/freebsd/contrib/pjdfstest/tests/chown/ |
H A D | 00.t | 30 expect 123,456 lstat ${n0} uid,gid 32 expect 0,0 lstat ${n0} uid,gid 35 uidgid=`${fstest} lstat ${n1} uid,gid` 37 expect 123,456 stat ${n1} uid,gid 38 expect 123,456 stat ${n0} uid,gid 39 expect ${uidgid} lstat ${n1} uid,gid 51 expect 123,456 lstat ${n0} uid,gid 66 expect 65534,65533 lstat ${n0} uid,gid 68 expect 65534,65532 lstat ${n0} uid,gid 70 expect 65534,65531 lstat ${n0} uid,gid [all …]
|
H A D | 08.t | 28 expect 0,0 stat ${n0} uid,gid 31 expect 65534,65534 stat ${n0} uid,gid 37 expect 65534,65534 stat ${n0} uid,gid 46 expect 65534,65534 stat ${n0} uid,gid 54 expect 0,0 stat ${n0} uid,gid 57 expect 65534,65534 stat ${n0} uid,gid 63 expect 0,0 stat ${n0} uid,gid 66 expect 65534,65534 stat ${n0} uid,gid 72 expect 65534,65534 stat ${n0} uid,gid 79 expect 0,0 stat ${n0} uid,gid [all …]
|
/freebsd/tests/sys/mac/bsdextended/ |
H A D | ugidfw_test.c | 79 "subject uid root object uid root mode n", 80 "subject uid root object uid daemon mode n", 81 "subject uid daemon object uid root mode n", 82 "subject uid daemon object uid daemon mode n", 84 "subject uid root object uid root mode a", 85 "subject uid root object uid root mode r", 86 "subject uid root object uid root mode s", 87 "subject uid root object uid root mode w", 88 "subject uid root object uid root mode x", 89 "subject uid root object uid root mode arswx", [all …]
|
H A D | matches_test.sh | 112 atf_check -s exit:0 ugidfw set 1 subject uid $uidrange object mode rasx 113 # subject uid in range 117 # subject uid out range 191 atf_check -s exit:0 ugidfw set 1 subject object uid $uidrange mode rasx 193 # object uid in range 197 # object uid out range 199 atf_check -s exit:0 ugidfw set 1 subject object uid $uidrange mode rasx 201 # object uid in range (different subject) 205 # object uid out range (different subject) 252 atf_check -s exit:0 ugidfw set 1 subject uid $uidrange object filesys / mode rasx [all …]
|
/freebsd/libexec/rc/ |
H A D | rc.bsdextended | 62 #${CMD} add subject uid 80 object not uid 80 mode rxws; 67 #${CMD} add subject uid 54 object not uid 54 mode rxws; 72 ${CMD} add subject uid 0 object not uid 0 mode arxws; 77 #${CMD} add subject uid 54 object not uid 54 mode rxws; 82 ${CMD} add subject uid 3 object not uid 3 mode rxws; 87 #${CMD} add subject uid 68 object not uid 68 mode rxws; 92 ${CMD} add subject uid 25 object not uid 25 mode rxws; 97 ${CMD} add subject uid 26 object not uid 26 mode rxws; 102 #${CMD} add subject uid 60 object not uid 60 mode rxws; 107 #${CMD} add subject uid 1018 object not uid 1018 mode rxws; [all …]
|
/freebsd/tests/sys/mac/portacl/ |
H A D | nobody_test.sh | 17 bind_test fl fl uid nobody tcp 77 18 bind_test ok ok uid nobody tcp 7777 19 bind_test fl fl uid nobody udp 77 20 bind_test ok ok uid nobody udp 7777 29 bind_test fl fl uid nobody tcp 77 30 bind_test ok ok uid nobody tcp 7777 31 bind_test fl fl uid nobody udp 77 32 bind_test ok ok uid nobody udp 7777 43 bind_test fl fl uid nobody tcp 77 44 bind_test fl ok uid nobody tcp 7777 [all …]
