Lines Matching full:box

48 	struct ssh_sandbox *box = NULL;  in ssh_sandbox_init()  local
50 box = xcalloc(1, sizeof(*box)); in ssh_sandbox_init()
53 box->pset = solaris_basic_privset(); in ssh_sandbox_init()
55 if (box->pset == NULL) { in ssh_sandbox_init()
56 free(box); in ssh_sandbox_init()
61 if (priv_delset(box->pset, PRIV_FILE_LINK_ANY) != 0 || in ssh_sandbox_init()
63 priv_delset(box->pset, PRIV_NET_ACCESS) != 0 || in ssh_sandbox_init()
65 priv_delset(box->pset, PRIV_PROC_EXEC) != 0 || in ssh_sandbox_init()
66 priv_delset(box->pset, PRIV_PROC_FORK) != 0 || in ssh_sandbox_init()
67 priv_delset(box->pset, PRIV_PROC_INFO) != 0 || in ssh_sandbox_init()
68 priv_delset(box->pset, PRIV_PROC_SESSION) != 0) { in ssh_sandbox_init()
69 free(box); in ssh_sandbox_init()
75 if (priv_delset(box->pset, PRIV_FILE_READ) != 0 || in ssh_sandbox_init()
76 priv_delset(box->pset, PRIV_FILE_WRITE) != 0) { in ssh_sandbox_init()
77 free(box); in ssh_sandbox_init()
82 return box; in ssh_sandbox_init()
86 ssh_sandbox_child(struct ssh_sandbox *box) in ssh_sandbox_child() argument
88 if (setppriv(PRIV_SET, PRIV_PERMITTED, box->pset) != 0 || in ssh_sandbox_child()
89 setppriv(PRIV_SET, PRIV_LIMIT, box->pset) != 0 || in ssh_sandbox_child()
90 setppriv(PRIV_SET, PRIV_INHERITABLE, box->pset) != 0) in ssh_sandbox_child()
95 ssh_sandbox_parent_finish(struct ssh_sandbox *box) in ssh_sandbox_parent_finish() argument
97 priv_freeset(box->pset); in ssh_sandbox_parent_finish()
98 box->pset = NULL; in ssh_sandbox_parent_finish()
99 free(box); in ssh_sandbox_parent_finish()
103 ssh_sandbox_parent_preauth(struct ssh_sandbox *box, pid_t child_pid) in ssh_sandbox_parent_preauth() argument