Searched refs:privileged (Results 1 - 24 of 24) sorted by relevance

/illumos-gate/usr/src/cmd/policykit/
H A DMakefile26 PROG = polkit-is-privileged
/illumos-gate/usr/src/cmd/hal/tools/
H A Dhal-functions.sh13 PK_RESULT=`hal-is-caller-privileged --udi $UDI --action $ACTION \
18 echo "Cannot determine if caller is privileged" >&2
H A DMakefile31 HAL_LIB = hal-is-caller-privileged
/illumos-gate/usr/src/lib/pam_modules/passwd_auth/
H A Dpasswd_auth.c78 int privileged; local
143 res = __user_to_authenticate(user, pwu_rep, &auth_user, &privileged);
177 if (privileged) {
207 if (privileged)
211 * Non privileged user: so we need to check the old password
/illumos-gate/usr/src/lib/pam_modules/smb/
H A Dsmb_passwd.c86 int privileged; local
132 &privileged);
/illumos-gate/usr/src/lib/libshell/common/tests/
H A Doptions.sh61 if [[ ! -o privileged ]]
78 if [[ -o privileged ]]
81 err_exit 'privileged nointeractive shell reads $ENV file'
83 err_exit 'privileged -E reads $ENV file'
85 err_exit 'privileged +E reads $ENV file'
87 err_exit 'privileged --rc reads $ENV file'
89 err_exit 'privileged --norc reads $ENV file'
106 if [[ -o privileged ]]
109 err_exit 'privileged nointeractive shell reads $HOME/.kshrc file'
111 err_exit 'privileged
[all...]
/illumos-gate/usr/src/lib/passwdutil/
H A Dnis_attr.c50 char **auth_user, int *privileged);
81 * Are we a 'privileged' process? Yes if we are running on the
120 * nis_user_to_authenticate(name, rep, auth_user, privileged)
126 char **auth_user, int *privileged)
148 *privileged = 1;
154 *privileged = (uid == (uid_t)0);
474 * If we are privileged, we create a ticlts connection to the
125 nis_user_to_authenticate(char *user, pwu_repository_t *rep, char **auth_user, int *privileged) argument
H A Dldap_attr.c79 char **auth_user, int *privileged);
179 * int ldap_user_to_authenticate(user, rep, auth_user, privileged)
185 * we can't determine whether the user is "privileged" in the LDAP
188 * privileged if he/she is attempting to change another user's
193 char **auth_user, int *privileged)
230 *privileged = 0; /* for proper prompting */
233 *privileged = 1;
246 /* changing our own, not privileged */
247 *privileged = 0;
253 *privileged
192 ldap_user_to_authenticate(char *user, pwu_repository_t *rep, char **auth_user, int *privileged) argument
[all...]
H A Dfiles_attr.c54 char **auth_user, int *privileged);
131 * Are we a privileged user with regard to the files repository?
321 * int files_user_to_authenticate(name, rep, auth_user, privileged)
332 char **auth_user, int *privileged)
345 *privileged = 1;
348 *privileged = 0;
331 files_user_to_authenticate(char *user, pwu_repository_t *rep, char **auth_user, int *privileged) argument
/illumos-gate/usr/src/cmd/svc/configd/
H A Dconfigd.c341 int privileged = 0; local
347 * in privileged pid mode, we only allow connections from
356 privileged = 1; /* he gets full privileges */
359 * in privileged user mode, only one particular user is
365 privileged = 1;
392 return (create_client(ucred_getpid(uc), debugflags, privileged,
H A Dclient.c2436 create_client(pid_t pid, uint32_t debugflags, int privileged, int *out_fd) argument
2457 cp->rc_all_auths = privileged;
/illumos-gate/usr/src/cmd/ypcmd/yppasswd/
H A Dyppasswdd.c568 validloginshell(char *pw_shell, char *arg, int privileged) argument
599 if (valid == NULL && !privileged) {
633 if (!privileged || newshell[0] != '/') {
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/pppd/
H A Dpppd.h128 #define OPT_PRIV 0x1000 /* privileged option */
196 extern bool privileged; /* We were run by real-uid root */
383 * command line, etc.) and whether it came from a privileged source.
