/freebsd-9.3-release/lib/libc/compat-43/ |
H A D | setruid.c | 39 setruid(uid_t ruid) argument 42 return (setreuid(ruid, -1));
|
/freebsd-9.3-release/tools/regression/usr.bin/pkill/ |
H A D | pgrep-U.t | 9 ruid=`id -ur` 15 pid=`pgrep -f -U $ruid $sleep` 25 ruid=`id -urn` 31 pid=`pgrep -f -U $ruid $sleep`
|
H A D | pkill-U.t | 9 ruid=`id -ur` 14 pkill -f -U $ruid $sleep 27 ruid=`id -urn` 32 pkill -f -U $ruid $sleep
|
/freebsd-9.3-release/crypto/openssh/openbsd-compat/ |
H A D | bsd-setres_id.c | 66 setresuid(uid_t ruid, uid_t euid, uid_t suid) argument 70 if (ruid != suid) { 75 if (setreuid(ruid, euid) < 0) { 77 error("setreuid %u: %.100s", ruid, strerror(errno)); 91 if (setuid(ruid) < 0) { 93 error("setuid %u: %.100s", ruid, strerror(errno));
|
/freebsd-9.3-release/contrib/openbsm/sys/bsm/ |
H A D | audit_record.h | 237 token_t *au_to_process(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 239 token_t *au_to_process32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 241 token_t *au_to_process64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 243 token_t *au_to_process_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 246 uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, 248 token_t *au_to_process64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 260 token_t *au_to_subject(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 262 token_t *au_to_subject32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 264 token_t *au_to_subject64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 266 token_t *au_to_subject_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, [all...] |
/freebsd-9.3-release/sys/bsm/ |
H A D | audit_record.h | 238 token_t *au_to_process(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 240 token_t *au_to_process32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 242 token_t *au_to_process64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 244 token_t *au_to_process_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 247 uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, 249 token_t *au_to_process64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 261 token_t *au_to_subject(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 263 token_t *au_to_subject32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 265 token_t *au_to_subject64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 267 token_t *au_to_subject_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, [all...] |
/freebsd-9.3-release/contrib/openbsm/bin/auditdistd/ |
H A D | sandbox.c | 73 uid_t ruid, euid; local 194 PJDLOG_VERIFY(getresuid(&ruid, &euid, &suid) == 0); 197 ruid = getuid(); 200 PJDLOG_VERIFY(ruid == pw->pw_uid);
|
/freebsd-9.3-release/sys/security/mac/ |
H A D | mac_cred.c | 285 mac_cred_check_setreuid(struct ucred *cred, uid_t ruid, uid_t euid) argument 289 MAC_POLICY_CHECK_NOSLEEP(cred_check_setreuid, cred, ruid, euid); 290 MAC_CHECK_PROBE3(cred_check_setreuid, error, cred, ruid, euid); 313 mac_cred_check_setresuid(struct ucred *cred, uid_t ruid, uid_t euid, argument 318 MAC_POLICY_CHECK_NOSLEEP(cred_check_setresuid, cred, ruid, euid, suid); 319 MAC_CHECK_PROBE4(cred_check_setresuid, error, cred, ruid, euid,
|
/freebsd-9.3-release/contrib/openbsm/libbsm/ |
H A D | bsm_token.c | 750 au_to_process32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument 764 ADD_U_INT32(dptr, ruid); 782 au_to_process64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument 797 ADD_U_INT32(dptr, ruid); 815 au_to_process(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument 819 return (au_to_process32(auid, euid, egid, ruid, rgid, pid, sid, 838 au_to_process32_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, argument 861 ADD_U_INT32(dptr, ruid); 878 au_to_process64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, argument 903 ADD_U_INT32(dptr, ruid); 920 au_to_process_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument 1161 au_to_subject32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument 1186 au_to_subject64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument 1212 au_to_subject(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument 1235 au_to_subject32_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument 1273 au_to_subject64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument 1313 au_to_subject_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument [all...] |
H A D | bsm_wrappers.c | 354 gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, 361 subject = au_to_subject32(auid, euid, egid, ruid, rgid, pid, sid, 398 uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, 404 subject = au_to_subject32(auid, euid, egid, ruid, rgid, pid, sid, tid); 353 audit_write_success(short event_code, token_t *tok, au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument 397 audit_write_failure(short event_code, char *errmsg, int errcode, au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument
|
