/src/lib/libc/net/ |
getpeereid.c | 47 struct unpcbid cred; local in function:getpeereid 59 len = sizeof(cred); 60 if (getsockopt(s, SOL_LOCAL, LOCAL_PEEREID, &cred, &len) == -1) 64 *euid = cred.unp_euid; 66 *egid = cred.unp_egid;
|
/src/sys/fs/sysvbfs/ |
bfs_sysvbfs.c | 47 kauth_cred_t cred; member in struct:bc_io_ops 72 bio->cred = NOCRED; /* sysvbfs layer check cred. */
|
sysvbfs_vfsops.c | 170 kauth_cred_t cred = l->l_cred; local in function:sysvbfs_mountfs 175 error = vinvalbuf(devvp, V_SAVE, cred, l, 0, 0); 291 sysvbfs_sync(struct mount *mp, int waitfor, kauth_cred_t cred) 306 err = VOP_FSYNC(vp, cred, FSYNC_WAIT, 0, 0); 447 kauth_cred_t cred)
|
/src/sys/rump/librump/rumpkern/ |
accessors.c | 105 kauth_cred_t cred; local in function:rump_cred_create 108 cred = kauth_cred_alloc(); 109 kauth_cred_setuid(cred, uid); 110 kauth_cred_seteuid(cred, uid); 111 kauth_cred_setsvuid(cred, uid); 112 kauth_cred_setgid(cred, gid); 113 kauth_cred_setgid(cred, gid); 114 kauth_cred_setegid(cred, gid); 115 kauth_cred_setsvgid(cred, gid); 116 rv = kauth_cred_setgroups(cred, groups, ngroups, 0, UIO_SYSSPACE) [all...] |
lwproc.c | 135 kauth_cred_t cred; local in function:lwproc_proc_free 167 cred = p->p_cred; 168 chgproccnt(kauth_cred_getuid(cred), -1);
|
/src/sys/fs/v7fs/ |
v7fs_io_kern.c | 59 kauth_cred_t cred; member in struct:local_io 98 local->cred = NOCRED; /* upper layer check cred. */
|
/src/sys/dev/ |
random.c | 250 kauth_cred_t cred = kauth_cred_get(); local in function:random_write 256 error = kauth_authorize_device(cred, KAUTH_DEVICE_RND_ADDDATA, 267 if (kauth_authorize_device(cred, KAUTH_DEVICE_RND_ADDDATA_ESTIMATE,
|
/src/sys/fs/filecorefs/ |
filecore_lookup.c | 137 kauth_cred_t cred = cnp->cn_cred; local in function:filecore_lookup 152 if ((error = VOP_ACCESS(vdp, VEXEC, cred)) != 0)
|
/src/usr.bin/passwd/ |
krb5_passwd.c | 84 krb5_creds cred; local in function:pwkrb5_process 160 &cred, 196 ret = krb5_set_password(context, &cred, pwbuf, NULL, 214 krb5_free_cred_contents(context, &cred); 280 krb5_creds cred; local in function:krb5_chpw 312 &cred, 344 ret = krb5_set_password (context, &cred, pwbuf, NULL, 359 krb5_free_cred_contents (context, &cred);
|
/src/usr.sbin/sdpd/ |
server.c | 583 struct sockcred *cred = data; local in function:server_auth_check 587 if (cred == NULL) 590 if (cred->sc_uid == 0 || cred->sc_euid == 0) 603 if (cred->sc_gid == grp->gr_gid || cred->sc_egid == grp->gr_gid) 606 if (cred->sc_ngroups > MAX_GROUPS) { 608 MAX_GROUPS - cred->sc_ngroups); 610 cred->sc_ngroups = MAX_GROUPS; 613 for (n = 0 ; n < cred->sc_ngroups ; n++) [all...] |
/src/sys/kern/ |
kern_core.c | 125 kauth_cred_t cred = NULL; local in function:coredump 156 cred = kauth_cred_hold(p->p_cred); 251 VOP_GETATTR(vp, &vattr, cred) || vattr.va_nlink != 1 || 252 vattr.va_uid != kauth_cred_geteuid(cred)) { 265 VOP_SETATTR(vp, &vattr, cred); 270 io.io_cred = cred; 277 error1 = vn_close(vp, FWRITE, cred); 281 if (cred != NULL) 282 kauth_cred_free(cred);
