/src/lib/libc/net/ |
getpeereid.c | 47 struct unpcbid cred; local in function:getpeereid 59 len = sizeof(cred); 60 if (getsockopt(s, SOL_LOCAL, LOCAL_PEEREID, &cred, &len) == -1) 64 *euid = cred.unp_euid; 66 *egid = cred.unp_egid;
|
getpeereid.c | 47 struct unpcbid cred; local in function:getpeereid 59 len = sizeof(cred); 60 if (getsockopt(s, SOL_LOCAL, LOCAL_PEEREID, &cred, &len) == -1) 64 *euid = cred.unp_euid; 66 *egid = cred.unp_egid;
|
/src/sys/fs/sysvbfs/ |
bfs_sysvbfs.c | 47 kauth_cred_t cred; member in struct:bc_io_ops 72 bio->cred = NOCRED; /* sysvbfs layer check cred. */
|
bfs_sysvbfs.c | 47 kauth_cred_t cred; member in struct:bc_io_ops 72 bio->cred = NOCRED; /* sysvbfs layer check cred. */
|
sysvbfs_vfsops.c | 170 kauth_cred_t cred = l->l_cred; local in function:sysvbfs_mountfs 175 error = vinvalbuf(devvp, V_SAVE, cred, l, 0, 0); 291 sysvbfs_sync(struct mount *mp, int waitfor, kauth_cred_t cred) 306 err = VOP_FSYNC(vp, cred, FSYNC_WAIT, 0, 0); 447 kauth_cred_t cred)
|
/src/sys/rump/librump/rumpkern/ |
accessors.c | 105 kauth_cred_t cred; local in function:rump_cred_create 108 cred = kauth_cred_alloc(); 109 kauth_cred_setuid(cred, uid); 110 kauth_cred_seteuid(cred, uid); 111 kauth_cred_setsvuid(cred, uid); 112 kauth_cred_setgid(cred, gid); 113 kauth_cred_setgid(cred, gid); 114 kauth_cred_setegid(cred, gid); 115 kauth_cred_setsvgid(cred, gid); 116 rv = kauth_cred_setgroups(cred, groups, ngroups, 0, UIO_SYSSPACE) [all...] |
accessors.c | 105 kauth_cred_t cred; local in function:rump_cred_create 108 cred = kauth_cred_alloc(); 109 kauth_cred_setuid(cred, uid); 110 kauth_cred_seteuid(cred, uid); 111 kauth_cred_setsvuid(cred, uid); 112 kauth_cred_setgid(cred, gid); 113 kauth_cred_setgid(cred, gid); 114 kauth_cred_setegid(cred, gid); 115 kauth_cred_setsvgid(cred, gid); 116 rv = kauth_cred_setgroups(cred, groups, ngroups, 0, UIO_SYSSPACE) [all...] |
/src/sys/fs/v7fs/ |
v7fs_io_kern.c | 59 kauth_cred_t cred; member in struct:local_io 98 local->cred = NOCRED; /* upper layer check cred. */
|
v7fs_io_kern.c | 59 kauth_cred_t cred; member in struct:local_io 98 local->cred = NOCRED; /* upper layer check cred. */
|
/src/sys/dev/ |
random.c | 250 kauth_cred_t cred = kauth_cred_get(); local in function:random_write 256 error = kauth_authorize_device(cred, KAUTH_DEVICE_RND_ADDDATA, 267 if (kauth_authorize_device(cred, KAUTH_DEVICE_RND_ADDDATA_ESTIMATE,
|
random.c | 250 kauth_cred_t cred = kauth_cred_get(); local in function:random_write 256 error = kauth_authorize_device(cred, KAUTH_DEVICE_RND_ADDDATA, 267 if (kauth_authorize_device(cred, KAUTH_DEVICE_RND_ADDDATA_ESTIMATE,
|
/src/sys/fs/filecorefs/ |
filecore_lookup.c | 137 kauth_cred_t cred = cnp->cn_cred; local in function:filecore_lookup 152 if ((error = VOP_ACCESS(vdp, VEXEC, cred)) != 0)
|