|
H A D | root_test.sh | 14 bind_test ok ok uid root tcp 77 15 bind_test ok ok uid root tcp 7777 16 bind_test ok ok uid root udp 77 17 bind_test ok ok uid root udp 7777 28 bind_test fl ok uid root tcp 77 29 bind_test ok ok uid root tcp 7777 30 bind_test fl ok uid root udp 77 31 bind_test ok ok uid root udp 7777 42 bind_test fl ok uid root tcp 77 43 bind_test fl ok uid root tcp 7777 [all …]
|
/freebsd/usr.bin/top/ |
H A D | username.c | 14 * These routines handle uid to username mapping. 42 int uid; member 57 username(int uid) in username() argument 61 hashindex = hashit(uid); in username() 62 if (is_empty_hash(hashindex) || (hash_table[hashindex].uid != uid)) in username() 65 hashindex = get_user(uid); in username() 93 enter_user(int uid, char name[], bool wecare) in enter_user() argument 98 fprintf(stderr, "enter_hash(%d, %s, %d)\n", uid, name, wecare); in enter_user() 101 hashindex = hashit(uid); in enter_user() 107 if (hash_table[hashindex].uid == uid) in enter_user() [all …]
|
/freebsd/contrib/netbsd-tests/lib/libc/c063/ |
H A D | t_fchownat.c | 56 static int getuser(uid_t *uid, gid_t *gid) in getuser() argument 63 *uid = pw->pw_uid; in getuser() 79 uid_t uid; in ATF_TC_BODY() local 83 ATF_REQUIRE(getuser(&uid, &gid) == 0); in ATF_TC_BODY() 89 ATF_REQUIRE(fchownat(dfd, BASEFILE, uid, gid, 0) == 0); in ATF_TC_BODY() 93 ATF_REQUIRE(st.st_uid == uid); in ATF_TC_BODY() 107 uid_t uid; in ATF_TC_BODY() local 111 ATF_REQUIRE(getuser(&uid, &gid) == 0); in ATF_TC_BODY() 117 ATF_REQUIRE(fchownat(AT_FDCWD, BASEFILE, uid, gid, 0) == 0); in ATF_TC_BODY() 120 ATF_REQUIRE(st.st_uid == uid); in ATF_TC_BODY() [all …]
|
/freebsd/contrib/dialog/samples/ |
H A D | form2 | 9 uid=`echo "$ids" | sed -e 's/^uid=//' -e 's/ .*//'` 24 "1 UID:" 2 1 "$uid" 2 12 10 10 \ 28 "2 UID:" 6 1 "$uid" 6 12 10 10 \ 32 "3 UID:" 10 1 "$uid" 10 12 10 10 \ 36 "4 UID:" 14 1 "$uid" 14 12 10 10 \ 40 "5 UID:" 18 1 "$uid" 18 12 10 10 \ 44 "6 UID:" 22 1 "$uid" 22 12 10 10 \ 48 "7 UID:" 26 1 "$uid" 26 12 10 10 \
|
/freebsd/share/man/man4/ |
H A D | mac_do.4 | 91 .Dl Ao type Ac \ ⟶\ Op So uid Sc | So gid Sc 93 .Ql uid 207 .Ql uid , 220 .Ql uid , 225 .Dl uid=. 350 .It Li uid=10001:uid=10002 354 .It Li uid=10001:uid=10002,uid=10003 355 Same as the first example, but also allows to switch to UID 10003 instead of 357 .It Li uid=10001:uid=10002,gid=10002 360 .It Li uid=10001:uid=10002,gid=10002,+gid=.\& [all …]
|
/freebsd/bin/pax/ |
