/titanic_44/usr/src/cmd/ssh/libssh/common/ |
H A D | uidswap.c | 47 static int privileged = 0; variable 68 privileged = 0; in temporarily_use_uid() 73 privileged = 0; in temporarily_use_uid() 78 privileged = 1; in temporarily_use_uid() 145 if (!privileged) { in restore_uid()
|
/titanic_44/usr/src/lib/pam_modules/passwd_auth/ |
H A D | passwd_auth.c | 78 int privileged; in pam_sm_authenticate() local 143 res = __user_to_authenticate(user, pwu_rep, &auth_user, &privileged); in pam_sm_authenticate() 177 if (privileged) { in pam_sm_authenticate() 207 if (privileged) in pam_sm_authenticate()
|
/titanic_44/usr/src/lib/libshell/common/tests/ |
H A D | options.sh | 61 if [[ ! -o privileged ]] 78 if [[ -o privileged ]] 106 if [[ -o privileged ]] 132 if [[ -o privileged ]] 188 if [[ -o privileged ]] 312 exec interactive login_shell login-shell logi privileged \
|
/titanic_44/usr/src/lib/pam_modules/smb/ |
H A D | smb_passwd.c | 86 int privileged; in pam_sm_chauthtok() local 132 &privileged); in pam_sm_chauthtok()
|
/titanic_44/usr/src/lib/passwdutil/ |
H A D | nis_attr.c | 50 char **auth_user, int *privileged); 126 char **auth_user, int *privileged) in nis_user_to_authenticate() argument 148 *privileged = 1; in nis_user_to_authenticate() 154 *privileged = (uid == (uid_t)0); in nis_user_to_authenticate()
|
H A D | ldap_attr.c | 79 char **auth_user, int *privileged); 193 char **auth_user, int *privileged) in ldap_user_to_authenticate() argument 230 *privileged = 0; /* for proper prompting */ in ldap_user_to_authenticate() 233 *privileged = 1; in ldap_user_to_authenticate() 247 *privileged = 0; in ldap_user_to_authenticate() 253 *privileged = 1; in ldap_user_to_authenticate()
|
H A D | files_attr.c | 54 char **auth_user, int *privileged); 332 char **auth_user, int *privileged) in files_user_to_authenticate() argument 345 *privileged = 1; in files_user_to_authenticate() 348 *privileged = 0; in files_user_to_authenticate()
|
/titanic_44/usr/src/cmd/cmd-inet/etc/ppp/ |
H A D | options.ttya.tmpl | 33 # privileged. Those from ~/.ppprc and the command line are privileged
|
H A D | myisp.tmpl | 41 # privileged. Those from ~/.ppprc and the command line are privileged
|
H A D | options.tmpl | 49 # privileged. Those from ~/.ppprc and the command line are privileged
|
H A D | chap-secrets | 41 # and the local system name is the "server." In this case, the privileged 55 # interpreted as privileged pppd options, and may be used to enable
|
H A D | pap-secrets | 40 # and the local system name is the "server." In this case, the privileged 54 # interpreted as privileged pppd options, and may be used to enable
|
/titanic_44/usr/src/cmd/policykit/ |
H A D | Makefile | 26 PROG = polkit-is-privileged
|
/titanic_44/usr/src/pkg/manifests/ |
H A D | system-library-policykit.mf | 42 file path=usr/sbin/polkit-is-privileged mode=0555 43 file path=usr/share/man/man1m/polkit-is-privileged.1m
|
/titanic_44/usr/src/cmd/svc/configd/ |
H A D | configd.c | 341 int privileged = 0; in create_connection() local 356 privileged = 1; /* he gets full privileges */ in create_connection() 365 privileged = 1; in create_connection() 392 return (create_client(ucred_getpid(uc), debugflags, privileged, in create_connection()
|
/titanic_44/usr/src/cmd/hal/tools/ |
H A D | hal-functions.sh | 13 PK_RESULT=`hal-is-caller-privileged --udi $UDI --action $ACTION \
|
H A D | Makefile | 31 HAL_LIB = hal-is-caller-privileged
|
/titanic_44/usr/src/cmd/ypcmd/yppasswd/ |
H A D | yppasswdd.c | 568 validloginshell(char *pw_shell, char *arg, int privileged) in validloginshell() argument 599 if (valid == NULL && !privileged) { in validloginshell() 633 if (!privileged || newshell[0] != '/') { in validloginshell()
|
/titanic_44/usr/src/cmd/cmd-inet/usr.bin/pppd/ |
H A D | pppd.h | 196 extern bool privileged; /* We were run by real-uid root */ 649 bool check_prot, bool privileged)); 655 extern int options_from_list __P((struct wordlist *, bool privileged));
|
H A D | auth.c | 369 privileged = 1; 952 if (!auth_required && !allow_any_ip && have_route_to(0) && !privileged) { in auth_check_options() 1846 return allow_any_ip || privileged || !have_route_to(addr);
|
/titanic_44/usr/src/uts/common/os/ |
H A D | priv_defs | 170 Allows a process to make privileged ioctls to graphics devices. 173 privileged graphics device mappings. 177 Allows a process to perform privileged mappings through a 241 setsockopt(3SOCKET). This allows a privileged process to 253 Allows a process to bind to a privileged port 255 UNIX privileged ports) as well as those ports marked as
|
/titanic_44/usr/src/lib/libbsm/ |
H A D | audit_class.txt | 65 0x00400000:xp:X - privileged/administrative operations
|
/titanic_44/usr/src/lib/libshare/smb/ |
H A D | libshare_smb.c | 388 boolean_t privileged; in smb_enable_share() local 404 privileged = (priv_isfullset(priv_effective) == B_TRUE); in smb_enable_share() 423 if (privileged == B_FALSE && !online) { in smb_enable_share() 443 if (privileged == B_TRUE && !online) { in smb_enable_share()
|
/titanic_44/usr/src/cmd/ssh/ssh/ |
H A D | sshconnect.c | 184 ssh_create_socket(int privileged, int family) in ssh_create_socket() argument 193 if (privileged) { in ssh_create_socket()
|
/titanic_44/usr/src/cmd/ssh/ |
H A D | README.altprivsep | 37 implementation where one process, the "monitor" is privileged and 123 No privilege or privileged resources are needed to implement the 183 that drops most privileges and access to privileged resources after 199 privileged resources, and two processes which run with much less 612 privileges and access to privileged resources in the
|