/freebsd/crypto/openssh/openbsd-compat/ |
H A D | bsd-setres_id.c | 64 setresuid(uid_t ruid, uid_t euid, uid_t suid) in setresuid() argument 68 if (ruid != suid) { in setresuid() 73 if (setreuid(ruid, euid) < 0) { in setresuid() 75 error("setreuid %lu: %.100s", (u_long)ruid, strerror(errno)); in setresuid() 89 if (setuid(ruid) < 0) { in setresuid() 91 error("setuid %lu: %.100s", (u_long)ruid, strerror(errno)); in setresuid()
|
/freebsd/contrib/openbsm/sys/bsm/ |
H A D | audit_record.h | 242 token_t *au_to_process(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 244 token_t *au_to_process32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 246 token_t *au_to_process64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 248 token_t *au_to_process_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 251 uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, 253 token_t *au_to_process64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 265 token_t *au_to_subject(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 267 token_t *au_to_subject32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 269 token_t *au_to_subject64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 271 token_t *au_to_subject_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, [all …]
|
/freebsd/sys/bsm/ |
H A D | audit_record.h | 247 token_t *au_to_process(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 249 token_t *au_to_process32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 251 token_t *au_to_process64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 253 token_t *au_to_process_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 256 uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, 258 token_t *au_to_process64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 271 token_t *au_to_subject(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 273 token_t *au_to_subject32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 275 token_t *au_to_subject64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 277 token_t *au_to_subject_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, [all …]
|
/freebsd/bin/pkill/tests/ |
H A D | pkill-_u_test.sh | 8 ruid=`id -ur` 13 pkill -f -U $ruid $sleep 26 ruid=`id -urn` 31 pkill -f -U $ruid $sleep
|
H A D | pgrep-_u_test.sh | 8 ruid=`id -ur` 14 pid=`pgrep -f -U $ruid $sleep` 24 ruid=`id -urn` 30 pid=`pgrep -f -U $ruid $sleep`
|
/freebsd/sys/security/mac/ |
H A D | mac_cred.c | 329 mac_cred_check_setreuid(struct ucred *cred, uid_t ruid, uid_t euid) in mac_cred_check_setreuid() argument 333 MAC_POLICY_CHECK_NOSLEEP(cred_check_setreuid, cred, ruid, euid); in mac_cred_check_setreuid() 334 MAC_CHECK_PROBE3(cred_check_setreuid, error, cred, ruid, euid); in mac_cred_check_setreuid() 357 mac_cred_check_setresuid(struct ucred *cred, uid_t ruid, uid_t euid, in mac_cred_check_setresuid() argument 362 MAC_POLICY_CHECK_NOSLEEP(cred_check_setresuid, cred, ruid, euid, suid); in mac_cred_check_setresuid() 363 MAC_CHECK_PROBE4(cred_check_setresuid, error, cred, ruid, euid, in mac_cred_check_setresuid()
|
/freebsd/contrib/openbsm/libbsm/ |
H A D | bsm_token.c | 748 au_to_process32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, in au_to_process32() argument 762 ADD_U_INT32(dptr, ruid); in au_to_process32() 780 au_to_process64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, in au_to_process64() argument 795 ADD_U_INT32(dptr, ruid); in au_to_process64() 813 au_to_process(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, in au_to_process() argument 817 return (au_to_process32(auid, euid, egid, ruid, rgid, pid, sid, in au_to_process() 836 au_to_process32_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, in au_to_process32_ex() argument 859 ADD_U_INT32(dptr, ruid); in au_to_process32_ex() 876 au_to_process64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, in au_to_process64_ex() argument 901 ADD_U_INT32(dptr, ruid); in au_to_process64_ex() [all …]
