/illumos-gate/usr/src/lib/pam_modules/smb/ |
H A D | smb_passwd.c | 86 int privileged; local 132 &privileged);
|
/illumos-gate/usr/src/lib/pam_modules/passwd_auth/ |
H A D | passwd_auth.c | 78 int privileged; local 143 res = __user_to_authenticate(user, pwu_rep, &auth_user, &privileged); 177 if (privileged) { 207 if (privileged) 211 * Non privileged user: so we need to check the old password
|
/illumos-gate/usr/src/lib/passwdutil/ |
H A D | nis_attr.c | 50 char **auth_user, int *privileged); 81 * Are we a 'privileged' process? Yes if we are running on the 120 * nis_user_to_authenticate(name, rep, auth_user, privileged) 126 char **auth_user, int *privileged) 148 *privileged = 1; 154 *privileged = (uid == (uid_t)0); 474 * If we are privileged, we create a ticlts connection to the 125 nis_user_to_authenticate(char *user, pwu_repository_t *rep, char **auth_user, int *privileged) argument
|
H A D | files_attr.c | 54 char **auth_user, int *privileged); 131 * Are we a privileged user with regard to the files repository? 321 * int files_user_to_authenticate(name, rep, auth_user, privileged) 332 char **auth_user, int *privileged) 345 *privileged = 1; 348 *privileged = 0; 331 files_user_to_authenticate(char *user, pwu_repository_t *rep, char **auth_user, int *privileged) argument
|
H A D | ldap_attr.c | 79 char **auth_user, int *privileged); 179 * int ldap_user_to_authenticate(user, rep, auth_user, privileged) 185 * we can't determine whether the user is "privileged" in the LDAP 188 * privileged if he/she is attempting to change another user's 193 char **auth_user, int *privileged) 230 *privileged = 0; /* for proper prompting */ 233 *privileged = 1; 246 /* changing our own, not privileged */ 247 *privileged = 0; 253 *privileged 192 ldap_user_to_authenticate(char *user, pwu_repository_t *rep, char **auth_user, int *privileged) argument [all...] |
/illumos-gate/usr/src/cmd/ypcmd/yppasswd/ |
H A D | yppasswdd.c | 568 validloginshell(char *pw_shell, char *arg, int privileged) argument 599 if (valid == NULL && !privileged) { 633 if (!privileged || newshell[0] != '/') {
|
/illumos-gate/usr/src/cmd/svc/configd/ |
H A D | configd.c | 341 int privileged = 0; local 347 * in privileged pid mode, we only allow connections from 356 privileged = 1; /* he gets full privileges */ 359 * in privileged user mode, only one particular user is 365 privileged = 1; 392 return (create_client(ucred_getpid(uc), debugflags, privileged,
|
H A D | client.c | 2436 create_client(pid_t pid, uint32_t debugflags, int privileged, int *out_fd) argument 2457 cp->rc_all_auths = privileged;
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/pppd/ |
H A D | main.c | 106 bool privileged; /* we're running as real uid root */ variable 337 privileged = (uid == 0); 373 if (!options_from_file(_PATH_SYSOPTIONS, !privileged, 0, 1)
|
/illumos-gate/usr/src/lib/libshare/smb/ |
H A D | libshare_smb.c | 389 boolean_t privileged; local 405 privileged = (priv_isfullset(priv_effective) == B_TRUE); 424 if (privileged == B_FALSE && !online) { 432 "by a privileged user\n")); 444 if (privileged == B_TRUE && !online) {
|
/illumos-gate/usr/src/lib/libshare/nfs/ |
H A D | libshare_nfs.c | 1914 int privileged; local 1917 * If we aren't a privileged user 1926 privileged = (priv_isfullset(priv_effective) == B_TRUE); 1929 if (!privileged && 1938 "by a privileged user\n"));
|
/illumos-gate/usr/src/cmd/cpio/ |
H A D | cpio.c | 475 privileged = 0, /* Flag set if running with higher privileges */ variable 1401 privileged = (priv_issubset(zones_privset, 1412 privileged = (Euid == 0); 1418 } else if ((Euid != Rpw_p->pw_uid) && !privileged) { 1855 G_p->g_gid, 0) != 0) && privileged) { 4308 (int)G_p->g_gid) < 0) && privileged) { 5744 AT_SYMLINK_NOFOLLOW) < 0) && privileged) { 6267 AT_SYMLINK_NOFOLLOW) < 0) && privileged) { 6296 if (privileged) { 6319 if (!privileged) { [all...] |