Home
last modified time | relevance | path

Searched refs:privilege (Results 1 – 25 of 30) sorted by relevance

12

/titanic_53/usr/src/uts/common/os/
H A Dpriv_defs31 # add the new privilege at the end; for ordinary releases privileges
35 privilege PRIV_CONTRACT_EVENT
41 privilege PRIV_CONTRACT_IDENTITY
46 privilege PRIV_CONTRACT_OBSERVER
55 privilege PRIV_CPC_CPU
59 privilege PRIV_DTRACE_KERNEL
63 privilege PRIV_DTRACE_PROC
69 privilege PRIV_DTRACE_USER
75 privilege PRIV_FILE_CHOWN
82 privilege PRIV_FILE_CHOWN_SELF
[all …]
H A Dprivs.awk104 /^([A-Za-z]* )?privilege / {
H A Drctl.c469 rctl_priv_t privilege, uint_t action) in rctl_add_default_limit() argument
477 dval->rcv_privilege = privilege; in rctl_add_default_limit()
/titanic_53/usr/src/lib/policykit/libpolkit/common/
H A Dlibpolkit-rbac.c93 const char *privilege, in libpolkit_get_allowed_resources_for_privilege_for_uid() argument
119 const char *privilege, in libpolkit_is_uid_allowed_for_privilege() argument
145 if (strcmp (privilege, "hal-storage-removable-mount") == 0) { in libpolkit_is_uid_allowed_for_privilege()
147 } else if (strcmp (privilege, "hal-storage-removable-mount-all-options") == 0) { in libpolkit_is_uid_allowed_for_privilege()
149 } else if (strcmp (privilege, "hal-storage-fixed-mount") == 0) { in libpolkit_is_uid_allowed_for_privilege()
151 } else if (strcmp (privilege, "hal-storage-fixed-mount-all-options") == 0) { in libpolkit_is_uid_allowed_for_privilege()
153 } else if (strcmp(privilege, "hal-power-suspend") == 0) { in libpolkit_is_uid_allowed_for_privilege()
155 } else if (strcmp(privilege, "hal-power-hibernate") == 0) { in libpolkit_is_uid_allowed_for_privilege()
157 } else if ((strcmp(privilege, "hal-power-shutdown") == 0) || in libpolkit_is_uid_allowed_for_privilege()
158 (strcmp(privilege, "hal-power-reboot") == 0)) { in libpolkit_is_uid_allowed_for_privilege()
[all …]
H A Dlibpolkit.h56 const char *privilege,
64 const char *privilege,
70 const char *privilege,
/titanic_53/usr/src/cmd/hal/tools/
H A Dhal-is-caller-privileged.c77 permission_denied_privilege (const char *privilege, const char *uid) in permission_denied_privilege() argument
81 fprintf (stderr, "%s refused uid %s\n", privilege, uid); in permission_denied_privilege()
108 char *privilege = NULL; in main() local
150 privilege = strdup (optarg); in main()
166 if (udi == NULL || caller == NULL || privilege == NULL) { in main()
190 privilege, in main()
203 permission_denied_privilege (privilege, invoked_by_uid); in main()
H A Dhal-storage-shared.c243 permission_denied_privilege (const char *privilege, const char *uid) in permission_denied_privilege() argument
246 fprintf (stderr, "%s refused uid %s\n", privilege, uid); in permission_denied_privilege()
676 auth_from_privilege(const char *privilege) argument
681 if (strcmp (privilege, "hal-storage-removable-mount") == 0) {
683 } else if (strcmp (privilege, "hal-storage-removable-mount-all-options") == 0) {
685 } else if (strcmp (privilege, "hal-storage-fixed-mount") == 0) {
687 } else if (strcmp (privilege, "hal-storage-fixed-mount-all-options") == 0) {
691 authname = g_strdup (privilege);
H A Dhal-storage-mount.c149 permission_denied_privilege (const char *privilege, const char *uid) in permission_denied_privilege() argument
152 fprintf (stderr, "%s refused uid %s\n", privilege, uid); in permission_denied_privilege()
472 char *privilege; local
799 privilege = "hal-storage-fixed-mount-all-options";
801 privilege = "hal-storage-fixed-mount";
805 privilege = "hal-storage-removable-mount-all-options";
807 privilege = "hal-storage-removable-mount";
