/freebsd-9.3-release/crypto/heimdal/lib/roken/ |
H A D | setegid.c | 46 setegid(gid_t egid) argument 49 return setregid(-1, egid); 53 return setresgid(-1, egid, -1);
|
/freebsd-9.3-release/cddl/contrib/opensolaris/cmd/dtrace/test/tst/common/scripting/ |
H A D | tst.egid.d | 41 printf("The egid is %d\n", $egid);
|
H A D | tst.egid.ksh | 33 # To verify egid of current process 56 /\$egid != \$1/ 62 /\$egid == \$1/
|
/freebsd-9.3-release/contrib/openpam/lib/libpam/ |
H A D | openpam_cred.h | 47 gid_t egid; member in struct:pam_saved_cred
|
H A D | openpam_restore_cred.c | 78 setegid(scred->egid) < 0)
|
H A D | openpam_borrow_cred.c | 85 scred->egid = getegid();
|
/freebsd-9.3-release/lib/libc/gen/ |
H A D | getpeereid.c | 39 getpeereid(int s, uid_t *euid, gid_t *egid) argument 52 *egid = xuc.cr_gid;
|
/freebsd-9.3-release/crypto/openssh/openbsd-compat/ |
H A D | bsd-setres_id.c | 31 setresgid(gid_t rgid, gid_t egid, gid_t sgid) argument 40 if (setregid(rgid, egid) < 0) { 47 if (setegid(egid) < 0) { 49 error("setegid %u: %.100s", (u_int)egid, strerror(errno));
|
H A D | bsd-misc.c | 88 int setegid(uid_t egid) argument 90 return(setresgid(-1, egid, -1));
|
/freebsd-9.3-release/sys/security/mac/ |
H A D | mac_cred.c | 257 mac_cred_check_setegid(struct ucred *cred, gid_t egid) argument 261 MAC_POLICY_CHECK_NOSLEEP(cred_check_setegid, cred, egid); 262 MAC_CHECK_PROBE2(cred_check_setegid, error, cred, egid); 299 mac_cred_check_setregid(struct ucred *cred, gid_t rgid, gid_t egid) argument 303 MAC_POLICY_CHECK_NOSLEEP(cred_check_setregid, cred, rgid, egid); 304 MAC_CHECK_PROBE3(cred_check_setregid, error, cred, rgid, egid); 329 mac_cred_check_setresgid(struct ucred *cred, gid_t rgid, gid_t egid, argument 334 MAC_POLICY_CHECK_NOSLEEP(cred_check_setresgid, cred, rgid, egid, sgid); 335 MAC_CHECK_PROBE4(cred_check_setresgid, error, cred, rgid, egid,
|
/freebsd-9.3-release/contrib/openbsm/sys/bsm/ |
H A D | audit_record.h | 237 token_t *au_to_process(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 239 token_t *au_to_process32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 241 token_t *au_to_process64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 243 token_t *au_to_process_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 245 token_t *au_to_process32_ex(au_id_t auid, uid_t euid, gid_t egid, 248 token_t *au_to_process64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 260 token_t *au_to_subject(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 262 token_t *au_to_subject32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 264 token_t *au_to_subject64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 266 token_t *au_to_subject_ex(au_id_t auid, uid_t euid, gid_t egid, uid_ [all...] |
/freebsd-9.3-release/sys/bsm/ |
H A D | audit_record.h | 238 token_t *au_to_process(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 240 token_t *au_to_process32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 242 token_t *au_to_process64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 244 token_t *au_to_process_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 246 token_t *au_to_process32_ex(au_id_t auid, uid_t euid, gid_t egid, 249 token_t *au_to_process64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 261 token_t *au_to_subject(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 263 token_t *au_to_subject32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 265 token_t *au_to_subject64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 267 token_t *au_to_subject_ex(au_id_t auid, uid_t euid, gid_t egid, uid_ [all...] |
/freebsd-9.3-release/contrib/openbsm/bin/auditdistd/ |
H A D | sandbox.c | 74 gid_t rgid, egid; local 203 PJDLOG_VERIFY(getresgid(&rgid, &egid, &sgid) == 0); 207 egid = getegid(); 210 PJDLOG_VERIFY(egid == pw->pw_gid);
|
/freebsd-9.3-release/usr.bin/newgrp/ |
H A D | newgrp.c | 153 gid_t egid; local 158 egid = getegid(); 198 if (grp->gr_gid != egid && inarray(grp->gr_gid, grps, ngrps)) { 223 if (egid != grp->gr_gid && !inarray(egid, grps, ngrps)) { 227 grps[ngrps++] = egid;
|
/freebsd-9.3-release/sys/kern/ |
H A D | kern_prot.c | 261 * Get effective group ID. The "egid" is groups[0], and could be obtained 477 * compatible. It says that setting the uid/gid to euid/egid is a special 706 * Do we have "appropriate privileges" (are we root or gid == egid) 737 * In all cases permitted cases, we are changing the egid. 757 gid_t egid; member in struct:setegid_args 766 gid_t egid; local 769 egid = uap->egid; 770 AUDIT_ARG_EGID(egid); 776 error = mac_cred_check_setegid(oldcred, egid); 947 gid_t egid; member in struct:setregid_args 956 gid_t egid, rgid; local 1093 gid_t egid; member in struct:setresgid_args 1103 gid_t egid, rgid, sgid; local 1187 gid_t *egid; member in struct:getresgid_args 2159 change_egid(struct ucred *newcred, gid_t egid) argument [all...] |
