Searched refs:egid (Results 1 - 25 of 71) sorted by relevance

123

/freebsd-11-stable/crypto/heimdal/lib/roken/
H A Dsetegid.c43 setegid(gid_t egid) argument
46 return setregid(-1, egid);
50 return setresgid(-1, egid, -1);
/freebsd-11-stable/cddl/contrib/opensolaris/cmd/dtrace/test/tst/common/scripting/
H A Dtst.egid.d41 printf("The egid is %d\n", $egid);
H A Dtst.egid.ksh33 # To verify egid of current process
56 /\$egid != \$1/
62 /\$egid == \$1/
80 groupid=`ps -x -o pid,egid | grep "$$ " | awk '{print $2}' 2>/dev/null`
/freebsd-11-stable/contrib/openpam/lib/libpam/
H A Dopenpam_cred.h47 gid_t egid; member in struct:pam_saved_cred
H A Dopenpam_restore_cred.c78 setegid(scred->egid) < 0)
H A Dopenpam_borrow_cred.c85 scred->egid = getegid();
/freebsd-11-stable/tests/sys/kern/
H A Dunix_socketpair_test.c47 gid_t real_egid, egid; local
58 ATF_REQUIRE_EQ(0, getpeereid(sv[0], &euid, &egid));
60 ATF_CHECK_EQ(real_egid, egid);
62 ATF_REQUIRE_EQ(0, getpeereid(sv[1], &euid, &egid));
64 ATF_CHECK_EQ(real_egid, egid);
/freebsd-11-stable/lib/libc/gen/
H A Dgetpeereid.c41 getpeereid(int s, uid_t *euid, gid_t *egid) argument
56 *egid = xuc.cr_gid;
/freebsd-11-stable/crypto/openssh/openbsd-compat/
H A Dbsd-setres_id.c29 setresgid(gid_t rgid, gid_t egid, gid_t sgid) argument
38 if (setregid(rgid, egid) < 0) {
45 if (setegid(egid) < 0) {
47 error("setegid %u: %.100s", (u_int)egid, strerror(errno));
/freebsd-11-stable/sys/security/mac/
H A Dmac_cred.c256 mac_cred_check_setegid(struct ucred *cred, gid_t egid) argument
260 MAC_POLICY_CHECK_NOSLEEP(cred_check_setegid, cred, egid);
261 MAC_CHECK_PROBE2(cred_check_setegid, error, cred, egid);
298 mac_cred_check_setregid(struct ucred *cred, gid_t rgid, gid_t egid) argument
302 MAC_POLICY_CHECK_NOSLEEP(cred_check_setregid, cred, rgid, egid);
303 MAC_CHECK_PROBE3(cred_check_setregid, error, cred, rgid, egid);
328 mac_cred_check_setresgid(struct ucred *cred, gid_t rgid, gid_t egid, argument
333 MAC_POLICY_CHECK_NOSLEEP(cred_check_setresgid, cred, rgid, egid, sgid);
334 MAC_CHECK_PROBE4(cred_check_setresgid, error, cred, rgid, egid,
/freebsd-11-stable/cddl/usr.sbin/dtrace/tests/common/scripting/
H A DMakefile22 tst.egid.d \
23 tst.egid.ksh \
/freebsd-11-stable/sys/bsm/
H A Daudit_record.h247 token_t *au_to_process(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid,
249 token_t *au_to_process32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid,
251 token_t *au_to_process64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid,
253 token_t *au_to_process_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid,
255 token_t *au_to_process32_ex(au_id_t auid, uid_t euid, gid_t egid,
258 token_t *au_to_process64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid,
271 token_t *au_to_subject(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid,
273 token_t *au_to_subject32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid,
275 token_t *au_to_subject64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid,
277 token_t *au_to_subject_ex(au_id_t auid, uid_t euid, gid_t egid, uid_
[all...]
/freebsd-11-stable/contrib/openbsm/sys/bsm/
H A Daudit_record.h235 token_t *au_to_process(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid,
237 token_t *au_to_process32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid,
239 token_t *au_to_process64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid,
241 token_t *au_to_process_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid,
243 token_t *au_to_process32_ex(au_id_t auid, uid_t euid, gid_t egid,
246 token_t *au_to_process64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid,
258 token_t *au_to_subject(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid,
260 token_t *au_to_subject32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid,
262 token_t *au_to_subject64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid,
264 token_t *au_to_subject_ex(au_id_t auid, uid_t euid, gid_t egid, uid_
[all...]
/freebsd-11-stable/contrib/openbsm/bin/auditdistd/
H A Dsandbox.c72 gid_t rgid, egid; local
201 PJDLOG_VERIFY(getresgid(&rgid, &egid, &sgid) == 0);
205 egid = getegid();
208 PJDLOG_VERIFY(egid == pw->pw_gid);
/freebsd-11-stable/tools/regression/sockets/unix_cmsg/
H A Dt_peercred.c81 if (xucred->cr_groups[0] != uc_cfg.proc_cred.egid) {
83 (u_long)xucred->cr_groups[0], (u_long)uc_cfg.proc_cred.egid);
H A Duc_common.h52 gid_t egid; member in struct:uc_cfg::__anon8598
/freebsd-11-stable/usr.bin/newgrp/
H A Dnewgrp.c154 gid_t egid; local
159 egid = getegid();
201 if (grp->gr_gid != egid && inarray(grp->gr_gid, grps, ngrps)) {
226 if (egid != grp->gr_gid && !inarray(egid, grps, ngrps)) {
