Searched defs:privilege (Results 1 - 9 of 9) sorted by relevance

/osnet-11/usr/src/cmd/policykit/
H A Dpolkit-is-privileged.c43 "usage : %s -u <uid> -p <privilege> [-r <resource>]\n"
51 " -p, --privilege Privilege to test for\n"
57 "privilege for a given resource. The resource may be omitted.\n"
66 char *privilege = NULL; local
73 {"privilege", required_argument, NULL, 'p'},
111 privilege = g_strdup (optarg);
134 if (user == NULL || privilege == NULL) {
141 printf ("privilege = '%s'\n", privilege);
164 privilege,
[all...]
/osnet-11/usr/src/cmd/hal/tools/
H A Dhal-is-caller-privileged.c77 permission_denied_privilege (const char *privilege, const char *uid) argument
81 fprintf (stderr, "%s refused uid %s\n", privilege, uid);
108 char *privilege = NULL; local
150 privilege = strdup (optarg);
166 if (udi == NULL || caller == NULL || privilege == NULL) {
190 privilege,
196 printf ("cannot lookup privilege\n");
197 fprintf (stderr, "Cannot lookup privilege from PolicyKit");
202 printf ("caller don't possess privilege\n");
203 permission_denied_privilege (privilege, invoked_by_ui
[all...]
H A Dhal-storage-shared.c243 permission_denied_privilege (const char *privilege, const char *uid) argument
246 fprintf (stderr, "%s refused uid %s\n", privilege, uid);
417 /* bail out, unless if we got the "hal-storage-can-unmount-volumes-mounted-by-others" privilege only
423 /* TODO: actually check for privilege "hal-storage-can-unmount-volumes-mounted-by-others" */
674 /* map PolicyKit privilege to RBAC authorization */
676 auth_from_privilege(const char *privilege) argument
681 if (strcmp (privilege, "hal-storage-removable-mount") == 0) {
683 } else if (strcmp (privilege, "hal-storage-removable-mount-all-options") == 0) {
685 } else if (strcmp (privilege, "hal-storage-fixed-mount") == 0) {
687 } else if (strcmp (privilege, "ha
[all...]
H A Dhal-storage-mount.c152 permission_denied_privilege (const char *privilege, const char *uid) argument
155 fprintf (stderr, "%s refused uid %s\n", privilege, uid);
479 char *privilege; local
802 /* Check privilege */
828 privilege = "hal-storage-fixed-mount-all-options";
830 privilege = "hal-storage-fixed-mount";
834 privilege = "hal-storage-removable-mount-all-options";
836 privilege = "hal-storage-removable-mount";
841 printf ("using privilege %s for uid %s, system_bus_connection %s\n", privilege, invoked_by_ui
[all...]
/osnet-11/usr/src/lib/libc/port/gen/
H A Drctlops.c169 rctlblk_set_privilege(rctlblk_t *rblk, rctl_priv_t privilege) argument
172 ropaque->rcq_privilege = privilege;
/osnet-11/usr/src/lib/policykit/libpolkit/common/
H A Dlibpolkit-rbac.c93 const char *privilege,
119 const char *privilege,
144 /* map PolicyKit privilege to RBAC authorization */
145 if (strcmp (privilege, "hal-storage-removable-mount") == 0) {
147 } else if (strcmp (privilege, "hal-storage-removable-mount-all-options") == 0) {
149 } else if (strcmp (privilege, "hal-storage-fixed-mount") == 0) {
151 } else if (strcmp (privilege, "hal-storage-fixed-mount-all-options") == 0) {
153 } else if (strcmp(privilege, "hal-power-suspend") == 0) {
155 } else if (strcmp(privilege, "hal-power-hibernate") == 0) {
157 } else if ((strcmp(privilege, "ha
91 libpolkit_get_allowed_resources_for_privilege_for_uid(LibPolKitContext *ctx, const char *user, const char *privilege, GList **resources, GList **restrictions, int *num_non_temporary) argument
116 libpolkit_is_uid_allowed_for_privilege(LibPolKitContext *ctx, const char *system_bus_unique_name, const char *user, const char *privilege, const char *resource, gboolean *out_is_allowed, gboolean *out_is_temporary, char **out_is_privileged_but_restricted_to_system_bus_unique_name) argument
210 libpolkit_revoke_temporary_privilege(LibPolKitContext *ctx, const char *user, const char *privilege, const char *resource, gboolean *result) argument
[all...]
/osnet-11/usr/src/cmd/hal/addons/cpufreq/
H A Daddon-cpufreq.c486 char *privilege; local
497 privilege = "hal-power-cpu";
544 NULL, user_id, privilege, udi,
547 HAL_INFO(("Cannot lookup privilege from PolicyKit"));
555 HAL_INFO(("Caller doesn't possess required privilege to"
559 "privilege to change the governor");
977 * Start with the 'basic' privilege set and then add any
/osnet-11/usr/src/lib/libbsm/common/
H A Dadt_token.c433 priv_set_t *privilege; local
435 privilege = ((union convert *)p_data)->tprivstar;
437 if (privilege != NULL) {
439 au_to_privset(priv_type, privilege));
442 DPRINTF((" Null privilege\n"));
H A Dau_to.c369 * priv_type (LIMIT, INHERIT...) is the first string and privilege
380 au_to_privset(const char *priv_type, const priv_set_t *privilege) argument
386 short p_bytes; /* length of privilege string */
387 char *priv_string; /* privilege string */
391 if ((privilege == NULL) || (priv_string =
392 priv_set_to_str(privilege, ',',
1151 * pointer to a use of privilege token.

Completed in 32 milliseconds