Searched refs:privileged (Results 1 - 25 of 28) sorted by relevance

12

/opensolaris-onvv-gate/usr/src/cmd/policykit/
H A DMakefile28 PROG = polkit-is-privileged
/opensolaris-onvv-gate/usr/src/cmd/hal/tools/
H A Dhal-functions.sh13 PK_RESULT=`hal-is-caller-privileged --udi $UDI --action $ACTION \
18 echo "Cannot determine if caller is privileged" >&2
H A DMakefile33 HAL_LIB = hal-is-caller-privileged
/opensolaris-onvv-gate/usr/src/cmd/ssh/libssh/common/
H A Duidswap.c47 static int privileged = 0; variable
68 privileged = 0;
73 privileged = 0;
78 privileged = 1;
113 /* Propagate the privileged gid to all of our gids. */
116 /* Propagate the privileged uid to all of our uids. */
139 * Restores to the original (privileged) uid.
144 /* it's a no-op unless privileged */
145 if (!privileged) {
154 /* Set the effective uid back to the saved privileged ui
[all...]
/opensolaris-onvv-gate/usr/src/lib/pam_modules/passwd_auth/
H A Dpasswd_auth.c78 int privileged; local
143 res = __user_to_authenticate(user, pwu_rep, &auth_user, &privileged);
177 if (privileged) {
207 if (privileged)
211 * Non privileged user: so we need to check the old password
/opensolaris-onvv-gate/usr/src/lib/libbsm/
H A Daudit_class.txt65 0x00400000:xp:X - privileged/administrative operations
/opensolaris-onvv-gate/usr/src/lib/pam_modules/smb/
H A Dsmb_passwd.c86 int privileged; local
132 &privileged);
/opensolaris-onvv-gate/usr/src/pkg/manifests/
H A Dsystem-library-policykit.mf41 file path=usr/sbin/polkit-is-privileged mode=0555
H A Dservice-hal.mf119 file path=usr/lib/hal/hal-is-caller-privileged mode=0555
/opensolaris-onvv-gate/usr/src/lib/libshell/common/tests/
H A Doptions.sh61 if [[ ! -o privileged ]]
78 if [[ -o privileged ]]
81 err_exit 'privileged nointeractive shell reads $ENV file'
83 err_exit 'privileged -E reads $ENV file'
85 err_exit 'privileged +E reads $ENV file'
87 err_exit 'privileged --rc reads $ENV file'
89 err_exit 'privileged --norc reads $ENV file'
106 if [[ -o privileged ]]
109 err_exit 'privileged nointeractive shell reads $HOME/.kshrc file'
111 err_exit 'privileged
[all...]
/opensolaris-onvv-gate/usr/src/cmd/svc/configd/
H A Dconfigd.c327 int privileged = 0; local
333 * in privileged pid mode, we only allow connections from
342 privileged = 1; /* he gets full privileges */
345 * in privileged user mode, only one particular user is
351 privileged = 1;
378 return (create_client(ucred_getpid(uc), debugflags, privileged,
/opensolaris-onvv-gate/usr/src/lib/passwdutil/
H A Dnis_attr.c50 char **auth_user, int *privileged);
81 * Are we a 'privileged' process? Yes if we are running on the
120 * nis_user_to_authenticate(name, rep, auth_user, privileged)
126 char **auth_user, int *privileged)
148 *privileged = 1;
154 *privileged = (uid == (uid_t)0);
474 * If we are privileged, we create a ticlts connection to the
125 nis_user_to_authenticate(char *user, pwu_repository_t *rep, char **auth_user, int *privileged) argument
H A Dldap_attr.c79 char **auth_user, int *privileged);
179 * int ldap_user_to_authenticate(user, rep, auth_user, privileged)
185 * we can't determine whether the user is "privileged" in the LDAP
188 * privileged if he/she is attempting to change another user's
193 char **auth_user, int *privileged)
230 *privileged = 0; /* for proper prompting */
233 *privileged = 1;
246 /* changing our own, not privileged */
247 *privileged = 0;
253 *privileged
192 ldap_user_to_authenticate(char *user, pwu_repository_t *rep, char **auth_user, int *privileged) argument
[all...]
H A Dfiles_attr.c54 char **auth_user, int *privileged);
131 * Are we a privileged user with regard to the files repository?
