Searched defs:privilege (Results 1 - 10 of 10) sorted by relevance

/illumos-gate/usr/src/cmd/policykit/
H A Dpolkit-is-privileged.c43 "usage : %s -u <uid> -p <privilege> [-r <resource>]\n"
51 " -p, --privilege Privilege to test for\n"
57 "privilege for a given resource. The resource may be omitted.\n"
66 char *privilege = NULL; local
73 {"privilege", required_argument, NULL, 'p'},
111 privilege = g_strdup (optarg);
134 if (user == NULL || privilege == NULL) {
141 printf ("privilege = '%s'\n", privilege);
164 privilege,
[all...]
/illumos-gate/usr/src/cmd/hal/tools/
H A Dhal-is-caller-privileged.c77 permission_denied_privilege (const char *privilege, const char *uid) argument
81 fprintf (stderr, "%s refused uid %s\n", privilege, uid);
108 char *privilege = NULL; local
150 privilege = strdup (optarg);
166 if (udi == NULL || caller == NULL || privilege == NULL) {
190 privilege,
196 printf ("cannot lookup privilege\n");
197 fprintf (stderr, "Cannot lookup privilege from PolicyKit");
202 printf ("caller don't possess privilege\n");
203 permission_denied_privilege (privilege, invoked_by_ui
[all...]
H A Dhal-storage-shared.c243 permission_denied_privilege (const char *privilege, const char *uid) argument
246 fprintf (stderr, "%s refused uid %s\n", privilege, uid);
417 /* bail out, unless if we got the "hal-storage-can-unmount-volumes-mounted-by-others" privilege only
423 /* TODO: actually check for privilege "hal-storage-can-unmount-volumes-mounted-by-others" */
674 /* map PolicyKit privilege to RBAC authorization */
676 auth_from_privilege(const char *privilege) argument
681 if (strcmp (privilege, "hal-storage-removable-mount") == 0) {
683 } else if (strcmp (privilege, "hal-storage-removable-mount-all-options") == 0) {
685 } else if (strcmp (privilege, "hal-storage-fixed-mount") == 0) {
687 } else if (strcmp (privilege, "ha
[all...]
H A Dhal-storage-mount.c149 permission_denied_privilege (const char *privilege, const char *uid) argument
152 fprintf (stderr, "%s refused uid %s\n", privilege, uid);
472 char *privilege; local
777 /* Check privilege */
799 privilege = "hal-storage-fixed-mount-all-options";
801 privilege = "hal-storage-fixed-mount";
805 privilege = "hal-storage-removable-mount-all-options";
807 privilege = "hal-storage-removable-mount";
812 printf ("using privilege %s for uid %s, system_bus_connection %s\n", privilege, invoked_by_ui
[all...]
/illumos-gate/usr/src/lib/policykit/libpolkit/common/
H A Dlibpolkit-rbac.c93 const char *privilege,
119 const char *privilege,
144 /* map PolicyKit privilege to RBAC authorization */
145 if (strcmp (privilege, "hal-storage-removable-mount") == 0) {
147 } else if (strcmp (privilege, "hal-storage-removable-mount-all-options") == 0) {
149 } else if (strcmp (privilege, "hal-storage-fixed-mount") == 0) {
151 } else if (strcmp (privilege, "hal-storage-fixed-mount-all-options") == 0) {
153 } else if (strcmp(privilege, "hal-power-suspend") == 0) {
155 } else if (strcmp(privilege, "hal-power-hibernate") == 0) {
157 } else if ((strcmp(privilege, "ha
91 libpolkit_get_allowed_resources_for_privilege_for_uid(LibPolKitContext *ctx, const char *user, const char *privilege, GList **resources, GList **restrictions, int *num_non_temporary) argument
116 libpolkit_is_uid_allowed_for_privilege(LibPolKitContext *ctx, const char *system_bus_unique_name, const char *user, const char *privilege, const char *resource, gboolean *out_is_allowed, gboolean *out_is_temporary, char **out_is_privileged_but_restricted_to_system_bus_unique_name) argument
210 libpolkit_revoke_temporary_privilege(LibPolKitContext *ctx, const char *user, const char *privilege, const char *resource, gboolean *result) argument
[all...]
/illumos-gate/usr/src/lib/libc/port/gen/
H A Drctlops.c169 rctlblk_set_privilege(rctlblk_t *rblk, rctl_priv_t privilege) argument
172 ropaque->rcq_privilege = privilege;
/illumos-gate/usr/src/lib/libbsm/common/
H A Dadt_token.c425 priv_set_t *privilege; local
427 privilege = ((union convert *)p_data)->tprivstar;
429 if (privilege != NULL) {
431 au_to_privset(priv_type, privilege));
434 DPRINTF((" Null privilege\n"));
H A Dau_to.c378 * priv_type (LIMIT, INHERIT...) is the first string and privilege
389 au_to_privset(const char *priv_type, const priv_set_t *privilege) argument
395 short p_bytes; /* length of privilege string */
396 char *priv_string; /* privilege string */
400 if ((privilege == NULL) || (priv_string =
401 priv_set_to_str(privilege, ',',
1188 * pointer to a use of privilege token.
/illumos-gate/usr/src/cmd/hal/addons/cpufreq/
H A Daddon-cpufreq.c658 char *privilege; local
669 privilege = "hal-power-cpu";
718 privilege,
723 HAL_INFO (("Cannot lookup privilege from PolicyKit"));
731 HAL_INFO (("Caller doesn't possess required privilege to"
735 "privilege to change the governor");
1310 * Start with the 'basic' privilege set and then add any
/illumos-gate/usr/src/uts/common/os/
H A Drctl.c134 * privilege).
459 * rctl_priv_t privilege, uint_t action)
462 * Create a default limit with specified value, privilege, and action.
469 rctl_priv_t privilege, uint_t action)
477 dval->rcv_privilege = privilege;
1753 * all the privilege values. These privilege values have been set by
1895 /* Delete all the privilege vaules */
2178 * cases. Furthermore, we don't allow multiple identical privilege-action
2181 * memory.) So we want to delete any values with the same privilege valu
468 rctl_add_default_limit(const char *name, rctl_qty_t value, rctl_priv_t privilege, uint_t action) argument
[all...]

Completed in 63 milliseconds