|
H A D | bsm_wrappers.c | 360 gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, in audit_write_success() argument 367 subject = au_to_subject32(auid, euid, egid, ruid, rgid, pid, sid, in audit_write_success() 404 uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, in audit_write_failure() argument 410 subject = au_to_subject32(auid, euid, egid, ruid, rgid, pid, sid, tid); in audit_write_failure()
|
H A D | bsm_io.c | 2531 READ_TOKEN_U_INT32(buf, len, tok->tt.proc32.ruid, tok->len, err); in fetch_process32_tok() 2575 print_user(fp, tok->tt.proc32.ruid, oflags); in print_process32_tok() 2599 print_user(fp, tok->tt.proc32.ruid, oflags); in print_process32_tok() 2643 READ_TOKEN_U_INT32(buf, len, tok->tt.proc64.ruid, tok->len, err); in fetch_process64_tok() 2686 print_user(fp, tok->tt.proc64.ruid, oflags); in print_process64_tok() 2710 print_user(fp, tok->tt.proc64.ruid, oflags); in print_process64_tok() 2755 READ_TOKEN_U_INT32(buf, len, tok->tt.proc32_ex.ruid, tok->len, err); in fetch_process32ex_tok() 2813 print_user(fp, tok->tt.proc32_ex.ruid, oflags); in print_process32ex_tok() 2838 print_user(fp, tok->tt.proc32_ex.ruid, oflags); in print_process32ex_tok() 2884 READ_TOKEN_U_INT32(buf, len, tok->tt.proc64_ex.ruid, tok->len, err); in fetch_process64ex_tok() [all …]
|
/freebsd/sys/security/audit/ |
H A D | bsm_token.c | 666 au_to_process32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, in au_to_process32() argument 678 ADD_U_INT32(dptr, ruid); in au_to_process32() 696 au_to_process64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, in au_to_process64() argument 709 ADD_U_INT32(dptr, ruid); in au_to_process64() 727 au_to_process(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, in au_to_process() argument 731 return (au_to_process32(auid, euid, egid, ruid, rgid, pid, sid, in au_to_process() 750 au_to_process32_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, in au_to_process32_ex() argument 769 ADD_U_INT32(dptr, ruid); in au_to_process32_ex() 786 au_to_process64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, in au_to_process64_ex() argument 808 ADD_U_INT32(dptr, ruid); in au_to_process64_ex() [all …]
|
H A D | audit.h | 98 void audit_arg_ruid(uid_t ruid); 282 #define AUDIT_ARG_RUID(ruid) do { \ argument 284 audit_arg_ruid((ruid)); \ 448 #define AUDIT_ARG_RUID(ruid) argument
|
/freebsd/contrib/openbsm/bsm/ |
H A D | libbsm.h | 463 u_int32_t ruid; member 474 u_int32_t ruid; member 498 u_int32_t ruid; member 509 u_int32_t ruid; member 613 u_int32_t ruid; member 624 u_int32_t ruid; member 648 u_int32_t ruid; member 659 u_int32_t ruid; member 1118 uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, 1187 au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid,
|
/freebsd/contrib/openbsm/bin/auditdistd/ |
H A D | sandbox.c | 71 uid_t ruid, euid; in sandbox() local 192 PJDLOG_VERIFY(getresuid(&ruid, &euid, &suid) == 0); in sandbox() 195 ruid = getuid(); in sandbox() 198 PJDLOG_VERIFY(ruid == pw->pw_uid); in sandbox()
|
/freebsd/lib/libc/compat-43/ |
H A D | setruid.c | 35 setruid(uid_t ruid) in setruid() argument 38 return (setreuid(ruid, -1)); in setruid()
|
/freebsd/sys/kern/ |
