Searched refs:euid (Results 1 - 25 of 91) sorted by relevance

1234

/freebsd-current/crypto/heimdal/lib/roken/
H A Dseteuid.c43 seteuid(uid_t euid) argument
46 return setreuid(-1, euid);
50 return setresuid(-1, euid, -1);
/freebsd-current/cddl/contrib/opensolaris/cmd/dtrace/test/tst/common/scripting/
H A Dtst.euid.d42 printf("The euid is %d\n", $euid);
H A Dtst.euid.ksh32 # To verify euid of current process
54 /\$euid != \$1/
60 /\$euid == \$1/
/freebsd-current/crypto/openssh/openbsd-compat/
H A Dbsd-getpeereid.c28 getpeereid(int s, uid_t *euid, gid_t *gid) argument
35 *euid = cred.uid;
47 getpeereid(int s, uid_t *euid, gid_t *gid) argument
53 if ((*euid = ucred_geteuid(ucred)) == -1)
64 getpeereid(int s, uid_t *euid, gid_t *gid) argument
66 *euid = geteuid();
H A Dbsd-setres_id.c64 setresuid(uid_t ruid, uid_t euid, uid_t suid) argument
73 if (setreuid(ruid, euid) < 0) {
82 if (seteuid(euid) < 0) {
84 error("seteuid %lu: %.100s", (u_long)euid, strerror(errno));
/freebsd-current/contrib/openpam/lib/libpam/
H A Dopenpam_cred.h44 uid_t euid; member in struct:pam_saved_cred
H A Dopenpam_restore_cred.c73 if (scred->euid != geteuid()) {
74 if (seteuid(scred->euid) < 0 ||
H A Dopenpam_borrow_cred.c75 openpam_log(PAM_LOG_LIBDEBUG, "called with non-zero euid: %d",
82 scred->euid = geteuid();
/freebsd-current/tests/sys/kern/
H A Dunix_stream.c57 uid_t real_euid, euid; local
65 ATF_REQUIRE_EQ(0, getpeereid(sv[0], &euid, &egid));
66 ATF_CHECK_EQ(real_euid, euid);
69 ATF_REQUIRE_EQ(0, getpeereid(sv[1], &euid, &egid));
70 ATF_CHECK_EQ(real_euid, euid);
/freebsd-current/lib/libc/gen/
H A Dgetpeereid.c40 getpeereid(int s, uid_t *euid, gid_t *egid) argument
54 *euid = xuc.cr_uid;
/freebsd-current/contrib/atf/atf-c/detail/
H A Duser_test.c43 ATF_TC(euid); variable
44 ATF_TC_HEAD(euid, tc)
48 ATF_TC_BODY(euid, tc)
140 ATF_TP_ADD_TC(tp, euid);
/freebsd-current/sys/security/mac/
H A Dmac_cred.c228 mac_cred_check_seteuid(struct ucred *cred, uid_t euid) argument
232 MAC_POLICY_CHECK_NOSLEEP(cred_check_seteuid, cred, euid);
233 MAC_CHECK_PROBE2(cred_check_seteuid, error, cred, euid);
282 mac_cred_check_setreuid(struct ucred *cred, uid_t ruid, uid_t euid) argument
286 MAC_POLICY_CHECK_NOSLEEP(cred_check_setreuid, cred, ruid, euid);
287 MAC_CHECK_PROBE3(cred_check_setreuid, error, cred, ruid, euid);
310 mac_cred_check_setresuid(struct ucred *cred, uid_t ruid, uid_t euid, argument
315 MAC_POLICY_CHECK_NOSLEEP(cred_check_setresuid, cred, ruid, euid, suid);
316 MAC_CHECK_PROBE4(cred_check_setresuid, error, cred, ruid, euid,
/freebsd-current/cddl/usr.sbin/dtrace/tests/common/scripting/
H A DMakefile23 tst.euid.d \
24 tst.euid.ksh \
/freebsd-current/usr.sbin/lpr/lprm/
H A Dlprm.c67 uid_t uid, euid; /* real and effective user id's */ variable
84 euid = geteuid();
/freebsd-current/contrib/openbsm/sys/bsm/
H A Daudit_record.h242 token_t *au_to_process(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid,
244 token_t *au_to_process32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid,
246 token_t *au_to_process64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid,
248 token_t *au_to_process_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid,
250 token_t *au_to_process32_ex(au_id_t auid, uid_t euid, gid_t egid,
253 token_t *au_to_process64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid,
265 token_t *au_to_subject(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid,
267 token_t *au_to_subject32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid,
269 token_t *au_to_subject64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid,
271 token_t *au_to_subject_ex(au_id_t auid, uid_t euid, gid_
[all...]
/freebsd-current/sys/bsm/
H A Daudit_record.h247 token_t *au_to_process(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid,
249 token_t *au_to_process32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid,
251 token_t *au_to_process64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid,
253 token_t *au_to_process_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid,
255 token_t *au_to_process32_ex(au_id_t auid, uid_t euid, gid_t egid,
258 token_t *au_to_process64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid,
271 token_t *au_to_subject(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid,
273 token_t *au_to_subject32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid,
275 token_t *au_to_subject64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid,
