/opensolaris-onvv-gate/usr/src/cmd/policykit/ |
H A D | Makefile | 28 PROG = polkit-is-privileged
|
/opensolaris-onvv-gate/usr/src/cmd/hal/tools/ |
H A D | hal-functions.sh | 13 PK_RESULT=`hal-is-caller-privileged --udi $UDI --action $ACTION \ 18 echo "Cannot determine if caller is privileged" >&2
|
H A D | Makefile | 33 HAL_LIB = hal-is-caller-privileged
|
/opensolaris-onvv-gate/usr/src/cmd/ssh/libssh/common/ |
H A D | uidswap.c | 47 static int privileged = 0; variable 68 privileged = 0; 73 privileged = 0; 78 privileged = 1; 113 /* Propagate the privileged gid to all of our gids. */ 116 /* Propagate the privileged uid to all of our uids. */ 139 * Restores to the original (privileged) uid. 144 /* it's a no-op unless privileged */ 145 if (!privileged) { 154 /* Set the effective uid back to the saved privileged ui [all...] |
/opensolaris-onvv-gate/usr/src/lib/pam_modules/passwd_auth/ |
H A D | passwd_auth.c | 78 int privileged; local 143 res = __user_to_authenticate(user, pwu_rep, &auth_user, &privileged); 177 if (privileged) { 207 if (privileged) 211 * Non privileged user: so we need to check the old password
|
/opensolaris-onvv-gate/usr/src/lib/libbsm/ |
H A D | audit_class.txt | 65 0x00400000:xp:X - privileged/administrative operations
|
/opensolaris-onvv-gate/usr/src/lib/pam_modules/smb/ |
H A D | smb_passwd.c | 86 int privileged; local 132 &privileged);
|
/opensolaris-onvv-gate/usr/src/pkg/manifests/ |
H A D | system-library-policykit.mf | 41 file path=usr/sbin/polkit-is-privileged mode=0555
|
H A D | service-hal.mf | 119 file path=usr/lib/hal/hal-is-caller-privileged mode=0555
|
/opensolaris-onvv-gate/usr/src/lib/libshell/common/tests/ |
H A D | options.sh | 61 if [[ ! -o privileged ]] 78 if [[ -o privileged ]] 81 err_exit 'privileged nointeractive shell reads $ENV file' 83 err_exit 'privileged -E reads $ENV file' 85 err_exit 'privileged +E reads $ENV file' 87 err_exit 'privileged --rc reads $ENV file' 89 err_exit 'privileged --norc reads $ENV file' 106 if [[ -o privileged ]] 109 err_exit 'privileged nointeractive shell reads $HOME/.kshrc file' 111 err_exit 'privileged [all...] |
/opensolaris-onvv-gate/usr/src/cmd/svc/configd/ |
H A D | configd.c | 327 int privileged = 0; local 333 * in privileged pid mode, we only allow connections from 342 privileged = 1; /* he gets full privileges */ 345 * in privileged user mode, only one particular user is 351 privileged = 1; 378 return (create_client(ucred_getpid(uc), debugflags, privileged,
|
/opensolaris-onvv-gate/usr/src/lib/passwdutil/ |
H A D | nis_attr.c | 50 char **auth_user, int *privileged); 81 * Are we a 'privileged' process? Yes if we are running on the 120 * nis_user_to_authenticate(name, rep, auth_user, privileged) 126 char **auth_user, int *privileged) 148 *privileged = 1; 154 *privileged = (uid == (uid_t)0); 474 * If we are privileged, we create a ticlts connection to the 125 nis_user_to_authenticate(char *user, pwu_repository_t *rep, char **auth_user, int *privileged) argument
|
H A D | ldap_attr.c | 79 char **auth_user, int *privileged); 179 * int ldap_user_to_authenticate(user, rep, auth_user, privileged) 185 * we can't determine whether the user is "privileged" in the LDAP 188 * privileged if he/she is attempting to change another user's 193 char **auth_user, int *privileged) 230 *privileged = 0; /* for proper prompting */ 233 *privileged = 1; 246 /* changing our own, not privileged */ 247 *privileged = 0; 253 *privileged 192 ldap_user_to_authenticate(char *user, pwu_repository_t *rep, char **auth_user, int *privileged) argument [all...] |
