/freebsd-12-stable/bin/pax/ |
H A D | cache.c | 56 * routines that control user, group, uid and gid caches (for the archive 64 static UIDC **uidtb = NULL; /* uid to name cache */ 66 static UIDC **usrtb = NULL; /* user name to uid cache */ 167 * caches the name (if any) for the uid. If frc set, we always return the 174 name_uid(uid_t uid, int frc) argument 183 * see if we have this uid cached 185 ptr = uidtb[uid % UID_SZ]; 186 if ((ptr != NULL) && (ptr->valid > 0) && (ptr->uid == uid)) { 188 * have an entry for this uid 315 uid_name(char *name, uid_t *uid) argument [all...] |
H A D | cache.h | 52 #define UID_SZ 317 /* size of user_name/uid cache */ 53 #define UNM_SZ 317 /* size of user_name/uid cache */ 60 * Node structures used in the user, group, uid, and gid caches. 65 char name[UNMLEN]; /* uid name */ 66 uid_t uid; /* cached uid */ member in struct:uidc
|
/freebsd-12-stable/usr.bin/login/ |
H A D | login_audit.c | 69 uid_t uid = pwd->pw_uid; local 88 auinfo.ai_auid = uid; 98 if ((tok = au_to_subject32(uid, geteuid(), getegid(), uid, gid, pid, 121 uid_t uid; local 147 uid = pwd->pw_uid; 149 if ((tok = au_to_subject32(uid, geteuid(), getegid(), uid, 177 uid_t uid = pwd->pw_uid; local 195 if ((tok = au_to_subject32(uid, geteui [all...] |
/freebsd-12-stable/usr.sbin/keyserv/ |
H A D | keyserv.c | 44 * Store secret keys per uid. Do public key encryption and decryption 357 key_set_1_svc_prog(uid, key) 358 uid_t uid; 364 (void) fprintf(stderr, "set(%u, %.*s) = ", uid, 367 status = pk_setkey(uid, key); 376 key_encrypt_pk_2_svc_prog(uid, arg) 377 uid_t uid; 383 (void) fprintf(stderr, "encrypt(%u, %s, %08x%08x) = ", uid, 388 res.status = pk_encrypt(uid, arg->remotename, &(arg->remotekey), 404 key_decrypt_pk_2_svc_prog(uid, ar 647 uid_t uid = -1; local 775 uid_t uid; local [all...] |
/freebsd-12-stable/usr.sbin/sa/ |
H A D | usrdb.c | 73 static uid_t uid; local 82 uid = (uid_t)*(u_long *)(key->data); 83 key->data = &uid; 124 uid_t uid; local 127 uid = ci->ci_uid; 128 key.data = &uid; 129 key.size = sizeof uid; 133 warn("get key %u from user accounting stats", uid); 138 if (newui.ui_uid != uid) { 140 newui.ui_uid, uid); [all...] |
/freebsd-12-stable/contrib/pjdfstest/tests/chown/ |
H A D | 02.t | 17 expect 65534,65534 stat ${nx} uid,gid 23 expect 65534,65534 stat ${nx} uid,gid
|
H A D | 03.t | 19 expect 65534,65534 stat ${nx} uid,gid 25 expect 65534,65534 stat ${nx} uid,gid
|
H A D | 09.t | 23 expect 65534,65534 stat ${n0}/${n1} uid,gid 26 expect 65534,65534 stat ${n0}/${n1} uid,gid 29 expect 65533,65533 stat ${n0}/${n1} uid,gid
|
/freebsd-12-stable/contrib/libc-pwcache/ |
H A D | pwcache.h | 52 #define UID_SZ 317 /* size of uid to user_name cache */ 53 #define UNM_SZ 317 /* size of user_name to uid cache */ 60 * Node structures used in the user, group, uid, and gid caches. 65 char name[UNMLEN]; /* uid name */ 66 uid_t uid; /* cached uid */ member in struct:uidc
|
/freebsd-12-stable/contrib/file/src/ |
H A D | tar.h | 56 char uid[8]; member in struct:record::header
|
/freebsd-12-stable/cddl/usr.sbin/dtrace/tests/common/vars/ |
H A D | Makefile | 15 tst.uid.d \
|
