/macosx-10.9.5/xnu-2422.115.4/osfmk/kern/ |
H A D | exception.h | 48 boolean_t privileged; /* survives ipc_task_reset */ member in struct:exception_action
|
H A D | ipc_tt.c | 194 task->exc_actions[i].privileged = 195 parent->exc_actions[i].privileged; 403 if (!task->exc_actions[i].privileged) { 582 * (privileged ports) should survive 587 if (thread->exc_actions[i].privileged) { 1620 boolean_t privileged = current_task()->sec_token.val[0] == 0; local 1667 thread->exc_actions[i].privileged = privileged; 1694 boolean_t privileged = current_task()->sec_token.val[0] == 0; local 1731 task->exc_actions[i].privileged 1790 boolean_t privileged = current_task()->sec_token.val[0] == 0; local 1888 boolean_t privileged = current_task()->sec_token.val[0] == 0; local [all...] |
/macosx-10.9.5/postfix-252/postfix/src/util/ |
H A D | vstream_popen.c | 116 int privileged; member in struct:VSTREAM_POPEN_ARGS 137 args->privileged = 0; 159 args->privileged = 1; 163 args->privileged = 1; 185 if (args->privileged != 0 && args->uid == 0) 186 msg_panic("%s: privileged uid", myname); 187 if (args->privileged != 0 && args->gid == 0) 188 msg_panic("%s: privileged gid", myname); 234 if (args.privileged)
|
/macosx-10.9.5/OpenSSH-186/openssh/ |
H A D | uidswap.c | 49 static int privileged = 0; variable 70 privileged = 0; 76 privileged = 0; 81 privileged = 1; 125 /* Propagate the privileged gid to all of our gids. */ 128 /* Propagate the privileged uid to all of our uids. */ 164 * Restores to the original (privileged) uid. 169 /* it's a no-op unless privileged */ 170 if (!privileged) { 179 /* Set the effective uid back to the saved privileged ui [all...] |
H A D | sshconnect.c | 192 * Creates a (possibly privileged) socket for use as the ssh connection. 195 ssh_create_socket(int privileged, struct addrinfo *ai) argument 201 * If we are running as root and want to connect to a privileged 202 * port, bind our own socket to a privileged port. 204 if (privileged) { 336 * a privileged port will be allocated to make the connection.
|
/macosx-10.9.5/bind9-45.100/ |
H A D | named.conf | 9 // This also allows non-privileged users on the local host to manage
|
/macosx-10.9.5/tcl-102/tcl_ext/tclx/tclx/tests/ |
H A D | nice.test | 88 set errList {{not owner} {permission denied} {not privileged}
|
/macosx-10.9.5/procmail-14/procmail/src/ |
H A D | from.c | 101 if(privs>0) /* privileged user? */ 172 privs=1; /* assume they're privileged */ 177 if(!strcmp(logname,*kp)) /* is it amongst the privileged? */ 178 goto privileged; 181 if(!strcmp(logname,*kp)) /* is it among the privileged? */ 182 goto privileged; 183 privs= -override; /* override only matters when not privileged */ 185 privileged:
|
H A D | procmail.h | 98 extern int sh,pwait,retval,retvl2,rc,privileged,ignwerr,
|
H A D | locking.c | 102 if(!privileged) /* we already set our ids */ 140 if(!privileged) /* we already set our ids */
|
H A D | procmail.c | 59 privileged=priv_START,lexitcode=EXIT_SUCCESS,ignwerr,crestarg,savstdout, variable 420 if(privileged) /* don't need this any longer */ 421 privileged=priv_DONTNEED; 439 if(privileged) 549 if(!delay_setid&&privileged&& /* if we can setid now and we haven't yet, */ 550 (privileged==priv_DONTNEED||!stat(buf,&stbuf))) /* and we either don't */ 557 if(!delay_setid&&privileged) /* if we're not supposed to delay */
|
H A D | foldinfo.c | 193 if((CAN_toggle_sgid||accspooldir)&&privileged) 194 privileged=priv_DONTNEED; /* we don't need root to setgid */
