/freebsd-11-stable/lib/libc/compat-43/ |
H A D | setruid.c | 39 setruid(uid_t ruid) argument 42 return (setreuid(ruid, -1));
|
/freebsd-11-stable/bin/pkill/tests/ |
H A D | pgrep-U_test.sh | 9 ruid=`id -ur` 15 pid=`pgrep -f -U $ruid $sleep` 25 ruid=`id -urn` 31 pid=`pgrep -f -U $ruid $sleep`
|
H A D | pkill-U_test.sh | 9 ruid=`id -ur` 14 pkill -f -U $ruid $sleep 27 ruid=`id -urn` 32 pkill -f -U $ruid $sleep
|
/freebsd-11-stable/crypto/openssh/openbsd-compat/ |
H A D | bsd-setres_id.c | 64 setresuid(uid_t ruid, uid_t euid, uid_t suid) argument 68 if (ruid != suid) { 73 if (setreuid(ruid, euid) < 0) { 75 error("setreuid %u: %.100s", ruid, strerror(errno)); 89 if (setuid(ruid) < 0) { 91 error("setuid %u: %.100s", ruid, strerror(errno));
|
/freebsd-11-stable/sys/bsm/ |
H A D | audit_record.h | 247 token_t *au_to_process(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 249 token_t *au_to_process32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 251 token_t *au_to_process64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 253 token_t *au_to_process_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 256 uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, 258 token_t *au_to_process64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 271 token_t *au_to_subject(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 273 token_t *au_to_subject32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 275 token_t *au_to_subject64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 277 token_t *au_to_subject_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, [all...] |
/freebsd-11-stable/contrib/openbsm/sys/bsm/ |
H A D | audit_record.h | 235 token_t *au_to_process(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 237 token_t *au_to_process32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 239 token_t *au_to_process64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 241 token_t *au_to_process_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 244 uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, 246 token_t *au_to_process64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 258 token_t *au_to_subject(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 260 token_t *au_to_subject32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 262 token_t *au_to_subject64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 264 token_t *au_to_subject_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, [all...] |
/freebsd-11-stable/contrib/openbsm/bin/auditdistd/ |
H A D | sandbox.c | 71 uid_t ruid, euid; local 192 PJDLOG_VERIFY(getresuid(&ruid, &euid, &suid) == 0); 195 ruid = getuid(); 198 PJDLOG_VERIFY(ruid == pw->pw_uid);
|
/freebsd-11-stable/sys/security/mac/ |
H A D | mac_cred.c | 284 mac_cred_check_setreuid(struct ucred *cred, uid_t ruid, uid_t euid) argument 288 MAC_POLICY_CHECK_NOSLEEP(cred_check_setreuid, cred, ruid, euid); 289 MAC_CHECK_PROBE3(cred_check_setreuid, error, cred, ruid, euid); 312 mac_cred_check_setresuid(struct ucred *cred, uid_t ruid, uid_t euid, argument 317 MAC_POLICY_CHECK_NOSLEEP(cred_check_setresuid, cred, ruid, euid, suid); 318 MAC_CHECK_PROBE4(cred_check_setresuid, error, cred, ruid, euid,
|
/freebsd-11-stable/contrib/openbsm/libbsm/ |
H A D | bsm_token.c | 748 au_to_process32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument 762 ADD_U_INT32(dptr, ruid); 780 au_to_process64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument 795 ADD_U_INT32(dptr, ruid); 813 au_to_process(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument 817 return (au_to_process32(auid, euid, egid, ruid, rgid, pid, sid, 836 au_to_process32_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, argument 859 ADD_U_INT32(dptr, ruid); 876 au_to_process64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, argument 901 ADD_U_INT32(dptr, ruid); 918 au_to_process_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument 1159 au_to_subject32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument 1184 au_to_subject64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument 1210 au_to_subject(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument 1233 au_to_subject32_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument 1271 au_to_subject64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument 1311 au_to_subject_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument [all...] |
H A D | bsm_wrappers.c | 352 gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, 359 subject = au_to_subject32(auid, euid, egid, ruid, rgid, pid, sid, 396 uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, 402 subject = au_to_subject32(auid, euid, egid, ruid, rgid, pid, sid, tid); 351 audit_write_success(short event_code, token_t *tok, au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument 395 audit_write_failure(short event_code, char *errmsg, int errcode, au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument
|
H A D | bsm_io.c | 2506 * ruid 4 bytes 2531 READ_TOKEN_U_INT32(buf, len, tok->tt.proc32.ruid, tok->len, err); 2574 open_attr(fp, "ruid"); 2575 print_user(fp, tok->tt.proc32.ruid, oflags); 2599 print_user(fp, tok->tt.proc32.ruid, oflags); 2618 * ruid 4 bytes 2643 READ_TOKEN_U_INT32(buf, len, tok->tt.proc64.ruid, tok->len, err); 2685 open_attr(fp, "ruid"); 2686 print_user(fp, tok->tt.proc64.ruid, oflags); 2710 print_user(fp, tok->tt.proc64.ruid, oflag [all...] |
