/freebsd-11-stable/contrib/gcc/ |
H A D | sys-protos.h | 160 extern int chroot(const char *);
|
/freebsd-11-stable/contrib/libarchive/tar/ |
H A D | read.c | 239 if (chroot(".") != 0) 240 lafe_errc(1, errno, "Can't chroot to \".\""); 243 "chroot isn't supported on this platform");
|
/freebsd-11-stable/contrib/libpcap/lbl/ |
H A D | os-sunos4.h | 58 int chroot(const char *);
|
/freebsd-11-stable/contrib/netbsd-tests/kernel/ |
H A D | t_ptrace.c | 166 FORKEE_ASSERT(chroot(buf) == 0);
|
/freebsd-11-stable/contrib/netbsd-tests/lib/libc/sys/ |
H A D | t_chroot.c | 49 atf_tc_set_md_var(tc, "descr", "A basic test of chroot(2)"); 71 if (chroot(buf) != 0) 76 if (chroot("/root") != -1) 96 atf_tc_fail("chroot(2) failed"); 104 atf_tc_fail("chroot(2) did not change the root directory"); 113 atf_tc_set_md_var(tc, "descr", "Test error conditions of chroot(2)"); 124 ATF_REQUIRE_ERRNO(ENAMETOOLONG, chroot(buf) == -1); 127 ATF_REQUIRE_ERRNO(EFAULT, chroot((void *)-1) == -1); 130 ATF_REQUIRE_ERRNO(ENOENT, chroot("/a/b/c/d/e/f/g/h/i/j") == -1); 136 atf_tc_set_md_var(tc, "descr", "Test permissions with chroot( [all...] |
/freebsd-11-stable/contrib/netbsd-tests/net/ndp/ |
H A D | t_ra.sh | 55 atf_check -s exit:0 mkdir -p /rump/var/chroot/rtadvd
|
/freebsd-11-stable/contrib/ntp/lib/isc/unix/ |
H A D | dir.c | 180 if (chroot(dirname) < 0 || chdir("/") < 0)
|
/freebsd-11-stable/contrib/openbsm/bin/auditdistd/ |
H A D | sandbox.c | 152 if (chroot(pw->pw_dir) == -1) { 223 capsicum ? "capsicum+" : "", jailed ? "jail" : "chroot");
|
/freebsd-11-stable/contrib/opie/ |
H A D | opieftpd.c | 567 /* open wtmp before chroot */ 574 /* We MUST do a chdir() after the chroot. Otherwise the old current 576 if (chroot(pw->pw_dir) < 0 || chdir("/") < 0) { 1579 anonymous ftp's that chroot and can't do it later. */
|
/freebsd-11-stable/contrib/pf/ftp-proxy/ |
H A D | ftp-proxy.c | 280 if (chroot(CHROOT_DIR) != 0 || chdir("/") != 0 ||
|
/freebsd-11-stable/contrib/pf/pflogd/ |
H A D | privsep.c | 100 if (chroot(pw->pw_dir) != 0) 101 err(1, "unable to chroot");
|
/freebsd-11-stable/contrib/pf/tftp-proxy/ |
H A D | tftp-proxy.c | 119 if (chroot(CHROOT_DIR) || chdir("/")) { 120 syslog(LOG_ERR, "chroot %s: %m", CHROOT_DIR);
|
/freebsd-11-stable/contrib/sendmail/libsm/ |
H A D | mpeix.c | 32 ** CHROOT -- dummy chroot() function 34 ** The MPE documentation for sendmail says that chroot-based 35 ** functionality is not implemented because MPE lacks chroot. But 36 ** rather than mucking around with all the sendmail calls to chroot, 38 ** case a sendmail user attempts to enable chroot-based functionality. 48 chroot(path) function
|
/freebsd-11-stable/contrib/tcpdump/lbl/ |
H A D | os-sunos4.h | 58 int chroot(const char *);