H A D | bsm_io.c | 2507 * ruid 4 bytes 2532 READ_TOKEN_U_INT32(buf, len, tok->tt.proc32.ruid, tok->len, err); 2575 open_attr(fp, "ruid"); 2576 print_user(fp, tok->tt.proc32.ruid, oflags); 2600 print_user(fp, tok->tt.proc32.ruid, oflags); 2619 * ruid 4 bytes 2644 READ_TOKEN_U_INT32(buf, len, tok->tt.proc64.ruid, tok->len, err); 2686 open_attr(fp, "ruid"); 2687 print_user(fp, tok->tt.proc64.ruid, oflags); 2711 print_user(fp, tok->tt.proc64.ruid, oflag [all...] |
/freebsd-9.3-release/sys/security/audit/ |
H A D | audit_bsm_token.c | 671 au_to_process32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument 683 ADD_U_INT32(dptr, ruid); 701 au_to_process64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument 714 ADD_U_INT32(dptr, ruid); 732 au_to_process(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument 736 return (au_to_process32(auid, euid, egid, ruid, rgid, pid, sid, 755 au_to_process32_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, argument 774 ADD_U_INT32(dptr, ruid); 791 au_to_process64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, argument 813 ADD_U_INT32(dptr, ruid); 830 au_to_process_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument 1084 au_to_subject32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument 1107 au_to_subject64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument 1131 au_to_subject(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument 1154 au_to_subject32_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument 1189 au_to_subject64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument 1226 au_to_subject_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument [all...] |
H A D | audit.h | 83 void audit_arg_ruid(uid_t ruid); 244 #define AUDIT_ARG_RUID(ruid) do { \ 246 audit_arg_ruid((ruid)); \ 352 #define AUDIT_ARG_RUID(ruid)
|
/freebsd-9.3-release/sys/kern/ |
H A D | kern_prot.c | 876 uid_t ruid; member in struct:setreuid_args 886 uid_t euid, ruid; local 891 ruid = uap->ruid; 893 AUDIT_ARG_RUID(ruid); 896 ruip = uifind(ruid); 901 error = mac_cred_check_setreuid(oldcred, ruid, euid); 906 if (((ruid != (uid_t)-1 && ruid != oldcred->cr_ruid && 907 ruid ! 1010 uid_t ruid; member in struct:setresuid_args 1021 uid_t euid, ruid, suid; local 1159 uid_t *ruid; member in struct:getresuid_args [all...] |
/freebsd-9.3-release/lib/libpam/modules/pam_ksu/ |
H A D | pam_ksu.c | 178 uid_t euid, ruid; local 186 ruid = getuid(); 188 rv = seteuid(ruid); 195 (void)asprintf(&ccname, "%s%lu", KRB5_DEFAULT_CCROOT, (unsigned long)ruid);
|
/freebsd-9.3-release/usr.bin/su/ |
H A D | su.c | 160 uid_t ruid; local 256 ruid = getuid(); 260 if (pwd == NULL || pwd->pw_uid != ruid) 261 pwd = getpwuid(ruid); 366 if (ruid != 0) { 381 if (ruid != 0 && !chshell(pwd->pw_shell)) 550 if (ruid != 0)
|
/freebsd-9.3-release/contrib/openbsm/bsm/ |
H A D | libbsm.h | 462 u_int32_t ruid; member in struct:__anon3979 473 u_int32_t ruid; member in struct:__anon3980 497 u_int32_t ruid; member in struct:__anon3981 508 u_int32_t ruid; member in struct:__anon3982 612 u_int32_t ruid; member in struct:__anon3991 623 u_int32_t ruid; member in struct:__anon3992 647 u_int32_t ruid; member in struct:__anon3993 658 u_int32_t ruid; member in struct:__anon3994 1115 * @param ruid - The subject's real user ID. 1131 uid_t euid, gid_t egid, uid_t ruid, gid_ [all...] |
/freebsd-9.3-release/sys/compat/linux/ |
H A D | linux_uid16.c | 397 LIN_SDT_PROBE2(uid16, linux_setreuid16, entry, args->ruid, args->euid); 399 bsd.ruid = CAST_NOCHG(args->ruid); 431 LIN_SDT_PROBE3(uid16, linux_setresuid16, entry, args->ruid, args->euid, 434 bsd.ruid = CAST_NOCHG(args->ruid);
|
/freebsd-9.3-release/contrib/opie/ |
H A D | opiepasswd.c | 122 uid_t ruid; local 127 ruid = getuid(); 130 if (username == NULL || pp == NULL || pp->pw_uid != ruid) 131 pp = getpwuid(ruid);
|
/freebsd-9.3-release/sbin/hastd/ |
H A D | subr.c | 157 uid_t ruid, euid, suid; local 247 PJDLOG_VERIFY(getresuid(&ruid, &euid, &suid) == 0); 248 PJDLOG_VERIFY(ruid == pw->pw_uid);
|
/freebsd-9.3-release/tools/regression/security/access/ |
H A D | testaccess.c | 124 uid_t euid, ruid, suid; local 128 error = getresuid(&ruid, &euid, &suid); 142 printf("ruid: %d, euid: %d, suid: %d, ", ruid, euid, suid);
|
/freebsd-9.3-release/tools/regression/security/proc_to_proc/ |
H A D | scenario.c | 71 /* euid ruid svuid issetugid */ 226 uid_t ruid, euid, svuid; local 227 error = getresuid(&ruid, &euid, &svuid); 232 assert(ruid == cred->cr_ruid);
|
/freebsd-9.3-release/contrib/libreadline/examples/rlfe/ |
H A D | os.h | 160 # define setreuid(ruid, euid) setresuid(ruid, euid, -1)
|
/freebsd-9.3-release/gnu/usr.bin/rcs/lib/ |
H A D | rcsutil.c | 366 struct passwd const *pw = getpwuid(ruid()); 369 (unsigned long)ruid() 1318 uid_t ruid() { cacheid(getuid()); } function 1346 if (euid() == ruid()) 1350 if (setreuid(u==euid() ? ruid() : euid(), u) != 0) 1387 set_uid_to(ruid());
|
/freebsd-9.3-release/sys/i386/linux/ |
H A D | linux_systrace_args.c | 461 iarg[0] = p->ruid; /* l_uid16_t */ 1165 iarg[0] = p->ruid; /* l_uid16_t */ 1174 uarg[0] = (intptr_t) p->ruid; /* l_uid16_t * */ 1457 uarg[0] = p->ruid; /* uid_t */ 1494 uarg[0] = p->ruid; /* uid_t */ 1503 uarg[0] = (intptr_t) p->ruid; /* uid_t * */
|