phy_test_function_rq_len(size_t user,smp_target_t * tp) sas2_phy_test_function_rq_len() argument
616 sas2_config_phy_event_rq_len(size_t user,smp_target_t * tp) sas2_config_phy_event_rq_len() argument
[all...]
/titanic_51/usr/src/lib/libast/common/uwin/
H A Drcmd.c383 char *user; in _validuser() local
402 user = p; in _validuser()
406 user = p; in _validuser()
415 if ('+' == user[0] && '\0' == user[1] ) in _validuser()
423 if ('-' == user[0] && '\0' == user[1] ) in _validuser()
437 if ('\0' != *user && user[0] == '-' && user[1] != '@' in _validuser()
438 && !strcmp(&user[1], ruser)) in _validuser()
441 if ('\0' != *user && user[0] == '-' && user[1] == '@' in _validuser()
442 && user[2] != '\0' && _checknetgroupuser(ruser, &user[2])) in _validuser()
450 if ('\0' != *user && user[0] == '+' in _validuser()
[all …]
/titanic_51/usr/src/contrib/ast/src/lib/libast/uwin/
H A Drcmd.c383 char *user; in _validuser() local
402 user = p; in _validuser()
406 user = p; in _validuser()
414 /* enable all user for + entry */ in _validuser()
415 if ('+' == user[0] && '\0' == user[1] ) in _validuser()
422 /* disable all user for - entry */ in _validuser()
423 if ('-' == user[0] && '\0' == user[1] ) in _validuser()
436 /* disable user fro in _validuser()
509 char *host, *user, *domain; _checknetgrouphost() local
541 char *host, *user, *domain; _checknetgroupuser() local
[all...]
/titanic_51/usr/src/lib/smbsrv/libmlsvc/common/
H A Dlsalib.c63 * If the name is a domain account, it may refer to a user, group or
145 char user[SMB_USERNAME_MAXLEN]; in lsa_query_primary_domain_info() local
148 smb_ipc_get_user(user, SMB_USERNAME_MAXLEN); in lsa_query_primary_domain_info()
150 status = lsar_open(server, domain, user, &domain_handle); in lsa_query_primary_domain_info()
174 char user[SMB_USERNAME_MAXLEN]; in lsa_query_account_domain_info() local
177 smb_ipc_get_user(user, SMB_USERNAME_MAXLEN); in lsa_query_account_domain_info()
179 status = lsar_open(server, domain, user, &domain_handle); in lsa_query_account_domain_info()
204 char user[SMB_USERNAME_MAXLEN]; in lsa_query_dns_domain_info() local
207 smb_ipc_get_user(user, SMB_USERNAME_MAXLEN); in lsa_query_dns_domain_info()
209 status = lsar_open(server, domain, user, in lsa_query_dns_domain_info()
234 char user[SMB_USERNAME_MAXLEN]; lsa_enum_trusted_domains() local
274 char user[SMB_USERNAME_MAXLEN]; lsa_enum_trusted_domains_ex() local
356 char user[SMB_USERNAME_MAXLEN]; lsa_lookup_name_domain() local
394 char user[SMB_USERNAME_MAXLEN]; lsa_lookup_privs() local
426 char user[SMB_USERNAME_MAXLEN]; lsa_list_privs() local
551 char user[SMB_USERNAME_MAXLEN]; lsa_lookup_sid_domain() local
[all...]
/titanic_51/usr/src/lib/pam_modules/krb5/
H A Dutils.c48 * To get the uid from the passwd entry for specified user
49 * It returns 0 if the user can't be found, otherwise returns 1.
52 get_pw_uid(char *user, uid_t *uid) in get_pw_uid() argument
57 if (getpwnam_r(user, &sp, buffer, sizeof (buffer)) == NULL) { in get_pw_uid()
68 * To get the gid from the passwd entry for specified user
69 * It returns 0 if the user can't be found, otherwise returns 1.
72 get_pw_gid(char *user, gid_t *gid) in get_pw_gid() argument
77 if (getpwnam_r(user, &sp, buffer, sizeof (buffer)) == NULL) { in get_pw_gid()
89 * To get the kerberos user name for the specified user
104 get_kmd_kuser(krb5_context kcontext,const char * user,char * kuser,int length) get_kmd_kuser() argument
143 key_in_keytab(const char * user,int debug) key_in_keytab() argument
[all...]
/titanic_51/usr/src/lib/pam_modules/smbfs/
H A Dsmbfs_login.c60 char *user; in pam_sm_setcred() local
85 (void) pam_get_item(pamh, PAM_USER, (void **)&user); in pam_sm_setcred()
87 if (user == NULL || *user == '\0') { in pam_sm_setcred()
92 if (getpwnam_r(user, &pwbuf, buf, sizeof (buf)) == NULL) { in pam_sm_setcred()
94 "pam_smbfs_login: username %s can't be found", user); in pam_sm_setcred()
114 "pam_smbfs_login: service %s, dom %s, user %s", in pam_sm_setcred()
115 service, dom, user); in pam_sm_setcred()
118 res = smbfs_keychain_add(uid, dom, user, pw); in pam_sm_setcred()
121 res = smbfs_keychain_del(uid, dom, user); in pam_sm_setcred()
[all...]