|
vfs_getcwd.c | 107 kauth_cred_t cred = l->l_cred; local in function:getcwd_scandir 120 error = VOP_GETATTR(lvp, &va, cred); 134 cn.cn_cred = cred; 185 error = VOP_READDIR(uvp, &uio, cred, &eofflag, 0, 0); 278 kauth_cred_t cred = l->l_cred; local in function:getcwd_common 330 error = VOP_ACCESS(lvp, accmode, cred); 369 error = VOP_ACCESS(lvp, accmode, cred);
|
/src/sys/secmodel/suser/ |
secmodel_suser.c | 126 suser_isroot(kauth_cred_t cred) 128 return kauth_cred_geteuid(cred) == 0; 137 kauth_cred_t cred = arg; local in function:suser_eval 140 *bp = suser_isroot(cred); 196 secmodel_suser_generic_cb(kauth_cred_t cred, kauth_action_t action, 202 isroot = suser_isroot(cred); 226 secmodel_suser_system_cb(kauth_cred_t cred, kauth_action_t action, 233 isroot = suser_isroot(cred); 466 secmodel_suser_process_cb(kauth_cred_t cred, kauth_action_t action, 472 isroot = suser_isroot(cred); [all...] |
/src/sys/fs/hfs/ |
hfs_subr.c | 189 result = vinvalbuf(args->devvp, V_SAVE, args->cred, args->l, 0, 0); 253 kauth_cred_t cred; local in function:hfs_libcb_read 263 && argsread->cred != NULL) 264 cred = argsread->cred; 266 cred = NOCRED; 277 length, cred); 290 uint64_t len, kauth_cred_t cred)
|
hfs.h | 111 kauth_cred_t cred; member in struct:__anon458a01ca0408 121 kauth_cred_t cred; member in struct:__anon458a01ca0608
|
hfs_vfsops.c | 347 kauth_cred_t cred; local in function:hfs_mountfs 350 cred = l ? l->l_cred : NOCRED; 375 argsopen.cred = argsread.cred = cred; 484 hfs_sync(struct mount *mp, int waitfor, kauth_cred_t cred)
|
/src/sys/miscfs/genfs/ |
genfs_rename.c | 75 * . cred (credentials structure), and 84 kauth_cred_t cred, bool posixly_correct) 90 cred, posixly_correct); 164 kauth_cred_t cred, bool posixly_correct)) 180 kauth_cred_t cred; local in function:genfs_insane_rename 197 cred = fcnp->cn_cred; 200 * XXX Want a better equality test. `tcnp->cn_cred == cred' 204 KASSERT(kauth_cred_uidmatch(cred, tcnp->cn_cred)); 221 error = (*sane_rename)(fdvp, fcnp, tdvp, tcnp, cred, false); 246 kauth_cred_t cred, bool posixly_correct [all...] |
/src/sys/ufs/lfs/ |
ulfs_quota1.c | 64 lfs_chkdq1(struct inode *ip, int64_t change, kauth_cred_t cred, int flags) 94 kauth_authorize_system(cred, KAUTH_SYSTEM_FS_QUOTA, 98 error = chkdqchg(ip, change, cred, i); 120 chkdqchg(struct inode *ip, int64_t change, kauth_cred_t cred, int type) 131 ip->i_uid == kauth_cred_geteuid(cred)) { 147 if (ip->i_uid == kauth_cred_geteuid(cred)) 155 ip->i_uid == kauth_cred_geteuid(cred)) { 172 lfs_chkiq1(struct inode *ip, int32_t change, kauth_cred_t cred, int flags) 201 if ((flags & FORCE) == 0 && kauth_authorize_system(cred, 205 error = chkiqchg(ip, change, cred, i) 417 kauth_cred_t cred; local in function:lfsquota1_handle_cmd_quotaoff [all...] |
