/freebsd-current/usr.sbin/nscd/ |
H A D | nscd.c | 233 uid_t euid; local 245 if (getpeereid(fd, &euid, &egid) != 0) { 252 qstate = init_query_state(fd, sizeof(int), euid, egid);
|
/freebsd-current/usr.bin/login/ |
H A D | login.c | 161 uid_t uid, euid; local 199 euid = geteuid(); 437 (void)seteuid(euid);
|
/freebsd-current/contrib/openbsm/libbsm/ |
H A D | bsm_io.c | 2504 * euid 4 bytes 2523 READ_TOKEN_U_INT32(buf, len, tok->tt.proc32.euid, tok->len, err); 2569 print_user(fp, tok->tt.proc32.euid, oflags); 2595 print_user(fp, tok->tt.proc32.euid, oflags); 2616 * euid 4 bytes 2635 READ_TOKEN_U_INT32(buf, len, tok->tt.proc64.euid, tok->len, err); 2680 print_user(fp, tok->tt.proc64.euid, oflags); 2706 print_user(fp, tok->tt.proc64.euid, oflags); 2747 READ_TOKEN_U_INT32(buf, len, tok->tt.proc32_ex.euid, tok->len, err); 2807 print_user(fp, tok->tt.proc32_ex.euid, oflag [all...] |
/freebsd-current/usr.bin/tip/tip/ |
H A D | tip.c | 64 euid = geteuid(); 282 seteuid(euid);
|
H A D | tip.h | 255 EXTERN uid_t uid, euid; /* real and effective user id's */ variable
|
/freebsd-current/lib/libpam/modules/pam_krb5/ |
H A D | pam_krb5.c | 419 uid_t euid; 456 euid = geteuid(); /* Usually 0 */ 459 PAM_LOG("Got euid, egid: %d %d", euid, egid); 632 seteuid(euid);
|
/freebsd-current/contrib/llvm-project/compiler-rt/lib/sanitizer_common/ |
H A D | sanitizer_common_syscalls.inc | 309 PRE_SYSCALL(getresuid)(void *ruid, void *euid, void *suid) {} 311 POST_SYSCALL(getresuid)(long res, void *ruid, void *euid, void *suid) { 315 if (euid) 316 POST_WRITE(euid, sizeof(unsigned)); 365 PRE_SYSCALL(setreuid)(long ruid, long euid) {} 367 POST_SYSCALL(setreuid)(long res, long ruid, long euid) {} 373 PRE_SYSCALL(setresuid)(long ruid, long euid, long suid) {} 375 POST_SYSCALL(setresuid)(long res, long ruid, long euid, long suid) {} 1577 PRE_SYSCALL(setreuid16)(long ruid, long euid) {} 1579 POST_SYSCALL(setreuid16)(long res, long ruid, long euid) {} [all...] |
/freebsd-current/contrib/openbsm/bin/auditreduce/ |
H A D | auditreduce.c | 213 * Check if the given euid matches the selection criteria. 219 /* Check if we want to select on euid. */ 443 * euid, 457 if (!select_euid(tok.tt.proc32.euid)) 473 * euid, 487 if (!select_euid(tok.tt.subj32.euid))
|
/freebsd-current/usr.sbin/lpr/lpr/ |
H A D | lpr.c | 116 uid_t uid, euid; variable 133 euid = geteuid();
|
/freebsd-current/tools/regression/sockets/unix_cmsg/ |
H A D | unix_cmsg.c | 308 uc_cfg.proc_cred.euid = geteuid();
|
/freebsd-current/sys/security/mac/ |
H A D | mac_framework.h | 119 int mac_cred_check_seteuid(struct ucred *cred, uid_t euid); 126 int mac_cred_check_setresuid(struct ucred *cred, uid_t ruid, uid_t euid, 128 int mac_cred_check_setreuid(struct ucred *cred, uid_t ruid, uid_t euid);
|
H A D | mac_policy.h | 148 typedef int (*mpo_cred_check_seteuid_t)(struct ucred *cred, uid_t euid); 157 uid_t euid, uid_t suid); 159 uid_t euid);