|
/freebsd-11-stable/crypto/heimdal/appl/ftp/ftpd/ |
H A D | ftpd.c | 336 * necessary for anonymous ftp's that chroot and can't do it later. 502 reply(530, "Can't change user from chroot user."); 712 /* open wtmp before chroot */ 719 * We MUST do a chdir() after the chroot. Otherwise 723 if (chroot(pw->pw_dir) < 0 || chdir("/") < 0) { 728 if (chroot(pw->pw_dir) < 0 || chdir("/") < 0) { 1799 * failes miserably when running chroot
|
/freebsd-11-stable/crypto/heimdal/kdc/ |
H A D | main.c | 69 errx(1, "no running as root, can't switch user/chroot"); 71 if (chroot_string && chroot(chroot_string) != 0) 72 errx(1, "chroot(%s)", "chroot_string failed");
|
/freebsd-11-stable/crypto/openssh/ |
H A D | buildpkg.sh.in | 367 # Use chroot to handle PKG_INSTALL_ROOT 370 chroot="chroot \${PKG_INSTALL_ROOT}" 375 chroot=echo 407 \$chroot ${PATH_GROUPADD_PROG} \$sshdgid \$SSH_PRIVSEP_GROUP 420 \$chroot ${PATH_USERADD_PROG} -c 'SSHD PrivSep User' -s /bin/false -g $SSH_PRIVSEP_USER \$sshduid $SSH_PRIVSEP_USER 421 \$chroot ${PATH_PASSWD_PROG} -l $SSH_PRIVSEP_USER
|
H A D | session.c | 1302 fatal("chroot path does not begin at root"); 1304 fatal("chroot path too long"); 1325 fatal("bad ownership or modes for chroot " 1329 fatal("chroot path %s\"%s\" is not a directory", 1335 fatal("Unable to chdir to chroot path \"%s\": " 1337 if (chroot(path) == -1) 1338 fatal("chroot(\"%s\"): %s", path, strerror(errno)); 1340 fatal("%s: chdir(/) after chroot: %s", 1386 /* Make sure we don't attempt to chroot again */ 1405 * In a chroot environmen [all...] |
H A D | sshd.c | 567 if (chroot(_PATH_PRIVSEP_CHROOT_DIR) == -1) 568 fatal("chroot(\"%s\"): %s", _PATH_PRIVSEP_CHROOT_DIR, 1992 * before privsep chroot().
|
/freebsd-11-stable/crypto/openssh/regress/ |
H A D | Makefile | 46 sftp-chroot \
|
H A D | sftp-chroot.sh | 1 # $OpenBSD: sftp-chroot.sh,v 1.5 2016/09/26 21:34:38 bluhm Exp $ 4 tid="sftp in chroot" 15 if ! $OBJ/check-perm -m chroot "$CHROOT" ; then
|
/freebsd-11-stable/lib/libc/sys/ |
H A D | Makefile.inc | 152 chroot.2 \
|
/freebsd-11-stable/lib/libpam/modules/pam_chroot/ |
H A D | pam_chroot.c | 81 "%s has no chroot directory", user); 89 if (chroot(dir) == -1) { 90 openpam_log(PAM_LOG_ERROR, "chroot(): %m");
|
/freebsd-11-stable/libexec/tftpd/ |
H A D | tftpd.c | 290 * (This needs to be done before the chroot()) 364 /* Must get this before chroot because /etc might go away */ 369 if (chroot(chroot_dir)) { 370 tftp_log(LOG_ERR, "chroot: %s: %s",
|
/freebsd-11-stable/release/tools/ |
H A D | azure.conf | 17 chroot ${DESTDIR} ln -s /usr/local/sbin/waagent /usr/sbin/waagent 18 chroot ${DESTDIR} /usr/local/sbin/waagent -verbose -install 19 yes | chroot ${DESTDIR} /usr/local/sbin/waagent -deprovision
|