Searched refs:privileged (Results 1 - 25 of 32) sorted by relevance

12

/macosx-10.10/xnu-2782.1.97/osfmk/kern/
H A Dexception.h48 boolean_t privileged; /* survives ipc_task_reset */ member in struct:exception_action
H A Dcoalition.h97 kern_return_t coalition_create_internal(coalition_t *out, boolean_t privileged);
H A Dipc_tt.c187 task->exc_actions[i].privileged =
188 parent->exc_actions[i].privileged;
399 if (!task->exc_actions[i].privileged) {
583 * (privileged ports) should survive
588 if (thread->exc_actions[i].privileged) {
1623 boolean_t privileged = current_task()->sec_token.val[0] == 0; local
1670 thread->exc_actions[i].privileged = privileged;
1697 boolean_t privileged = current_task()->sec_token.val[0] == 0; local
1742 task->exc_actions[i].privileged
1801 boolean_t privileged = current_task()->sec_token.val[0] == 0; local
1902 boolean_t privileged = current_task()->sec_token.val[0] == 0; local
[all...]
H A Dcoalition.c101 unsigned int privileged : 1; /* Members of this coalition may create and manage coalitions and may posix_spawn processes into selected coalitions */ member in struct:coalition
240 coalition_create_internal(coalition_t *out, boolean_t privileged) argument
257 new_coal->privileged = privileged ? TRUE : FALSE;
431 return coal->privileged || unrestrict_coalition_syscalls;
437 return task->coalition->privileged || unrestrict_coalition_syscalls;
/macosx-10.10/postfix-255/postfix/src/util/
H A Dvstream_popen.c116 int privileged; member in struct:VSTREAM_POPEN_ARGS
137 args->privileged = 0;
159 args->privileged = 1;
163 args->privileged = 1;
185 if (args->privileged != 0 && args->uid == 0)
186 msg_panic("%s: privileged uid", myname);
187 if (args->privileged != 0 && args->gid == 0)
188 msg_panic("%s: privileged gid", myname);
234 if (args.privileged)
/macosx-10.10/OpenSSH-189/openssh/
H A Duidswap.c49 static int privileged = 0; variable
70 privileged = 0;
76 privileged = 0;
81 privileged = 1;
125 /* Propagate the privileged gid to all of our gids. */
128 /* Propagate the privileged uid to all of our uids. */
164 * Restores to the original (privileged) uid.
169 /* it's a no-op unless privileged */
170 if (!privileged) {
179 /* Set the effective uid back to the saved privileged ui
[all...]
H A Dsshconnect.c192 * Creates a (possibly privileged) socket for use as the ssh connection.
195 ssh_create_socket(int privileged, struct addrinfo *ai) argument
201 * If we are running as root and want to connect to a privileged
202 * port, bind our own socket to a privileged port.
204 if (privileged) {
336 * a privileged port will be allocated to make the connection.
/macosx-10.10/bind9-45.101/
H A Dnamed.conf9 // This also allows non-privileged users on the local host to manage
/macosx-10.10/tcl-105/tcl_ext/tclx/tclx/tests/
H A Dnice.test88 set errList {{not owner} {permission denied} {not privileged}
/macosx-10.10/procmail-14/procmail/src/
H A Dfrom.c101 if(privs>0) /* privileged user? */
172 privs=1; /* assume they're privileged */
177 if(!strcmp(logname,*kp)) /* is it amongst the privileged? */
178 goto privileged;
181 if(!strcmp(logname,*kp)) /* is it among the privileged? */
182 goto privileged;
183 privs= -override; /* override only matters when not privileged */
185 privileged:
H A Dprocmail.h98 extern int sh,pwait,retval,retvl2,rc,privileged,ignwerr,
H A Dlocking.c102 if(!privileged) /* we already set our ids */
140 if(!privileged) /* we already set our ids */
H A Dprocmail.c59 privileged=priv_START,lexitcode=EXIT_SUCCESS,ignwerr,crestarg,savstdout, variable
