/illumos-gate/usr/src/cmd/policykit/ |
H A D | polkit-is-privileged.c | 43 "usage : %s -u <uid> -p <privilege> [-r <resource>]\n" 51 " -p, --privilege Privilege to test for\n" 57 "privilege for a given resource. The resource may be omitted.\n" 66 char *privilege = NULL; local 73 {"privilege", required_argument, NULL, 'p'}, 111 privilege = g_strdup (optarg); 134 if (user == NULL || privilege == NULL) { 141 printf ("privilege = '%s'\n", privilege); 164 privilege, [all...] |
/illumos-gate/usr/src/cmd/hal/tools/ |
H A D | hal-is-caller-privileged.c | 77 permission_denied_privilege (const char *privilege, const char *uid) argument 81 fprintf (stderr, "%s refused uid %s\n", privilege, uid); 108 char *privilege = NULL; local 150 privilege = strdup (optarg); 166 if (udi == NULL || caller == NULL || privilege == NULL) { 190 privilege, 196 printf ("cannot lookup privilege\n"); 197 fprintf (stderr, "Cannot lookup privilege from PolicyKit"); 202 printf ("caller don't possess privilege\n"); 203 permission_denied_privilege (privilege, invoked_by_ui [all...] |
H A D | hal-storage-shared.c | 243 permission_denied_privilege (const char *privilege, const char *uid) argument 246 fprintf (stderr, "%s refused uid %s\n", privilege, uid); 417 /* bail out, unless if we got the "hal-storage-can-unmount-volumes-mounted-by-others" privilege only 423 /* TODO: actually check for privilege "hal-storage-can-unmount-volumes-mounted-by-others" */ 674 /* map PolicyKit privilege to RBAC authorization */ 676 auth_from_privilege(const char *privilege) argument 681 if (strcmp (privilege, "hal-storage-removable-mount") == 0) { 683 } else if (strcmp (privilege, "hal-storage-removable-mount-all-options") == 0) { 685 } else if (strcmp (privilege, "hal-storage-fixed-mount") == 0) { 687 } else if (strcmp (privilege, "ha [all...] |
H A D | hal-storage-mount.c | 149 permission_denied_privilege (const char *privilege, const char *uid) argument 152 fprintf (stderr, "%s refused uid %s\n", privilege, uid); 472 char *privilege; local 777 /* Check privilege */ 799 privilege = "hal-storage-fixed-mount-all-options"; 801 privilege = "hal-storage-fixed-mount"; 805 privilege = "hal-storage-removable-mount-all-options"; 807 privilege = "hal-storage-removable-mount"; 812 printf ("using privilege %s for uid %s, system_bus_connection %s\n", privilege, invoked_by_ui [all...] |
/illumos-gate/usr/src/lib/policykit/libpolkit/common/ |
H A D | libpolkit-rbac.c | 93 const char *privilege, 119 const char *privilege, 144 /* map PolicyKit privilege to RBAC authorization */ 145 if (strcmp (privilege, "hal-storage-removable-mount") == 0) { 147 } else if (strcmp (privilege, "hal-storage-removable-mount-all-options") == 0) { 149 } else if (strcmp (privilege, "hal-storage-fixed-mount") == 0) { 151 } else if (strcmp (privilege, "hal-storage-fixed-mount-all-options") == 0) { 153 } else if (strcmp(privilege, "hal-power-suspend") == 0) { 155 } else if (strcmp(privilege, "hal-power-hibernate") == 0) { 157 } else if ((strcmp(privilege, "ha 91 libpolkit_get_allowed_resources_for_privilege_for_uid(LibPolKitContext *ctx, const char *user, const char *privilege, GList **resources, GList **restrictions, int *num_non_temporary) argument 116 libpolkit_is_uid_allowed_for_privilege(LibPolKitContext *ctx, const char *system_bus_unique_name, const char *user, const char *privilege, const char *resource, gboolean *out_is_allowed, gboolean *out_is_temporary, char **out_is_privileged_but_restricted_to_system_bus_unique_name) argument 210 libpolkit_revoke_temporary_privilege(LibPolKitContext *ctx, const char *user, const char *privilege, const char *resource, gboolean *result) argument [all...] |
/illumos-gate/usr/src/lib/libc/port/gen/ |
H A D | rctlops.c | 169 rctlblk_set_privilege(rctlblk_t *rblk, rctl_priv_t privilege) argument 172 ropaque->rcq_privilege = privilege;
|
/illumos-gate/usr/src/lib/libbsm/common/ |
H A D | adt_token.c | 425 priv_set_t *privilege; local 427 privilege = ((union convert *)p_data)->tprivstar; 429 if (privilege != NULL) { 431 au_to_privset(priv_type, privilege)); 434 DPRINTF((" Null privilege\n"));
|
H A D | au_to.c | 378 * priv_type (LIMIT, INHERIT...) is the first string and privilege 389 au_to_privset(const char *priv_type, const priv_set_t *privilege) argument 395 short p_bytes; /* length of privilege string */ 396 char *priv_string; /* privilege string */ 400 if ((privilege == NULL) || (priv_string = 401 priv_set_to_str(privilege, ',', 1188 * pointer to a use of privilege token.
|
/illumos-gate/usr/src/cmd/hal/addons/cpufreq/ |
H A D | addon-cpufreq.c | 658 char *privilege; local 669 privilege = "hal-power-cpu"; 718 privilege, 723 HAL_INFO (("Cannot lookup privilege from PolicyKit")); 731 HAL_INFO (("Caller doesn't possess required privilege to" 735 "privilege to change the governor"); 1310 * Start with the 'basic' privilege set and then add any
|
/illumos-gate/usr/src/uts/common/os/ |
H A D | rctl.c | 134 * privilege). 459 * rctl_priv_t privilege, uint_t action) 462 * Create a default limit with specified value, privilege, and action. 469 rctl_priv_t privilege, uint_t action) 477 dval->rcv_privilege = privilege; 1753 * all the privilege values. These privilege values have been set by 1895 /* Delete all the privilege vaules */ 2178 * cases. Furthermore, we don't allow multiple identical privilege-action 2181 * memory.) So we want to delete any values with the same privilege valu 468 rctl_add_default_limit(const char *name, rctl_qty_t value, rctl_priv_t privilege, uint_t action) argument [all...] |