| /src/external/ibm-public/postfix/dist/src/util/ |
| chroot_uid.c | 49 gid_t gid; local 52 * Look up the uid/gid before entering the jail, and save them so they 59 gid = pwd->pw_gid; 60 if (setgid(gid) < 0) 61 msg_fatal("setgid(%ld): %m", (long) gid); 62 if (initgroups(user_name, gid) < 0)
|
| /src/external/bsd/kyua-cli/dist/utils/ |
| passwd.hpp | 52 unsigned int gid; member in class:utils::passwd::user
|
| /src/sys/miscfs/umapfs/ |
| umap_subr.c | 138 gid_t gid; local 163 /* Find gid entry in map */ 165 gid = (gid_t) umap_findid(kauth_cred_getegid(credp), groupmap, gnentries); 167 if (gid != -1) 168 kauth_cred_setegid(credp, gid); 178 /* XXX elad: can't we just skip cases where gid == -1? */ 180 gid = (gid_t) umap_findid(groups[i], 182 if (gid != -1) 183 groups[i] = gid;
|
| /src/crypto/external/bsd/openssh/dist/ |
| sftp-common.h | 40 u_int32_t gid; member in struct:Attrib
|
| sshpty.c | 141 gid_t gid; local 149 gid = (grp != NULL) ? grp->gr_gid : pw->pw_gid; 161 if (st.st_uid != pw->pw_uid || st.st_gid != gid) { 162 if (chown(tty, pw->pw_uid, gid) == -1) { 166 tty, (u_int)pw->pw_uid, (u_int)gid, 170 tty, (u_int)pw->pw_uid, (u_int)gid,
|
| /src/external/bsd/openldap/dist/servers/slapd/ |
| user.c | 52 gid_t gid = 0; local 90 gid = pwd->pw_gid; 108 gid = (uid_t)g; 110 grp = getgrgid( gid ); 116 gid = grp->gr_gid; 129 if ( getuid() == 0 && initgroups( user, gid ) != 0 ) { 131 "Could not set the group access (gid) list\n" ); 142 if ( setgid( gid ) != 0 ) { 144 (int) gid ); 149 if ( setegid( gid ) != 0 ) [all...] |
| /src/external/bsd/pkg_install/dist/create/ |
| util.c | 77 gid_t gid; local 79 if (gid_from_group(file->group, &gid) == -1) 81 file->st.st_gid = gid; 84 errx(2, "unknown group name for gid %u",
|
| /src/lib/libc/gen/ |
| pwcache.h | 53 #define GID_SZ 251 /* size of gid to group_name cache */ 54 #define GNM_SZ 251 /* size of group_name to gid cache */ 59 * Node structures used in the user, group, uid, and gid caches. 70 char name[GNMLEN]; /* gid name */ 71 gid_t gid; /* cached gid */ member in struct:gidc
|
| /src/sys/compat/sys/ |
| ipc.h | 64 unsigned short gid; /* group id */ member in struct:ipc_perm14 80 CVT(gid); 94 CVT(gid);
|
| /src/sys/fs/filecorefs/ |
| filecore_mount.h | 77 gid_t gid; /* gid that owns filecore files */ member in struct:filecore_args
|
| /src/sys/fs/ntfs/ |
| ntfsmount.h | 40 gid_t gid; /* gid that owns ntfs files */ member in struct:ntfs_args
|
| /src/tests/lib/libc/sys/ |
| t_getgroups.c | 73 gid_t gid = getgid(); local 84 if (gidset[i] == gid)
|
| /src/crypto/external/bsd/heimdal/dist/kcm/ |
| client.c | 128 ccache->gid != client->gid) && !CLIENT_IS_ROOT(client)) 145 ccache->gid = client->gid; 169 * default gid. 181 gid_t gid = pwd->pw_gid; local 182 kcm_chown(context, client, ccache, uid, gid);
|
| /src/crypto/external/bsd/heimdal/dist/lib/roken/ |
| issuid.c | 87 * set-gid (and therefore the environment cannot be trusted). 99 * true IFF the program exec()ed was set-uid or set-gid. 102 * exec()ed was set-uid or set-gid, or if the process has switched 107 * set-uid or set-gid, so we can decide whether to trust the 157 unsigned long gid; local 162 gid = rk_getauxval(AT_GID); 165 if (egid != gid)
|
| /src/external/bsd/libarchive/dist/cpio/test/ |
| test_option_c.c | 50 int dev, ino, gid = 1000; local 116 assert(is_octal(e + 30, 6)); /* gid */ 117 gid = (int)from_octal(e + 30, 6); 143 assertEqualInt(gid, from_octal(e + 30, 6)); /* gid */ 176 /* Gid should be same as first entry. */ 177 assert(is_octal(e + 30, 6)); /* gid */ 178 assertEqualInt(gid, from_octal(e + 30, 6)); 201 assertEqualMem(e + 30, "000000", 6); /* gid */
