/illumos-gate/usr/src/cmd/policykit/ |
H A D | Makefile | 26 PROG = polkit-is-privileged
|
/illumos-gate/usr/src/cmd/hal/tools/ |
H A D | hal-functions.sh | 13 PK_RESULT=`hal-is-caller-privileged --udi $UDI --action $ACTION \ 18 echo "Cannot determine if caller is privileged" >&2
|
H A D | Makefile | 31 HAL_LIB = hal-is-caller-privileged
|
/illumos-gate/usr/src/lib/pam_modules/passwd_auth/ |
H A D | passwd_auth.c | 78 int privileged; local 143 res = __user_to_authenticate(user, pwu_rep, &auth_user, &privileged); 177 if (privileged) { 207 if (privileged) 211 * Non privileged user: so we need to check the old password
|
/illumos-gate/usr/src/lib/pam_modules/smb/ |
H A D | smb_passwd.c | 86 int privileged; local 132 &privileged);
|
/illumos-gate/usr/src/lib/libshell/common/tests/ |
H A D | options.sh | 61 if [[ ! -o privileged ]] 78 if [[ -o privileged ]] 81 err_exit 'privileged nointeractive shell reads $ENV file' 83 err_exit 'privileged -E reads $ENV file' 85 err_exit 'privileged +E reads $ENV file' 87 err_exit 'privileged --rc reads $ENV file' 89 err_exit 'privileged --norc reads $ENV file' 106 if [[ -o privileged ]] 109 err_exit 'privileged nointeractive shell reads $HOME/.kshrc file' 111 err_exit 'privileged [all...] |
/illumos-gate/usr/src/lib/passwdutil/ |
H A D | nis_attr.c | 50 char **auth_user, int *privileged); 81 * Are we a 'privileged' process? Yes if we are running on the 120 * nis_user_to_authenticate(name, rep, auth_user, privileged) 126 char **auth_user, int *privileged) 148 *privileged = 1; 154 *privileged = (uid == (uid_t)0); 474 * If we are privileged, we create a ticlts connection to the 125 nis_user_to_authenticate(char *user, pwu_repository_t *rep, char **auth_user, int *privileged) argument
|
H A D | ldap_attr.c | 79 char **auth_user, int *privileged); 179 * int ldap_user_to_authenticate(user, rep, auth_user, privileged) 185 * we can't determine whether the user is "privileged" in the LDAP 188 * privileged if he/she is attempting to change another user's 193 char **auth_user, int *privileged) 230 *privileged = 0; /* for proper prompting */ 233 *privileged = 1; 246 /* changing our own, not privileged */ 247 *privileged = 0; 253 *privileged 192 ldap_user_to_authenticate(char *user, pwu_repository_t *rep, char **auth_user, int *privileged) argument [all...] |
H A D | files_attr.c | 54 char **auth_user, int *privileged); 131 * Are we a privileged user with regard to the files repository? 321 * int files_user_to_authenticate(name, rep, auth_user, privileged) 332 char **auth_user, int *privileged) 345 *privileged = 1; 348 *privileged = 0; 331 files_user_to_authenticate(char *user, pwu_repository_t *rep, char **auth_user, int *privileged) argument
|
/illumos-gate/usr/src/cmd/svc/configd/ |
H A D | configd.c | 341 int privileged = 0; local 347 * in privileged pid mode, we only allow connections from 356 privileged = 1; /* he gets full privileges */ 359 * in privileged user mode, only one particular user is 365 privileged = 1; 392 return (create_client(ucred_getpid(uc), debugflags, privileged,
|
H A D | client.c | 2436 create_client(pid_t pid, uint32_t debugflags, int privileged, int *out_fd) argument 2457 cp->rc_all_auths = privileged;
|
/illumos-gate/usr/src/cmd/ypcmd/yppasswd/ |
H A D | yppasswdd.c | 568 validloginshell(char *pw_shell, char *arg, int privileged) argument 599 if (valid == NULL && !privileged) { 633 if (!privileged || newshell[0] != '/') {
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/pppd/ |