|
/freebsd-current/lib/libc/rpc/ |
H A D | svc_vc.c | 715 uid_t euid; local 721 ret = getpeereid(sock, &euid, &egid); 723 *uid = euid;
|
/freebsd-current/sys/rpc/ |
H A D | svc_vc.c | 1173 uid_t euid; 1179 ret = getpeereid(sock, &euid, &egid); 1181 *uid = euid;
|
/freebsd-current/sys/security/mac_stub/ |
H A D | mac_stub.c | 235 stub_cred_check_seteuid(struct ucred *cred, uid_t euid) argument 272 stub_cred_check_setresuid(struct ucred *cred, uid_t ruid, uid_t euid, argument 280 stub_cred_check_setreuid(struct ucred *cred, uid_t ruid, uid_t euid) argument
|
/freebsd-current/contrib/tcsh/ |
H A D | sh.c | 370 euid = geteuid(); 641 setv(STReuid, Itoa(euid, 0, 0), VAR_READWRITE); 642 if ((pw = xgetpwuid(euid)) == NULL) 1105 if (!batch && (uid != euid || gid != egid)) {
|
H A D | tc.prompt.c | 226 Scp = (uid == 0 || euid == 0) ? PRCHROOT : PRCH;
|
/freebsd-current/lib/libsys/ |
H A D | _libsys.h | 548 int __sys_setreuid(int ruid, int euid); 575 int __sys_seteuid(uid_t euid); 633 int __sys_setresuid(uid_t ruid, uid_t euid, uid_t suid); 672 int __sys_getresuid(uid_t * ruid, uid_t * euid, uid_t * suid);
|
/freebsd-current/contrib/capsicum-test/ |
H A D | capmode.cc | 297 uid_t euid; local 299 EXPECT_OK(getresuid(&ruid, &euid, &suid));
|
/freebsd-current/tools/tools/syscall_timing/ |
H A D | syscall_timing.c | 293 uid_t ruid, euid, suid; local 298 (void)getresuid(&ruid, &euid, &suid);
|
/freebsd-current/sys/security/audit/ |
H A D | audit_arg.c | 201 audit_arg_euid(uid_t euid) argument 209 ar->k_ar.ar_arg_euid = euid;
|
/freebsd-current/crypto/openssh/ |
H A D | ssh-agent.c | 1957 uid_t euid; local 1967 if (getpeereid(fd, &euid, &egid) == -1) { 1972 if ((euid != 0) && (getuid() != euid)) { 1973 error("uid mismatch: peer euid %u != uid %u", 1974 (u_int) euid, (u_int) getuid());
|
/freebsd-current/contrib/llvm-project/compiler-rt/include/sanitizer/ |
H A D | netbsd_syscall_hooks.h | 667 #define __sanitizer_syscall_pre_setreuid(ruid, euid) \ 668 __sanitizer_syscall_pre_impl_setreuid((long long)(ruid), (long long)(euid)) 669 #define __sanitizer_syscall_post_setreuid(res, ruid, euid) \ 671 (long long)(euid)) 959 #define __sanitizer_syscall_pre_seteuid(euid) \ 960 __sanitizer_syscall_pre_impl_seteuid((long long)(euid)) 961 #define __sanitizer_syscall_post_seteuid(res, euid) \ 962 __sanitizer_syscall_post_impl_seteuid(res, (long long)(euid)) 3342 void __sanitizer_syscall_pre_impl_setreuid(long long ruid, long long euid); 3344 long long euid); [all...] |
/freebsd-current/usr.sbin/inetd/ |
H A D | inetd.c | 269 static uid_t euid; variable 452 euid = geteuid(); 1696 sep->se_sockuid = euid;
|
/freebsd-current/contrib/netbsd-tests/usr.bin/id/ |
H A D | t_id.sh | 54 echo "uid=100(test) gid=100(users) euid=0(root) egid=0(wheel) groups=100(users),0(wheel)" >expout 212 euid root
|