/macosx-10.10/xnu-2782.1.97/osfmk/kern/ |
H A D | exception.h | 48 boolean_t privileged; /* survives ipc_task_reset */ member in struct:exception_action
|
H A D | coalition.h | 97 kern_return_t coalition_create_internal(coalition_t *out, boolean_t privileged);
|
H A D | ipc_tt.c | 187 task->exc_actions[i].privileged = 188 parent->exc_actions[i].privileged; 399 if (!task->exc_actions[i].privileged) { 583 * (privileged ports) should survive 588 if (thread->exc_actions[i].privileged) { 1623 boolean_t privileged = current_task()->sec_token.val[0] == 0; local 1670 thread->exc_actions[i].privileged = privileged; 1697 boolean_t privileged = current_task()->sec_token.val[0] == 0; local 1742 task->exc_actions[i].privileged 1801 boolean_t privileged = current_task()->sec_token.val[0] == 0; local 1902 boolean_t privileged = current_task()->sec_token.val[0] == 0; local [all...] |
H A D | coalition.c | 101 unsigned int privileged : 1; /* Members of this coalition may create and manage coalitions and may posix_spawn processes into selected coalitions */ member in struct:coalition 240 coalition_create_internal(coalition_t *out, boolean_t privileged) argument 257 new_coal->privileged = privileged ? TRUE : FALSE; 431 return coal->privileged || unrestrict_coalition_syscalls; 437 return task->coalition->privileged || unrestrict_coalition_syscalls;
|
/macosx-10.10/postfix-255/postfix/src/util/ |
H A D | vstream_popen.c | 116 int privileged; member in struct:VSTREAM_POPEN_ARGS 137 args->privileged = 0; 159 args->privileged = 1; 163 args->privileged = 1; 185 if (args->privileged != 0 && args->uid == 0) 186 msg_panic("%s: privileged uid", myname); 187 if (args->privileged != 0 && args->gid == 0) 188 msg_panic("%s: privileged gid", myname); 234 if (args.privileged)
|
/macosx-10.10/OpenSSH-189/openssh/ |
H A D | uidswap.c | 49 static int privileged = 0; variable 70 privileged = 0; 76 privileged = 0; 81 privileged = 1; 125 /* Propagate the privileged gid to all of our gids. */ 128 /* Propagate the privileged uid to all of our uids. */ 164 * Restores to the original (privileged) uid. 169 /* it's a no-op unless privileged */ 170 if (!privileged) { 179 /* Set the effective uid back to the saved privileged ui [all...] |
H A D | sshconnect.c | 192 * Creates a (possibly privileged) socket for use as the ssh connection. 195 ssh_create_socket(int privileged, struct addrinfo *ai) argument 201 * If we are running as root and want to connect to a privileged 202 * port, bind our own socket to a privileged port. 204 if (privileged) { 336 * a privileged port will be allocated to make the connection.
|
/macosx-10.10/bind9-45.101/ |
H A D | named.conf | 9 // This also allows non-privileged users on the local host to manage
|
/macosx-10.10/tcl-105/tcl_ext/tclx/tclx/tests/ |
H A D | nice.test | 88 set errList {{not owner} {permission denied} {not privileged}
|
/macosx-10.10/procmail-14/procmail/src/ |
H A D | from.c | 101 if(privs>0) /* privileged user? */ 172 privs=1; /* assume they're privileged */ 177 if(!strcmp(logname,*kp)) /* is it amongst the privileged? */ 178 goto privileged; 181 if(!strcmp(logname,*kp)) /* is it among the privileged? */ 182 goto privileged; 183 privs= -override; /* override only matters when not privileged */ 185 privileged:
|
H A D | procmail.h | 98 extern int sh,pwait,retval,retvl2,rc,privileged,ignwerr,
|
H A D | locking.c | 102 if(!privileged) /* we already set our ids */ 140 if(!privileged) /* we already set our ids */
|