filecore_lookup.c | 137 kauth_cred_t cred = cnp->cn_cred; local in function:filecore_lookup 152 if ((error = VOP_ACCESS(vdp, VEXEC, cred)) != 0)
|
/src/usr.bin/passwd/ |
krb5_passwd.c | 84 krb5_creds cred; local in function:pwkrb5_process 160 &cred, 196 ret = krb5_set_password(context, &cred, pwbuf, NULL, 214 krb5_free_cred_contents(context, &cred); 280 krb5_creds cred; local in function:krb5_chpw 312 &cred, 344 ret = krb5_set_password (context, &cred, pwbuf, NULL, 359 krb5_free_cred_contents (context, &cred);
|
krb5_passwd.c | 84 krb5_creds cred; local in function:pwkrb5_process 160 &cred, 196 ret = krb5_set_password(context, &cred, pwbuf, NULL, 214 krb5_free_cred_contents(context, &cred); 280 krb5_creds cred; local in function:krb5_chpw 312 &cred, 344 ret = krb5_set_password (context, &cred, pwbuf, NULL, 359 krb5_free_cred_contents (context, &cred);
|
/src/usr.sbin/sdpd/ |
server.c | 583 struct sockcred *cred = data; local in function:server_auth_check 587 if (cred == NULL) 590 if (cred->sc_uid == 0 || cred->sc_euid == 0) 603 if (cred->sc_gid == grp->gr_gid || cred->sc_egid == grp->gr_gid) 606 if (cred->sc_ngroups > MAX_GROUPS) { 608 MAX_GROUPS - cred->sc_ngroups); 610 cred->sc_ngroups = MAX_GROUPS; 613 for (n = 0 ; n < cred->sc_ngroups ; n++) [all...] |
server.c | 583 struct sockcred *cred = data; local in function:server_auth_check 587 if (cred == NULL) 590 if (cred->sc_uid == 0 || cred->sc_euid == 0) 603 if (cred->sc_gid == grp->gr_gid || cred->sc_egid == grp->gr_gid) 606 if (cred->sc_ngroups > MAX_GROUPS) { 608 MAX_GROUPS - cred->sc_ngroups); 610 cred->sc_ngroups = MAX_GROUPS; 613 for (n = 0 ; n < cred->sc_ngroups ; n++) [all...] |
/src/sys/kern/ |
kern_core.c | 125 kauth_cred_t cred = NULL; local in function:coredump 156 cred = kauth_cred_hold(p->p_cred); 251 VOP_GETATTR(vp, &vattr, cred) || vattr.va_nlink != 1 || 252 vattr.va_uid != kauth_cred_geteuid(cred)) { 265 VOP_SETATTR(vp, &vattr, cred); 270 io.io_cred = cred; 277 error1 = vn_close(vp, FWRITE, cred); 281 if (cred != NULL) 282 kauth_cred_free(cred);
|
kern_core.c | 125 kauth_cred_t cred = NULL; local in function:coredump 156 cred = kauth_cred_hold(p->p_cred); 251 VOP_GETATTR(vp, &vattr, cred) || vattr.va_nlink != 1 || 252 vattr.va_uid != kauth_cred_geteuid(cred)) { 265 VOP_SETATTR(vp, &vattr, cred); 270 io.io_cred = cred; 277 error1 = vn_close(vp, FWRITE, cred); 281 if (cred != NULL) 282 kauth_cred_free(cred);
|
/src/sys/secmodel/suser/ |
secmodel_suser.c | 126 suser_isroot(kauth_cred_t cred) 128 return kauth_cred_geteuid(cred) == 0; 137 kauth_cred_t cred = arg; local in function:suser_eval 140 *bp = suser_isroot(cred); 196 secmodel_suser_generic_cb(kauth_cred_t cred, kauth_action_t action, 202 isroot = suser_isroot(cred); 226 secmodel_suser_system_cb(kauth_cred_t cred, kauth_action_t action, 233 isroot = suser_isroot(cred); 466 secmodel_suser_process_cb(kauth_cred_t cred, kauth_action_t action, 472 isroot = suser_isroot(cred); [all...] |
