/illumos-gate/usr/src/lib/pam_modules/krb5/ |
H A D | krb5_acct_mgmt.c | 167 char *user, in exp_warn() argument 181 user ? user : "<null>"); in exp_warn() 185 if (!pamh || !user || !password) { in exp_warn() 217 if ((err = fetch_princ_entry(kmd, user, &prent, debug)) in exp_warn() 309 char *user = NULL; in pam_sm_acct_mgmt() local 356 (void) pam_get_item(pamh, PAM_USER, (void **) &user); in pam_sm_acct_mgmt() 358 if (user == NULL || *user == '\0') { in pam_sm_acct_mgmt() 377 if (strcmp(user, userdata) == 0) in pam_sm_acct_mgmt() 385 user, (char *)userdata); in pam_sm_acct_mgmt() 461 (void) exp_warn(pamh, user, kmd, debug); in pam_sm_acct_mgmt()
|
H A D | krb5_setcred.c | 75 char *user = NULL; in pam_sm_setcred() local 104 (void) pam_get_item(pamh, PAM_USER, (void**) &user); in pam_sm_setcred() 106 if (user == NULL || *user == '\0') in pam_sm_setcred() 158 " gotten but is NULL for user %s", user); in pam_sm_setcred() 208 if (kmd->user != NULL) in pam_sm_setcred() 209 user = kmd->user; in pam_sm_setcred() 246 err = attempt_refresh_cred(kmd, user, PAM_REINITIALIZE_CRED); in pam_sm_setcred() 248 err = attempt_refresh_cred(kmd, user, PAM_REFRESH_CRED); in pam_sm_setcred() 255 err = attempt_refresh_cred(kmd, user, PAM_ESTABLISH_CRED); in pam_sm_setcred() 261 "for %s (%s).", user, pam_strerror(pamh, err)); in pam_sm_setcred() [all …]
|
/illumos-gate/usr/src/test/os-tests/runfiles/ |
H A D | default.run | 30 user = root 48 user = root 69 user = root 73 user = root 77 user = root 84 user = root 92 user = root 97 user = root 106 user = root 126 user = root [all …]
|
/illumos-gate/usr/src/lib/smbsrv/libmlsvc/common/ |
H A D | smbrdr_glue.c | 82 smbrdr_logon(char *srv, char *dom, char *user) in smbrdr_logon() argument 87 err = smbrdr_ctx_new(&ctx, srv, dom, user); in smbrdr_logon() 107 char *domain, char *user) in smbrdr_ctx_new() argument 116 assert(user != NULL); in smbrdr_ctx_new() 131 (void) smb_ctx_setuser(ctx, user, B_TRUE); in smbrdr_ctx_new() 136 if (user[0] == '\0') { in smbrdr_ctx_new()
|
/illumos-gate/usr/src/lib/print/libpapi-ipp/common/ |
H A D | ipp-support.c | 172 char *user = "nobody"; in ipp_initialize_operational_attributes() local 196 user = pw->pw_name; in ipp_initialize_operational_attributes() 202 if (svc->user != NULL) in ipp_initialize_operational_attributes() 203 user = svc->user; in ipp_initialize_operational_attributes() 422 char *user, *passphrase; in setAuthString() local 430 if (svc->user == NULL) { in setAuthString() 434 user = p->pw_name; in setAuthString() 436 user = getenv("USER"); in setAuthString() 437 if (user == NULL) in setAuthString() 438 user = "nobody"; in setAuthString() [all …]
|
/illumos-gate/usr/src/cmd/tip/ |
H A D | log.c | 22 char *user, *timestamp; in logent() local 34 if ((user = getlogin()) == NOSTR) in logent() 36 user = "???"; in logent() 38 user = pwd->pw_name; in logent() 43 user, timestamp, group, in logent()
|
/illumos-gate/usr/src/test/zfs-tests/tests/functional/delegate/ |
H A D | zfs_allow_005_pos.ksh | 71 for user in $EVERYONE; do 72 childfs=$ROOT_TESTFS/$user 74 user_run $user zfs create $childfs 80 if [[ $other == $user ]]; then 81 log_must verify_perm $childfs $perms $user
|
/illumos-gate/usr/src/cmd/power/ |
H A D | power.dfl | 34 # all any user can change the configuration. 36 # - nobody except super-user can change 39 # <user1, user2, . . .> a user in this user list or super-user 41 # user is a space and/or comma (,) seperated 45 # console-owner a user who owns the system console device 46 # node or super-user can change the configuration.