H A D | procmail.c | 59 privileged=priv_START,lexitcode=EXIT_SUCCESS,ignwerr,crestarg,savstdout, variable 420 if(privileged) /* don't need this any longer */ 421 privileged=priv_DONTNEED; 439 if(privileged) 549 if(!delay_setid&&privileged&& /* if we can setid now and we haven't yet, */ 550 (privileged==priv_DONTNEED||!stat(buf,&stbuf))) /* and we either don't */ 557 if(!delay_setid&&privileged) /* if we're not supposed to delay */
|
H A D | foldinfo.c | 193 if((CAN_toggle_sgid||accspooldir)&&privileged) 194 privileged=priv_DONTNEED; /* we don't need root to setgid */
|
H A D | robust.c | 30 if(!privileged&&buf&&buf2)
|
H A D | misc.c | 95 { if(privileged) 103 privileged=0;
|
/macosx-10.10/ksh-23/ksh/src/cmd/ksh93/tests/ |
H A D | options.sh | 61 if [[ ! -o privileged ]] 78 if [[ -o privileged ]] 81 err_exit 'privileged nointeractive shell reads $ENV file' 83 err_exit 'privileged -E reads $ENV file' 85 err_exit 'privileged +E reads $ENV file' 87 err_exit 'privileged --rc reads $ENV file' 89 err_exit 'privileged --norc reads $ENV file' 106 if [[ -o privileged ]] 109 err_exit 'privileged nointeractive shell reads $HOME/.kshrc file' 111 err_exit 'privileged [all...] |
/macosx-10.10/OpenSSH-189/openssh/contrib/cygwin/ |
H A D | ssh-user-config | 225 --privileged ) 239 echo " --privileged On Windows NT/2k/XP, assume privileged user"
|
H A D | ssh-host-config | 193 csih_inform "However, this requires a non-privileged account called 'sshd'." 440 csih_inform "sshd requires. You need to have or to create a privileged" 450 csih_error_recoverable "There was a serious problem creating a privileged user." 470 # $password is empty, or $run_service_as is some privileged user and 594 --privileged ) 609 echo " --user -u <account> privileged user for service." 610 echo " --pwd -w <passwd> Use \"pwd\" as password for privileged user." 611 echo " --privileged On Windows NT/2k/XP, require privileged user"
|
/macosx-10.10/xnu-2782.1.97/bsd/kern/ |
H A D | sys_coalition.c | 38 boolean_t privileged = flags & COALITION_CREATE_FLAG_PRIVILEGED; local 40 kr = coalition_create_internal(&coal, privileged); 179 * Returns EPERM if the calling process is not privileged to make this call.
|
/macosx-10.10/xnu-2782.1.97/bsd/netinet6/ |
H A D | in6.c | 1096 boolean_t privileged = (proc_suser(p) == 0); local 1110 if (!privileged) 1119 if (!privileged) 1152 if (!privileged) 1158 if (!privileged) 1165 if (!privileged) 1171 if (!privileged) 1177 if (!privileged) 1188 if (!privileged) 1194 if (!privileged) [all...] |
/macosx-10.10/xnu-2782.1.97/bsd/netinet/ |
H A D | in.c | 1113 boolean_t privileged = (proc_suser(p) == 0); local 1154 if (!privileged) 1160 if (!privileged) 1166 if (!privileged) 1172 if (!privileged) 1178 if (!privileged) 1203 if (!privileged) 1215 if (!privileged)
|
/macosx-10.10/ppp-786.1.1/Helpers/pppd/ |
H A D | pppd.h | 168 #define OPT_PRIV 0x1000 /* privileged option */ 278 extern int privileged; /* We were run by real-uid root */ 996 int privileged)); 1000 int options_from_list __P((struct wordlist *, int privileged));
|
H A D | main.c | 149 int privileged; /* we're running as real uid root */ variable 381 privileged = uid == 0; 383 if (!privileged) 384 privileged = sys_check_controller(); 418 if (!options_from_file(_PATH_SYSOPTIONS, !privileged, 0, 1)
|
H A D | auth.c | 506 "Allow group members to use privileged options", OPT_PRIV | OPT_A2LIST }, 578 * privgroup - allow members of the group to have privileged access. 594 privileged = 1; 1400 if (!auth_required && !allow_any_ip && have_route_to(0) && !privileged) { 2444 return allow_any_ip || privileged || !have_route_to(addr);
|