H A D | cache.c | 48 * routines that control user, group, uid and gid caches (for the archive 56 static UIDC **uidtb = NULL; /* uid to name cache */ 58 static UIDC **usrtb = NULL; /* user name to uid cache */ 159 * caches the name (if any) for the uid. If frc set, we always return the 166 name_uid(uid_t uid, int frc) in name_uid() argument 175 * see if we have this uid cached in name_uid() 177 ptr = uidtb[uid % UID_SZ]; in name_uid() 178 if ((ptr != NULL) && (ptr->valid > 0) && (ptr->uid == uid)) { in name_uid() 180 * have an entry for this uid in name_uid() 188 * No entry for this uid, we will add it in name_uid() [all …]
|
/freebsd/sys/dev/mlx5/mlx5_core/ |
H A D | mlx5_qp.c | 134 qp->uid = MLX5_GET(create_qp_in, in, uid); in mlx5_core_create_qp() 149 MLX5_SET(destroy_qp_in, din, uid, qp->uid); in mlx5_core_create_qp() 167 MLX5_SET(destroy_qp_in, in, uid, qp->uid); in mlx5_core_destroy_qp() 207 struct mbox_info *mbox, u16 uid) in modify_qp_mbox_alloc() argument 219 MLX5_SET(typ##_in, in, uid, _uid); \ in modify_qp_mbox_alloc() 235 MOD_QP_IN_SET(qp_2rst, mbox->in, opcode, qpn, uid); in modify_qp_mbox_alloc() 240 MOD_QP_IN_SET(qp_2err, mbox->in, opcode, qpn, uid); in modify_qp_mbox_alloc() 248 opt_param_mask, qpc, uid); in modify_qp_mbox_alloc() 254 opt_param_mask, qpc, uid); in modify_qp_mbox_alloc() 260 opt_param_mask, qpc, uid); in modify_qp_mbox_alloc() [all …]
|
/freebsd/sys/contrib/openzfs/include/os/linux/spl/sys/ |
H A D | cred.h | 77 struct user_namespace *fs_userns, uid_t uid) in zfs_uid_to_vfsuid() argument 82 return (uid); in zfs_uid_to_vfsuid() 92 return (uid); in zfs_uid_to_vfsuid() 94 uid = from_kuid(fs_userns, KUIDT_INIT(uid)); in zfs_uid_to_vfsuid() 95 if (uid == (uid_t)-1) in zfs_uid_to_vfsuid() 96 return (uid); in zfs_uid_to_vfsuid() 97 return (__kuid_val(make_kuid(owner, uid))); in zfs_uid_to_vfsuid() 125 struct user_namespace *fs_userns, uid_t uid) in zfs_vfsuid_to_uid() argument 130 return (uid); in zfs_vfsuid_to_uid() 140 return (uid); in zfs_vfsuid_to_uid() [all …]
|
/freebsd/tools/regression/security/access/ |
H A D | testaccess.c | 182 /* Make sure saved uid is set appropriately. */ in main() 204 * UID-only tests. in main() 207 /* Check that saved uid is not used */ in main() 219 fprintf(stderr, "saved uid used instead of real uid\n"); in main() 226 fprintf(stderr, "saved uid used instead of effective uid\n"); in main() 245 /* Check that the real uid is used, not the effective uid */ in main() 248 fprintf(stderr, "Effective uid was used instead of real uid in access().\n"); in main() 253 /* Check that the effective uid is used, not the real uid */ in main() 256 fprintf(stderr, "Real uid was used instead of effective uid in eaccess().\n"); in main() 261 /* Check that the real uid is used, not the effective uid */ in main() [all …]
|
/freebsd/usr.sbin/ugidfw/ |
H A D | ugidfw.8 | 44 .Cm uid Ar uid | minuid:maxuid 58 .Cm uid Ar uid | minuid:maxuid 99 .Cm uid Ar uid | minuid:maxuid 113 .Cm uid Ar uid | minuid:maxuid 153 interface to manage access to file system objects by UID and GID, 202 .Cm uid Ar uid | minuid:maxuid 221 .Ar uid 232 .Cm uid Ar uid | minuid:maxuid 271 .Ar uid
|
/freebsd/contrib/sendmail/libsm/ |