/src/sys/ufs/ufs/ |
ufs_quota1.c | 63 chkdq1(struct inode *ip, int64_t change, kauth_cred_t cred, int flags) 93 kauth_authorize_system(cred, KAUTH_SYSTEM_FS_QUOTA, 97 error = chkdqchg(ip, change, cred, i); 119 chkdqchg(struct inode *ip, int64_t change, kauth_cred_t cred, int type) 130 ip->i_uid == kauth_cred_geteuid(cred)) { 146 if (ip->i_uid == kauth_cred_geteuid(cred)) 154 ip->i_uid == kauth_cred_geteuid(cred)) { 171 chkiq1(struct inode *ip, int32_t change, kauth_cred_t cred, int flags) 201 kauth_authorize_system(cred, KAUTH_SYSTEM_FS_QUOTA, 205 error = chkiqchg(ip, change, cred, i) 423 kauth_cred_t cred; local in function:quota1_handle_cmd_quotaoff [all...] |
/src/sys/fs/cd9660/ |
cd9660_lookup.c | 122 kauth_cred_t cred = cnp->cn_cred; local in function:cd9660_lookup 137 if ((error = VOP_ACCESS(vdp, VEXEC, cred)) != 0)
|
/src/lib/libtelnet/ |
sra.c | 469 check_user(char *name, const char *cred) 488 xpasswd = crypt(cred, salt); 519 cred_t *cred = appdata; local in function:auth_conv 529 reply[i].resp = COPY_STRING(cred->uname); 535 reply[i].resp = COPY_STRING(cred->pass); 557 check_user(char *name, const char *cred) 563 cred_t auth_cred = { name, cred };
|
/src/sys/coda/ |
coda_namecache.h | 94 kauth_cred_t cred; /* user credentials */ member in struct:coda_cache
|
/src/sys/fs/nfs/common/ |
nfs_commonport.c | 239 * Copy NFS uid, gids to the cred structure. 311 struct ucred *cred, struct thread *p) 364 newnfs_setroot(struct ucred *cred) 367 cred->cr_uid = 0; 368 cred->cr_groups[0] = 0; 369 cred->cr_ngroups = 1; 378 struct ucred *cred; local in function:newnfs_getcred 381 cred = crdup(td->td_ucred); 382 newnfs_setroot(cred); 383 return (cred); [all...] |
/src/sys/fs/ntfs/ |
ntfs_vnops.c | 426 kauth_cred_t cred) 432 return kauth_authorize_vnode(cred, KAUTH_ACCESS_ACTION(accmode, 433 vp->v_type, file_mode), vp, NULL, genfs_can_access(vp, cred, 666 kauth_cred_t cred = cnp->cn_cred; local in function:ntfs_lookup 673 error = VOP_ACCESS(dvp, VEXEC, cred);
|
/src/sys/fs/ptyfs/ |
ptyfs_vnops.c | 382 kauth_cred_t cred = ap->a_cred; local in function:ptyfs_setattr 417 error = kauth_authorize_vnode(cred, action, vp, NULL, 418 genfs_can_chflags(vp, cred, ptyfs->ptyfs_uid, 438 error = ptyfs_chown(vp, vap->va_uid, vap->va_gid, cred, l); 449 error = kauth_authorize_vnode(cred, KAUTH_VNODE_WRITE_TIMES, vp, 450 NULL, genfs_can_chtimes(vp, cred, ptyfs->ptyfs_uid, 476 error = ptyfs_chmod(vp, vap->va_mode, cred, l); 488 ptyfs_chmod(struct vnode *vp, mode_t mode, kauth_cred_t cred, struct lwp *l) 493 error = kauth_authorize_vnode(cred, KAUTH_VNODE_WRITE_SECURITY, vp, 494 NULL, genfs_can_chmod(vp, cred, ptyfs->ptyfs_uid, ptyfs->ptyfs_gid [all...] |