Home
last modified time | relevance | path

Searched refs:privilege (Results 1 – 25 of 31) sorted by relevance

12

/titanic_50/usr/src/uts/common/os/
H A Dpriv_defs31 # add the new privilege at the end; for ordinary releases privileges
35 privilege PRIV_CONTRACT_EVENT
41 privilege PRIV_CONTRACT_IDENTITY
46 privilege PRIV_CONTRACT_OBSERVER
55 privilege PRIV_CPC_CPU
59 privilege PRIV_DTRACE_KERNEL
63 privilege PRIV_DTRACE_PROC
69 privilege PRIV_DTRACE_USER
75 privilege PRIV_FILE_CHOWN
82 privilege PRIV_FILE_CHOWN_SELF
[all …]
H A Dprivs.awk104 /^([A-Za-z]* )?privilege / {
H A Drctl.c469 rctl_priv_t privilege, uint_t action) in rctl_add_default_limit() argument
477 dval->rcv_privilege = privilege; in rctl_add_default_limit()
/titanic_50/usr/src/lib/policykit/libpolkit/common/
H A Dlibpolkit-rbac.c93 const char *privilege, in libpolkit_get_allowed_resources_for_privilege_for_uid() argument
119 const char *privilege, in libpolkit_is_uid_allowed_for_privilege() argument
145 if (strcmp (privilege, "hal-storage-removable-mount") == 0) { in libpolkit_is_uid_allowed_for_privilege()
147 } else if (strcmp (privilege, "hal-storage-removable-mount-all-options") == 0) { in libpolkit_is_uid_allowed_for_privilege()
149 } else if (strcmp (privilege, "hal-storage-fixed-mount") == 0) { in libpolkit_is_uid_allowed_for_privilege()
151 } else if (strcmp (privilege, "hal-storage-fixed-mount-all-options") == 0) { in libpolkit_is_uid_allowed_for_privilege()
153 } else if (strcmp(privilege, "hal-power-suspend") == 0) { in libpolkit_is_uid_allowed_for_privilege()
155 } else if (strcmp(privilege, "hal-power-hibernate") == 0) { in libpolkit_is_uid_allowed_for_privilege()
157 } else if ((strcmp(privilege, "hal-power-shutdown") == 0) || in libpolkit_is_uid_allowed_for_privilege()
158 (strcmp(privilege, "hal-power-reboot") == 0)) { in libpolkit_is_uid_allowed_for_privilege()
[all …]
H A Dlibpolkit.h56 const char *privilege,
64 const char *privilege,
70 const char *privilege,
/titanic_50/usr/src/cmd/hal/tools/
H A Dhal-is-caller-privileged.c77 permission_denied_privilege (const char *privilege, const char *uid) in permission_denied_privilege() argument
81 fprintf (stderr, "%s refused uid %s\n", privilege, uid); in permission_denied_privilege()
108 char *privilege = NULL; in main() local
150 privilege = strdup (optarg); in main()
166 if (udi == NULL || caller == NULL || privilege == NULL) { in main()
190 privilege, in main()
203 permission_denied_privilege (privilege, invoked_by_uid); in main()
H A Dhal-storage-shared.c243 permission_denied_privilege (const char *privilege, const char *uid) in permission_denied_privilege() argument
246 fprintf (stderr, "%s refused uid %s\n", privilege, uid); in permission_denied_privilege()
676 auth_from_privilege(const char *privilege) argument
681 if (strcmp (privilege, "hal-storage-removable-mount") == 0) {
683 } else if (strcmp (privilege, "hal-storage-removable-mount-all-options") == 0) {
685 } else if (strcmp (privilege, "hal-storage-fixed-mount") == 0) {
687 } else if (strcmp (privilege, "hal-storage-fixed-mount-all-options") == 0) {
691 authname = g_strdup (privilege);
H A Dhal-storage-mount.c149 permission_denied_privilege (const char *privilege, const char *uid) in permission_denied_privilege() argument
152 fprintf (stderr, "%s refused uid %s\n", privilege, uid); in permission_denied_privilege()
472 char *privilege; local
799 privilege = "hal-storage-fixed-mount-all-options";
801 privilege = "hal-storage-fixed-mount";
805 privilege = "hal-storage-removable-mount-all-options";
807 privilege = "hal-storage-removable-mount";
812 printf ("using privilege %s for uid %s, system_bus_connection %s\n", privilege, invoked_by_uid,
820 privilege,
831 permission_denied_privilege (privilege, invoked_by_uid);
[all …]
