/freebsd/contrib/mandoc/ |
H A D | test-pledge.c | 6 return !!pledge("stdio", NULL); in main()
|
H A D | main.c | 170 if (pledge("stdio rpath wpath cpath tmppath tty proc exec", NULL) == -1) { in main() 401 c = pledge("stdio rpath", NULL); in main() 404 c = pledge("stdio rpath wpath cpath", NULL); in main() 406 c = pledge("stdio rpath tmppath tty proc exec", NULL); in main() 934 pledge("stdio rpath cpath", NULL) == -1) { in process_onefile() 1384 if (pledge("stdio rpath tmppath tty proc", NULL) == -1) { in spawn_pager()
|
H A D | configure | 317 runtest pledge PLEDGE || true
|
H A D | Makefile | 40 test-pledge.c \
|
H A D | mandocdb.c | 330 if (pledge("stdio rpath wpath cpath", NULL) == -1) { in mandocdb() 418 if (pledge("stdio rpath", NULL) == -1) { in mandocdb()
|
H A D | cgi.c | 1075 if (pledge("stdio rpath", NULL) == -1) { in main()
|
H A D | NEWS | 416 * man.cgi(8) now uses pledge(2), too. 591 * privilege limitation: Use OpenBSD pledge(2) or OS X sandbox_init(3)
|
/freebsd/crypto/openssh/ |
H A D | sandbox-pledge.c | 59 if (pledge("stdio", NULL) == -1) in ssh_sandbox_child()
|
H A D | ssh-keysign.c | 188 if (pledge("stdio rpath getpw dns id", NULL) != 0) in main() 232 if (pledge("stdio dns", NULL) != 0) in main()
|
H A D | clientloop.c | 940 /* Might be able to tighten pledge now that session is established */ in client_repledge() 962 debug("pledge: network"); in client_repledge() 963 if (pledge("stdio unix inet dns proc tty", NULL) == -1) in client_repledge() 964 fatal_f("pledge(): %s", strerror(errno)); in client_repledge() 967 debug("pledge: agent"); in client_repledge() 968 if (pledge("stdio unix proc tty", NULL) == -1) in client_repledge() 969 fatal_f("pledge(): %s", strerror(errno)); in client_repledge() 971 debug("pledge: fork"); in client_repledge() 972 if (pledge("stdio proc tty", NULL) == -1) in client_repledge() 973 fatal_f("pledge() in client_repledge() [all...] |
H A D | mux.c | 1992 if (pledge("stdio proc tty", NULL) == -1) in mux_client_request_session() 2151 if (pledge("stdio proc tty", NULL) == -1) in mux_client_request_stdio_fwd()
|
H A D | ssh_namespace.h | 484 #define pledge Fssh_pledge macro
|
H A D | configure.ac | 2012 pledge \ 3648 …ify privilege separation sandbox (no, capsicum, darwin, rlimit, seccomp_filter, systrace, pledge)], 3768 AC_MSG_ERROR([pledge sandbox requires pledge(2) support]) 3769 SANDBOX_STYLE="pledge" 3770 AC_DEFINE([SANDBOX_PLEDGE], [1], [Sandbox using pledge(2)])
|
H A D | scp.c | 658 if (pledge("stdio rpath wpath cpath fattr tty proc exec", in main()
|
H A D | ssh-agent.c | 2478 if (pledge("stdio rpath cpath unix id proc exec", NULL) == -1) in main()
|
H A D | ChangeLog | 5077 upstream: tighten pledge(2) after session establishment 5091 default pledge(2) in the client. 7267 and not in the pledge(2)'d unprivileged process; fixes regression caused by
|
H A D | .depend | 92 platform-pledge.o: includes.h config.h defines.h platform.h openbsd-compat/openbsd-compat.h openbsd… 104 sandbox-pledge.o: includes.h config.h defines.h platform.h openbsd-compat/openbsd-compat.h openbsd-…
|
/freebsd/crypto/openssh/openbsd-compat/ |
H A D | bsd-misc.h | 147 int pledge(const char *promises, const char *paths[]);
|
H A D | bsd-misc.c | 359 pledge(const char *promises, const char *paths[]) in pledge() function
|
/freebsd/secure/usr.sbin/sshd/ |
H A D | Makefile | 19 sandbox-seccomp-filter.c sandbox-capsicum.c sandbox-pledge.c \
|
/freebsd/secure/lib/libssh/ |
H A D | Makefile | 27 sftp-realpath.c platform-pledge.c platform-tracing.c platform-misc.c \
|
/freebsd/usr.bin/diff/ |
H A D | diff.c | 408 if (pledge("stdio rpath tmppath", NULL) == -1) in main() 409 err(2, "pledge"); in main()
|
/freebsd/contrib/bc/src/ |
H A D | vm.c | 944 int r = pledge(promises, execpromises);
|
/freebsd/contrib/bc/ |
H A D | NEWS.md | 442 * Added support for OpenBSD's `pledge()` and `unveil()`.
|
/freebsd/share/dict/ |
H A D | web2a | 11368 chief-pledge 41177 pledge-bound 41178 pledge-free 41179 pledge keeper 41180 pledge taker 45131 quasi pledge
|