H A D | mpeix.c | 320 ** uid -- uid to obtain passwd data for 330 sendmail_mpe_getpwuid(uid) in sendmail_mpe_getpwuid() argument 331 uid_t uid; in sendmail_mpe_getpwuid() 335 if ((result = getpwuid(uid)) != NULL) 353 ** - there is no uid 0 superuser 356 ** - setuid() forces a gid change to the new uid's primary (and only) gid 361 ** sendmail, because there are only about a zillion references to uid 0 366 ** gid/uid management functions getegid(), geteuid(), setgid(), and 369 ** - the sendmail program thinks it is a setuid-root (uid 0) program 370 ** - uid 0 is recognized as being valid, but does not grant extra powers [all …]
|
/freebsd/contrib/pjdfstest/tests/link/ |
H A D | 00.t | 37 expect ${type},0201,3,65534,65533 lstat ${n0} type,mode,nlink,uid,gid 38 expect ${type},0201,3,65534,65533 lstat ${n1} type,mode,nlink,uid,gid 39 expect ${type},0201,3,65534,65533 lstat ${n2} type,mode,nlink,uid,gid 42 expect ENOENT lstat ${n0} type,mode,nlink,uid,gid 43 expect ${type},0201,2,65534,65533 lstat ${n1} type,mode,nlink,uid,gid 44 expect ${type},0201,2,65534,65533 lstat ${n2} type,mode,nlink,uid,gid 47 expect ENOENT lstat ${n0} type,mode,nlink,uid,gid 48 expect ${type},0201,1,65534,65533 lstat ${n1} type,mode,nlink,uid,gid 49 expect ENOENT lstat ${n2} type,mode,nlink,uid,gid 52 expect ENOENT lstat ${n0} type,mode,nlink,uid,gid [all …]
|
/freebsd/crypto/openssh/ |
H A D | uidswap.c | 6 * Code for uid-swapping. 44 /* Saved effective uid. */ 49 /* Saved effective uid. */ 57 * Temporarily changes to the given uid. If the effective user 119 /* Set the effective uid to the given (unprivileged) uid. */ in temporarily_use_uid() 126 /* Propagate the privileged uid to all of our uids. */ in temporarily_use_uid() 139 * Restores to the original (privileged) uid. 154 /* Set the effective uid back to the saved privileged uid. */ in restore_uid() 161 * We are unable to restore the real uid to its unprivileged value. in restore_uid() 162 * Propagate the real uid (usually more privileged) to effective uid in restore_uid() [all …]
|
/freebsd/contrib/pjdfstest/tests/granular/ |
H A D | 04.t | 23 expect 0,0 lstat ${n0} uid,gid 25 expect 0,0 lstat ${n0} uid,gid 28 expect 0,0 lstat ${n0} uid,gid 30 expect 0,65532 lstat ${n0} uid,gid 33 # ACL_WRITE_OWNER permits to set uid to our own only. 35 expect 0,0 lstat ${n0} uid,gid 37 expect 0,0 lstat ${n0} uid,gid 40 expect 0,0 lstat ${n0} uid,gid 42 expect 65534,65531 lstat ${n0} uid,gid
|
/freebsd/contrib/libc-pwcache/ |
H A D | pwcache.c | 112 * routines that control user, group, uid and gid caches (for the archive 136 static UIDC **uidtb; /* uid to name cache */ 138 static UIDC **usrtb; /* user name to uid cache */ 255 * caches the name (if any) for the uid. If noname clear, we always 262 user_from_uid(uid_t uid, int noname) in user_from_uid() argument 271 * see if we have this uid cached in user_from_uid() 273 pptr = uidtb + (uid % UID_SZ); in user_from_uid() 276 if ((ptr != NULL) && (ptr->valid > 0) && (ptr->uid == uid)) { in user_from_uid() 278 * have an entry for this uid in user_from_uid() 286 * No entry for this uid, we will add it in user_from_uid() [all …]