|
/illumos-gate/usr/src/cmd/ypcmd/ |
H A D | mkalias.c | 158 char user[PBLKSIZ]; /* unqualified version */ in ProcessMap() local 166 CopyName(user, key.dptr, key.dsize); in ProcessMap() 170 if (IsMaint(user)) continue; in ProcessMap() 173 hostpart, user, address); in ProcessMap() 185 Compare(partvalue.dptr, user) == 0) { in ProcessMap() 192 userpart, user, address); in ProcessMap() 195 DoName(user); in ProcessMap() 196 key.dptr = user; in ProcessMap() 197 key.dsize = strlen(user) + 1; in ProcessMap() 201 printf("%s --> %s\n", user, address); in ProcessMap()
|
/illumos-gate/usr/src/test/zfs-tests/tests/functional/acl/nontrivial/ |
H A D | zfs_acl_chmod_rwacl_001_pos.ksh | 62 typeset user 66 for user in $@; do 67 chgusr_exec $user ls -vd $node > /dev/null 2>&1 80 typeset user 84 for user in "$@"; do 89 chgusr_exec $user chmod A0+owner@:read_data:allow $node 97 chgusr_exec $user chmod A0- $node 186 chmod A0+user:$ZFS_ACL_OTHER1:read_acl/write_acl:allow $node 231 A0+user:$ZFS_ACL_OTHER1:read_acl/write_acl:allow $node 262 for user in root $ZFS_ACL_STAFF1; do [all …]
|
/illumos-gate/usr/src/lib/libwrap/ |
H A D | eval.c | 53 if (request->user[0] == 0) { 54 strcpy(request->user, unknown); 56 rfc931(request->client->sin, request->server->sin, request->user); 58 return (request->user); 115 if (request->user[0] == 0) 119 sprintf(both, "%s@%s", request->user, hostinfo);
|
/illumos-gate/usr/src/lib/libgss/ |
H A D | g_userok.c | 40 const char *user, in compare_names() argument 52 gss_user.value = (void *)user; in compare_names() 93 const char *user, in __gss_userok() argument 105 if (name == NULL || user == NULL) in __gss_userok() 125 user, user_ok); in __gss_userok() 128 name, user, user_ok); in __gss_userok()
|
/illumos-gate/usr/src/cmd/sendmail/src/ |
H A D | recipient.c | 972 SM_MBDB_T user; local 1030 if (!usershellok(user.mbdb_name, user.mbdb_shell)) 1163 SM_MBDB_T *user; 1318 user = NULL; 1337 user = DefUser; 1342 user = NULL; 1352 user = NULL; 1359 user = DefUser; 1497 user = DefUser; 1516 user, gid); [all …]
|
/illumos-gate/usr/src/uts/common/fs/smbsrv/ |
H A D | smb_tree.c | 532 smb_user_t *user; in smb_tree_acl_access() local 543 user = sr->uid_user; in smb_tree_acl_access() 544 cred = user->u_cred; in smb_tree_acl_access() 680 ASSERT(user); in smb_tree_connect_disk() 681 ASSERT(user->u_cred); in smb_tree_connect_disk() 807 ASSERT(user); in smb_tree_connect_printq() 876 ASSERT(user); in smb_tree_connect_ipc() 1313 ASSERT(user); in smb_tree_log() 1335 user->u_domain, user->u_name, sharename, buf); in smb_tree_log() 1509 *namelen = user->u_domain_len + user->u_name_len; in smb_tree_netinfo_username() [all …]
|
H A D | smb_session.c | 951 smb_user_t *user; in smb_session_lookup_uid_st() local 960 user != NULL; in smb_session_lookup_uid_st() 961 user = smb_llist_next(user_list, user)) { in smb_session_lookup_uid_st() 963 SMB_USER_VALID(user); in smb_session_lookup_uid_st() 966 if (user->u_ssnid != ssnid && user->u_uid != uid) in smb_session_lookup_uid_st() 972 user->u_refcnt++; in smb_session_lookup_uid_st() 980 return (user); in smb_session_lookup_uid_st() 1186 smb_user_t *user; in smb_session_logoff() local 1197 while (user) { in smb_session_logoff() 1206 user->u_refcnt++; in smb_session_logoff() [all …]
|
/illumos-gate/usr/src/lib/nsswitch/compat/common/ |
H A D | getuserattr.c | 45 userstr_t *user = (userstr_t *)argp->returnval; in get_username() local 47 return (user->name); in get_username() 53 userstr_t *user = (userstr_t *)argp->returnval; in check_name() local 58 "\n[getuserattr.c: check_name %s with %s]\n", user->name, name); in check_name() 61 if (strcmp(user->name, name) == 0) { in check_name()
|
/illumos-gate/usr/src/cmd/lp/lib/secure/ |