/freebsd-12-stable/usr.sbin/pw/ |
H A D | rm_r.c | 44 rm_r(int rootfd, const char *path, uid_t uid) argument 71 rm_r(dirfd, e->d_name, uid); 72 else if (S_ISLNK(st.st_mode) || st.st_uid == uid) 80 else if (st.st_uid == uid)
|
H A D | pwupd.h | 48 struct passwd * (*_getpwuid)(uid_t uid); 94 #define GETPWUID(uid) PWF._getpwuid(uid) 134 struct passwd * vgetpwuid(uid_t uid); 143 void copymkdir(int rootfd, char const * dir, int skelfd, mode_t mode, uid_t uid, 145 void rm_r(int rootfd, char const * dir, uid_t uid);
|
/freebsd-12-stable/crypto/openssh/ |
H A D | sshlogin.c | 75 get_last_login_time(uid_t uid, const char *logname, argument 80 login_get_lastlog(&li, uid); 90 store_lastlog_message(const char *user, uid_t uid) argument 101 time_string = sys_auth_get_lastlogin_msg(user, uid); 109 last_login_time = get_last_login_time(uid, user, hostname, 133 record_login(pid_t pid, const char *tty, const char *user, uid_t uid, argument 139 store_lastlog_message(user, uid);
|
/freebsd-12-stable/contrib/pjdfstest/tests/rmdir/ |
H A D | 11.t | 26 expect dir,65534,65534 lstat ${n0}/${n1} type,uid,gid 33 expect dir,65534,65534 lstat ${n0}/${n1} type,uid,gid 41 expect dir,${id},${id} lstat ${n0}/${n1} type,uid,gid 49 expect dir,${id},${id} lstat ${n0}/${n1} type,uid,gid 51 expect dir,${id},${id} lstat ${n0}/${n1} type,uid,gid
|
/freebsd-12-stable/contrib/pjdfstest/tests/unlink/ |
H A D | 11.t | 28 expect ${type},65534,65534 lstat ${n0}/${n1} type,uid,gid 36 expect ${type},${id},${id} lstat ${n0}/${n1} type,uid,gid 45 expect ${type},65534,65534 lstat ${n0}/${n1} type,uid,gid 54 expect ${type},${id},${id} lstat ${n0}/${n1} type,uid,gid 56 expect ${type},${id},${id} lstat ${n0}/${n1} type,uid,gid
|
/freebsd-12-stable/crypto/heimdal/kcm/ |
H A D | client.c | 102 snprintf(prefix, sizeof(prefix), "%ld:", (long)client->uid); 120 if ((ccache->uid != client->uid || 136 ccache->uid = client->uid; 163 unsigned long uid; local 164 int matches = sscanf(name,"%ld:",&uid); 166 matches = sscanf(name,"%ld",&uid); 168 struct passwd *pwd = getpwuid(uid); 171 kcm_chown(context, client, ccache, uid, gi [all...] |
H A D | kcm_locl.h | 47 kcm_log(1, "%s request by process %d/uid %d", \ 48 kcm_op2string(_opcode), (_client)->pid, (_client)->uid); \ 52 kcm_log(1, "%s request for cache %s by process %d/uid %d", \ 53 kcm_op2string(_opcode), (_name), (_client)->pid, (_client)->uid); \ 71 uid_t uid; member in struct:kcm_default_cache 91 uid_t uid; member in struct:kcm_ccache_data 147 uid_t uid; member in struct:kcm_client 152 #define CLIENT_IS_ROOT(client) ((client)->uid == 0)
|
/freebsd-12-stable/usr.bin/chkey/ |
H A D | chkey.c | 91 uid_t uid; local 120 uid = getuid() /*geteuid()*/; 121 if (uid == 0) { 125 if (user2netname(name, uid, NULL) == 0) 131 if (uid != 0) { 133 pw = ypgetpwuid(uid); 135 pw = getpwuid(uid); 190 if (uid == 0) { 249 ypgetpwuid(uid_t uid) argument 257 (void)sprintf(uidstr, "%d", uid); [all...] |
/freebsd-12-stable/usr.bin/passwd/ |
H A D | passwd.c | 74 uid_t uid; local 96 uid = getuid(); 100 if ((pwd = getpwuid(uid)) == NULL) 111 if (uid != 0 && uid != pwd->pw_uid)
|
/freebsd-12-stable/contrib/sendmail/libsm/ |
