/freebsd-10.0-release/crypto/heimdal/lib/roken/ |
H A D | seteuid.c | 43 seteuid(uid_t euid) argument 46 return setreuid(-1, euid); 50 return setresuid(-1, euid, -1);
|
/freebsd-10.0-release/cddl/contrib/opensolaris/cmd/dtrace/test/tst/common/scripting/ |
H A D | tst.euid.d | 42 printf("The euid is %d\n", $euid);
|
H A D | tst.euid.ksh | 32 # To verify euid of current process 54 /\$euid != \$1/ 60 /\$euid == \$1/
|
/freebsd-10.0-release/crypto/openssh/openbsd-compat/ |
H A D | bsd-getpeereid.c | 28 getpeereid(int s, uid_t *euid, gid_t *gid) argument 35 *euid = cred.uid; 47 getpeereid(int s, uid_t *euid, gid_t *gid) argument 53 if ((*euid = ucred_geteuid(ucred)) == -1) 64 getpeereid(int s, uid_t *euid, gid_t *gid) argument 66 *euid = geteuid();
|
H A D | bsd-setres_id.c | 65 setresuid(uid_t ruid, uid_t euid, uid_t suid) argument 74 if (setreuid(ruid, euid) < 0) { 83 if (seteuid(euid) < 0) { 85 error("seteuid %u: %.100s", euid, strerror(errno));
|
/freebsd-10.0-release/contrib/openpam/lib/libpam/ |
H A D | openpam_cred.h | 46 uid_t euid; member in struct:pam_saved_cred
|
H A D | openpam_restore_cred.c | 75 if (scred->euid != geteuid()) { 76 if (seteuid(scred->euid) < 0 ||
|
H A D | openpam_borrow_cred.c | 77 openpam_log(PAM_LOG_LIBDEBUG, "called with non-zero euid: %d", 84 scred->euid = geteuid();
|
/freebsd-10.0-release/contrib/atf/atf-run/ |
H A D | user_test.cpp | 48 ATF_TEST_CASE(euid); variable 49 ATF_TEST_CASE_HEAD(euid) 51 set_md_var("descr", "Tests the euid function"); 53 ATF_TEST_CASE_BODY(euid) 55 using atf::atf_run::euid; 57 ATF_REQUIRE_EQ(euid(), ::geteuid()); 144 ATF_ADD_TEST_CASE(tcs, euid);
|
H A D | user.hpp | 42 uid_t euid(void);
|
H A D | user.cpp | 50 impl::euid(void) function in class:impl
|
/freebsd-10.0-release/lib/libc/gen/ |
H A D | getpeereid.c | 39 getpeereid(int s, uid_t *euid, gid_t *egid) argument 51 *euid = xuc.cr_uid;
|
/freebsd-10.0-release/contrib/atf/atf-c/detail/ |
H A D | user_test.c | 46 ATF_TC(euid); variable 47 ATF_TC_HEAD(euid, tc) 51 ATF_TC_BODY(euid, tc) 143 ATF_TP_ADD_TC(tp, euid);
|
/freebsd-10.0-release/sys/security/mac/ |
H A D | mac_cred.c | 231 mac_cred_check_seteuid(struct ucred *cred, uid_t euid) argument 235 MAC_POLICY_CHECK_NOSLEEP(cred_check_seteuid, cred, euid); 236 MAC_CHECK_PROBE2(cred_check_seteuid, error, cred, euid); 285 mac_cred_check_setreuid(struct ucred *cred, uid_t ruid, uid_t euid) argument 289 MAC_POLICY_CHECK_NOSLEEP(cred_check_setreuid, cred, ruid, euid); 290 MAC_CHECK_PROBE3(cred_check_setreuid, error, cred, ruid, euid); 313 mac_cred_check_setresuid(struct ucred *cred, uid_t ruid, uid_t euid, argument 318 MAC_POLICY_CHECK_NOSLEEP(cred_check_setresuid, cred, ruid, euid, suid); 319 MAC_CHECK_PROBE4(cred_check_setresuid, error, cred, ruid, euid,
|
/freebsd-10.0-release/contrib/openbsm/sys/bsm/ |
H A D | audit_record.h | 237 token_t *au_to_process(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 239 token_t *au_to_process32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 241 token_t *au_to_process64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 243 token_t *au_to_process_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 245 token_t *au_to_process32_ex(au_id_t auid, uid_t euid, gid_t egid, 248 token_t *au_to_process64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 260 token_t *au_to_subject(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 262 token_t *au_to_subject32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 264 token_t *au_to_subject64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 266 token_t *au_to_subject_ex(au_id_t auid, uid_t euid, gid_ [all...] |
/freebsd-10.0-release/sys/bsm/ |
H A D | audit_record.h | 241 token_t *au_to_process(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 243 token_t *au_to_process32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 245 token_t *au_to_process64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 247 token_t *au_to_process_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 249 token_t *au_to_process32_ex(au_id_t auid, uid_t euid, gid_t egid, 252 token_t *au_to_process64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 265 token_t *au_to_subject(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 267 token_t *au_to_subject32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 269 token_t *au_to_subject64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 271 token_t *au_to_subject_ex(au_id_t auid, uid_t euid, gid_ [all...] |
/freebsd-10.0-release/contrib/openbsm/bin/auditdistd/ |
H A D | sandbox.c | 73 uid_t ruid, euid; local 194 PJDLOG_VERIFY(getresuid(&ruid, &euid, &suid) == 0); 198 euid = geteuid(); 201 PJDLOG_VERIFY(euid == pw->pw_uid);
