/freebsd-current/crypto/heimdal/lib/roken/ |
H A D | setegid.c | 43 setegid(gid_t egid) argument 46 return setregid(-1, egid); 50 return setresgid(-1, egid, -1);
|
/freebsd-current/cddl/contrib/opensolaris/cmd/dtrace/test/tst/common/scripting/ |
H A D | tst.egid.d | 41 printf("The egid is %d\n", $egid);
|
H A D | tst.egid.ksh | 33 # To verify egid of current process 56 /\$egid != \$1/ 62 /\$egid == \$1/ 80 groupid=`ps -x -o pid,egid | grep "$$ " | awk '{print $2}' 2>/dev/null`
|
/freebsd-current/contrib/openpam/lib/libpam/ |
H A D | openpam_cred.h | 45 gid_t egid; member in struct:pam_saved_cred
|
H A D | openpam_restore_cred.c | 76 setegid(scred->egid) < 0)
|
H A D | openpam_borrow_cred.c | 83 scred->egid = getegid();
|
/freebsd-current/tests/sys/kern/ |
H A D | unix_stream.c | 58 gid_t real_egid, egid; local 65 ATF_REQUIRE_EQ(0, getpeereid(sv[0], &euid, &egid)); 67 ATF_CHECK_EQ(real_egid, egid); 69 ATF_REQUIRE_EQ(0, getpeereid(sv[1], &euid, &egid)); 71 ATF_CHECK_EQ(real_egid, egid);
|
/freebsd-current/lib/libc/gen/ |
H A D | getpeereid.c | 40 getpeereid(int s, uid_t *euid, gid_t *egid) argument 55 *egid = xuc.cr_gid;
|
/freebsd-current/crypto/openssh/openbsd-compat/ |
H A D | bsd-setres_id.c | 29 setresgid(gid_t rgid, gid_t egid, gid_t sgid) argument 38 if (setregid(rgid, egid) < 0) { 45 if (setegid(egid) < 0) { 47 error("setegid %lu: %.100s", (u_long)egid, strerror(errno));
|
/freebsd-current/sys/security/mac/ |
H A D | mac_cred.c | 254 mac_cred_check_setegid(struct ucred *cred, gid_t egid) argument 258 MAC_POLICY_CHECK_NOSLEEP(cred_check_setegid, cred, egid); 259 MAC_CHECK_PROBE2(cred_check_setegid, error, cred, egid); 296 mac_cred_check_setregid(struct ucred *cred, gid_t rgid, gid_t egid) argument 300 MAC_POLICY_CHECK_NOSLEEP(cred_check_setregid, cred, rgid, egid); 301 MAC_CHECK_PROBE3(cred_check_setregid, error, cred, rgid, egid); 326 mac_cred_check_setresgid(struct ucred *cred, gid_t rgid, gid_t egid, argument 331 MAC_POLICY_CHECK_NOSLEEP(cred_check_setresgid, cred, rgid, egid, sgid); 332 MAC_CHECK_PROBE4(cred_check_setresgid, error, cred, rgid, egid,
|
/freebsd-current/cddl/usr.sbin/dtrace/tests/common/scripting/ |
H A D | Makefile | 21 tst.egid.d \ 22 tst.egid.ksh \
|
/freebsd-current/contrib/openbsm/sys/bsm/ |
H A D | audit_record.h | 242 token_t *au_to_process(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 244 token_t *au_to_process32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 246 token_t *au_to_process64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 248 token_t *au_to_process_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 250 token_t *au_to_process32_ex(au_id_t auid, uid_t euid, gid_t egid, 253 token_t *au_to_process64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 265 token_t *au_to_subject(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 267 token_t *au_to_subject32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 269 token_t *au_to_subject64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 271 token_t *au_to_subject_ex(au_id_t auid, uid_t euid, gid_t egid, uid_ [all...] |
/freebsd-current/sys/bsm/ |
H A D | audit_record.h | 247 token_t *au_to_process(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 249 token_t *au_to_process32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 251 token_t *au_to_process64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 253 token_t *au_to_process_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 255 token_t *au_to_process32_ex(au_id_t auid, uid_t euid, gid_t egid, 258 token_t *au_to_process64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 271 token_t *au_to_subject(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 273 token_t *au_to_subject32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 275 token_t *au_to_subject64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 277 token_t *au_to_subject_ex(au_id_t auid, uid_t euid, gid_t egid, uid_ [all...] |
/freebsd-current/contrib/openbsm/bin/auditdistd/ |
H A D | sandbox.c | 72 gid_t rgid, egid; local 201 PJDLOG_VERIFY(getresgid(&rgid, &egid, &sgid) == 0); 205 egid = getegid(); 208 PJDLOG_VERIFY(egid == pw->pw_gid);
|
/freebsd-current/tools/regression/sockets/unix_cmsg/ |
H A D | t_peercred.c | 78 if (xucred->cr_groups[0] != uc_cfg.proc_cred.egid) { 80 (u_long)xucred->cr_groups[0], (u_long)uc_cfg.proc_cred.egid);
|
H A D | uc_common.h | 50 gid_t egid; member in struct:uc_cfg::__anon6339
|
/freebsd-current/usr.bin/newgrp/ |
H A D | newgrp.c | 151 gid_t egid; local 156 egid = getegid(); 198 if (grp->gr_gid != egid && inarray(grp->gr_gid, grps, ngrps)) { 223 if (egid != grp->gr_gid && !inarray(egid, grps, ngrps)) { 227 grps[ngrps++] = egid;
