Searched refs:euid (Results 1 - 25 of 86) sorted by relevance

1234

/freebsd-10.0-release/crypto/heimdal/lib/roken/
H A Dseteuid.c43 seteuid(uid_t euid) argument
46 return setreuid(-1, euid);
50 return setresuid(-1, euid, -1);
/freebsd-10.0-release/cddl/contrib/opensolaris/cmd/dtrace/test/tst/common/scripting/
H A Dtst.euid.d42 printf("The euid is %d\n", $euid);
H A Dtst.euid.ksh32 # To verify euid of current process
54 /\$euid != \$1/
60 /\$euid == \$1/
/freebsd-10.0-release/crypto/openssh/openbsd-compat/
H A Dbsd-getpeereid.c28 getpeereid(int s, uid_t *euid, gid_t *gid) argument
35 *euid = cred.uid;
47 getpeereid(int s, uid_t *euid, gid_t *gid) argument
53 if ((*euid = ucred_geteuid(ucred)) == -1)
64 getpeereid(int s, uid_t *euid, gid_t *gid) argument
66 *euid = geteuid();
H A Dbsd-setres_id.c65 setresuid(uid_t ruid, uid_t euid, uid_t suid) argument
74 if (setreuid(ruid, euid) < 0) {
83 if (seteuid(euid) < 0) {
85 error("seteuid %u: %.100s", euid, strerror(errno));
/freebsd-10.0-release/contrib/openpam/lib/libpam/
H A Dopenpam_cred.h46 uid_t euid; member in struct:pam_saved_cred
H A Dopenpam_restore_cred.c75 if (scred->euid != geteuid()) {
76 if (seteuid(scred->euid) < 0 ||
H A Dopenpam_borrow_cred.c77 openpam_log(PAM_LOG_LIBDEBUG, "called with non-zero euid: %d",
84 scred->euid = geteuid();
/freebsd-10.0-release/contrib/atf/atf-run/
H A Duser_test.cpp48 ATF_TEST_CASE(euid); variable
49 ATF_TEST_CASE_HEAD(euid)
51 set_md_var("descr", "Tests the euid function");
53 ATF_TEST_CASE_BODY(euid)
55 using atf::atf_run::euid;
57 ATF_REQUIRE_EQ(euid(), ::geteuid());
144 ATF_ADD_TEST_CASE(tcs, euid);
H A Duser.hpp42 uid_t euid(void);
H A Duser.cpp50 impl::euid(void) function in class:impl
/freebsd-10.0-release/lib/libc/gen/
H A Dgetpeereid.c39 getpeereid(int s, uid_t *euid, gid_t *egid) argument
51 *euid = xuc.cr_uid;
/freebsd-10.0-release/contrib/atf/atf-c/detail/
H A Duser_test.c46 ATF_TC(euid); variable
47 ATF_TC_HEAD(euid, tc)
51 ATF_TC_BODY(euid, tc)
143 ATF_TP_ADD_TC(tp, euid);
/freebsd-10.0-release/sys/security/mac/
H A Dmac_cred.c231 mac_cred_check_seteuid(struct ucred *cred, uid_t euid) argument
235 MAC_POLICY_CHECK_NOSLEEP(cred_check_seteuid, cred, euid);
236 MAC_CHECK_PROBE2(cred_check_seteuid, error, cred, euid);
285 mac_cred_check_setreuid(struct ucred *cred, uid_t ruid, uid_t euid) argument
289 MAC_POLICY_CHECK_NOSLEEP(cred_check_setreuid, cred, ruid, euid);
290 MAC_CHECK_PROBE3(cred_check_setreuid, error, cred, ruid, euid);
313 mac_cred_check_setresuid(struct ucred *cred, uid_t ruid, uid_t euid, argument
318 MAC_POLICY_CHECK_NOSLEEP(cred_check_setresuid, cred, ruid, euid, suid);
319 MAC_CHECK_PROBE4(cred_check_setresuid, error, cred, ruid, euid,
/freebsd-10.0-release/contrib/openbsm/sys/bsm/
H A Daudit_record.h237 token_t *au_to_process(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid,
239 token_t *au_to_process32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid,
241 token_t *au_to_process64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid,
243 token_t *au_to_process_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid,
245 token_t *au_to_process32_ex(au_id_t auid, uid_t euid, gid_t egid,
248 token_t *au_to_process64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid,
260 token_t *au_to_subject(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid,
262 token_t *au_to_subject32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid,
264 token_t *au_to_subject64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid,
266 token_t *au_to_subject_ex(au_id_t auid, uid_t euid, gid_
[all...]
/freebsd-10.0-release/sys/bsm/
H A Daudit_record.h241 token_t *au_to_process(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid,
243 token_t *au_to_process32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid,
245 token_t *au_to_process64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid,
247 token_t *au_to_process_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid,
249 token_t *au_to_process32_ex(au_id_t auid, uid_t euid, gid_t egid,
252 token_t *au_to_process64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid,
265 token_t *au_to_subject(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid,
267 token_t *au_to_subject32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid,
269 token_t *au_to_subject64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid,
271 token_t *au_to_subject_ex(au_id_t auid, uid_t euid, gid_
[all...]
/freebsd-10.0-release/contrib/openbsm/bin/auditdistd/
H A Dsandbox.c73 uid_t ruid, euid; local
194 PJDLOG_VERIFY(getresuid(&ruid, &euid, &suid) == 0);
