Home
last modified time | relevance | path

Searched refs:privileged (Results 1 – 25 of 40) sorted by relevance

12

/illumos-gate/usr/src/contrib/ast/src/cmd/ksh93/
H A Dksh-regress.tst17 OUTPUT - 'set --default --braceexpand --privileged --trackall --vi --viraw'
1461 EXEC --regress=etc=. --regress=source --privileged
1526 EXEC --regress=etc=. --regress=source --privileged --norestricted
1591 EXEC --regress=etc=. --regress=source --privileged --restricted
1656 EXEC --regress=etc=. --regress=source --privileged --norc
1851 EXEC --regress=etc=. --regress=source --privileged --rc
3495 EXEC --regress=etc=. --regress=source --nologin --privileged
6153 EXEC --regress=etc=. --regress=source --login --privileged
6669 EXEC --regress=etc=. --regress=source --login --privileged --rc
22530 TEST 02 'privileged/noprivileged sequence'
[all …]
H A Dksh-regress.rt18 privileged
67 TEST privileged/noprivileged sequence
69 EXEC --regress=etc=. --regress=euid=1 --privileged <<!
70 set --state; set --noprivileged; set --state; set --privileged; set --state; set --noprivileged; se…
/illumos-gate/usr/src/lib/pam_modules/passwd_auth/
H A Dpasswd_auth.c78 int privileged; in pam_sm_authenticate() local
143 res = __user_to_authenticate(user, pwu_rep, &auth_user, &privileged); in pam_sm_authenticate()
177 if (privileged) { in pam_sm_authenticate()
207 if (privileged) in pam_sm_authenticate()
/illumos-gate/usr/src/contrib/ast/src/cmd/ksh93/tests/
H A Doptions.sh61 if [[ ! -o privileged ]]
78 if [[ -o privileged ]]
106 if [[ -o privileged ]]
132 if [[ -o privileged ]]
188 if [[ -o privileged ]]
312 exec interactive login_shell login-shell logi privileged \
/illumos-gate/usr/src/lib/pam_modules/smb/
H A Dsmb_passwd.c84 int privileged; in pam_sm_chauthtok() local
130 &privileged); in pam_sm_chauthtok()
/illumos-gate/usr/src/lib/passwdutil/
H A Dnis_attr.c50 char **auth_user, int *privileged);
126 char **auth_user, int *privileged) in nis_user_to_authenticate() argument
148 *privileged = 1; in nis_user_to_authenticate()
154 *privileged = (uid == (uid_t)0); in nis_user_to_authenticate()
H A Dldap_attr.c80 char **auth_user, int *privileged);
194 char **auth_user, int *privileged) in ldap_user_to_authenticate() argument
231 *privileged = 0; /* for proper prompting */ in ldap_user_to_authenticate()
234 *privileged = 1; in ldap_user_to_authenticate()
248 *privileged = 0; in ldap_user_to_authenticate()
254 *privileged = 1; in ldap_user_to_authenticate()
H A Dfiles_attr.c55 char **auth_user, int *privileged);
333 char **auth_user, int *privileged) in files_user_to_authenticate() argument
346 *privileged = 1; in files_user_to_authenticate()
349 *privileged = 0; in files_user_to_authenticate()
/illumos-gate/usr/src/cmd/cmd-inet/etc/ppp/
H A Doptions.ttya.tmpl33 # privileged. Those from ~/.ppprc and the command line are privileged
H A Dmyisp.tmpl41 # privileged. Those from ~/.ppprc and the command line are privileged
H A Doptions.tmpl49 # privileged. Those from ~/.ppprc and the command line are privileged
H A Dchap-secrets41 # and the local system name is the "server." In this case, the privileged
55 # interpreted as privileged pppd options, and may be used to enable
H A Dpap-secrets40 # and the local system name is the "server." In this case, the privileged
54 # interpreted as privileged pppd options, and may be used to enable
/illumos-gate/usr/src/cmd/svc/configd/
H A Dconfigd.c342 int privileged = 0; in create_connection() local
357 privileged = 1; /* it gets full privileges */ in create_connection()
366 privileged = 1; in create_connection()
393 return (create_client(ucred_getpid(uc), debugflags, privileged, in create_connection()
/illumos-gate/usr/src/pkg/manifests/
H A Dsystem-library-policykit.p5m42 file path=usr/sbin/polkit-is-privileged mode=0555
44 file path=usr/share/man/man8/polkit-is-privileged.8
/illumos-gate/usr/src/cmd/policykit/
H A DMakefile28 PROG = polkit-is-privileged
/illumos-gate/usr/src/cmd/hal/tools/
H A Dhal-functions.sh13 PK_RESULT=`hal-is-caller-privileged --udi $UDI --action $ACTION \
H A DMakefile31 HAL_LIB = hal-is-caller-privileged
/illumos-gate/usr/src/cmd/ypcmd/yppasswd/
H A Dyppasswdd.c566 validloginshell(char *pw_shell, char *arg, int privileged) in validloginshell() argument
597 if (valid == NULL && !privileged) { in validloginshell()
631 if (!privileged || newshell[0] != '/') { in validloginshell()
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/pppd/
H A Dpppd.h203 extern bool privileged; /* We were run by real-uid root */
656 bool check_prot, bool privileged));
662 extern int options_from_list __P((struct wordlist *, bool privileged));
H A Dauth.c362 privileged = 1;
945 if (!auth_required && !allow_any_ip && have_route_to(0) && !privileged) { in auth_check_options()
1839 return allow_any_ip || privileged || !have_route_to(addr);
/illumos-gate/usr/src/uts/common/os/
H A Dpriv_defs170 Allows a process to make privileged ioctls to graphics devices.
173 privileged graphics device mappings.
177 Allows a process to perform privileged mappings through a
241 setsockopt(3SOCKET). This allows a privileged process to
253 Allows a process to bind to a privileged port
255 UNIX privileged ports) as well as those ports marked as
/illumos-gate/usr/src/lib/libbsm/
H A Daudit_class.txt63 0x00400000:xp:X - privileged/administrative operations
/illumos-gate/usr/src/cmd/perl/contrib/Sun/Solaris/Project/t/
H A DProject.t462 [ 0, 0, { "allowunits" => 1 }, "rctl4:166::::project.max-crypto-memory=(privileged,100m,deny)" ],
463 [ 0, 0, {}, "rctl4:166::::project.max-crypto-memory=(privileged,100,deny)" ],
670 [ 0, 1, {}, "rctl4:166::::project.max-crypto-memory=(privileged,100p,deny)" ],
/illumos-gate/usr/src/man/man8/
H A DMakefile346 polkit-is-privileged.8 \

12