/illumos-gate/usr/src/lib/passwdutil/ |
H A D | README.SunOS-aging | 37 user to change passwords after a system administrator-specified period 38 of time. Password aging can also force a user to keep a password for 67 If the first and second characters are set to '..' the user will be 70 user will not be subjected to password aging requirements again. 72 If the third and fourth characters are set to '..' the user will be 77 the user is not allowed to change his/her password. Only root can
|
H A D | files_attr.c | 332 files_user_to_authenticate(char *user, pwu_repository_t *rep, in files_user_to_authenticate() argument 351 if ((*auth_user = strdup(user)) == NULL) { in files_user_to_authenticate() 415 debug("files_checkhistory(user=%s)", user); in files_checkhistory() 425 if ((res = files_getattr(user, &attr, rep)) == PWU_SUCCESS) { in files_checkhistory() 457 debug("files_checkhistory(%s, %s) = %d", user, crypt_passwd, in files_checkhistory() 1185 char *user; in files_update_history() local 1189 user = strtok_r(buf, ":", &last); in files_update_history() 1192 debug("files_update_history: read=\"%s\"", user); in files_update_history() 1195 if (strcmp(user, name) == 0) { in files_update_history() 1219 (void) fprintf(dst, "%s:%s", user, last); in files_update_history() [all …]
|
H A D | __check_history.c | 49 __check_history(char *user, char *passwd, pwu_repository_t *rep) in __check_history() argument 70 res = rops[i]->checkhistory(user, passwd, rep); in __check_history()
|
/illumos-gate/usr/src/lib/pam_modules/timestamp/ |
H A D | pam_timestamp.c | 53 char *user; in validate_basic() local 58 (void) pam_get_item(pamh, PAM_USER, (void **)&user); in validate_basic() 62 if (user == NULL || *user == '\0') { in validate_basic() 82 "user = %s, auser = %s, tty = %s", user, auser, ttyn); in validate_basic() 96 auser, ttyn, user); in validate_basic()
|
/illumos-gate/usr/src/test/zfs-tests/tests/functional/acl/nontrivial/ |
H A D | zfs_acl_chmod_rwx_003_pos.ksh | 66 typeset user=$3 70 [[ $user == root && -d $node ]] || \ 71 [[ $user == root && $acl_spec != *"execute"* ]]
|
H A D | zfs_acl_cp_002_pos.ksh | 74 for user in root $ZFS_ACL_STAFF1; do 76 log_must set_cur_usr $user 88 A0+user:$ZFS_ACL_OTHER1:read_acl:deny $obj
|
H A D | zfs_acl_cpio_002_pos.ksh | 87 typeset user 88 for user in root $ZFS_ACL_STAFF1; do 90 log_must set_cur_usr $user
|
/illumos-gate/usr/src/tools/codesign/ |
H A D | codesign_server.pl | 66 my $user = `/usr/ucb/whoami`; 67 chomp($user); 69 audit("START User=$user Client=$client");
|
/illumos-gate/usr/src/cmd/tsol/demo/ |
H A D | runinzone.ksh | 33 user=$2 40 zlogin ${zonename} /usr/demo/tsol/waitforzone.ksh ${user} ${program} ${DISPLAY}
|
/illumos-gate/usr/src/cmd/who/ |
H A D | who.c | 144 static char user[sizeof (utmpp->ut_user) + 1]; /* holds user name */ variable 497 (void) strcpy(user, " ."); in dump() 499 (void) strncpy(user, utmpp->ut_user, sizeof (user)); in dump() 500 user[sizeof (user) - 1] = '\0'; in dump() 513 (void) printf("%-*.*s ", LOGIN_WIDTH, NMAX, user); in dump() 569 (void) printf("%-*.*s %c %-12s %s", LOGIN_WIDTH, NMAX, user, in dump()
|
/illumos-gate/usr/src/lib/smbsrv/libsmb/common/ |
H A D | smb_kmod.c | 331 smb_netuserinfo_t *user; in smb_kmod_enum_fini() local 347 user = &item->nsi_un.nsi_user; in smb_kmod_enum_fini() 348 free(user->ui_domain); in smb_kmod_enum_fini() 349 free(user->ui_account); in smb_kmod_enum_fini() 350 free(user->ui_workstation); in smb_kmod_enum_fini() 383 smb_netuserinfo_t *user; in smb_kmod_enum() local 412 user = &items->nsi_un.nsi_user; in smb_kmod_enum() 413 rc = smb_netuserinfo_decode(user, data, len, &nbytes); in smb_kmod_enum()
|
/illumos-gate/usr/src/cmd/syseventd/etc/ |
H A D | README | 48 <class> <subclass> <vendor> <publisher> <user> <reserved1> 54 <user> may be "-" for commands to be invoked as root, or a 55 valid user name. 60 to the event, and must be executable by <user>.