H A D | pppd.h | 128 #define OPT_PRIV 0x1000 /* privileged option */ 196 extern bool privileged; /* We were run by real-uid root */ 383 * command line, etc.) and whether it came from a privileged source. 649 bool check_prot, bool privileged)); 655 extern int options_from_list __P((struct wordlist *, bool privileged));
|
H A D | auth.c | 281 "Allow group members to use privileged options", OPT_PRIV }, 351 * privgroup - allow members of the group to have privileged access. 369 privileged = 1; 952 if (!auth_required && !allow_any_ip && have_route_to(0) && !privileged) { 1846 return allow_any_ip || privileged || !have_route_to(addr);
|
H A D | main.c | 106 bool privileged; /* we're running as real uid root */ variable 337 privileged = (uid == 0); 373 if (!options_from_file(_PATH_SYSOPTIONS, !privileged, 0, 1)
|
H A D | options.c | 274 "Take options from a privileged file", OPT_PREPASS }, 374 \t\tor when found in the privileged option files (/etc/ppp/options,\n\ 396 privileged_option = privileged; 580 ret = options_from_file(path, 0, 1, privileged);
|
/illumos-gate/usr/src/uts/common/os/ |
H A D | priv_defs | 170 Allows a process to make privileged ioctls to graphics devices. 173 privileged graphics device mappings. 177 Allows a process to perform privileged mappings through a 241 setsockopt(3SOCKET). This allows a privileged process to 253 Allows a process to bind to a privileged port 255 UNIX privileged ports) as well as those ports marked as
|
/illumos-gate/usr/src/lib/libshare/smb/ |
H A D | libshare_smb.c | 389 boolean_t privileged; local 405 privileged = (priv_isfullset(priv_effective) == B_TRUE); 424 if (privileged == B_FALSE && !online) { 432 "by a privileged user\n")); 444 if (privileged == B_TRUE && !online) {
|
/illumos-gate/usr/src/lib/libshare/nfs/ |
H A D | libshare_nfs.c | 1914 int privileged; local 1917 * If we aren't a privileged user 1926 privileged = (priv_isfullset(priv_effective) == B_TRUE); 1929 if (!privileged && 1938 "by a privileged user\n"));
|
/illumos-gate/usr/src/cmd/cpio/ |
H A D | cpio.c | 475 privileged = 0, /* Flag set if running with higher privileges */ variable 1401 privileged = (priv_issubset(zones_privset, 1412 privileged = (Euid == 0); 1418 } else if ((Euid != Rpw_p->pw_uid) && !privileged) { 1855 G_p->g_gid, 0) != 0) && privileged) { 4308 (int)G_p->g_gid) < 0) && privileged) { 5744 AT_SYMLINK_NOFOLLOW) < 0) && privileged) { 6267 AT_SYMLINK_NOFOLLOW) < 0) && privileged) { 6296 if (privileged) { 6319 if (!privileged) { [all...] |
/illumos-gate/usr/src/cmd/perl/contrib/Sun/Solaris/Project/ |
H A D | Project.pm | 71 'privs' => [ qw(basic privileged priv) ], 1519 $rctl->{'privs'} = ['privileged', 'priv']; 1521 $rctl->{'privs'} = ['basic', 'privileged', 'priv'];
|
/illumos-gate/usr/src/man/man1m/ |
H A D | Makefile | 371 polkit-is-privileged.1m \
|
/illumos-gate/usr/src/uts/sun4v/ml/ |
H A D | trap_table.s | 59 * non-privileged user, you may have to use the FAST_TRAP_DONE macro 225 * Takes breakpoint if privileged, calls trap() if not. 1141 TRAP(T_PRIV_INSTR); /* 011 privileged opcode */ 1160 DMMU_EXC_AG_PRIV; /* 037 privileged action */ 1683 * not in privileged mode 1704 rdpr %tstate, %g7 ! branch if in privileged mode
|
/illumos-gate/usr/src/uts/sun4u/ml/ |
H A D | trap_table.s | 58 * non-privileged user, you may have to use the FAST_TRAP_DONE macro 232 * Takes breakpoint if privileged, calls trap() if not. 1372 TRAP(T_PRIV_INSTR); /* 011 privileged opcode */ 1392 DMMU_EXC_AG_PRIV; /* 037 privileged action */ 1910 * not in privileged mode 1931 rdpr %tstate, %g7 ! branch if in privileged mode
|