H A D | files_attr.c | 54 char **auth_user, int *privileged); 131 * Are we a privileged user with regard to the files repository? 321 * int files_user_to_authenticate(name, rep, auth_user, privileged) 332 char **auth_user, int *privileged) 345 *privileged = 1; 348 *privileged = 0; 331 files_user_to_authenticate(char *user, pwu_repository_t *rep, char **auth_user, int *privileged) argument
|
/opensolaris-onvv-gate/usr/src/cmd/ypcmd/yppasswd/ |
H A D | yppasswdd.c | 568 validloginshell(char *pw_shell, char *arg, int privileged) argument 599 if (valid == NULL && !privileged) { 633 if (!privileged || newshell[0] != '/') {
|
/opensolaris-onvv-gate/usr/src/cmd/cmd-inet/usr.bin/pppd/ |
H A D | pppd.h | 128 #define OPT_PRIV 0x1000 /* privileged option */ 196 extern bool privileged; /* We were run by real-uid root */ 383 * command line, etc.) and whether it came from a privileged source. 649 bool check_prot, bool privileged)); 655 extern int options_from_list __P((struct wordlist *, bool privileged));
|
H A D | auth.c | 281 "Allow group members to use privileged options", OPT_PRIV }, 351 * privgroup - allow members of the group to have privileged access. 369 privileged = 1; 952 if (!auth_required && !allow_any_ip && have_route_to(0) && !privileged) { 1846 return allow_any_ip || privileged || !have_route_to(addr);
|
H A D | main.c | 106 bool privileged; /* we're running as real uid root */ variable 337 privileged = (uid == 0); 373 if (!options_from_file(_PATH_SYSOPTIONS, !privileged, 0, 1)
|
H A D | options.c | 275 "Take options from a privileged file", OPT_PREPASS }, 375 \t\tor when found in the privileged option files (/etc/ppp/options,\n\ 397 privileged_option = privileged; 581 ret = options_from_file(path, 0, 1, privileged);
|
/opensolaris-onvv-gate/usr/src/uts/common/os/ |
H A D | priv_defs | 169 Allows a process to make privileged ioctls to graphics devices. 172 privileged graphics device mappings. 176 Allows a process to perform privileged mappings through a 240 setsockopt(3SOCKET). This allows a privileged process to 252 Allows a process to bind to a privileged port 254 UNIX privileged ports) as well as those ports marked as
|
/opensolaris-onvv-gate/usr/src/lib/libshare/smb/ |
H A D | libshare_smb.c | 386 boolean_t privileged; local 408 privileged = (priv_isfullset(priv_effective) == B_TRUE); 427 if (privileged == B_FALSE && !online) { 435 "by a privileged user\n")); 447 if (privileged == B_TRUE && !online) {
|
/opensolaris-onvv-gate/usr/src/cmd/ssh/ssh/ |
H A D | sshconnect.c | 177 * Creates a (possibly privileged) socket for use as the ssh connection. 180 ssh_create_socket(int privileged, int family) argument 186 * If we are running as root and want to connect to a privileged 187 * port, bind our own socket to a privileged port. 189 if (privileged) { 303 * a privileged port will be allocated to make the connection.
|
/opensolaris-onvv-gate/usr/src/lib/libshare/nfs/ |
H A D | libshare_nfs.c | 1892 int privileged; local 1895 * If we aren't a privileged user 1904 privileged = (priv_isfullset(priv_effective) == B_TRUE); 1907 if (!privileged && 1916 "by a privileged user\n"));
|
/opensolaris-onvv-gate/usr/src/cmd/cpio/ |
H A D | cpio.c | 473 privileged = 0, /* Flag set if running with higher privileges */ variable 1396 privileged = (priv_issubset(zones_privset, 1407 privileged = (Euid == 0); 1413 } else if ((Euid != Rpw_p->pw_uid) && !privileged) { 1850 G_p->g_gid, 0) != 0) && privileged) { 4303 (int)G_p->g_gid) < 0) && privileged) { 5739 AT_SYMLINK_NOFOLLOW) < 0) && privileged) { 6262 AT_SYMLINK_NOFOLLOW) < 0) && privileged) { 6291 if (privileged) { 6314 if (!privileged) { [all...] |
/opensolaris-onvv-gate/usr/src/cmd/perl/contrib/Sun/Solaris/Project/ |
H A D | Project.pm | 70 'privs' => [ qw(basic privileged priv) ], 1518 $rctl->{'privs'} = ['privileged', 'priv']; 1520 $rctl->{'privs'} = ['basic', 'privileged', 'priv'];
|