/freebsd-9.3-release/contrib/openbsm/libbsm/ |
H A D | bsm_token.c | 750 au_to_process32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument 763 ADD_U_INT32(dptr, egid); 782 au_to_process64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument 796 ADD_U_INT32(dptr, egid); 815 au_to_process(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument 819 return (au_to_process32(auid, euid, egid, ruid, rgid, pid, sid, 838 au_to_process32_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, argument 860 ADD_U_INT32(dptr, egid); 878 au_to_process64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, argument 902 ADD_U_INT32(dptr, egid); 920 au_to_process_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument 1161 au_to_subject32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument 1186 au_to_subject64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument 1212 au_to_subject(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument 1235 au_to_subject32_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument 1273 au_to_subject64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument 1313 au_to_subject_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument [all...] |
/freebsd-9.3-release/sys/security/audit/ |
H A D | audit_bsm_token.c | 671 au_to_process32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument 682 ADD_U_INT32(dptr, egid); 701 au_to_process64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument 713 ADD_U_INT32(dptr, egid); 732 au_to_process(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument 736 return (au_to_process32(auid, euid, egid, ruid, rgid, pid, sid, 755 au_to_process32_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, argument 773 ADD_U_INT32(dptr, egid); 791 au_to_process64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, argument 812 ADD_U_INT32(dptr, egid); 830 au_to_process_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument 1084 au_to_subject32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument 1107 au_to_subject64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument 1131 au_to_subject(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument 1154 au_to_subject32_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument 1189 au_to_subject64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument 1226 au_to_subject_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument [all...] |
H A D | audit.h | 80 void audit_arg_egid(gid_t egid); 169 #define AUDIT_ARG_EGID(egid) do { \ 171 audit_arg_egid((egid)); \ 337 #define AUDIT_ARG_EGID(egid)
|
/freebsd-9.3-release/contrib/openbsm/bsm/ |
H A D | libbsm.h | 461 u_int32_t egid; member in struct:__anon3979 472 u_int32_t egid; member in struct:__anon3980 496 u_int32_t egid; member in struct:__anon3981 507 u_int32_t egid; member in struct:__anon3982 611 u_int32_t egid; member in struct:__anon3991 622 u_int32_t egid; member in struct:__anon3992 646 u_int32_t egid; member in struct:__anon3993 657 u_int32_t egid; member in struct:__anon3994 1113 * @param egid - The subject's effective group ID. 1131 uid_t euid, gid_t egid, uid_ [all...] |
/freebsd-9.3-release/usr.sbin/nscd/ |
H A D | query.h | 73 gid_t egid; /* egid of the caller, received via getpeereid */ member in struct:query_state
|
/freebsd-9.3-release/sys/compat/linux/ |
H A D | linux_uid16.c | 189 * cr_groups[0] holds egid. Setting the whole set from 190 * the supplied set will cause egid to be changed too. 244 * cr_groups[0] holds egid. Returning the whole set 381 LIN_SDT_PROBE2(uid16, linux_setregid16, entry, args->rgid, args->egid); 384 bsd.egid = CAST_NOCHG(args->egid); 413 LIN_SDT_PROBE3(uid16, linux_setresgid16, entry, args->rgid, args->egid, 417 bsd.egid = CAST_NOCHG(args->egid);
|
/freebsd-9.3-release/sbin/ccdconfig/ |
H A D | ccdconfig.c | 287 gid_t egid; local 290 egid = getegid(); 294 if (setegid(egid) != 0) 299 if (setegid(egid) != 0)
|
/freebsd-9.3-release/usr.bin/id/ |
H A D | id.c | 267 gid_t gid, egid, lastgid; local 307 if (p_egid && (egid = getegid()) != gid) { 308 (void)printf(" egid=%u", egid); 309 if ((gr = getgrgid(egid)))
|
/freebsd-9.3-release/sys/sys/ |
H A D | ucred.h | 98 void change_egid(struct ucred *newcred, gid_t egid);
|
/freebsd-9.3-release/sbin/hastd/ |
H A D | subr.c | 158 gid_t rgid, egid, sgid; local 251 PJDLOG_VERIFY(getresgid(&rgid, &egid, &sgid) == 0); 253 PJDLOG_VERIFY(egid == pw->pw_gid);
|