/titanic_50/usr/src/uts/common/os/ |
H A D | priv_defs | 31 # add the new privilege at the end; for ordinary releases privileges 35 privilege PRIV_CONTRACT_EVENT 41 privilege PRIV_CONTRACT_IDENTITY 46 privilege PRIV_CONTRACT_OBSERVER 55 privilege PRIV_CPC_CPU 59 privilege PRIV_DTRACE_KERNEL 63 privilege PRIV_DTRACE_PROC 69 privilege PRIV_DTRACE_USER 75 privilege PRIV_FILE_CHOWN 82 privilege PRIV_FILE_CHOWN_SELF [all …]
|
H A D | privs.awk | 104 /^([A-Za-z]* )?privilege / {
|
H A D | rctl.c | 469 rctl_priv_t privilege, uint_t action) in rctl_add_default_limit() argument 477 dval->rcv_privilege = privilege; in rctl_add_default_limit()
|
/titanic_50/usr/src/lib/policykit/libpolkit/common/ |
H A D | libpolkit-rbac.c | 93 const char *privilege, in libpolkit_get_allowed_resources_for_privilege_for_uid() argument 119 const char *privilege, in libpolkit_is_uid_allowed_for_privilege() argument 145 if (strcmp (privilege, "hal-storage-removable-mount") == 0) { in libpolkit_is_uid_allowed_for_privilege() 147 } else if (strcmp (privilege, "hal-storage-removable-mount-all-options") == 0) { in libpolkit_is_uid_allowed_for_privilege() 149 } else if (strcmp (privilege, "hal-storage-fixed-mount") == 0) { in libpolkit_is_uid_allowed_for_privilege() 151 } else if (strcmp (privilege, "hal-storage-fixed-mount-all-options") == 0) { in libpolkit_is_uid_allowed_for_privilege() 153 } else if (strcmp(privilege, "hal-power-suspend") == 0) { in libpolkit_is_uid_allowed_for_privilege() 155 } else if (strcmp(privilege, "hal-power-hibernate") == 0) { in libpolkit_is_uid_allowed_for_privilege() 157 } else if ((strcmp(privilege, "hal-power-shutdown") == 0) || in libpolkit_is_uid_allowed_for_privilege() 158 (strcmp(privilege, "hal-power-reboot") == 0)) { in libpolkit_is_uid_allowed_for_privilege() [all …]
|
H A D | libpolkit.h | 56 const char *privilege, 64 const char *privilege, 70 const char *privilege,
|
/titanic_50/usr/src/cmd/hal/tools/ |
H A D | hal-is-caller-privileged.c | 77 permission_denied_privilege (const char *privilege, const char *uid) in permission_denied_privilege() argument 81 fprintf (stderr, "%s refused uid %s\n", privilege, uid); in permission_denied_privilege() 108 char *privilege = NULL; in main() local 150 privilege = strdup (optarg); in main() 166 if (udi == NULL || caller == NULL || privilege == NULL) { in main() 190 privilege, in main() 203 permission_denied_privilege (privilege, invoked_by_uid); in main()
|
H A D | hal-storage-shared.c | 243 permission_denied_privilege (const char *privilege, const char *uid) in permission_denied_privilege() argument 246 fprintf (stderr, "%s refused uid %s\n", privilege, uid); in permission_denied_privilege() 676 auth_from_privilege(const char *privilege) argument 681 if (strcmp (privilege, "hal-storage-removable-mount") == 0) { 683 } else if (strcmp (privilege, "hal-storage-removable-mount-all-options") == 0) { 685 } else if (strcmp (privilege, "hal-storage-fixed-mount") == 0) { 687 } else if (strcmp (privilege, "hal-storage-fixed-mount-all-options") == 0) { 691 authname = g_strdup (privilege);
|
H A D | hal-storage-mount.c | 149 permission_denied_privilege (const char *privilege, const char *uid) in permission_denied_privilege() argument 152 fprintf (stderr, "%s refused uid %s\n", privilege, uid); in permission_denied_privilege() 472 char *privilege; local 799 privilege = "hal-storage-fixed-mount-all-options"; 801 privilege = "hal-storage-fixed-mount"; 805 privilege = "hal-storage-removable-mount-all-options"; 807 privilege = "hal-storage-removable-mount"; 812 printf ("using privilege %s for uid %s, system_bus_connection %s\n", privilege, invoked_by_uid, 820 privilege, 831 permission_denied_privilege (privilege, invoked_by_uid); [all …]
|
H A D | hal-storage-shared.h | 74 char *auth_from_privilege(const char *privilege);
|
/titanic_50/usr/src/cmd/policykit/ |