secmodel_suser.c | 126 suser_isroot(kauth_cred_t cred) 128 return kauth_cred_geteuid(cred) == 0; 137 kauth_cred_t cred = arg; local in function:suser_eval 140 *bp = suser_isroot(cred); 196 secmodel_suser_generic_cb(kauth_cred_t cred, kauth_action_t action, 202 isroot = suser_isroot(cred); 226 secmodel_suser_system_cb(kauth_cred_t cred, kauth_action_t action, 233 isroot = suser_isroot(cred); 466 secmodel_suser_process_cb(kauth_cred_t cred, kauth_action_t action, 472 isroot = suser_isroot(cred); [all...] |
/src/sys/fs/hfs/ |
hfs_subr.c | 189 result = vinvalbuf(args->devvp, V_SAVE, args->cred, args->l, 0, 0); 253 kauth_cred_t cred; local in function:hfs_libcb_read 263 && argsread->cred != NULL) 264 cred = argsread->cred; 266 cred = NOCRED; 277 length, cred); 290 uint64_t len, kauth_cred_t cred)
|
/src/sys/miscfs/genfs/ |
genfs_rename.c | 75 * . cred (credentials structure), and 84 kauth_cred_t cred, bool posixly_correct) 90 cred, posixly_correct); 164 kauth_cred_t cred, bool posixly_correct)) 180 kauth_cred_t cred; local in function:genfs_insane_rename 197 cred = fcnp->cn_cred; 200 * XXX Want a better equality test. `tcnp->cn_cred == cred' 204 KASSERT(kauth_cred_uidmatch(cred, tcnp->cn_cred)); 221 error = (*sane_rename)(fdvp, fcnp, tdvp, tcnp, cred, false); 246 kauth_cred_t cred, bool posixly_correct [all...] |
/src/sys/ufs/lfs/ |
ulfs_quota1.c | 64 lfs_chkdq1(struct inode *ip, int64_t change, kauth_cred_t cred, int flags) 94 kauth_authorize_system(cred, KAUTH_SYSTEM_FS_QUOTA, 98 error = chkdqchg(ip, change, cred, i); 120 chkdqchg(struct inode *ip, int64_t change, kauth_cred_t cred, int type) 131 ip->i_uid == kauth_cred_geteuid(cred)) { 147 if (ip->i_uid == kauth_cred_geteuid(cred)) 155 ip->i_uid == kauth_cred_geteuid(cred)) { 172 lfs_chkiq1(struct inode *ip, int32_t change, kauth_cred_t cred, int flags) 201 if ((flags & FORCE) == 0 && kauth_authorize_system(cred, 205 error = chkiqchg(ip, change, cred, i) 417 kauth_cred_t cred; local in function:lfsquota1_handle_cmd_quotaoff [all...] |
/src/sys/ufs/ufs/ |
ufs_quota1.c | 63 chkdq1(struct inode *ip, int64_t change, kauth_cred_t cred, int flags) 93 kauth_authorize_system(cred, KAUTH_SYSTEM_FS_QUOTA, 97 error = chkdqchg(ip, change, cred, i); 119 chkdqchg(struct inode *ip, int64_t change, kauth_cred_t cred, int type) 130 ip->i_uid == kauth_cred_geteuid(cred)) { 146 if (ip->i_uid == kauth_cred_geteuid(cred)) 154 ip->i_uid == kauth_cred_geteuid(cred)) { 171 chkiq1(struct inode *ip, int32_t change, kauth_cred_t cred, int flags) 201 kauth_authorize_system(cred, KAUTH_SYSTEM_FS_QUOTA, 205 error = chkiqchg(ip, change, cred, i) 423 kauth_cred_t cred; local in function:quota1_handle_cmd_quotaoff [all...] |