|
/illumos-gate/usr/src/cmd/tcpd/ |
H A D | inetcf.c | 64 char *user; local 113 if ((user = strtok((char *) 0, whitespace)) == 0) 115 if (user[0] == '/') { /* user */ 116 path = user;
|
H A D | tcpdmatch.c | 65 char *user; local 127 user = argv[optind + 1]; 130 user = unknown; 163 request_init(&request, RQ_DAEMON, daemon, RQ_USER, user, RQ_FILE, 1, 0);
|
/illumos-gate/usr/src/cmd/bnu/ |
H A D | uupick | 74 user=`id | sed -n "/^uid=[0-9]*(\([^)]*\)).*/s//\1/p"` 76 if test -z "$user" 80 pu=/var/spool/uucppublic/receive/$user
|
/illumos-gate/usr/src/cmd/passmgmt/ |
H A D | passmgmt.c | 173 putuserattrent(userattr_t *user, FILE *f) in putuserattrent() argument 184 if (user->attr == NULL) in putuserattrent() 187 kv_pair = user->attr->data; in putuserattrent() 189 for (i = j = 0; i < user->attr->length; i++) { in putuserattrent() 203 (void) fprintf(f, "%s:%s:%s:%s:", user->name, user->qualifier, in putuserattrent() 204 user->res1, user->res2); in putuserattrent() 206 for (i = j = 0; i < user->attr->length; i++) { in putuserattrent() 230 if (user->attr != NULL) { in assign_attr() 231 kv_pair = user->attr->data; in assign_attr() 232 for (i = 0; i < user->attr->length; i++) { in assign_attr() [all …]
|
/illumos-gate/usr/src/lib/rpcsec_gss/ |
H A D | rpcsec_gss_utils.c | 143 char *user, char *node, char *secdomain) in __rpc_gss_get_principal_name() argument 153 if (user == NULL || strlen(user) == 0) in __rpc_gss_get_principal_name() 168 strcpy(user_name, user); in __rpc_gss_get_principal_name()
|
/illumos-gate/usr/src/test/zfs-tests/tests/functional/xattr/ |
H A D | cleanup.ksh | 32 ZFS_USER=$(cat /tmp/zfs-xattr-test-user.txt) 33 rm /tmp/zfs-xattr-test-user.txt
|
/illumos-gate/usr/src/test/zfs-tests/tests/functional/acl/trivial/ |
H A D | zfs_acl_ls_001_pos.ksh | 50 for user in root $ZFS_ACL_STAFF1; do 51 log_must set_cur_usr $user
|
H A D | zfs_acl_ls_002_neg.ksh | 51 for user in root $ZFS_ACL_STAFF1; do 52 log_must set_cur_usr $user
|
H A D | zfs_acl_mv_001_pos.ksh | 56 for user in root $ZFS_ACL_STAFF1; do 57 log_must set_cur_usr $user
|
/illumos-gate/usr/src/lib/print/libipp-listener/common/ |
H A D | print-job.c | 92 char *user = NULL; in ipp_print_job() local 97 "requesting-user-name", &user) == PAPI_OK) { in ipp_print_job() 99 PAPI_ATTR_REPLACE, "requesting-user-name", user); in ipp_print_job()
|
/illumos-gate/usr/src/contrib/ast/src/cmd/INIT/ |
H A D | hurl.sh | 173 read -u9 user 181 authorize=$user:$password 192 …elif wget ${authorize:+--http-user="${authorize%:*}"} ${password:+--http-passwd="${password##*:}"}…
|
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/os/ |
H A D | kuserok.c | 53 #define getpwnam(user) getpwnam((char *)user) argument 375 const char *user, in krb5_gss_userok() argument 381 if (pname == NULL || user == NULL) in krb5_gss_userok() 401 if (krb5_kuserok(ctxt, (krb5_principal) pname, user)) { in krb5_gss_userok()
|
/illumos-gate/usr/src/cmd/smbsrv/smbadm/ |
H A D | smbadm.c | 1583 char *user = NULL; in smbadm_user_delete() local 1585 user = argv[optind]; in smbadm_user_delete() 1586 if (optind >= argc || user == NULL || *user == '\0') { in smbadm_user_delete() 1591 error = smb_pwd_setcntl(user, SMB_PWC_DELETE); in smbadm_user_delete() 1604 char *user = NULL; in smbadm_user_disable() local 1606 user = argv[optind]; in smbadm_user_disable() 1607 if (optind >= argc || user == NULL || *user == '\0') { in smbadm_user_disable() 1625 char *user = NULL; in smbadm_user_enable() local 1627 user = argv[optind]; in smbadm_user_enable() 1628 if (optind >= argc || user == NULL || *user == '\0') { in smbadm_user_enable() [all …]
|