|
| /src/external/bsd/libarchive/dist/libarchive/test/ |
| test_read_format_lha.c | 143 int uid, gid; local 146 uid = gid = 1001; 148 uid = gid = 0; 166 assertEqualInt(gid, archive_entry_gid(ae)); 180 assertEqualInt(gid, archive_entry_gid(ae)); 196 assertEqualInt(gid, archive_entry_gid(ae)); 208 assertEqualInt(gid, archive_entry_gid(ae)); 220 assertEqualInt(gid, archive_entry_gid(ae)); 236 assertEqualInt(gid, archive_entry_gid(ae));
|
| test_write_disk_perms.c | 38 * * the GID that files are created with by default (for the 40 * * An "alt gid" that this user can create files with 41 * * An "invalid gid" that this user is not permitted to create 51 gid_t gid = 0; local 63 failure("Couldn't create a file for gid testing."); 66 /* See what GID it ended up with. This is our "valid" GID. */ 70 /* Find a GID for which fchown() fails. This is our "invalid" GID. */ 72 /* This loop stops when we wrap the gid or examine 10,000 gids. * [all...] |
| test_write_format_mtree_classic.c | 36 gid_t gid; member in struct:__anon7134 57 "/set type=file uid=1001 gid=1001 mode=644\n" 69 " config time=1232266273.0 gid=1003 uid=1003 size=8\n" 82 " mtree nlink=2 time=1232266273.0 gid=1003 uid=1003 size=8\n" 92 "/set type=dir uid=1001 gid=1001 mode=755\n" 137 archive_entry_set_gid(ae, entries[i].gid); 138 assertEqualInt(entries[i].gid, archive_entry_gid(ae)); 173 assertEqualInt(entries[i].gid, archive_entry_gid(ae));
|
| test_write_format_mtree_classic_indent.c | 36 gid_t gid; member in struct:__anon7135 57 "/set type=file uid=1001 gid=1001 mode=644\n" 69 " config time=1232266273.0 gid=1003 uid=1003 size=8\n" 82 " mtree nlink=2 time=1232266273.0 gid=1003 uid=1003 size=8\n" 92 "/set type=dir uid=1001 gid=1001 mode=755\n" 139 archive_entry_set_gid(ae, entries[i].gid); 140 assertEqualInt(entries[i].gid, archive_entry_gid(ae)); 175 assertEqualInt(entries[i].gid, archive_entry_gid(ae));
|
| test_write_format_mtree.c | 35 gid_t gid; member in struct:__anon7132 55 gid_t gid; member in struct:__anon7133 97 archive_entry_set_gid(ae, entries[i].gid); 98 assert(entries[i].gid == archive_entry_gid(ae)); 124 o = "/set type=dir uid=1001 gid=1001 mode=755"; 126 o = "/set type=file uid=1001 gid=1001 mode=644"; 149 assertEqualInt(entries[i].gid, archive_entry_gid(ae)); 185 archive_entry_set_gid(ae, entries2[i].gid); 186 assert(entries2[i].gid == archive_entry_gid(ae)); 212 o = "/set type=dir uid=1001 gid=1001 mode=755" [all...] |
| /src/bin/pax/ |
| sel_subs.h | 51 gid_t gid; member in struct:grpt 52 struct grpt *fow; /* next gid */
|
| /src/sbin/fsdb/ |
| fsdbutil.c | 101 uint32_t uid, gid; local 176 gid = iswap16(dp->dp1.di_ogid); 178 gid = iswap32(DIP(dp, gid)); 179 if ((grp = getgrgid(gid)) != NULL) 182 printf("GID=%u ", gid);
|
| /src/sys/fs/cd9660/ |
| cd9660_mount.h | 49 gid_t gid; /* gid that owns ISO-9660 files */ member in struct:iso_args 60 #define ISOFSMNT_GID 0x00000200 /* override gid */
|
| /src/usr.sbin/chroot/ |
| chroot.c | 119 gid_t gid, gidlist[NGROUPS_MAX]; local 126 gid = 0; 161 gid = getgroup(group); 181 if (group && setgid(gid) == -1)
|
| /src/usr.sbin/sdpd/ |
| main.c | 158 gid_t gid; local 163 log_notice("Cannot set uid/gid. Not a superuser"); 167 gid = getgid(); 184 gid = strtol(group, &ep, 10); 193 gid = grp->gr_gid; 197 if (setgid(gid) < 0) {
|