Lines Matching defs:asid

425 uuidstr2sessioninfo(const char *uuid_str, uid_t *uid, au_asid_t *asid)
431 au_asid_t asid;
439 *asid = u.info.asid;
445 sessioninfo2uuid(uid_t uid, au_asid_t asid, uuid_t uuid)
451 au_asid_t asid;
457 u.info.asid = asid;
462 join_session(au_asid_t asid, __unused const char *instance)
468 err = audit_session_port(asid, &session_port);
470 Log("Could not get audit session port for %d: %s", asid, strerror(errno));
478 if (asid2 != asid) {
479 Log("Joined session %d but wound up in session %d", asid, asid2);
489 check_session(au_asid_t asid)
494 if (asid == AU_DEFAUDITSID || asid == AU_ASSIGN_ASID) {
495 Info("Received special audit session id of %d", asid);
499 err = audit_session_port(asid, &session_port);
501 Log("Audit session id %d is in invalid: %s", asid, strerror(errno));
516 au_asid_t asid = -1;
522 asid = ai.ai_asid;
524 Debug("asid = %d euid = %d, instance = %s", ai.ai_asid,
529 if (uuidstr2sessioninfo(instance, &uid, &asid))
532 if (join_session(asid, instance) == 0)
542 if (asid != my_asid || getuid() != euid)
543 Info("My identity changed to asid = %d auid = %d uid = %d", ai.ai_asid, ai.ai_auid, getuid());
552 au_asid_t asid;
556 audit_token_to_au32(atok, &uid, &euid, &egid, &ruid, &rgid, &pid, &asid, NULL);
557 DEBUG(9, "Received audit token: uid = %d, euid = %d, egid = %d, ruid = %d rgid = %d, pid = %d, asid = %d atid = %d",
558 uid, euid, egid, ruid, rgid, pid, asid, atok.val[7]);
562 Debug("gssd asid = %d gssd uid = %d remote pid = %d remote asid = %d remote euid = %d",
563 my_asid, getuid(), pid, asid, euid);
564 ok = (asid == my_asid || (euid && euid == getuid()));
567 Log("Process %d in session %d as user %d was denied by gssd[%d] for session %d as user %d", pid, asid, euid, getpid(), my_asid, getuid());
3159 int32_t asid,
3178 if (!check_session(asid)) {
3181 sessioninfo2uuid((uid_t)uid, (au_asid_t)asid, uuid);
3183 DEBUG(2, "Looking up %s for %d %d as instance %s", bname, uid, asid, uuidstr);