|
/freebsd-10.0-release/usr.sbin/lpr/lprm/ |
H A D | lprm.c | 79 uid_t uid, euid; /* real and effective user id's */ variable 96 euid = geteuid();
|
/freebsd-10.0-release/sys/kern/ |
H A D | kern_prot.c | 478 * compatible. It says that setting the uid/gid to euid/egid is a special 529 * 1: We determine if the euid is going to change, and do EPERM 530 * right away. We unconditionally change the euid later if this 534 * 3: Change euid last. (after tests in #2 for "appropriate privs") 548 * Do we have "appropriate privileges" (are we root or uid == euid) 580 * In all permitted cases, we are changing the euid. 604 uid_t euid; member in struct:seteuid_args 613 uid_t euid; local 617 euid = uap->euid; 878 uid_t euid; member in struct:setreuid_args 887 uid_t euid, ruid; local 1012 uid_t euid; member in struct:setresuid_args 1022 uid_t euid, ruid, suid; local 1161 uid_t *euid; member in struct:getresuid_args [all...] |
/freebsd-10.0-release/usr.sbin/chown/ |
H A D | chown.c | 273 static uid_t euid = -1; local 280 euid == (uid_t)-1 && (euid = geteuid()) != 0)) { 287 euid == (uid_t)-1 && (euid = geteuid()) != 0) {
|
/freebsd-10.0-release/contrib/openbsm/libbsm/ |
H A D | bsm_token.c | 750 au_to_process32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument 762 ADD_U_INT32(dptr, euid); 782 au_to_process64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument 795 ADD_U_INT32(dptr, euid); 815 au_to_process(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument 819 return (au_to_process32(auid, euid, egid, ruid, rgid, pid, sid, 838 au_to_process32_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, argument 859 ADD_U_INT32(dptr, euid); 878 au_to_process64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, argument 901 ADD_U_INT32(dptr, euid); 920 au_to_process_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument 1161 au_to_subject32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument 1186 au_to_subject64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument 1212 au_to_subject(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument 1235 au_to_subject32_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument 1273 au_to_subject64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument 1313 au_to_subject_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument [all...] |
/freebsd-10.0-release/sys/security/audit/ |
H A D | bsm_token.c | 671 au_to_process32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument 681 ADD_U_INT32(dptr, euid); 701 au_to_process64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument 712 ADD_U_INT32(dptr, euid); 732 au_to_process(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument 736 return (au_to_process32(auid, euid, egid, ruid, rgid, pid, sid, 755 au_to_process32_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, argument 772 ADD_U_INT32(dptr, euid); 791 au_to_process64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, argument 811 ADD_U_INT32(dptr, euid); 830 au_to_process_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument 1100 au_to_subject32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument 1123 au_to_subject64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument 1147 au_to_subject(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument 1170 au_to_subject32_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument 1205 au_to_subject64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument 1242 au_to_subject_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument [all...] |
/freebsd-10.0-release/usr.sbin/lpr/lpq/ |
H A D | lpq.c | 75 uid_t uid, euid; variable 89 euid = geteuid();
|
/freebsd-10.0-release/contrib/openbsm/bsm/ |
H A D | libbsm.h | 460 u_int32_t euid; member in struct:__anon4053 471 u_int32_t euid; member in struct:__anon4054 495 u_int32_t euid; member in struct:__anon4055 506 u_int32_t euid; member in struct:__anon4056 610 u_int32_t euid; member in struct:__anon4065 621 u_int32_t euid; member in struct:__anon4066 645 u_int32_t euid; member in struct:__anon4067 656 u_int32_t euid; member in struct:__anon4068 1111 * @param euid - The subject's effective user ID. 1131 uid_t euid, gid_ [all...] |
/freebsd-10.0-release/contrib/sendmail/libsmdb/ |
H A D | smdb.c | 126 int euid = (int) geteuid(); 128 syslog(LOG_ERR, "cannot lockf(%s%s, fd=%d, type=%o, omode=%o, euid=%d)", 129 filename, ext, fd, type, omode, euid); 146 int euid = (int) geteuid(); 148 syslog(LOG_ERR, "cannot flock(%s%s, fd=%d, type=%o, omode=%o, euid=%d)", 149 filename, ext, fd, type, omode, euid);
|