Home
last modified time | relevance | path

Searched refs:privileged (Results 1 – 25 of 47) sorted by relevance

12

/titanic_44/usr/src/cmd/ssh/libssh/common/
H A Duidswap.c47 static int privileged = 0; variable
68 privileged = 0; in temporarily_use_uid()
73 privileged = 0; in temporarily_use_uid()
78 privileged = 1; in temporarily_use_uid()
145 if (!privileged) { in restore_uid()
/titanic_44/usr/src/lib/pam_modules/passwd_auth/
H A Dpasswd_auth.c78 int privileged; in pam_sm_authenticate() local
143 res = __user_to_authenticate(user, pwu_rep, &auth_user, &privileged); in pam_sm_authenticate()
177 if (privileged) { in pam_sm_authenticate()
207 if (privileged) in pam_sm_authenticate()
/titanic_44/usr/src/lib/libshell/common/tests/
H A Doptions.sh61 if [[ ! -o privileged ]]
78 if [[ -o privileged ]]
106 if [[ -o privileged ]]
132 if [[ -o privileged ]]
188 if [[ -o privileged ]]
312 exec interactive login_shell login-shell logi privileged \
/titanic_44/usr/src/lib/pam_modules/smb/
H A Dsmb_passwd.c86 int privileged; in pam_sm_chauthtok() local
132 &privileged); in pam_sm_chauthtok()
/titanic_44/usr/src/lib/passwdutil/
H A Dnis_attr.c50 char **auth_user, int *privileged);
126 char **auth_user, int *privileged) in nis_user_to_authenticate() argument
148 *privileged = 1; in nis_user_to_authenticate()
154 *privileged = (uid == (uid_t)0); in nis_user_to_authenticate()
H A Dldap_attr.c79 char **auth_user, int *privileged);
193 char **auth_user, int *privileged) in ldap_user_to_authenticate() argument
230 *privileged = 0; /* for proper prompting */ in ldap_user_to_authenticate()
233 *privileged = 1; in ldap_user_to_authenticate()
247 *privileged = 0; in ldap_user_to_authenticate()
253 *privileged = 1; in ldap_user_to_authenticate()
H A Dfiles_attr.c54 char **auth_user, int *privileged);
332 char **auth_user, int *privileged) in files_user_to_authenticate() argument
345 *privileged = 1; in files_user_to_authenticate()
348 *privileged = 0; in files_user_to_authenticate()
/titanic_44/usr/src/cmd/cmd-inet/etc/ppp/
H A Doptions.ttya.tmpl33 # privileged. Those from ~/.ppprc and the command line are privileged
H A Dmyisp.tmpl41 # privileged. Those from ~/.ppprc and the command line are privileged
H A Doptions.tmpl49 # privileged. Those from ~/.ppprc and the command line are privileged
H A Dchap-secrets41 # and the local system name is the "server." In this case, the privileged
55 # interpreted as privileged pppd options, and may be used to enable
H A Dpap-secrets40 # and the local system name is the "server." In this case, the privileged
54 # interpreted as privileged pppd options, and may be used to enable
/titanic_44/usr/src/cmd/policykit/
H A DMakefile26 PROG = polkit-is-privileged
/titanic_44/usr/src/pkg/manifests/
H A Dsystem-library-policykit.mf42 file path=usr/sbin/polkit-is-privileged mode=0555
43 file path=usr/share/man/man1m/polkit-is-privileged.1m
/titanic_44/usr/src/cmd/svc/configd/
H A Dconfigd.c341 int privileged = 0; in create_connection() local
356 privileged = 1; /* he gets full privileges */ in create_connection()
365 privileged = 1; in create_connection()
392 return (create_client(ucred_getpid(uc), debugflags, privileged, in create_connection()
/titanic_44/usr/src/cmd/hal/tools/
H A Dhal-functions.sh13 PK_RESULT=`hal-is-caller-privileged --udi $UDI --action $ACTION \
H A DMakefile31 HAL_LIB = hal-is-caller-privileged
/titanic_44/usr/src/cmd/ypcmd/yppasswd/
H A Dyppasswdd.c568 validloginshell(char *pw_shell, char *arg, int privileged) in validloginshell() argument
599 if (valid == NULL && !privileged) { in validloginshell()
633 if (!privileged || newshell[0] != '/') { in validloginshell()
/titanic_44/usr/src/cmd/cmd-inet/usr.bin/pppd/
H A Dpppd.h196 extern bool privileged; /* We were run by real-uid root */
649 bool check_prot, bool privileged));
655 extern int options_from_list __P((struct wordlist *, bool privileged));
H A Dauth.c369 privileged = 1;
952 if (!auth_required && !allow_any_ip && have_route_to(0) && !privileged) { in auth_check_options()
1846 return allow_any_ip || privileged || !have_route_to(addr);
/titanic_44/usr/src/uts/common/os/
H A Dpriv_defs170 Allows a process to make privileged ioctls to graphics devices.
173 privileged graphics device mappings.
177 Allows a process to perform privileged mappings through a
241 setsockopt(3SOCKET). This allows a privileged process to
253 Allows a process to bind to a privileged port
255 UNIX privileged ports) as well as those ports marked as
/titanic_44/usr/src/lib/libbsm/
H A Daudit_class.txt65 0x00400000:xp:X - privileged/administrative operations
/titanic_44/usr/src/lib/libshare/smb/
H A Dlibshare_smb.c388 boolean_t privileged; in smb_enable_share() local
404 privileged = (priv_isfullset(priv_effective) == B_TRUE); in smb_enable_share()
423 if (privileged == B_FALSE && !online) { in smb_enable_share()
443 if (privileged == B_TRUE && !online) { in smb_enable_share()
/titanic_44/usr/src/cmd/ssh/ssh/
H A Dsshconnect.c184 ssh_create_socket(int privileged, int family) in ssh_create_socket() argument
193 if (privileged) { in ssh_create_socket()
/titanic_44/usr/src/cmd/ssh/
H A DREADME.altprivsep37 implementation where one process, the "monitor" is privileged and
123 No privilege or privileged resources are needed to implement the
183 that drops most privileges and access to privileged resources after
199 privileged resources, and two processes which run with much less
612 privileges and access to privileged resources in the

12