H A D | kern_prot.c | 1292 uid_t ruid; member 1302 uid_t euid, ruid; in sys_setreuid() local 1307 ruid = uap->ruid; in sys_setreuid() 1309 AUDIT_ARG_RUID(ruid); in sys_setreuid() 1312 ruip = uifind(ruid); in sys_setreuid() 1317 error = mac_cred_check_setreuid(oldcred, ruid, euid); in sys_setreuid() 1322 if (((ruid != (uid_t)-1 && ruid != oldcred->cr_ruid && in sys_setreuid() 1323 ruid != oldcred->cr_svuid) || in sys_setreuid() 1333 if (ruid != (uid_t)-1 && oldcred->cr_ruid != ruid) { in sys_setreuid() 1337 if ((ruid != (uid_t)-1 || newcred->cr_uid != newcred->cr_ruid) && in sys_setreuid() [all …]
|
/freebsd/usr.bin/su/ |
H A D | su.c | 147 uid_t ruid; in main() local 243 ruid = getuid(); in main() 247 if (pwd == NULL || pwd->pw_uid != ruid) in main() 248 pwd = getpwuid(ruid); in main() 353 if (ruid != 0) { in main() 370 if (ruid != 0 && !chshell(pwd->pw_shell)) in main() 539 if (ruid != 0) in main()
|
/freebsd/lib/libpam/modules/pam_ksu/ |
H A D | pam_ksu.c | 188 uid_t euid, ruid; in get_su_principal() local 196 ruid = getuid(); in get_su_principal() 198 rv = seteuid(ruid); in get_su_principal() 205 (void)asprintf(&ccname, "%s%lu", KRB5_DEFAULT_CCROOT, (unsigned long)ruid); in get_su_principal()
|
/freebsd/sys/compat/linux/ |
H A D | linux_uid16.c | 277 bsd.ruid = CAST_NOCHG(args->ruid); in linux_setreuid16() 304 bsd.ruid = CAST_NOCHG(args->ruid); in linux_setresuid16()
|
/freebsd/tools/regression/security/access/ |
H A D | testaccess.c | 122 uid_t euid, ruid, suid; in reportprivilege() local 126 error = getresuid(&ruid, &euid, &suid); in reportprivilege() 140 printf("ruid: %d, euid: %d, suid: %d, ", ruid, euid, suid); in reportprivilege()
|
/freebsd/sbin/hastd/ |
H A D | subr.c | 157 uid_t ruid, euid, suid; in drop_privs() local 281 PJDLOG_VERIFY(getresuid(&ruid, &euid, &suid) == 0); in drop_privs() 282 PJDLOG_VERIFY(ruid == pw->pw_uid); in drop_privs()
|
/freebsd/contrib/llvm-project/compiler-rt/include/sanitizer/ |
H A D | linux_syscall_hooks.h | 76 #define __sanitizer_syscall_pre_getresuid(ruid, euid, suid) \ argument 77 __sanitizer_syscall_pre_impl_getresuid((long)(ruid), (long)(euid), \ 79 #define __sanitizer_syscall_post_getresuid(res, ruid, euid, suid) \ argument 80 __sanitizer_syscall_post_impl_getresuid(res, (long)(ruid), (long)(euid), \ 112 #define __sanitizer_syscall_pre_setreuid(ruid, euid) \ argument 113 __sanitizer_syscall_pre_impl_setreuid((long)(ruid), (long)(euid)) 114 #define __sanitizer_syscall_post_setreuid(res, ruid, euid) \ argument 115 __sanitizer_syscall_post_impl_setreuid(res, (long)(ruid), (long)(euid)) 120 #define __sanitizer_syscall_pre_setresuid(ruid, euid, suid) \ argument 121 __sanitizer_syscall_pre_impl_setresuid((long)(ruid), (long)(euid), \ [all …]
|
/freebsd/tools/regression/security/proc_to_proc/ |
H A D | scenario.c | 224 uid_t ruid, euid, svuid; in cred_set() local 225 error = getresuid(&ruid, &euid, &svuid); in cred_set() 230 assert(ruid == cred->cr_ruid); in cred_set()
|
/freebsd/contrib/llvm-project/compiler-rt/lib/sanitizer_common/ |
H A D | sanitizer_common_syscalls.inc | 323 PRE_SYSCALL(getresuid)(void *ruid, void *euid, void *suid) {} 325 POST_SYSCALL(getresuid)(long res, void *ruid, void *euid, void *suid) { 327 if (ruid) 328 POST_WRITE(ruid, sizeof(unsigned)); 379 PRE_SYSCALL(setreuid)(long ruid, long euid) {} 381 POST_SYSCALL(setreuid)(long res, long ruid, long euid) {} 387 PRE_SYSCALL(setresuid)(long ruid, long euid, long suid) {} 389 POST_SYSCALL(setresuid)(long res, long ruid, long euid, long suid) {} 1591 PRE_SYSCALL(setreuid16)(long ruid, long euid) {} 1593 POST_SYSCALL(setreuid16)(long res, long ruid, long euid) {} [all …]
|
/freebsd/contrib/netbsd-tests/bin/ps/ |
H A D | keywords | 89 ruid RUID
|
/freebsd/share/doc/psd/05.sysman/ |
H A D | spell.ok | 267 ruid
|