649 bool check_prot, bool privileged));
655 extern int options_from_list __P((struct wordlist *, bool privileged));
H A Dauth.c281 "Allow group members to use privileged options", OPT_PRIV },
351 * privgroup - allow members of the group to have privileged access.
369 privileged = 1;
952 if (!auth_required && !allow_any_ip && have_route_to(0) && !privileged) {
1846 return allow_any_ip || privileged || !have_route_to(addr);
H A Dmain.c106 bool privileged; /* we're running as real uid root */ variable
337 privileged = (uid == 0);
373 if (!options_from_file(_PATH_SYSOPTIONS, !privileged, 0, 1)
H A Doptions.c274 "Take options from a privileged file", OPT_PREPASS },
374 \t\tor when found in the privileged option files (/etc/ppp/options,\n\
396 privileged_option = privileged;
580 ret = options_from_file(path, 0, 1, privileged);
/illumos-gate/usr/src/uts/common/os/
H A Dpriv_defs170 Allows a process to make privileged ioctls to graphics devices.
173 privileged graphics device mappings.
177 Allows a process to perform privileged mappings through a
241 setsockopt(3SOCKET). This allows a privileged process to
253 Allows a process to bind to a privileged port
255 UNIX privileged ports) as well as those ports marked as
/illumos-gate/usr/src/lib/libshare/smb/
H A Dlibshare_smb.c389 boolean_t privileged; local
405 privileged = (priv_isfullset(priv_effective) == B_TRUE);
424 if (privileged == B_FALSE && !online) {
432 "by a privileged user\n"));
444 if (privileged == B_TRUE && !online) {
/illumos-gate/usr/src/lib/libshare/nfs/
H A Dlibshare_nfs.c1914 int privileged; local
1917 * If we aren't a privileged user
1926 privileged = (priv_isfullset(priv_effective) == B_TRUE);
1929 if (!privileged &&
1938 "by a privileged user\n"));
/illumos-gate/usr/src/cmd/cpio/
H A Dcpio.c475 privileged = 0, /* Flag set if running with higher privileges */ variable
1401 privileged = (priv_issubset(zones_privset,
1412 privileged = (Euid == 0);
1418 } else if ((Euid != Rpw_p->pw_uid) && !privileged) {
1855 G_p->g_gid, 0) != 0) && privileged) {
4308 (int)G_p->g_gid) < 0) && privileged) {
5744 AT_SYMLINK_NOFOLLOW) < 0) && privileged) {
6267 AT_SYMLINK_NOFOLLOW) < 0) && privileged) {
6296 if (privileged) {
6319 if (!privileged) {
[all...]
/illumos-gate/usr/src/cmd/perl/contrib/Sun/Solaris/Project/
H A DProject.pm71 'privs' => [ qw(basic privileged priv) ],
1519 $rctl->{'privs'} = ['privileged', 'priv'];
1521 $rctl->{'privs'} = ['basic', 'privileged', 'priv'];
/illumos-gate/usr/src/man/man1m/
H A DMakefile371 polkit-is-privileged.1m \
/illumos-gate/usr/src/uts/sun4v/ml/
H A Dtrap_table.s59 * non-privileged user, you may have to use the FAST_TRAP_DONE macro
225 * Takes breakpoint if privileged, calls trap() if not.
1141 TRAP(T_PRIV_INSTR); /* 011 privileged opcode */
1160 DMMU_EXC_AG_PRIV; /* 037 privileged action */
1683 * not in privileged mode
1704 rdpr %tstate, %g7 ! branch if in privileged mode
/illumos-gate/usr/src/uts/sun4u/ml/
H A Dtrap_table.s58 * non-privileged user, you may have to use the FAST_TRAP_DONE macro
232 * Takes breakpoint if privileged, calls trap() if not.
1372 TRAP(T_PRIV_INSTR); /* 011 privileged opcode */
1392 DMMU_EXC_AG_PRIV; /* 037 privileged action */
1910 * not in privileged mode
1931 rdpr %tstate, %g7 ! branch if in privileged mode

Completed in 406 milliseconds