H A D | t-sem.c | 131 drop_priv(uid, gid) 132 uid_t uid; 140 r = setuid(uid); 158 semtest(owner, uid, gid) 160 uid_t uid; 166 if (!owner && uid != 0) 168 r = drop_priv(uid, gid); 184 if (uid != 0) 186 r = sm_semsetowner(semid, uid, gid, 0660); 192 r = drop_priv(uid, gi 326 uid_t uid; local [all...] |
/freebsd-12-stable/contrib/netbsd-tests/fs/umapfs/ |
H A D | t_basic.c | 43 xchown(const char *path, uid_t uid, gid_t gid) argument 46 if (rump_sys_chown(path, uid, gid) == -1) 51 testuidgid(const char *path, uid_t uid, gid_t gid) argument 57 if (uid != (uid_t)-1) { 58 if (sb.st_uid != uid) 59 atf_tc_fail("%s: expected uid %d, got %d", 60 path, uid, sb.st_uid); 92 * Map td1 uid 555 to td2 uid 777 (yes, IMHO the umapfs
|
/freebsd-12-stable/crypto/heimdal/lib/kafs/ |
H A D | afskrb5.c | 48 v5_to_kt(krb5_creds *cred, uid_t uid, struct kafs_token *kt, int local524) argument 103 kt->ct.ViceId = uid; 107 _kafs_fixup_viceid(&kt->ct, uid); 114 krb5_creds *cred, uid_t uid, 132 ret = v5_to_kt(cred, uid, kt, 1); 134 ret = v5_to_kt(cred, uid, kt, 0); 147 const char *realm, uid_t uid, struct kafs_token *kt) 187 ret = v5_convert(d->context, d->id, out_creds, uid, 210 uid_t uid, const char *homedir) 219 return _kafs_afslog_all_local_cells (data, uid, homedi 113 v5_convert(krb5_context context, krb5_ccache id, krb5_creds *cred, uid_t uid, const char *cell, struct kafs_token *kt) argument 146 get_cred(struct kafs_data *data, const char *name, const char *inst, const char *realm, uid_t uid, struct kafs_token *kt) argument 209 afslog_uid_int(struct kafs_data *data, const char *cell, const char *rh, uid_t uid, const char *homedir) argument 252 krb5_afslog_uid_home(krb5_context context, krb5_ccache id, const char *cell, krb5_const_realm realm, uid_t uid, const char *homedir) argument 293 krb5_afslog_uid(krb5_context context, krb5_ccache id, const char *cell, krb5_const_realm realm, uid_t uid) argument 342 kafs_settoken5(krb5_context context, const char *cell, uid_t uid, krb5_creds *cred) argument [all...] |
H A D | common.c | 120 _kafs_fixup_viceid(struct ClearToken *ct, uid_t uid) argument 130 if (uid != 0) /* valid ViceId */ 214 afslog_cells(struct kafs_data *data, char **cells, int max, uid_t uid, argument 220 int er = (*data->afslog_uid)(data, cells[i], 0, uid, homedir); 229 uid_t uid, const char *homedir) 255 ret = afslog_cells(data, cells, idx, uid, homedir); 344 const char *realm, uid_t uid, struct kafs_token *kt) 348 ret = (*data->get_cred)(data, user, cell, realm, uid, kt); 370 uid_t uid, 403 cell, realm_hint, uid, k 228 _kafs_afslog_all_local_cells(struct kafs_data *data, uid_t uid, const char *homedir) argument 343 _kafs_try_get_cred(struct kafs_data *data, const char *user, const char *cell, const char *realm, uid_t uid, struct kafs_token *kt) argument 366 _kafs_get_cred(struct kafs_data *data, const char *cell, const char *realm_hint, const char *realm, uid_t uid, struct kafs_token *kt) argument [all...] |
/freebsd-12-stable/contrib/netbsd-tests/sbin/fsck_ffs/ |
H A D | quotas_common.sh | 7 local uid=$(id -u) 14 -o 'match:USER QUOTA MISMATCH FOR ID '${uid}': 0/0 SHOULD BE 1/1' \
|