/illumos-gate/usr/src/lib/passwdutil/ |
H A D | README.SunOS-aging | 37 user to change passwords after a system administrator-specified period 38 of time. Password aging can also force a user to keep a password for 67 If the first and second characters are set to '..' the user will be 70 user will not be subjected to password aging requirements again. 72 If the third and fourth characters are set to '..' the user will be 77 the user is not allowed to change his/her password. Only root can
|
H A D | files_attr.c | 332 files_user_to_authenticate(char *user, pwu_repository_t *rep, in files_user_to_authenticate() argument 351 if ((*auth_user = strdup(user)) == NULL) { in files_user_to_authenticate() 415 debug("files_checkhistory(user=%s)", user); in files_checkhistory() 425 if ((res = files_getattr(user, &attr, rep)) == PWU_SUCCESS) { in files_checkhistory() 457 debug("files_checkhistory(%s, %s) = %d", user, crypt_passwd, in files_checkhistory() 1185 char *user; in files_update_history() local 1189 user = strtok_r(buf, ":", &last); in files_update_history() 1192 debug("files_update_history: read=\"%s\"", user); in files_update_history() 1195 if (strcmp(user, name) == 0) { in files_update_history() 1219 (void) fprintf(dst, "%s:%s", user, last); in files_update_history() [all …]
|
H A D | __check_history.c | 49 __check_history(char *user, char *passwd, pwu_repository_t *rep) in __check_history() argument 70 res = rops[i]->checkhistory(user, passwd, rep); in __check_history()
|
/illumos-gate/usr/src/lib/pam_modules/timestamp/ |
H A D | pam_timestamp.c | 53 char *user; in validate_basic() local 58 (void) pam_get_item(pamh, PAM_USER, (void **)&user); in validate_basic() 62 if (user == NULL || *user == '\0') { in validate_basic() 82 "user = %s, auser = %s, tty = %s", user, auser, ttyn); in validate_basic() 96 auser, ttyn, user); in validate_basic()
|
/illumos-gate/usr/src/test/zfs-tests/tests/functional/acl/nontrivial/ |
H A D | zfs_acl_chmod_rwx_003_pos.ksh | 66 typeset user=$3 70 [[ $user == root && -d $node ]] || \ 71 [[ $user == root && $acl_spec != *"execute"* ]]
|
H A D | zfs_acl_cp_002_pos.ksh | 74 for user in root $ZFS_ACL_STAFF1; do 76 log_must set_cur_usr $user 88 A0+user:$ZFS_ACL_OTHER1:read_acl:deny $obj
|
H A D | zfs_acl_cpio_002_pos.ksh | 87 typeset user 88 for user in root $ZFS_ACL_STAFF1; do 90 log_must set_cur_usr $user
|
/illumos-gate/usr/src/tools/codesign/ |
H A D | codesign_server.pl | 66 my $user = `/usr/ucb/whoami`; 67 chomp($user); 69 audit("START User=$user Client=$client");
|
/illumos-gate/usr/src/cmd/tsol/demo/ |
H A D | runinzone.ksh | 33 user=$2 40 zlogin ${zonename} /usr/demo/tsol/waitforzone.ksh ${user} ${program} ${DISPLAY}
|
/illumos-gate/usr/src/cmd/who/ |
H A D | who.c | 144 static char user[sizeof (utmpp->ut_user) + 1]; /* holds user name */ variable 497 (void) strcpy(user, " ."); in dump() 499 (void) strncpy(user, utmpp->ut_user, sizeof (user)); in dump() 500 user[sizeof (user) - 1] = '\0'; in dump() 513 (void) printf("%-*.*s ", LOGIN_WIDTH, NMAX, user); in dump() 569 (void) printf("%-*.*s %c %-12s %s", LOGIN_WIDTH, NMAX, user, in dump()
|
/illumos-gate/usr/src/lib/smbsrv/libsmb/common/ |
H A D | smb_kmod.c | 343 smb_netuserinfo_t *user; in smb_kmod_enum_fini() local 359 user = &item->nsi_un.nsi_user; in smb_kmod_enum_fini() 360 free(user->ui_domain); in smb_kmod_enum_fini() 361 free(user->ui_account); in smb_kmod_enum_fini() 362 free(user->ui_workstation); in smb_kmod_enum_fini() 395 smb_netuserinfo_t *user; in smb_kmod_enum() local 424 user = &items->nsi_un.nsi_user; in smb_kmod_enum() 425 rc = smb_netuserinfo_decode(user, data, len, &nbytes); in smb_kmod_enum()
|
/illumos-gate/usr/src/cmd/syseventd/etc/ |
H A D | README | 48 <class> <subclass> <vendor> <publisher> <user> <reserved1> 54 <user> may be "-" for commands to be invoked as root, or a 55 valid user name. 60 to the event, and must be executable by <user>.