|
/freebsd/contrib/kyua/utils/ |
H A D | passwd.cpp | 67 return F("name=%s, uid=%s, gid=%s") % user.name % user.uid % user.gid; in format_user() 82 uid(uid_), in user() 94 return uid == 0; in is_root() 147 /// \param uid The identifier of the user to query. 153 passwd_ns::find_user_by_uid(const unsigned int uid) in find_user_by_uid() argument 156 const struct ::passwd* pw = ::getpwuid(uid); in find_user_by_uid() 159 "user with UID %s") % uid); in find_user_by_uid() 160 INV(pw->pw_uid == uid); in find_user_by_uid() 165 if ((*iter).uid == uid) in find_user_by_uid() 169 "user with UID %s") % uid); in find_user_by_uid()
|
/freebsd/crypto/heimdal/kcm/ |
H A D | client.c | 96 /* We insist the ccache name starts with UID or UID: */ in kcm_ccache_new_client() 102 snprintf(prefix, sizeof(prefix), "%ld:", (long)client->uid); in kcm_ccache_new_client() 120 if ((ccache->uid != client->uid || in kcm_ccache_new_client() 136 ccache->uid = client->uid; in kcm_ccache_new_client() 163 unsigned long uid; in kcm_ccache_new_client() local 164 int matches = sscanf(name,"%ld:",&uid); in kcm_ccache_new_client() 166 matches = sscanf(name,"%ld",&uid); in kcm_ccache_new_client() 168 struct passwd *pwd = getpwuid(uid); in kcm_ccache_new_client() 171 kcm_chown(context, client, ccache, uid, gid); in kcm_ccache_new_client()
|
/freebsd/crypto/heimdal/lib/kafs/ |
H A D | afskrb5.c | 48 v5_to_kt(krb5_creds *cred, uid_t uid, struct kafs_token *kt, int local524) in v5_to_kt() argument 101 kt->ct.ViceId = uid; in v5_to_kt() 105 _kafs_fixup_viceid(&kt->ct, uid); in v5_to_kt() 112 krb5_creds *cred, uid_t uid, in v5_convert() argument 130 ret = v5_to_kt(cred, uid, kt, 1); in v5_convert() 132 ret = v5_to_kt(cred, uid, kt, 0); in v5_convert() 145 const char *realm, uid_t uid, struct kafs_token *kt) in get_cred() argument 185 ret = v5_convert(d->context, d->id, out_creds, uid, in get_cred() 208 uid_t uid, const char *homedir) in afslog_uid_int() argument 217 return _kafs_afslog_all_local_cells (data, uid, homedir); in afslog_uid_int() [all …]
|
/freebsd/tests/sys/cddl/zfs/tests/history/ |
H A D | history_009_pos.ksh | 109 uid=$($ID $HIST_USER | $AWK -F= '{print $2}'| $AWK -F"(" '{print $1}' ) 125 "ul\$$uid" "allow" "-l -u $HIST_USER snapshot" \ 126 "ul\$$uid" "allow" "-u $HIST_USER snapshot" \ 127 "ul\$$uid" "unallow" "-u $HIST_USER snapshot" \ 128 "Ul\$$uid" "allow" "-l -u $HIST_USER @set" \ 129 "Ul\$$uid" "allow" "-u $HIST_USER @set" \ 130 "Ul\$$uid" "unallow" "-u $HIST_USER @set" \ 131 "ud\$$uid" "allow" "-d -u $HIST_USER snapshot" \ 132 "ud\$$uid" "allow" "-u $HIST_USER snapshot" \ 133 "ud\$$uid" "unallow" "-u $HIST_USER snapshot" \ [all …]
|