321 * int files_user_to_authenticate(name, rep, auth_user, privileged)
332 char **auth_user, int *privileged)
345 *privileged = 1;
348 *privileged = 0;
331 files_user_to_authenticate(char *user, pwu_repository_t *rep, char **auth_user, int *privileged) argument
/opensolaris-onvv-gate/usr/src/cmd/ypcmd/yppasswd/
H A Dyppasswdd.c568 validloginshell(char *pw_shell, char *arg, int privileged) argument
599 if (valid == NULL && !privileged) {
633 if (!privileged || newshell[0] != '/') {
/opensolaris-onvv-gate/usr/src/cmd/cmd-inet/usr.bin/pppd/
H A Dpppd.h128 #define OPT_PRIV 0x1000 /* privileged option */
196 extern bool privileged; /* We were run by real-uid root */
383 * command line, etc.) and whether it came from a privileged source.
649 bool check_prot, bool privileged));
655 extern int options_from_list __P((struct wordlist *, bool privileged));
H A Dauth.c281 "Allow group members to use privileged options", OPT_PRIV },
351 * privgroup - allow members of the group to have privileged access.
369 privileged = 1;
952 if (!auth_required && !allow_any_ip && have_route_to(0) && !privileged) {
1846 return allow_any_ip || privileged || !have_route_to(addr);
H A Dmain.c106 bool privileged; /* we're running as real uid root */ variable
337 privileged = (uid == 0);
373 if (!options_from_file(_PATH_SYSOPTIONS, !privileged, 0, 1)
H A Doptions.c275 "Take options from a privileged file", OPT_PREPASS },
375 \t\tor when found in the privileged option files (/etc/ppp/options,\n\
397 privileged_option = privileged;
581 ret = options_from_file(path, 0, 1, privileged);
/opensolaris-onvv-gate/usr/src/uts/common/os/
H A Dpriv_defs169 Allows a process to make privileged ioctls to graphics devices.
172 privileged graphics device mappings.
176 Allows a process to perform privileged mappings through a
240 setsockopt(3SOCKET). This allows a privileged process to
252 Allows a process to bind to a privileged port
254 UNIX privileged ports) as well as those ports marked as
/opensolaris-onvv-gate/usr/src/lib/libshare/smb/
H A Dlibshare_smb.c386 boolean_t privileged; local
408 privileged = (priv_isfullset(priv_effective) == B_TRUE);
427 if (privileged == B_FALSE && !online) {
435 "by a privileged user\n"));
447 if (privileged == B_TRUE && !online) {
/opensolaris-onvv-gate/usr/src/cmd/ssh/ssh/
H A Dsshconnect.c177 * Creates a (possibly privileged) socket for use as the ssh connection.
180 ssh_create_socket(int privileged, int family) argument
186 * If we are running as root and want to connect to a privileged
187 * port, bind our own socket to a privileged port.
189 if (privileged) {
303 * a privileged port will be allocated to make the connection.
/opensolaris-onvv-gate/usr/src/lib/libshare/nfs/
H A Dlibshare_nfs.c1892 int privileged; local
1895 * If we aren't a privileged user
1904 privileged = (priv_isfullset(priv_effective) == B_TRUE);
1907 if (!privileged &&
1916 "by a privileged user\n"));
/opensolaris-onvv-gate/usr/src/cmd/cpio/
H A Dcpio.c473 privileged = 0, /* Flag set if running with higher privileges */ variable
1396 privileged = (priv_issubset(zones_privset,
1407 privileged = (Euid == 0);
1413 } else if ((Euid != Rpw_p->pw_uid) && !privileged) {
1850 G_p->g_gid, 0) != 0) && privileged) {
4303 (int)G_p->g_gid) < 0) && privileged) {
5739 AT_SYMLINK_NOFOLLOW) < 0) && privileged) {
6262 AT_SYMLINK_NOFOLLOW) < 0) && privileged) {
6291 if (privileged) {
6314 if (!privileged) {
[all...]
/opensolaris-onvv-gate/usr/src/cmd/perl/contrib/Sun/Solaris/Project/
H A DProject.pm70 'privs' => [ qw(basic privileged priv) ],
1518 $rctl->{'privs'} = ['privileged', 'priv'];
1520 $rctl->{'privs'} = ['basic', 'privileged', 'priv'];

Completed in 241 milliseconds

12