198 euid = geteuid();
201 PJDLOG_VERIFY(euid == pw->pw_uid);
/freebsd-10.0-release/usr.sbin/lpr/lprm/
H A Dlprm.c79 uid_t uid, euid; /* real and effective user id's */ variable
96 euid = geteuid();
/freebsd-10.0-release/sys/kern/
H A Dkern_prot.c478 * compatible. It says that setting the uid/gid to euid/egid is a special
529 * 1: We determine if the euid is going to change, and do EPERM
530 * right away. We unconditionally change the euid later if this
534 * 3: Change euid last. (after tests in #2 for "appropriate privs")
548 * Do we have "appropriate privileges" (are we root or uid == euid)
580 * In all permitted cases, we are changing the euid.
604 uid_t euid; member in struct:seteuid_args
613 uid_t euid; local
617 euid = uap->euid;
878 uid_t euid; member in struct:setreuid_args
887 uid_t euid, ruid; local
1012 uid_t euid; member in struct:setresuid_args
1022 uid_t euid, ruid, suid; local
1161 uid_t *euid; member in struct:getresuid_args
[all...]
/freebsd-10.0-release/usr.sbin/chown/
H A Dchown.c273 static uid_t euid = -1; local
280 euid == (uid_t)-1 && (euid = geteuid()) != 0)) {
287 euid == (uid_t)-1 && (euid = geteuid()) != 0) {
/freebsd-10.0-release/contrib/openbsm/libbsm/
H A Dbsm_token.c750 au_to_process32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument
762 ADD_U_INT32(dptr, euid);
782 au_to_process64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument
795 ADD_U_INT32(dptr, euid);
815 au_to_process(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument
819 return (au_to_process32(auid, euid, egid, ruid, rgid, pid, sid,
838 au_to_process32_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, argument
859 ADD_U_INT32(dptr, euid);
878 au_to_process64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, argument
901 ADD_U_INT32(dptr, euid);
920 au_to_process_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument
1161 au_to_subject32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument
1186 au_to_subject64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument
1212 au_to_subject(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument
1235 au_to_subject32_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument
1273 au_to_subject64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument
1313 au_to_subject_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument
[all...]
/freebsd-10.0-release/sys/security/audit/
H A Dbsm_token.c671 au_to_process32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument
681 ADD_U_INT32(dptr, euid);
701 au_to_process64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument
712 ADD_U_INT32(dptr, euid);
732 au_to_process(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument
736 return (au_to_process32(auid, euid, egid, ruid, rgid, pid, sid,
755 au_to_process32_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, argument
772 ADD_U_INT32(dptr, euid);
791 au_to_process64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, argument
811 ADD_U_INT32(dptr, euid);
830 au_to_process_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument
1100 au_to_subject32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument
1123 au_to_subject64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument
1147 au_to_subject(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument
1170 au_to_subject32_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument
1205 au_to_subject64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument
1242 au_to_subject_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument
[all...]
/freebsd-10.0-release/usr.sbin/lpr/lpq/
H A Dlpq.c75 uid_t uid, euid; variable
89 euid = geteuid();
/freebsd-10.0-release/contrib/openbsm/bsm/
H A Dlibbsm.h460 u_int32_t euid; member in struct:__anon4053
471 u_int32_t euid; member in struct:__anon4054
495 u_int32_t euid; member in struct:__anon4055
506 u_int32_t euid; member in struct:__anon4056
610 u_int32_t euid; member in struct:__anon4065
621 u_int32_t euid; member in struct:__anon4066
645 u_int32_t euid; member in struct:__anon4067
656 u_int32_t euid; member in struct:__anon4068
1111 * @param euid - The subject's effective user ID.
1131 uid_t euid, gid_
[all...]
/freebsd-10.0-release/contrib/sendmail/libsmdb/
H A Dsmdb.c126 int euid = (int) geteuid();
128 syslog(LOG_ERR, "cannot lockf(%s%s, fd=%d, type=%o, omode=%o, euid=%d)",
129 filename, ext, fd, type, omode, euid);
146 int euid = (int) geteuid();
148 syslog(LOG_ERR, "cannot flock(%s%s, fd=%d, type=%o, omode=%o, euid=%d)",
149 filename, ext, fd, type, omode, euid);

Completed in 196 milliseconds

1234