/openbsd/regress/sys/kern/setuid/ |
H A D | Makefile | 30 REGRESS_TARGETS+= run-regress-setgid 55 BINFILES+= setgid 85 run-regress-setgid: install-setgid 86 cd ${DIR} && ${SUDO} ./setgid
|
H A D | setgid.c | 35 if (setgid(pw->pw_gid) == -1) in main()
|
H A D | setgid_child.c | 32 if (setgid(pw->pw_gid) == -1) in main()
|
/openbsd/gnu/usr.bin/perl/cpan/Test-Harness/t/ |
H A D | source.t | 177 setgid => -g $test ? 1 : 0, 228 setgid => -g $test ? 1 : 0, 295 setgid => -g $symlink ? 1 : 0,
|
/openbsd/usr.sbin/chroot/ |
H A D | chroot.c | 106 if (setgid(gidlist[0]) != 0) in main()
|
/openbsd/regress/lib/libc/sys/ |
H A D | t_getgroups.c | 123 rv = setgid(gidset[i]); in ATF_TC_BODY()
|
/openbsd/usr.bin/which/ |
H A D | which.c | 79 if (setgid(getegid())) in main()
|
/openbsd/libexec/rpc.rstatd/ |
H A D | rstatd.c | 84 setgid(pw->pw_gid); in main()
|
/openbsd/gnu/usr.bin/cvs/src/ |
H A D | options.h.in | 144 administrators), set the cvs executable to setgid that group, chown 153 which cvs is setgid to). 155 One security hole which has been reported is that setgid is not
|
/openbsd/gnu/usr.bin/perl/cpan/Test-Harness/lib/TAP/Parser/ |
H A D | Source.pm | 271 $file->{setgid} = -g _ ? 1 : 0;
|
/openbsd/lib/libc/hidden/ |
H A D | unistd.h | 138 PROTO_NORMAL(setgid);
|
/openbsd/gnu/llvm/lldb/source/Host/posix/ |
H A D | ProcessLauncherPosixFork.cpp | 159 if (setgid(getgid()) != 0) in ChildFunc()
|
/openbsd/gnu/usr.bin/perl/pod/ |
H A D | perlsec.pod | 8 with extra privileges, like setuid or setgid programs. Unlike most 34 setgid bit mode 02000; either or both may be set. You can also enable taint 237 (or setgid) script actually match the ones set on the #! line. Some 241 Unix-like environments that support #! and setuid or setgid scripts.) 310 or setgid program: just create a child process with reduced privilege who 434 than your script setuid or setgid. Note that this wrapper isn't doing
|
H A D | perlrun.pod | 880 these checks are done only when running setuid or setgid. It's a 1064 setgid, or the L</-T> or L</-t> switch was specified, neither PERL5LIB nor 1075 program was running setuid or setgid, or because the L</-T> or L</-t> 1412 Ignored if perl is run setuid or setgid. Used only for some limited 1442 Ignored if perl is run setuid or setgid.
|
/openbsd/include/ |
H A D | unistd.h | 368 int setgid(gid_t);
|
/openbsd/lib/libutil/ |
H A D | passwd.c | 237 setgid(getgid()); in pw_edit()
|
/openbsd/gnu/usr.bin/perl/win32/ |
H A D | win32.h | 373 extern int setgid(gid_t gid);
|
/openbsd/usr.sbin/cron/ |
H A D | crontab.c | 577 if (setgid(user_gid) == -1) { in editit()
|
/openbsd/gnu/usr.bin/perl/ |
H A D | README.os400 | 78 work if you've done a setuid/setgid or have environment variable
|
H A D | XSUB.h | 607 # define setgid PerlProc_setgid macro
|
/openbsd/lib/libc/sys/ |
H A D | Makefile.inc | 70 setegid.o seteuid.o setgid.o setgroups.o setitimer.o setlogin.o \
|
/openbsd/gnu/usr.bin/perl/ext/POSIX/t/ |
H A D | export.t | 99 puts qsort raise realloc remove rewind scanf setbuf setgid
|
/openbsd/gnu/usr.bin/perl/t/porting/ |
H A D | diag.t | 677 No %s allowed while running setgid
|
/openbsd/usr.sbin/unbound/daemon/ |
H A D | unbound.c | 663 if(setgid(cfg_gid) != 0) in perform_setup()
|
/openbsd/gnu/usr.bin/perl/ext/POSIX/ |
H A D | POSIX.xs | 1408 # undef setgid 1410 # define setgid(a) not_here("setgid") macro 3676 setgid(gid) in setgid() function
|