230 grps[ngrps++] = egid;
/freebsd-11-stable/sys/kern/
H A Dkern_prot.c279 * Get effective group ID. The "egid" is groups[0], and could be obtained
474 * compatible. It says that setting the uid/gid to euid/egid is a special
708 * Do we have "appropriate privileges" (are we root or gid == egid)
739 * In all cases permitted cases, we are changing the egid.
759 gid_t egid; member in struct:setegid_args
768 gid_t egid; local
771 egid = uap->egid;
772 AUDIT_ARG_EGID(egid);
778 error = mac_cred_check_setegid(oldcred, egid);
961 gid_t egid; member in struct:setregid_args
970 gid_t egid, rgid; local
1112 gid_t egid; member in struct:setresgid_args
1122 gid_t egid, rgid, sgid; local
1206 gid_t *egid; member in struct:getresgid_args
2196 change_egid(struct ucred *newcred, gid_t egid) argument
[all...]
/freebsd-11-stable/contrib/openbsm/libbsm/
H A Dbsm_token.c748 au_to_process32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument
761 ADD_U_INT32(dptr, egid);
780 au_to_process64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument
794 ADD_U_INT32(dptr, egid);
813 au_to_process(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument
817 return (au_to_process32(auid, euid, egid, ruid, rgid, pid, sid,
836 au_to_process32_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, argument
858 ADD_U_INT32(dptr, egid);
876 au_to_process64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, argument
900 ADD_U_INT32(dptr, egid);
918 au_to_process_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument
1159 au_to_subject32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument
1184 au_to_subject64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument
1210 au_to_subject(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument
1233 au_to_subject32_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument
1271 au_to_subject64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument
1311 au_to_subject_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument
[all...]
/freebsd-11-stable/sys/security/audit/
H A Dbsm_token.c669 au_to_process32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument
680 ADD_U_INT32(dptr, egid);
699 au_to_process64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument
711 ADD_U_INT32(dptr, egid);
730 au_to_process(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument
734 return (au_to_process32(auid, euid, egid, ruid, rgid, pid, sid,
753 au_to_process32_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, argument
771 ADD_U_INT32(dptr, egid);
789 au_to_process64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, argument
810 ADD_U_INT32(dptr, egid);
828 au_to_process_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument
1098 au_to_subject32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument
1121 au_to_subject64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument
1145 au_to_subject(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument
1168 au_to_subject32_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument
1203 au_to_subject64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument
1240 au_to_subject_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument
[all...]
H A Daudit.h80 void audit_arg_egid(gid_t egid);
170 #define AUDIT_ARG_EGID(egid) do { \
172 audit_arg_egid((egid)); \
348 #define AUDIT_ARG_EGID(egid)
/freebsd-11-stable/contrib/openbsm/bsm/
H A Dlibbsm.h459 u_int32_t egid; member in struct:__anon3951
470 u_int32_t egid; member in struct:__anon3952
494 u_int32_t egid; member in struct:__anon3953
505 u_int32_t egid; member in struct:__anon3954
609 u_int32_t egid; member in struct:__anon3963
620 u_int32_t egid; member in struct:__anon3964
644 u_int32_t egid; member in struct:__anon3965
655 u_int32_t egid; member in struct:__anon3966
1096 * @param egid - The subject's effective group ID.
1114 uid_t euid, gid_t egid, uid_
[all...]
/freebsd-11-stable/usr.sbin/nscd/
H A Dquery.h73 gid_t egid; /* egid of the caller, received via getpeereid */ member in struct:query_state
/freebsd-11-stable/sys/compat/linux/
H A Dlinux_uid16.c188 * cr_groups[0] holds egid. Setting the whole set from
189 * the supplied set will cause egid to be changed too.
243 * cr_groups[0] holds egid. Returning the whole set
380 LIN_SDT_PROBE2(uid16, linux_setregid16, entry, args->rgid, args->egid);
383 bsd.egid = CAST_NOCHG(args->egid);
412 LIN_SDT_PROBE3(uid16, linux_setresgid16, entry, args->rgid, args->egid,
416 bsd.egid = CAST_NOCHG(args->egid);
/freebsd-11-stable/sys/sys/
H A Ducred.h99 void change_egid(struct ucred *newcred, gid_t egid);

Completed in 155 milliseconds

123