|
/illumos-gate/usr/src/cmd/tcpd/ |
H A D | inetcf.c | 64 char *user; local 113 if ((user = strtok((char *) 0, whitespace)) == 0) 115 if (user[0] == '/') { /* user */ 116 path = user;
|
H A D | tcpdmatch.c | 65 char *user; local 127 user = argv[optind + 1]; 130 user = unknown; 163 request_init(&request, RQ_DAEMON, daemon, RQ_USER, user, RQ_FILE, 1, 0);
|
/illumos-gate/usr/src/cmd/bnu/ |
H A D | uupick | 74 user=`id | sed -n "/^uid=[0-9]*(\([^)]*\)).*/s//\1/p"` 76 if test -z "$user" 80 pu=/var/spool/uucppublic/receive/$user
|
/illumos-gate/usr/src/cmd/passmgmt/ |
H A D | passmgmt.c | 173 putuserattrent(userattr_t *user, FILE *f) in putuserattrent() argument 184 if (user->attr == NULL) in putuserattrent() 187 kv_pair = user->attr->data; in putuserattrent() 189 for (i = j = 0; i < user->attr->length; i++) { in putuserattrent() 203 (void) fprintf(f, "%s:%s:%s:%s:", user->name, user->qualifier, in putuserattrent() 204 user->res1, user->res2); in putuserattrent() 206 for (i = j = 0; i < user->attr->length; i++) { in putuserattrent() 230 if (user->attr != NULL) { in assign_attr() 231 kv_pair = user->attr->data; in assign_attr() 232 for (i = 0; i < user->attr->length; i++) { in assign_attr() [all …]
|
/illumos-gate/usr/src/lib/rpcsec_gss/ |
H A D | rpcsec_gss_utils.c | 143 char *user, char *node, char *secdomain) in __rpc_gss_get_principal_name() argument 153 if (user == NULL || strlen(user) == 0) in __rpc_gss_get_principal_name() 168 strcpy(user_name, user); in __rpc_gss_get_principal_name()
|
/illumos-gate/usr/src/test/zfs-tests/tests/functional/xattr/ |
H A D | cleanup.ksh | 32 ZFS_USER=$(cat /tmp/zfs-xattr-test-user.txt) 33 rm /tmp/zfs-xattr-test-user.txt
|
/illumos-gate/usr/src/test/zfs-tests/tests/functional/acl/trivial/ |
H A D | zfs_acl_ls_001_pos.ksh | 50 for user in root $ZFS_ACL_STAFF1; do 51 log_must set_cur_usr $user
|
H A D | zfs_acl_ls_002_neg.ksh | 51 for user in root $ZFS_ACL_STAFF1; do 52 log_must set_cur_usr $user
|
H A D | zfs_acl_mv_001_pos.ksh | 56 for user in root $ZFS_ACL_STAFF1; do 57 log_must set_cur_usr $user
|
/illumos-gate/usr/src/lib/print/libipp-listener/common/ |
H A D | print-job.c | 92 char *user = NULL; in ipp_print_job() local 97 "requesting-user-name", &user) == PAPI_OK) { in ipp_print_job() 99 PAPI_ATTR_REPLACE, "requesting-user-name", user); in ipp_print_job()
|
/illumos-gate/usr/src/contrib/ast/src/cmd/INIT/ |
H A D | hurl.sh | 173 read -u9 user 181 authorize=$user:$password 192 …elif wget ${authorize:+--http-user="${authorize%:*}"} ${password:+--http-passwd="${password##*:}"}…
|
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/os/ |
H A D | kuserok.c | 53 #define getpwnam(user) getpwnam((char *)user) argument 375 const char *user, in krb5_gss_userok() argument 381 if (pname == NULL || user == NULL) in krb5_gss_userok() 401 if (krb5_kuserok(ctxt, (krb5_principal) pname, user)) { in krb5_gss_userok()
|
/illumos-gate/usr/src/cmd/smbsrv/smbadm/ |
H A D | smbadm.c | 1633 char *user = NULL; in smbadm_user_delete() local 1635 user = argv[optind]; in smbadm_user_delete() 1636 if (optind >= argc || user == NULL || *user == '\0') { in smbadm_user_delete() 1641 error = smb_pwd_setcntl(user, SMB_PWC_DELETE); in smbadm_user_delete() 1654 char *user = NULL; in smbadm_user_disable() local 1656 user = argv[optind]; in smbadm_user_disable() 1657 if (optind >= argc || user == NULL || *user == '\0') { in smbadm_user_disable() 1675 char *user = NULL; in smbadm_user_enable() local 1677 user = argv[optind]; in smbadm_user_enable() 1678 if (optind >= argc || user == NULL || *user == '\0') { in smbadm_user_enable() [all …]
|