/freebsd-11-stable/contrib/sendmail/test/ |
H A D | t_setgid.c | 12 ** This program checks to see if your version of setgid works. 58 res = setgid(effgid); 61 printf("setgid(%d)=%d %s\n", (int) effgid, res, 66 printgids("after setgid()", effgid, effgid); 82 if (setgid(0) == 0) 85 printf("MAYDAY! setgid(0) succeeded (should have failed)\n"); 89 printf("setgid(0) failed (this is correct)\n"); 91 printgids("after setgid(0)", effgid, effgid); 111 "setgid" 117 printf("\nIt is possible to use setgid o [all...] |
H A D | t_dropgid.c | 12 ** This program checks to see if your version of setgid works. 49 # define SETGIDCALL "setgid" 94 res = setgid(realgid); 95 printf("setgid(%d)=%d %s\n", (int) realgid, res, 97 printgids("after setgid()", realgid, realgid); 112 if (setgid(effgid) == 0) 115 printf("MAYDAY! setgid(%d) succeeded (should have failed)\n", 120 printf("setgid(%d) failed (this is correct)\n", effgid); 122 printgids("after setgid() to egid", realgid, realgid);
|
/freebsd-11-stable/contrib/tcp_wrappers/ |
H A D | safe_finger.c | 68 setgid(pwd->pw_gid); 71 setgid(UNPRIV_UGID);
|
/freebsd-11-stable/contrib/netbsd-tests/lib/libc/gen/ |
H A D | t_getgrent.c | 135 * even without the setgid(2) check. 154 rv = setgid(gr->gr_gid);
|
/freebsd-11-stable/crypto/openssh/openbsd-compat/ |
H A D | bsd-setres_id.c | 51 if (setgid(rgid) < 0) { 53 error("setgid %u: %.100s", rgid, strerror(errno));
|
/freebsd-11-stable/contrib/netbsd-tests/lib/libc/sys/ |
H A D | t_issetugid.c | 121 if (check(NULL, setgid) != true)
|
H A D | t_getgroups.c | 97 atf_tc_set_md_var(tc, "descr", "Test setgid(2) from getgroups(2)"); 108 * Check that we can setgid(2) 121 rv = setgid(gidset[i]);
|
/freebsd-11-stable/crypto/heimdal/kdc/ |
H A D | main.c | 85 if (setgid(pw->pw_gid) < 0) 86 err(1, "setgid(%s) failed", runas_string);
|
/freebsd-11-stable/contrib/dma/ |
H A D | dma-mbox-create.c | 103 if (setgid(mail_gid) != 0)
|
/freebsd-11-stable/crypto/openssh/ |
H A D | uidswap.c | 120 if (setgid(getegid()) < 0) 121 debug("setgid %u: %.100s", (u_int) getegid(), strerror(errno)); 193 setgid(getgid()); 225 * OS X requires initgroups after setgid to opt back into 239 (setgid(old_gid) != -1 || setegid(old_gid) != -1))
|
/freebsd-11-stable/contrib/amd/hlfsd/ |
H A D | homedir.c | 173 if ((old_groupid = setgid(groupid)) < 0) { 174 plog(XLOG_WARNING, "could not setgid to %d: %m", groupid); 179 setgid(old_groupid); 187 setgid(old_groupid); 194 setgid(old_groupid); 210 setgid(old_groupid); 215 setgid(old_groupid);
|
/freebsd-11-stable/usr.sbin/chroot/ |
H A D | chroot.c | 159 if (group && setgid(gid) == -1) 160 err(1, "setgid");
|
/freebsd-11-stable/usr.sbin/bluetooth/sdpd/ |
H A D | main.c | 194 if (setgid(gid) < 0) { 195 log_err("Could not setgid(%s). %s (%d)",
|
/freebsd-11-stable/contrib/openpam/bin/su/ |
H A D | su.c | 164 if (setgid(pwd->pw_gid) == -1) { 165 warn("setgid()");
|
/freebsd-11-stable/contrib/sendmail/libsm/ |
H A D | mpeix.c | 354 ** - setuid/setgid file permission bits exist but have no-op functionality 355 ** - setgid() exists, but only supports new gid == current gid (boring!) 366 ** gid/uid management functions getegid(), geteuid(), setgid(), and 375 ** This emulation model is activated by use of the program file setgid and 376 ** setuid mode bits which exist but are unused by MPE. If the setgid mode 437 ** if the setgid bit is on, we want gid emulation and so set 548 ** SENDMAIL_MPE_SETGID -- shadow function for setgid() 550 ** Simulate a call to setgid() without actually calling the real 554 ** implicit real setgid() to the proper primary gid. So it doesn't matter 565 #undef setgid macro [all...] |
/freebsd-11-stable/usr.bin/finger/ |
H A D | finger.c | 168 if (setgid(pw->pw_gid) != 0) 169 err(1, "setgid()"); 173 if (setgid(UNPRIV_UGID) != 0) 174 err(1, "setgid()");
|
/freebsd-11-stable/sys/kern/ |
H A D | capabilities.conf | 602 setgid
|
/freebsd-11-stable/sys/compat/freebsd32/ |
H A D | capabilities.conf | 239 setgid
|
/freebsd-11-stable/usr.bin/newgrp/ |
H A D | newgrp.c | 139 setres = setgid(pwd->pw_gid); 145 warn("setgid"); 217 if (setgid(grp->gr_gid)) { 219 warn("setgid");
|
/freebsd-11-stable/release/picobsd/tinyware/passwd/ |
H A D | pw_util.c | 210 (void)setgid(getgid());
|
/freebsd-11-stable/tools/regression/priv/ |
H A D | priv_cred.c | 94 error = setgid(GID_OTHER);
|
/freebsd-11-stable/contrib/openbsm/bin/auditdistd/ |
H A D | sandbox.c | 165 if (setgid(pw->pw_gid) == -1) { 222 "Privileges successfully dropped using %s%s+setgid+setuid.",
|
/freebsd-11-stable/usr.sbin/jexec/ |
H A D | jexec.c | 123 if (setgid(pwd->pw_gid) != 0) 124 err(1, "setgid");
|
/freebsd-11-stable/usr.sbin/cron/cron/ |
H A D | popen.c | 180 if (setgid(e->gid) != 0)
|
/freebsd-11-stable/contrib/llvm-project/lldb/source/Host/posix/ |
H A D | ProcessLauncherPosixFork.cpp | 138 // Do not inherit setgid powers. 139 if (setgid(getgid()) != 0) 140 ExitWithError(error_fd, "setgid");
|