Searched refs:suser (Results 1 – 6 of 6) sorted by relevance
/titanic_44/usr/src/lib/libsecdb/ |
H A D | exec_attr.txt | 29 All:suser:cmd:::*: 37 Cron Management:suser:cmd:::/usr/bin/crontab:euid=0 38 Crypto Management:suser:cmd:::/usr/sbin/cryptoadm:euid=0 39 Crypto Management:suser:cmd:::/usr/bin/kmfcfg:euid=0 40 Crypto Management:suser:cmd:::/usr/sfw/bin/openssl:euid=0 41 Crypto Management:suser:cmd:::/usr/sfw/bin/CA.pl:euid=0 42 DHCP Management:suser:cmd:::/usr/lib/inet/dhcp/svcadm/dhcpconfig:uid=0 43 DHCP Management:suser:cmd:::/usr/lib/inet/dhcp/svcadm/dhtadm:uid=0 44 DHCP Management:suser:cmd:::/usr/lib/inet/dhcp/svcadm/pntadm:uid=0 45 Device Management:suser:cmd:::/usr/sbin/allocate:uid=0 [all …]
|
/titanic_44/usr/src/cmd/ssh/scp/ |
H A D | scp.c | 441 char *bp, *host, *src, *suser, *thost, *tuser, *arg; local 489 suser = argv[i]; 490 if (*suser == '\0') 491 suser = pwd->pw_name; 492 else if (!okname(suser)) 495 addargs(&alist, "%s", suser); 531 char *bp, *host, *src, *suser; local 556 suser = NULL; 559 suser = argv[i]; 560 if (*suser == '\0') [all …]
|
/titanic_44/usr/src/cmd/cmd-inet/usr.bin/ |
H A D | rcp.c | 542 char *host, *src, *suser, *thost, *tuser; in toremote() local 577 suser = argv[i]; in toremote() 578 if (*suser == '\0') { in toremote() 579 suser = pwd->pw_name; in toremote() 580 } else if (!okname(suser)) { in toremote() 588 suser, "-n", cmd, src, bp, (char *)NULL); in toremote() 793 char *host, *src, *suser, *lhost; in tolocal() local 817 suser = argv[i]; in tolocal() 818 if (*suser == '\0') { in tolocal() 819 suser = pwd->pw_name; in tolocal() [all …]
|
/titanic_44/usr/src/lib/libresolv/ |
H A D | netdb.h | 146 int ruserok(const char *rhost, int suser, const char *ruser, const char *luser);
|
/titanic_44/usr/src/uts/common/os/ |
H A D | cred.c | 517 suser(cred_t *cr) in suser() function
|
H A D | priv_defs | 472 that calls the kernel suser() function to check for allowed access.
|