H A D | secure.c | 72 secp->user = 0; in getsecure() 91 secp->user = Strdup(buf); in getsecure() 127 || !secp->user in getsecure() 168 !secbufp->user in putsecure() 185 (void)fdprintf(fd, "%s\n", secbufp->user); in putsecure() 262 if (secbufp->user) in freesecure() 263 Free (secbufp->user); in freesecure()
|
/illumos-gate/usr/src/test/zfs-tests/tests/functional/history/ |
H A D | history_common.kshlib | 36 typeset user pool 43 user=$OPTARG 50 user=${user:-"root"} 68 if [[ $user == "root" ]]; then 71 log_must su $user -c "eval $fullcmd" 89 [[ $flags =~ "l" ]] && log_must verify_long "$histcmd" "$user" "$flags" 95 typeset user=$2 100 typeset uid=$(id -u $user) 106 grep "$cmd \[user $uid ($user) on $hname\]" $NEW_HISTORY >/dev/null \
|
/illumos-gate/usr/src/cmd/policykit/ |
H A D | polkit-is-privileged.c | 68 char *user = NULL; in main() local 106 user = g_strdup (optarg); in main() 137 if (user == NULL || privilege == NULL) { in main() 143 printf ("user = '%s'\n", user); in main() 166 user, in main() 194 g_print ("No such user '%s'.\n", user); in main()
|
/illumos-gate/usr/src/cmd/print/bsd-sysv-commands/ |
H A D | common.c | 63 match_job(int id, char *user, int ac, char *av[]) in match_job() argument 72 else if (strcmp(user, av[i]) == 0) in match_job() 211 char *user = "nobody"; in print_job_line() local 220 "job-originating-user-name", &user); in print_job_line() 225 if ((ac > 0) && (match_job(id, user, ac, av) < 0)) in print_job_line() 265 char *user = ""; in cancel_job() local 274 "job-originating-user-name", &user); in cancel_job() 278 (match_job(rid, user, ac, av) < 0)) in cancel_job() 591 char *user, *svc_name, *passphrase; in cli_auth_callback() local 602 user = pw->pw_name; in cli_auth_callback() [all …]
|
/illumos-gate/usr/src/test/zfs-tests/tests/functional/acl/trivial/ |
H A D | zfs_acl_chmod_001_pos.ksh | 115 for user in root $ZFS_ACL_STAFF1; do 116 log_must set_cur_usr $user 121 log_must usr_exec chmod A+user:$ZFS_ACL_STAFF2:write_acl:allow $testfile 126 log_must usr_exec chmod A+user:$ZFS_ACL_STAFF2:write_acl:allow $testdir 134 log_must set_cur_usr $user
|
/illumos-gate/usr/src/lib/smbsrv/libfksmbsrv/common/ |
H A D | fksmb_cred.c | 65 smb_user_setcred(smb_user_t *user, cred_t *cr, uint32_t privileges) in smb_user_setcred() argument 67 user->u_cred = cr; in smb_user_setcred() 68 user->u_privcred = NULL; in smb_user_setcred() 69 user->u_privileges = privileges; in smb_user_setcred()
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.sbin/ |
H A D | in.rexecd.c | 165 char user[16]; in doit() local 269 getstr(user, sizeof (user), "username"); in doit() 273 pwd = getpwnam_r(user, &pw_data, pwdbuf, sizeof (pwdbuf)); in doit() 275 (void) audit_rexecd_fail("Login incorrect", hostname, user, in doit() 294 if (pam_start("rexec", user, &conv, &pamh) != PAM_SUCCESS) { in doit() 305 user, cmdbuf); /* BSM */ in doit() 310 user, cmdbuf); /* BSM */ in doit() 318 hostname, user, cmdbuf); in doit() 341 user, cmdbuf); /* BSM */ in doit() 350 hostname, user, cmdbuf); /* BSM */ in doit() [all …]
|
/illumos-gate/usr/src/lib/libsmbfs/netsmb/ |
H A D | smb_keychain.h | 50 int smbfs_keychain_add(uid_t uid, const char *domain, const char *user, 54 int smbfs_keychain_addhash(uid_t uid, const char *domain, const char *user, 58 int smbfs_keychain_del(uid_t uid, const char *domain, const char *user); 64 int smbfs_keychain_chk(const char *domain, const char *user);
|
/illumos-gate/usr/src/cmd/make/lib/vroot/ |
H A D | chown.cc | 37 vroot_result= chown(path, vroot_args.chown.user, vroot_args.chown.group); in chown_thunk() 41 int chown_vroot(char *path, int user, int group, pathpt vroot_path, pathpt vroot_vroot) in chown_vroot() argument 43 vroot_args.chown.user= user; in chown_vroot()
|