/freebsd-current/crypto/heimdal/lib/roken/ |
H A D | seteuid.c | 43 seteuid(uid_t euid) argument 46 return setreuid(-1, euid); 50 return setresuid(-1, euid, -1);
|
/freebsd-current/cddl/contrib/opensolaris/cmd/dtrace/test/tst/common/scripting/ |
H A D | tst.euid.d | 42 printf("The euid is %d\n", $euid);
|
H A D | tst.euid.ksh | 32 # To verify euid of current process 54 /\$euid != \$1/ 60 /\$euid == \$1/
|
/freebsd-current/crypto/openssh/openbsd-compat/ |
H A D | bsd-getpeereid.c | 28 getpeereid(int s, uid_t *euid, gid_t *gid) argument 35 *euid = cred.uid; 47 getpeereid(int s, uid_t *euid, gid_t *gid) argument 53 if ((*euid = ucred_geteuid(ucred)) == -1) 64 getpeereid(int s, uid_t *euid, gid_t *gid) argument 66 *euid = geteuid();
|
H A D | bsd-setres_id.c | 64 setresuid(uid_t ruid, uid_t euid, uid_t suid) argument 73 if (setreuid(ruid, euid) < 0) { 82 if (seteuid(euid) < 0) { 84 error("seteuid %lu: %.100s", (u_long)euid, strerror(errno));
|
/freebsd-current/contrib/openpam/lib/libpam/ |
H A D | openpam_cred.h | 44 uid_t euid; member in struct:pam_saved_cred
|
H A D | openpam_restore_cred.c | 73 if (scred->euid != geteuid()) { 74 if (seteuid(scred->euid) < 0 ||
|
H A D | openpam_borrow_cred.c | 75 openpam_log(PAM_LOG_LIBDEBUG, "called with non-zero euid: %d", 82 scred->euid = geteuid();
|
/freebsd-current/tests/sys/kern/ |
H A D | unix_stream.c | 57 uid_t real_euid, euid; local 65 ATF_REQUIRE_EQ(0, getpeereid(sv[0], &euid, &egid)); 66 ATF_CHECK_EQ(real_euid, euid); 69 ATF_REQUIRE_EQ(0, getpeereid(sv[1], &euid, &egid)); 70 ATF_CHECK_EQ(real_euid, euid);
|
/freebsd-current/lib/libc/gen/ |
H A D | getpeereid.c | 40 getpeereid(int s, uid_t *euid, gid_t *egid) argument 54 *euid = xuc.cr_uid;
|
/freebsd-current/contrib/atf/atf-c/detail/ |
H A D | user_test.c | 43 ATF_TC(euid); variable 44 ATF_TC_HEAD(euid, tc) 48 ATF_TC_BODY(euid, tc) 140 ATF_TP_ADD_TC(tp, euid);
|
/freebsd-current/sys/security/mac/ |
H A D | mac_cred.c | 228 mac_cred_check_seteuid(struct ucred *cred, uid_t euid) argument 232 MAC_POLICY_CHECK_NOSLEEP(cred_check_seteuid, cred, euid); 233 MAC_CHECK_PROBE2(cred_check_seteuid, error, cred, euid); 282 mac_cred_check_setreuid(struct ucred *cred, uid_t ruid, uid_t euid) argument 286 MAC_POLICY_CHECK_NOSLEEP(cred_check_setreuid, cred, ruid, euid); 287 MAC_CHECK_PROBE3(cred_check_setreuid, error, cred, ruid, euid); 310 mac_cred_check_setresuid(struct ucred *cred, uid_t ruid, uid_t euid, argument 315 MAC_POLICY_CHECK_NOSLEEP(cred_check_setresuid, cred, ruid, euid, suid); 316 MAC_CHECK_PROBE4(cred_check_setresuid, error, cred, ruid, euid,
|
/freebsd-current/cddl/usr.sbin/dtrace/tests/common/scripting/ |
H A D | Makefile | 23 tst.euid.d \ 24 tst.euid.ksh \
|
/freebsd-current/usr.sbin/lpr/lprm/ |
H A D | lprm.c | 67 uid_t uid, euid; /* real and effective user id's */ variable 84 euid = geteuid();
|
/freebsd-current/contrib/openbsm/sys/bsm/ |
H A D | audit_record.h | 242 token_t *au_to_process(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 244 token_t *au_to_process32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 246 token_t *au_to_process64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 248 token_t *au_to_process_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 250 token_t *au_to_process32_ex(au_id_t auid, uid_t euid, gid_t egid, 253 token_t *au_to_process64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 265 token_t *au_to_subject(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 267 token_t *au_to_subject32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 269 token_t *au_to_subject64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 271 token_t *au_to_subject_ex(au_id_t auid, uid_t euid, gid_ [all...] |
/freebsd-current/sys/bsm/ |
H A D | audit_record.h | 247 token_t *au_to_process(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 249 token_t *au_to_process32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 251 token_t *au_to_process64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 253 token_t *au_to_process_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 255 token_t *au_to_process32_ex(au_id_t auid, uid_t euid, gid_t egid, 258 token_t *au_to_process64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 271 token_t *au_to_subject(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 273 token_t *au_to_subject32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 275 token_t *au_to_subject64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 277 token_t *au_to_subject_ex(au_id_t auid, uid_t euid, gid_ [all...] |