H A D | polkit-is-privileged.c | 66 char *privilege = NULL; in main() local 111 privilege = g_strdup (optarg); in main() 134 if (user == NULL || privilege == NULL) { in main() 141 printf ("privilege = '%s'\n", privilege); in main() 164 privilege, in main() 186 g_print ("No such privilege '%s'.\n", privilege); in main()
|
/titanic_50/usr/src/cmd/ssh/ |
H A D | README.altprivsep | 26 Implementations of SSH servers require some degree of privilege in 28 privilege throughout normal operation even while users are logged 30 protocols can be exploited in such ways as to escalate the privilege 33 The OpenSSH team introduced support for "privilege separation" in 41 The ssh team at Sun agrees with the basic OpenSSH privilege 45 with the question of just what is "privilege" and follow on with an 46 analysis of the SSH protocols vis-a-vis privilege. Then we briefly 55 there is a new approach to this sort of privilege with the aim of 57 required; root's privilege is broken down into many privileges and 58 these are managed through privilege sets. We won't go into the [all …]
|
/titanic_50/usr/src/uts/common/smbsrv/ndl/ |
H A D | lsarpc.ndl | 310 * Obtain a list of privilege names. This interface is not implemented 728 * actual privilege names. 741 struct mslsa_LuidAndAttributes privilege[ANY_SIZE_ARRAY]; 766 * Map a privilege name to a local unique id (LUID). Privilege names 768 * The privilege list is provided as a set of LUIDs so the privilege 769 * lookup functions must be used to identify which the privilege to 786 * Map a privilege value (LUID) to a privilege name. Privilege names 788 * The privilege list is provided as a set of LUIDs so the privilege 789 * lookup functions must be used to identify which the privilege to 806 * Map a privilege name to a local unique id (LUID). Privilege names [all …]
|
/titanic_50/usr/src/lib/libc/port/gen/ |
H A D | rctlops.c | 169 rctlblk_set_privilege(rctlblk_t *rblk, rctl_priv_t privilege) in rctlblk_set_privilege() argument 172 ropaque->rcq_privilege = privilege; in rctlblk_set_privilege()
|
/titanic_50/usr/src/test/zfs-tests/tests/functional/privilege/ |
H A D | Makefile | 19 TESTDIR = $(ROOTOPTPKG)/tests/functional/privilege
|
/titanic_50/usr/src/test/zfs-tests/tests/functional/ |
H A D | Makefile | 56 privilege \
|
/titanic_50/usr/src/cmd/localedef/translations/ |
H A D | zz_AA.UTF-8.priv | 18 # This is a dummy version of the privilege names file. It is designed to
|
/titanic_50/usr/src/psm/stand/cpr/sparcv9/sun4u/ |
H A D | cb_srt0.s | 91 ! enable fp, privilege, interrupt enable
|
/titanic_50/usr/src/lib/libbsm/common/ |
H A D | adt_token.c | 425 priv_set_t *privilege; in adt_to_priv() local 427 privilege = ((union convert *)p_data)->tprivstar; in adt_to_priv() 429 if (privilege != NULL) { in adt_to_priv() 431 au_to_privset(priv_type, privilege)); in adt_to_priv()
|
H A D | au_to.c | 389 au_to_privset(const char *priv_type, const priv_set_t *privilege) in au_to_privset() argument 400 if ((privilege == NULL) || (priv_string = in au_to_privset() 401 priv_set_to_str(privilege, ',', in au_to_privset()
|
/titanic_50/usr/src/cmd/cmd-inet/etc/default/ |
H A D | ipsec.dfl | 43 # IKE_ADM_PRIV sets the ikeadm "privilege level", which determines how
|
/titanic_50/usr/src/lib/libunistat/common/spcs/ |
H A D | spcs.err | 37 NEEDROOT = Root privilege required for libspcs access
|
/titanic_50/usr/src/cmd/hal/addons/cpufreq/ |
H A D | addon-cpufreq.c | 658 char *privilege; in check_authorization() local 669 privilege = "hal-power-cpu"; in check_authorization() 718 privilege, in check_authorization()
|
/titanic_50/usr/src/test/zfs-tests/runfiles/ |
H A D | delphix.run | 438 [/opt/zfs-tests/tests/functional/privilege]
|
H A D | omnios.run | 437 [/opt/zfs-tests/tests/functional/privilege]
|
H A D | openindiana.run | 437 [/opt/zfs-tests/tests/functional/privilege]
|