|
/freebsd-current/sys/kern/ |
H A D | kern_prot.c | 276 * Get effective group ID. The "egid" is groups[0], and could be obtained 474 * compatible. It says that setting the uid/gid to euid/egid is a special 708 * Do we have "appropriate privileges" (are we root or gid == egid) 739 * In all cases permitted cases, we are changing the egid. 759 gid_t egid; member in struct:setegid_args 768 gid_t egid; local 771 egid = uap->egid; 772 AUDIT_ARG_EGID(egid); 778 error = mac_cred_check_setegid(oldcred, egid); 960 gid_t egid; member in struct:setregid_args 969 gid_t egid, rgid; local 1111 gid_t egid; member in struct:setresgid_args 1121 gid_t egid, rgid, sgid; local 1205 gid_t *egid; member in struct:getresgid_args 2455 change_egid(struct ucred *newcred, gid_t egid) argument [all...] |
/freebsd-current/contrib/openbsm/libbsm/ |
H A D | bsm_token.c | 748 au_to_process32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument 761 ADD_U_INT32(dptr, egid); 780 au_to_process64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument 794 ADD_U_INT32(dptr, egid); 813 au_to_process(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument 817 return (au_to_process32(auid, euid, egid, ruid, rgid, pid, sid, 836 au_to_process32_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, argument 858 ADD_U_INT32(dptr, egid); 876 au_to_process64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, argument 900 ADD_U_INT32(dptr, egid); 918 au_to_process_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument 1159 au_to_subject32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument 1184 au_to_subject64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument 1210 au_to_subject(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument 1233 au_to_subject32_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument 1271 au_to_subject64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument 1311 au_to_subject_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument [all...] |
/freebsd-current/sys/security/audit/ |
H A D | bsm_token.c | 666 au_to_process32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument 677 ADD_U_INT32(dptr, egid); 696 au_to_process64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument 708 ADD_U_INT32(dptr, egid); 727 au_to_process(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument 731 return (au_to_process32(auid, euid, egid, ruid, rgid, pid, sid, 750 au_to_process32_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, argument 768 ADD_U_INT32(dptr, egid); 786 au_to_process64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, argument 807 ADD_U_INT32(dptr, egid); 825 au_to_process_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument 1095 au_to_subject32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument 1118 au_to_subject64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument 1142 au_to_subject(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument 1165 au_to_subject32_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument 1200 au_to_subject64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument 1237 au_to_subject_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument [all...] |
/freebsd-current/contrib/openbsm/bsm/ |
H A D | libbsm.h | 462 u_int32_t egid; member in struct:__anon5855 473 u_int32_t egid; member in struct:__anon5856 497 u_int32_t egid; member in struct:__anon5857 508 u_int32_t egid; member in struct:__anon5858 612 u_int32_t egid; member in struct:__anon5867 623 u_int32_t egid; member in struct:__anon5868 647 u_int32_t egid; member in struct:__anon5869 658 u_int32_t egid; member in struct:__anon5870 1100 * @param egid - The subject's effective group ID. 1118 uid_t euid, gid_t egid, uid_ [all...] |
/freebsd-current/usr.sbin/nscd/ |
H A D | query.h | 71 gid_t egid; /* egid of the caller, received via getpeereid */ member in struct:query_state
|
/freebsd-current/sys/compat/linux/ |
H A D | linux_uid16.c | 110 * cr_groups[0] holds egid. Setting the whole set from 111 * the supplied set will cause egid to be changed too. 161 * cr_groups[0] holds egid. Returning the whole set 265 bsd.egid = CAST_NOCHG(args->egid); 291 bsd.egid = CAST_NOCHG(args->egid);
|
/freebsd-current/usr.bin/id/ |
H A D | id.c | 260 gid_t gid, egid, lastgid; local 300 if (p_egid && (egid = getegid()) != gid) { 301 (void)printf(" egid=%u", egid); 302 if ((gr = getgrgid(egid)))
|
/freebsd-current/sbin/ccdconfig/ |
H A D | ccdconfig.c | 287 gid_t egid; local 290 egid = getegid(); 294 if (setegid(egid) != 0) 299 if (setegid(egid) != 0)
|