Lines Matching defs:euid
819 * Parameters: uap->euid effective uid to set
825 * unprivileged process but euid is equal to the real or saved
835 uid_t euid;
840 DEBUG_CRED_ENTER("seteuid: %d\n", uap->euid);
842 euid = uap->euid;
843 AUDIT_ARG(euid, euid);
848 if (euid != my_pcred->cr_ruid && euid != my_pcred->cr_svuid &&
867 my_new_cred = kauth_cred_setresuid(my_cred, KAUTH_UID_NONE, euid, KAUTH_UID_NONE, my_pcred->cr_gmuid);
909 * uap->euid effective uid to set
937 uid_t ruid, euid;
942 DEBUG_CRED_ENTER("setreuid %d %d\n", uap->ruid, uap->euid);
945 euid = uap->euid;
948 if (euid == (uid_t)-1)
949 euid = KAUTH_UID_NONE;
950 AUDIT_ARG(euid, euid);
958 ruid != my_pcred->cr_uid && /* allow ruid = euid */
960 (euid != KAUTH_UID_NONE && /* allow no change of euid */
961 euid != my_pcred->cr_uid && /* allow euid = euid */
962 euid != my_pcred->cr_ruid && /* allow euid = ruid */
963 euid != my_pcred->cr_svuid)) && /* allow euid = svui */
989 if (euid == KAUTH_UID_NONE && my_pcred->cr_uid != euid) {
991 new_euid = euid;
1009 my_pcred->cr_svuid != uap->euid) {
1014 my_new_cred = kauth_cred_setresuid(my_cred, ruid, euid, svuid, my_pcred->cr_gmuid);
1984 /* Set the secrity token of the task with current euid and eguid */