/titanic_51/usr/src/lib/pam_modules/ldap/
H A Dldap_authenticate.c43 * Authenticate user.
54 char *user = NULL; in pam_sm_authenticate() local
63 /* Get the service and user */ in pam_sm_authenticate()
66 (err = pam_get_item(pamh, PAM_USER, (void **)&user)) != PAM_SUCCESS) in pam_sm_authenticate()
89 service, (user && *user != '\0')?user:"no-user", flags, in pam_sm_authenticate()
92 if (!user || *user in pam_sm_authenticate()
[all...]
/titanic_51/usr/src/lib/pam_modules/tsol_acct/
H A Dtsol_acct.c42 * Validates that the user's label range contains
62 char *user; in pam_sm_acct_mgmt() local
83 (void) pam_get_item(pamh, PAM_USER, (void **)&user); in pam_sm_acct_mgmt()
89 "pam_tsol_account: allowed_unlabeled = %d, user %s, " in pam_sm_acct_mgmt()
92 (user == NULL) ? "NULL" : (user == '\0') ? "ZERO" : in pam_sm_acct_mgmt()
93 user, in pam_sm_acct_mgmt()
97 if (user == NULL || *user == '\0') { in pam_sm_acct_mgmt()
99 "pam_tsol_account: no user"); in pam_sm_acct_mgmt()
[all...]
/titanic_51/usr/src/lib/libc/port/gen/
H A Devent_port.c59 port_associate(int port, int source, uintptr_t object, int events, void *user) in port_associate() argument
63 (uintptr_t)user); in port_associate()
112 port_send(int port, int events, void *user) in port_send() argument
115 r.r_vals = _portfs(PORT_SEND, port, events, (uintptr_t)user, NULL, in port_send()
127 void *user) in _port_dispatch() argument
132 (uintptr_t)user); in _port_dispatch()
135 source, events, object, (uintptr_t)user); in _port_dispatch()
140 port_sendn(int ports[], int errors[], uint_t nent, int events, void *user) in port_sendn() argument
149 (uintptr_t)user); in port_sendn()
163 lnent, events, (uintptr_t)user); in port_sendn()
178 port_alert(int port,int flags,int events,void * user) port_alert() argument
[all...]
/titanic_51/usr/src/cmd/userattr/
H A Duserattr.c45 * userattr [-v] attr_name [user]
75 char *user = NULL; in main() local
91 user = argv[opt++]; in main()
96 gettext("Usage: %s [-v] attribute_name [user]\n"), argv[0]); in main()
100 if (user == NULL) { in main()
105 gettext("Cannot find user for uid %d\n"), uid); in main()
108 user = pwd->pw_name; in main()
110 if ((pwd = getpwnam(user)) == NULL) { in main()
112 gettext("No such user %s\n"), user); in main()
[all...]
/titanic_51/usr/src/cmd/lp/lib/users/
H A Dloadpri.c42 Input: Path name of the user priority file. It has the following
53 list of user names. No white space is allowed
69 Effect: The user priority file is read and parsed. Storage for
78 *user, in ld_priority_file() local
132 if (!(user = next_user(fd, line, &p))) in ld_priority_file()
138 if (!(user = next_user(fd, line, &p))) goto Error; in ld_priority_file()
151 add_user (&pri_tbl, user, pri); in ld_priority_file()
153 while ((user = next_user(fd, line, &p))); in ld_priority_file()
168 Inputs: A pointer to a limit structure, and a user.
170 Effects: Adds <user> t
174 add_user(struct user_priority * ppri_tbl,char * user,int limit) add_user() argument
243 del_user(struct user_priority * ppri_tbl,char * user) del_user() argument
[all...]
H A Dusermgmt.c44 int putuser ( char * user, USER * pri_s ) in putuser() argument
55 if (!add_user(ppri_tbl, user, pri_s->priority_limit)) in putuser()
67 USER * getuser ( char * user ) in getuser() argument
72 if (STREQU(user, "root") || STREQU(user, LPUSER)) in getuser()
87 if (bang_searchlist(user, ppri_tbl->users[limit - PRI_MIN])) in getuser()
97 int deluser ( char * user ) in deluser() argument
109 del_user(ppri_tbl, user); in deluser()
/titanic_51/usr/src/lib/libproject/common/
H A Dgetprojent.c129 * The following routine checks if user specified by the second argument
131 * argument. Information about user's default group and whether or not
132 * the project specified in the first argument is user's default project
133 * (i.e., user_attr, "default", "user.username", or "group.groupname"
135 * then this function returns 1 (true), unless specified user explicitly
136 * excluded with "!user", or "!group" wildcards.
139 ismember(struct project *proj, const char *user, gid_t gid, int is_default) in ismember() argument
155 * Scan project's user list. in ismember()
160 (strcmp(member + 1, user) == 0 || in ismember()
163 if (strcmp(member, "*") == 0 || strcmp(member, user) in ismember()
197 _getdefaultproj(const char * user,struct project * result,void * buffer,size_t buflen) _getdefaultproj() argument
260 _inproj(const char * user,const char * name,void * buffer,size_t buflen) _inproj() argument
[all...]

12345678910>>...31