/illumos-gate/usr/src/contrib/ast/src/cmd/ksh93/ |
H A D | ksh-regress.tst | 17 OUTPUT - 'set --default --braceexpand --privileged --trackall --vi --viraw' 34 OUTPUT - 'set --default --braceexpand --privileged --trackall --vi --viraw' 59 OUTPUT - 'set --default --braceexpand --privileged --trackall --vi --viraw' 84 OUTPUT - 'set --default --braceexpand --privileged --trackall --vi --viraw' 97 OUTPUT - 'set --default --braceexpand --privileged --trackall --vi --viraw' 114 OUTPUT - 'set --default --braceexpand --privileged --trackall --vi --viraw' 139 OUTPUT - 'set --default --braceexpand --privileged --trackall --vi --viraw' 164 OUTPUT - 'set --default --braceexpand --privileged --trackall --vi --viraw' 177 OUTPUT - 'set --default --braceexpand --privileged --restricted --trackall --vi --viraw' 194 OUTPUT - 'set --default --braceexpand --privileged --restricted --trackall --vi --viraw' [all …]
|
H A D | ksh-regress.rt | 18 privileged 67 TEST privileged/noprivileged sequence 69 EXEC --regress=etc=. --regress=euid=1 --privileged <<! 70 set --state; set --noprivileged; set --state; set --privileged; set --state; set --noprivileged; se…
|
/illumos-gate/usr/src/lib/pam_modules/passwd_auth/ |
H A D | passwd_auth.c | 80 int privileged; in pam_sm_authenticate() local 146 res = __user_to_authenticate(user, pwu_rep, &auth_user, &privileged); in pam_sm_authenticate() 180 if (privileged) { in pam_sm_authenticate() 210 if (privileged) in pam_sm_authenticate()
|
/illumos-gate/usr/src/contrib/ast/src/cmd/ksh93/tests/ |
H A D | options.sh | 61 if [[ ! -o privileged ]] 78 if [[ -o privileged ]] 106 if [[ -o privileged ]] 132 if [[ -o privileged ]] 188 if [[ -o privileged ]] 312 exec interactive login_shell login-shell logi privileged \
|
/illumos-gate/usr/src/lib/pam_modules/smb/ |
H A D | smb_passwd.c | 87 int privileged; in pam_sm_chauthtok() local 133 &privileged); in pam_sm_chauthtok()
|
/illumos-gate/usr/src/lib/passwdutil/ |
H A D | nis_attr.c | 52 char **auth_user, int *privileged); 128 char **auth_user, int *privileged) in nis_user_to_authenticate() argument 150 *privileged = 1; in nis_user_to_authenticate() 156 *privileged = (uid == (uid_t)0); in nis_user_to_authenticate()
|
H A D | ldap_attr.c | 82 char **auth_user, int *privileged); 196 char **auth_user, int *privileged) in ldap_user_to_authenticate() argument 233 *privileged = 0; /* for proper prompting */ in ldap_user_to_authenticate() 236 *privileged = 1; in ldap_user_to_authenticate() 250 *privileged = 0; in ldap_user_to_authenticate() 256 *privileged = 1; in ldap_user_to_authenticate()
|
H A D | files_attr.c | 58 char **auth_user, int *privileged); 337 char **auth_user, int *privileged) in files_user_to_authenticate() argument 350 *privileged = 1; in files_user_to_authenticate() 353 *privileged = 0; in files_user_to_authenticate()
|
/illumos-gate/usr/src/cmd/cmd-inet/etc/ppp/ |
H A D | options.ttya.tmpl | 33 # privileged. Those from ~/.ppprc and the command line are privileged
|
H A D | myisp.tmpl | 41 # privileged. Those from ~/.ppprc and the command line are privileged
|
H A D | options.tmpl | 49 # privileged. Those from ~/.ppprc and the command line are privileged
|
H A D | chap-secrets | 41 # and the local system name is the "server." In this case, the privileged 55 # interpreted as privileged pppd options, and may be used to enable
|
H A D | pap-secrets | 40 # and the local system name is the "server." In this case, the privileged 54 # interpreted as privileged pppd options, and may be used to enable
|
/illumos-gate/usr/src/cmd/svc/configd/ |
H A D | configd.c | 342 int privileged = 0; in create_connection() local 357 privileged = 1; /* it gets full privileges */ in create_connection() 366 privileged = 1; in create_connection() 393 return (create_client(ucred_getpid(uc), debugflags, privileged, in create_connection()
|
/illumos-gate/usr/src/pkg/manifests/ |
H A D | system-library-policykit.p5m | 42 file path=usr/sbin/polkit-is-privileged mode=0555 44 file path=usr/share/man/man8/polkit-is-privileged.8
|
/illumos-gate/usr/src/cmd/policykit/ |
H A D | Makefile | 28 PROG = polkit-is-privileged
|
/illumos-gate/usr/src/cmd/hal/tools/ |
H A D | hal-functions.sh | 13 PK_RESULT=`hal-is-caller-privileged --udi $UDI --action $ACTION \
|
H A D | Makefile | 31 HAL_LIB = hal-is-caller-privileged
|
/illumos-gate/usr/src/cmd/ypcmd/yppasswd/ |
H A D | yppasswdd.c | 566 validloginshell(char *pw_shell, char *arg, int privileged) in validloginshell() argument 597 if (valid == NULL && !privileged) { in validloginshell() 631 if (!privileged || newshell[0] != '/') { in validloginshell()
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/pppd/ |
H A D | pppd.h | 203 extern bool privileged; /* We were run by real-uid root */ 656 bool check_prot, bool privileged)); 662 extern int options_from_list __P((struct wordlist *, bool privileged));
|
H A D | auth.c | 366 privileged = 1; 949 if (!auth_required && !allow_any_ip && have_route_to(0) && !privileged) { in auth_check_options() 1839 return allow_any_ip || privileged || !have_route_to(addr);
|
/illumos-gate/usr/src/uts/common/os/ |
H A D | priv_defs | 170 Allows a process to make privileged ioctls to graphics devices. 173 privileged graphics device mappings. 177 Allows a process to perform privileged mappings through a 241 setsockopt(3SOCKET). This allows a privileged process to 253 Allows a process to bind to a privileged port 255 UNIX privileged ports) as well as those ports marked as
|
/illumos-gate/usr/src/lib/libbsm/ |
H A D | audit_class.txt | 63 0x00400000:xp:X - privileged/administrative operations
|
/illumos-gate/usr/src/cmd/perl/contrib/Sun/Solaris/Project/t/ |
H A D | Project.t | 462 [ 0, 0, { "allowunits" => 1 }, "rctl4:166::::project.max-crypto-memory=(privileged,100m,deny)" ], 463 [ 0, 0, {}, "rctl4:166::::project.max-crypto-memory=(privileged,100,deny)" ], 670 [ 0, 1, {}, "rctl4:166::::project.max-crypto-memory=(privileged,100p,deny)" ],
|
/illumos-gate/usr/src/man/man8/ |
H A D | Makefile | 348 polkit-is-privileged.8 \
|