277 token_t *au_to_subject_ex(au_id_t auid, uid_t euid, gid_
[all...]
/freebsd-current/contrib/openbsm/bin/auditdistd/
H A Dsandbox.c71 uid_t ruid, euid; local
192 PJDLOG_VERIFY(getresuid(&ruid, &euid, &suid) == 0);
196 euid = geteuid();
199 PJDLOG_VERIFY(euid == pw->pw_uid);
/freebsd-current/tools/regression/sockets/unix_cmsg/
H A Dt_peercred.c60 if (xucred->cr_uid != uc_cfg.proc_cred.euid) {
62 (u_long)xucred->cr_uid, (u_long)uc_cfg.proc_cred.euid);
H A Duc_common.h48 uid_t euid; member in struct:uc_cfg::__anon6339
/freebsd-current/sys/kern/
H A Dkern_prot.c474 * compatible. It says that setting the uid/gid to euid/egid is a special
525 * 1: We determine if the euid is going to change, and do EPERM
526 * right away. We unconditionally change the euid later if this
530 * 3: Change euid last. (after tests in #2 for "appropriate privs")
544 * Do we have "appropriate privileges" (are we root or uid == euid)
576 * In all permitted cases, we are changing the euid.
605 uid_t euid; member in struct:seteuid_args
614 uid_t euid; local
618 euid = uap->euid;
885 uid_t euid; member in struct:setreuid_args
894 uid_t euid, ruid; local
1024 uid_t euid; member in struct:setresuid_args
1034 uid_t euid, ruid, suid; local
1178 uid_t *euid; member in struct:getresuid_args
[all...]
/freebsd-current/usr.sbin/chown/
H A Dchown.c249 static uid_t euid = -1; local
256 euid == (uid_t)-1 && (euid = geteuid()) != 0)) {
263 euid == (uid_t)-1 && (euid = geteuid()) != 0) {
/freebsd-current/contrib/openbsm/libbsm/
H A Dbsm_token.c748 au_to_process32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument
760 ADD_U_INT32(dptr, euid);
780 au_to_process64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument
793 ADD_U_INT32(dptr, euid);
813 au_to_process(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument
817 return (au_to_process32(auid, euid, egid, ruid, rgid, pid, sid,
836 au_to_process32_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, argument
857 ADD_U_INT32(dptr, euid);
876 au_to_process64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, argument
899 ADD_U_INT32(dptr, euid);
918 au_to_process_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument
1159 au_to_subject32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument
1184 au_to_subject64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument
1210 au_to_subject(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument
1233 au_to_subject32_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument
1271 au_to_subject64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument
1311 au_to_subject_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument
[all...]
/freebsd-current/sys/security/audit/
H A Dbsm_token.c666 au_to_process32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument
676 ADD_U_INT32(dptr, euid);
696 au_to_process64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument
707 ADD_U_INT32(dptr, euid);
727 au_to_process(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument
731 return (au_to_process32(auid, euid, egid, ruid, rgid, pid, sid,
750 au_to_process32_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, argument
767 ADD_U_INT32(dptr, euid);
786 au_to_process64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, argument
806 ADD_U_INT32(dptr, euid);
825 au_to_process_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument
1095 au_to_subject32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument
1118 au_to_subject64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument
1142 au_to_subject(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument
1165 au_to_subject32_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument
1200 au_to_subject64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument
1237 au_to_subject_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument
[all...]
/freebsd-current/usr.sbin/lpr/lpq/
H A Dlpq.c63 uid_t uid, euid; variable
77 euid = geteuid();
/freebsd-current/contrib/openbsm/bsm/
H A Dlibbsm.h461 u_int32_t euid; member in struct:__anon5855
472 u_int32_t euid; member in struct:__anon5856
496 u_int32_t euid; member in struct:__anon5857
507 u_int32_t euid; member in struct:__anon5858
611 u_int32_t euid; member in struct:__anon5867
622 u_int32_t euid; member in struct:__anon5868
646 u_int32_t euid; member in struct:__anon5869
657 u_int32_t euid; member in struct:__anon5870
1098 * @param euid - The subject's effective user ID.
1118 uid_t euid, gid_
[all...]

Completed in 164 milliseconds

1234