812 printf ("using privilege %s for uid %s, system_bus_connection %s\n", privilege, invoked_by_uid,
820 privilege,
831 permission_denied_privilege (privilege, invoked_by_uid);
[all …]
H A Dhal-storage-shared.h74 char *auth_from_privilege(const char *privilege);
/titanic_53/usr/src/cmd/policykit/
H A Dpolkit-is-privileged.c66 char *privilege = NULL; in main() local
111 privilege = g_strdup (optarg); in main()
134 if (user == NULL || privilege == NULL) { in main()
141 printf ("privilege = '%s'\n", privilege); in main()
164 privilege, in main()
186 g_print ("No such privilege '%s'.\n", privilege); in main()
/titanic_53/usr/src/uts/common/smbsrv/ndl/
H A Dlsarpc.ndl310 * Obtain a list of privilege names. This interface is not implemented
728 * actual privilege names.
741 struct mslsa_LuidAndAttributes privilege[ANY_SIZE_ARRAY];
766 * Map a privilege name to a local unique id (LUID). Privilege names
768 * The privilege list is provided as a set of LUIDs so the privilege
769 * lookup functions must be used to identify which the privilege to
786 * Map a privilege value (LUID) to a privilege name. Privilege names
788 * The privilege list is provided as a set of LUIDs so the privilege
789 * lookup functions must be used to identify which the privilege to
806 * Map a privilege name to a local unique id (LUID). Privilege names
[all …]
/titanic_53/usr/src/lib/libc/port/gen/
H A Drctlops.c169 rctlblk_set_privilege(rctlblk_t *rblk, rctl_priv_t privilege) in rctlblk_set_privilege() argument
172 ropaque->rcq_privilege = privilege; in rctlblk_set_privilege()
/titanic_53/usr/src/test/zfs-tests/tests/functional/privilege/
H A DMakefile19 TESTDIR = $(ROOTOPTPKG)/tests/functional/privilege
/titanic_53/usr/src/test/zfs-tests/tests/functional/
H A DMakefile56 privilege \
/titanic_53/usr/src/cmd/localedef/translations/
H A Dzz_AA.UTF-8.priv18 # This is a dummy version of the privilege names file. It is designed to
/titanic_53/usr/src/psm/stand/cpr/sparcv9/sun4u/
H A Dcb_srt0.s91 ! enable fp, privilege, interrupt enable
/titanic_53/usr/src/lib/libbsm/common/
H A Dadt_token.c425 priv_set_t *privilege; in adt_to_priv() local
427 privilege = ((union convert *)p_data)->tprivstar; in adt_to_priv()
429 if (privilege != NULL) { in adt_to_priv()
431 au_to_privset(priv_type, privilege)); in adt_to_priv()
H A Dau_to.c389 au_to_privset(const char *priv_type, const priv_set_t *privilege) in au_to_privset() argument
400 if ((privilege == NULL) || (priv_string = in au_to_privset()
401 priv_set_to_str(privilege, ',', in au_to_privset()
/titanic_53/usr/src/cmd/cmd-inet/etc/default/
H A Dipsec.dfl43 # IKE_ADM_PRIV sets the ikeadm "privilege level", which determines how
/titanic_53/usr/src/lib/libunistat/common/spcs/
H A Dspcs.err37 NEEDROOT = Root privilege required for libspcs access
/titanic_53/usr/src/cmd/hal/addons/cpufreq/
H A Daddon-cpufreq.c658 char *privilege; in check_authorization() local
669 privilege = "hal-power-cpu"; in check_authorization()
718 privilege, in check_authorization()
/titanic_53/usr/src/test/zfs-tests/runfiles/
H A Domnios.run437 [/opt/zfs-tests/tests/functional/privilege]
H A Dopenindiana.run437 [/opt/zfs-tests/tests/functional/privilege]
H A Ddelphix.run438 [/opt/zfs-tests/tests/functional/privilege]
/titanic_53/usr/src/pkg/manifests/
H A Dsystem-test-zfstest.mf119 dir path=opt/zfs-tests/tests/functional/privilege
1923 file path=opt/zfs-tests/tests/functional/privilege/cleanup mode=0555
1924 file path=opt/zfs-tests/tests/functional/privilege/privilege_001_pos mode=0555
1925 file path=opt/zfs-tests/tests/functional/privilege/privilege_002_pos mode=0555
1926 file path=opt/zfs-tests/tests/functional/privilege/setup mode=0555

12