/freebsd-current/contrib/openbsm/bin/auditdistd/ |
H A D | sandbox.c | 71 uid_t ruid, euid; local 192 PJDLOG_VERIFY(getresuid(&ruid, &euid, &suid) == 0); 196 euid = geteuid(); 199 PJDLOG_VERIFY(euid == pw->pw_uid);
|
/freebsd-current/tools/regression/sockets/unix_cmsg/ |
H A D | t_peercred.c | 60 if (xucred->cr_uid != uc_cfg.proc_cred.euid) { 62 (u_long)xucred->cr_uid, (u_long)uc_cfg.proc_cred.euid);
|
H A D | uc_common.h | 48 uid_t euid; member in struct:uc_cfg::__anon6339
|
/freebsd-current/sys/kern/ |
H A D | kern_prot.c | 474 * compatible. It says that setting the uid/gid to euid/egid is a special 525 * 1: We determine if the euid is going to change, and do EPERM 526 * right away. We unconditionally change the euid later if this 530 * 3: Change euid last. (after tests in #2 for "appropriate privs") 544 * Do we have "appropriate privileges" (are we root or uid == euid) 576 * In all permitted cases, we are changing the euid. 605 uid_t euid; member in struct:seteuid_args 614 uid_t euid; local 618 euid = uap->euid; 885 uid_t euid; member in struct:setreuid_args 894 uid_t euid, ruid; local 1024 uid_t euid; member in struct:setresuid_args 1034 uid_t euid, ruid, suid; local 1178 uid_t *euid; member in struct:getresuid_args [all...] |
/freebsd-current/usr.sbin/chown/ |
H A D | chown.c | 249 static uid_t euid = -1; local 256 euid == (uid_t)-1 && (euid = geteuid()) != 0)) { 263 euid == (uid_t)-1 && (euid = geteuid()) != 0) {
|
/freebsd-current/contrib/openbsm/libbsm/ |
H A D | bsm_token.c | 748 au_to_process32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument 760 ADD_U_INT32(dptr, euid); 780 au_to_process64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument 793 ADD_U_INT32(dptr, euid); 813 au_to_process(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument 817 return (au_to_process32(auid, euid, egid, ruid, rgid, pid, sid, 836 au_to_process32_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, argument 857 ADD_U_INT32(dptr, euid); 876 au_to_process64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, argument 899 ADD_U_INT32(dptr, euid); 918 au_to_process_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument 1159 au_to_subject32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument 1184 au_to_subject64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument 1210 au_to_subject(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument 1233 au_to_subject32_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument 1271 au_to_subject64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument 1311 au_to_subject_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument [all...] |
/freebsd-current/sys/security/audit/ |
H A D | bsm_token.c | 666 au_to_process32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument 676 ADD_U_INT32(dptr, euid); 696 au_to_process64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument 707 ADD_U_INT32(dptr, euid); 727 au_to_process(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument 731 return (au_to_process32(auid, euid, egid, ruid, rgid, pid, sid, 750 au_to_process32_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, argument 767 ADD_U_INT32(dptr, euid); 786 au_to_process64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, argument 806 ADD_U_INT32(dptr, euid); 825 au_to_process_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument 1095 au_to_subject32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument 1118 au_to_subject64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument 1142 au_to_subject(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument 1165 au_to_subject32_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument 1200 au_to_subject64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument 1237 au_to_subject_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument [all...] |
/freebsd-current/usr.sbin/lpr/lpq/ |
H A D | lpq.c | 63 uid_t uid, euid; variable 77 euid = geteuid();
|
/freebsd-current/contrib/openbsm/bsm/ |
H A D | libbsm.h | 461 u_int32_t euid; member in struct:__anon5855 472 u_int32_t euid; member in struct:__anon5856 496 u_int32_t euid; member in struct:__anon5857 507 u_int32_t euid; member in struct:__anon5858 611 u_int32_t euid; member in struct:__anon5867 622 u_int32_t euid; member in struct:__anon5868 646 u_int32_t euid; member in struct:__anon5869 657 u_int32_t euid; member in struct:__anon5870 1098 * @param euid - The subject's effective user ID. 1118 uid_t euid, gid_ [all...] |