|
H A D | robust.c | 30 if(!privileged&&buf&&buf2)
|
H A D | misc.c | 95 { if(privileged) 103 privileged=0;
|
/macosx-10.9.5/ksh-20/ksh/src/cmd/ksh93/tests/ |
H A D | options.sh | 61 if [[ ! -o privileged ]] 78 if [[ -o privileged ]] 81 err_exit 'privileged nointeractive shell reads $ENV file' 83 err_exit 'privileged -E reads $ENV file' 85 err_exit 'privileged +E reads $ENV file' 87 err_exit 'privileged --rc reads $ENV file' 89 err_exit 'privileged --norc reads $ENV file' 106 if [[ -o privileged ]] 109 err_exit 'privileged nointeractive shell reads $HOME/.kshrc file' 111 err_exit 'privileged [all...] |
/macosx-10.9.5/OpenSSH-186/openssh/contrib/cygwin/ |
H A D | ssh-user-config | 225 --privileged ) 239 echo " --privileged On Windows NT/2k/XP, assume privileged user"
|
H A D | ssh-host-config | 193 csih_inform "However, this requires a non-privileged account called 'sshd'." 440 csih_inform "sshd requires. You need to have or to create a privileged" 450 csih_error_recoverable "There was a serious problem creating a privileged user." 470 # $password is empty, or $run_service_as is some privileged user and 594 --privileged ) 609 echo " --user -u <account> privileged user for service." 610 echo " --pwd -w <passwd> Use \"pwd\" as password for privileged user." 611 echo " --privileged On Windows NT/2k/XP, require privileged user"
|
/macosx-10.9.5/xnu-2422.115.4/bsd/netinet6/ |
H A D | in6.c | 1081 boolean_t privileged = (proc_suser(p) == 0); local 1103 if (!privileged) 1112 if (!privileged) 1145 if (!privileged) 1151 if (!privileged) 1158 if (!privileged) 1164 if (!privileged) 1170 if (!privileged) 1181 if (!privileged) 1187 if (!privileged) [all...] |
/macosx-10.9.5/xnu-2422.115.4/bsd/netinet/ |
H A D | in.c | 1151 boolean_t privileged = (proc_suser(p) == 0); local 1192 if (!privileged) 1198 if (!privileged) 1204 if (!privileged) 1210 if (!privileged) 1216 if (!privileged) 1237 if (!privileged) 1256 if (!privileged) 1268 if (!privileged)
|
/macosx-10.9.5/ppp-727.90.1/Helpers/pppd/ |
H A D | pppd.h | 168 #define OPT_PRIV 0x1000 /* privileged option */ 278 extern int privileged; /* We were run by real-uid root */ 992 int privileged)); 996 int options_from_list __P((struct wordlist *, int privileged));
|
H A D | main.c | 151 int privileged; /* we're running as real uid root */ variable 383 privileged = uid == 0; 385 if (!privileged) 386 privileged = sys_check_controller(); 420 if (!options_from_file(_PATH_SYSOPTIONS, !privileged, 0, 1)
|
H A D | auth.c | 506 "Allow group members to use privileged options", OPT_PRIV | OPT_A2LIST }, 578 * privgroup - allow members of the group to have privileged access. 594 privileged = 1; 1400 if (!auth_required && !allow_any_ip && have_route_to(0) && !privileged) { 2444 return allow_any_ip || privileged || !have_route_to(addr);
|
/macosx-10.9.5/vim-53/runtime/syntax/ |
H A D | nasm.vim | 317 " System Instructions: (usually privileged) 340 " Debugging Instructions: (privileged)
|
/macosx-10.9.5/CPANInternal-140/Net-Daemon/lib/Net/ |
H A D | Daemon.pm | 819 This is usefull, if you want your server to bind to a privileged port 940 This is usefull, if you want your server to bind to a privileged port
|
/macosx-10.9.5/CPANInternal-140/Net-Daemon-0.48/lib/Net/ |
H A D | Daemon.pm | 838 This is usefull, if you want your server to bind to a privileged port 959 This is usefull, if you want your server to bind to a privileged port
|