420 if(privileged) /* don't need this any longer */
421 privileged=priv_DONTNEED;
439 if(privileged)
549 if(!delay_setid&&privileged&& /* if we can setid now and we haven't yet, */
550 (privileged==priv_DONTNEED||!stat(buf,&stbuf))) /* and we either don't */
557 if(!delay_setid&&privileged) /* if we're not supposed to delay */
H A Dfoldinfo.c193 if((CAN_toggle_sgid||accspooldir)&&privileged)
194 privileged=priv_DONTNEED; /* we don't need root to setgid */
H A Drobust.c30 if(!privileged&&buf&&buf2)
H A Dmisc.c95 { if(privileged)
103 privileged=0;
/macosx-10.10/ksh-23/ksh/src/cmd/ksh93/tests/
H A Doptions.sh61 if [[ ! -o privileged ]]
78 if [[ -o privileged ]]
81 err_exit 'privileged nointeractive shell reads $ENV file'
83 err_exit 'privileged -E reads $ENV file'
85 err_exit 'privileged +E reads $ENV file'
87 err_exit 'privileged --rc reads $ENV file'
89 err_exit 'privileged --norc reads $ENV file'
106 if [[ -o privileged ]]
109 err_exit 'privileged nointeractive shell reads $HOME/.kshrc file'
111 err_exit 'privileged
[all...]
/macosx-10.10/OpenSSH-189/openssh/contrib/cygwin/
H A Dssh-user-config225 --privileged )
239 echo " --privileged On Windows NT/2k/XP, assume privileged user"
H A Dssh-host-config193 csih_inform "However, this requires a non-privileged account called 'sshd'."
440 csih_inform "sshd requires. You need to have or to create a privileged"
450 csih_error_recoverable "There was a serious problem creating a privileged user."
470 # $password is empty, or $run_service_as is some privileged user and
594 --privileged )
609 echo " --user -u <account> privileged user for service."
610 echo " --pwd -w <passwd> Use \"pwd\" as password for privileged user."
611 echo " --privileged On Windows NT/2k/XP, require privileged user"
/macosx-10.10/xnu-2782.1.97/bsd/kern/
H A Dsys_coalition.c38 boolean_t privileged = flags & COALITION_CREATE_FLAG_PRIVILEGED; local
40 kr = coalition_create_internal(&coal, privileged);
179 * Returns EPERM if the calling process is not privileged to make this call.
/macosx-10.10/xnu-2782.1.97/bsd/netinet6/
H A Din6.c1096 boolean_t privileged = (proc_suser(p) == 0); local
1110 if (!privileged)
1119 if (!privileged)
1152 if (!privileged)
1158 if (!privileged)
1165 if (!privileged)
1171 if (!privileged)
1177 if (!privileged)
1188 if (!privileged)
1194 if (!privileged)
[all...]
/macosx-10.10/xnu-2782.1.97/bsd/netinet/
H A Din.c1113 boolean_t privileged = (proc_suser(p) == 0); local
1154 if (!privileged)
1160 if (!privileged)
1166 if (!privileged)
1172 if (!privileged)
1178 if (!privileged)
1203 if (!privileged)
1215 if (!privileged)
/macosx-10.10/ppp-786.1.1/Helpers/pppd/
H A Dpppd.h168 #define OPT_PRIV 0x1000 /* privileged option */
278 extern int privileged; /* We were run by real-uid root */
996 int privileged));
1000 int options_from_list __P((struct wordlist *, int privileged));
H A Dmain.c149 int privileged; /* we're running as real uid root */ variable
381 privileged = uid == 0;
383 if (!privileged)
384 privileged = sys_check_controller();
418 if (!options_from_file(_PATH_SYSOPTIONS, !privileged, 0, 1)
H A Dauth.c506 "Allow group members to use privileged options", OPT_PRIV | OPT_A2LIST },
578 * privgroup - allow members of the group to have privileged access.
594 privileged = 1;
1400 if (!auth_required && !allow_any_ip && have_route_to(0) && !privileged) {
2444 return allow_any_ip || privileged || !have_route_to(addr);

Completed in 232 milliseconds

12