Lines Matching defs:su

33  *	su [-] [name [arg ...]] change userid, `-' changes environment.
34 * If SULOG is defined, all attempts to su to another user are
36 * If CONSOLE is defined, all successful attempts to su to uid 0
39 * If su cannot create, open, or write entries into SULOG,
41 * be logged -- thus losing a record of the su's attempted
90 * Intervals to sleep after failed su
97 #define DEFFILE "/etc/default/su"
104 * Locale variables to be propagated to "su -" environment
147 char su[PATH_MAX] = "su"; /* arg0 for exec of shprog */
234 * catch bad usage (like "su - -c ls").
282 if (pam_start(embedded ? EMBEDDED_NAME : "su", nptr,
292 openlog("su", LOG_CONS, LOG_AUTH);
348 syslog(LOG_CRIT, "'su %s' failed for %s on %s",
358 syslog(LOG_CRIT, "'su %s' failed for %s on %s",
378 "'su %s' succeeded for %s on %s",
408 syslog(LOG_CRIT, "'su %s' failed for %s on %s",
420 "'su %s' succeeded for %s on %s",
458 * su = [-]last component of shell's pathname
460 * Otherwise, set the shell to /usr/bin/sh and set argv[0] to '[-]su'.
466 (void) strcpy(su, eflag ? "-" : "");
469 (void) strlcat(su, p + 1, sizeof (su));
471 (void) strlcat(su, pshell, sizeof (su));
474 (void) strcpy(su, eflag ? "-su" : "su");
649 * -> if shell = default, then su = [-]su
650 * -> if shell != default, then su = [-]last component of
653 * if no additional arguments, exec shell with arg0 of su
655 * -> if shell = default, then su = [-]su
656 * -> if shell != default, then su = [-]last component of
660 argv[1] = su;
663 (void) execl(pshell, su, 0);
678 (void) strcpy(su, "-sh");
682 (void) strcpy(su, "sh");
686 argv[1] = su;
689 (void) execl(safe_shell, su, 0);
701 * This routine is called when a user is su'ing to root
706 * their current values after the su (if they are exported).
741 * towho = specified user ( user being su'ed to )
742 * how = 0 if su attempt failed; 1 if su attempt succeeded
776 * audit_success - audit successful su
846 * audit_logout - audit successful su logout
848 * Entry ah = Successful su audit handle
849 * event_id = su event ID: ADT_su, ADT_role_login
852 * su logout event written.
874 "su audit_logout: could not alloc basic privs: %m");
880 * The child returns and continues su processing.
895 "su audit_logout: could not fork: %m");
912 "su audit_logout: could not chdir /: %m");
926 "su audit_logout: could not reduce privs: %m");
995 * audit_failure - audit failed su
1043 * can't tell if user not found is a role, so always use su
1045 * distinguish and set name in both su and role_login
1066 "su: adt_alloc_event(ADT_passwd): %m");
1070 "su: adt_put_event(ADT_passwd, ADT_FAILURE): %m");
1346 "'su %s' failed for %s on %s",
1357 syslog(LOG_CRIT, "'su %s' failed for %s on %s",
1440 syslog(LOG_CRIT, "'su %s' failed for %s "
1449 syslog(LOG_CRIT, "'su %s' failed for %s "