H A Dhal-storage-shared.h74 char *auth_from_privilege(const char *privilege);
/titanic_50/usr/src/cmd/policykit/
H A Dpolkit-is-privileged.c66 char *privilege = NULL; in main() local
111 privilege = g_strdup (optarg); in main()
134 if (user == NULL || privilege == NULL) { in main()
141 printf ("privilege = '%s'\n", privilege); in main()
164 privilege, in main()
186 g_print ("No such privilege '%s'.\n", privilege); in main()
/titanic_50/usr/src/cmd/ssh/
H A DREADME.altprivsep26 Implementations of SSH servers require some degree of privilege in
28 privilege throughout normal operation even while users are logged
30 protocols can be exploited in such ways as to escalate the privilege
33 The OpenSSH team introduced support for "privilege separation" in
41 The ssh team at Sun agrees with the basic OpenSSH privilege
45 with the question of just what is "privilege" and follow on with an
46 analysis of the SSH protocols vis-a-vis privilege. Then we briefly
55 there is a new approach to this sort of privilege with the aim of
57 required; root's privilege is broken down into many privileges and
58 these are managed through privilege sets. We won't go into the
[all …]
/titanic_50/usr/src/uts/common/smbsrv/ndl/
H A Dlsarpc.ndl310 * Obtain a list of privilege names. This interface is not implemented
728 * actual privilege names.
741 struct mslsa_LuidAndAttributes privilege[ANY_SIZE_ARRAY];
766 * Map a privilege name to a local unique id (LUID). Privilege names
768 * The privilege list is provided as a set of LUIDs so the privilege
769 * lookup functions must be used to identify which the privilege to
786 * Map a privilege value (LUID) to a privilege name. Privilege names
788 * The privilege list is provided as a set of LUIDs so the privilege
789 * lookup functions must be used to identify which the privilege to
806 * Map a privilege name to a local unique id (LUID). Privilege names
[all …]
/titanic_50/usr/src/lib/libc/port/gen/
H A Drctlops.c169 rctlblk_set_privilege(rctlblk_t *rblk, rctl_priv_t privilege) in rctlblk_set_privilege() argument
172 ropaque->rcq_privilege = privilege; in rctlblk_set_privilege()
/titanic_50/usr/src/test/zfs-tests/tests/functional/privilege/
H A DMakefile19 TESTDIR = $(ROOTOPTPKG)/tests/functional/privilege
/titanic_50/usr/src/test/zfs-tests/tests/functional/
H A DMakefile56 privilege \
/titanic_50/usr/src/cmd/localedef/translations/
H A Dzz_AA.UTF-8.priv18 # This is a dummy version of the privilege names file. It is designed to
/titanic_50/usr/src/psm/stand/cpr/sparcv9/sun4u/
H A Dcb_srt0.s91 ! enable fp, privilege, interrupt enable
/titanic_50/usr/src/lib/libbsm/common/
H A Dadt_token.c425 priv_set_t *privilege; in adt_to_priv() local
427 privilege = ((union convert *)p_data)->tprivstar; in adt_to_priv()
429 if (privilege != NULL) { in adt_to_priv()
431 au_to_privset(priv_type, privilege)); in adt_to_priv()
H A Dau_to.c389 au_to_privset(const char *priv_type, const priv_set_t *privilege) in au_to_privset() argument
400 if ((privilege == NULL) || (priv_string = in au_to_privset()
401 priv_set_to_str(privilege, ',', in au_to_privset()
/titanic_50/usr/src/cmd/cmd-inet/etc/default/
H A Dipsec.dfl43 # IKE_ADM_PRIV sets the ikeadm "privilege level", which determines how
/titanic_50/usr/src/lib/libunistat/common/spcs/
H A Dspcs.err37 NEEDROOT = Root privilege required for libspcs access
/titanic_50/usr/src/cmd/hal/addons/cpufreq/
H A Daddon-cpufreq.c658 char *privilege; in check_authorization() local
669 privilege = "hal-power-cpu"; in check_authorization()
718 privilege, in check_authorization()
/titanic_50/usr/src/test/zfs-tests/runfiles/
H A Ddelphix.run438 [/opt/zfs-tests/tests/functional/privilege]
H A Domnios.run437 [/opt/zfs-tests/tests/functional/privilege]
H A Dopenindiana.run437 [/opt/zfs-tests/tests/functional/privilege]

12