/freebsd-11-stable/sys/security/audit/ |
H A D | bsm_token.c | 669 au_to_process32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument 681 ADD_U_INT32(dptr, ruid); 699 au_to_process64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument 712 ADD_U_INT32(dptr, ruid); 730 au_to_process(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument 734 return (au_to_process32(auid, euid, egid, ruid, rgid, pid, sid, 753 au_to_process32_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, argument 772 ADD_U_INT32(dptr, ruid); 789 au_to_process64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, argument 811 ADD_U_INT32(dptr, ruid); 828 au_to_process_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument 1098 au_to_subject32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument 1121 au_to_subject64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument 1145 au_to_subject(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument 1168 au_to_subject32_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument 1203 au_to_subject64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument 1240 au_to_subject_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument [all...] |
H A D | audit.h | 83 void audit_arg_ruid(uid_t ruid); 250 #define AUDIT_ARG_RUID(ruid) do { \ 252 audit_arg_ruid((ruid)); \ 364 #define AUDIT_ARG_RUID(ruid)
|
/freebsd-11-stable/sys/kern/ |
H A D | kern_prot.c | 885 uid_t ruid; member in struct:setreuid_args 895 uid_t euid, ruid; local 900 ruid = uap->ruid; 902 AUDIT_ARG_RUID(ruid); 905 ruip = uifind(ruid); 910 error = mac_cred_check_setreuid(oldcred, ruid, euid); 915 if (((ruid != (uid_t)-1 && ruid != oldcred->cr_ruid && 916 ruid ! 1024 uid_t ruid; member in struct:setresuid_args 1035 uid_t euid, ruid, suid; local 1178 uid_t *ruid; member in struct:getresuid_args [all...] |
/freebsd-11-stable/lib/libpam/modules/pam_ksu/ |
H A D | pam_ksu.c | 188 uid_t euid, ruid; local 196 ruid = getuid(); 198 rv = seteuid(ruid); 205 (void)asprintf(&ccname, "%s%lu", KRB5_DEFAULT_CCROOT, (unsigned long)ruid);
|
/freebsd-11-stable/usr.bin/su/ |
H A D | su.c | 160 uid_t ruid; local 256 ruid = getuid(); 260 if (pwd == NULL || pwd->pw_uid != ruid) 261 pwd = getpwuid(ruid); 366 if (ruid != 0) { 383 if (ruid != 0 && !chshell(pwd->pw_shell)) 552 if (ruid != 0)
|
/freebsd-11-stable/contrib/openbsm/bsm/ |
H A D | libbsm.h | 460 u_int32_t ruid; member in struct:__anon3951 471 u_int32_t ruid; member in struct:__anon3952 495 u_int32_t ruid; member in struct:__anon3953 506 u_int32_t ruid; member in struct:__anon3954 610 u_int32_t ruid; member in struct:__anon3963 621 u_int32_t ruid; member in struct:__anon3964 645 u_int32_t ruid; member in struct:__anon3965 656 u_int32_t ruid; member in struct:__anon3966 1098 * @param ruid - The subject's real user ID. 1114 uid_t euid, gid_t egid, uid_t ruid, gid_ [all...] |
/freebsd-11-stable/sys/compat/linux/ |
H A D | linux_uid16.c | 396 LIN_SDT_PROBE2(uid16, linux_setreuid16, entry, args->ruid, args->euid); 398 bsd.ruid = CAST_NOCHG(args->ruid); 430 LIN_SDT_PROBE3(uid16, linux_setresuid16, entry, args->ruid, args->euid, 433 bsd.ruid = CAST_NOCHG(args->ruid);
|
/freebsd-11-stable/contrib/opie/ |
H A D | opiepasswd.c | 122 uid_t ruid; local 127 ruid = getuid(); 130 if (username == NULL || pp == NULL || pp->pw_uid != ruid) 131 pp = getpwuid(ruid);
|
/freebsd-11-stable/tools/regression/security/access/ |
H A D | testaccess.c | 124 uid_t euid, ruid, suid; local 128 error = getresuid(&ruid, &euid, &suid); 142 printf("ruid: %d, euid: %d, suid: %d, ", ruid, euid, suid);
|
/freebsd-11-stable/sbin/hastd/ |
H A D | subr.c | 160 uid_t ruid, euid, suid; local 284 PJDLOG_VERIFY(getresuid(&ruid, &euid, &suid) == 0); 285 PJDLOG_VERIFY(ruid == pw->pw_uid);
|
/freebsd-11-stable/tools/regression/security/proc_to_proc/ |
H A D | scenario.c | 71 /* euid ruid svuid issetugid */ 226 uid_t ruid, euid, svuid; local 227 error = getresuid(&ruid, &euid, &svuid); 232 assert(ruid == cred->cr_ruid);
|
/freebsd-11-stable/contrib/llvm-project/compiler-rt/include/sanitizer/ |
H A D | linux_syscall_hooks.h | 76 #define __sanitizer_syscall_pre_getresuid(ruid, euid, suid) \ 77 __sanitizer_syscall_pre_impl_getresuid((long)(ruid), (long)(euid), \ 79 #define __sanitizer_syscall_post_getresuid(res, ruid, euid, suid) \ 80 __sanitizer_syscall_post_impl_getresuid(res, (long)(ruid), (long)(euid), \ 112 #define __sanitizer_syscall_pre_setreuid(ruid, euid) \ 113 __sanitizer_syscall_pre_impl_setreuid((long)(ruid), (long)(euid)) 114 #define __sanitizer_syscall_post_setreuid(res, ruid, euid) \ 115 __sanitizer_syscall_post_impl_setreuid(res, (long)(ruid), (long)(euid)) 120 #define __sanitizer_syscall_pre_setresuid(ruid, euid, suid) \ 121 __sanitizer_syscall_pre_impl_setresuid((long)(ruid), (lon [all...] |
/freebsd-11-stable/contrib/libreadline/examples/rlfe/ |
H A D | os.h | 160 # define setreuid(ruid, euid) setresuid(ruid, euid, -1)
|
/freebsd-11-stable/gnu/usr.bin/rcs/lib/ |
H A D | rcsutil.c | 366 struct passwd const *pw = getpwuid(ruid()); 369 (unsigned long)ruid() 1318 uid_t ruid() { cacheid(getuid()); } function 1346 if (euid() == ruid()) 1350 if (setreuid(u==euid() ? ruid() : euid(), u) != 0) 1387 set_uid_to(ruid());
|