/macosx-10.10.1/system_cmds-643.1.1/at.tproj/ |
H A D | privs.h | 78 if (seteuid(real_uid)<0) perr("cannot seteuid"); \ 87 if (seteuid(real_uid)<0) perr("cannot seteuid"); \ 91 if (seteuid(0)<0) perr("cannot regain privs"); \ 93 if (seteuid(effective_uid)<0) perr("cannot reset uid"); \ 97 if (seteuid(0)<0) perr("cannot regain privs"); \ 99 if (seteuid(real_uid)<0) perr("cannot reset uid"); \
|
/macosx-10.10.1/Heimdal-398.1.2/lib/roken/ |
H A D | seteuid.c | 43 seteuid(uid_t euid) function
|
H A D | iruserok.c | 250 if (seteuid(pwd->pw_uid) < 0) 253 seteuid(uid);
|
/macosx-10.10.1/ruby-106/ruby/nacl/ |
H A D | unistd.h | 5 int seteuid(pid_t pid);
|
/macosx-10.10.1/postfix-255/postfix/src/util/ |
H A D | set_eugid.c | 28 /* seteuid(2), setegid(2), setgroups(2) 59 if (seteuid(0)) 60 msg_fatal("set_eugid: seteuid(0): %m"); 65 if (euid != 0 && seteuid(euid) < 0) 66 msg_fatal("set_eugid: seteuid(%ld): %m", (long) euid);
|
H A D | set_ugid.c | 50 if (seteuid(0) < 0) 51 msg_fatal("seteuid(0): %m");
|
/macosx-10.10.1/OpenSSH-189/openssh/ |
H A D | sshconnect.h | 63 if (seteuid(original_effective_uid) != 0) \ 64 fatal("PRIV_START: seteuid: %s", \ 71 if (seteuid(original_real_uid) != 0) \ 72 fatal("PRIV_END: seteuid: %s", \
|
H A D | uidswap.c | 40 /* Lets assume that posix saved ids also work with seteuid, even though that 135 if (seteuid(pw->pw_uid) == -1) 136 fatal("seteuid %u: %.100s", (u_int)pw->pw_uid, 152 (setuid(old_uid) != -1 || seteuid(old_uid) != -1)) 180 if (seteuid(saved_euid) < 0) 181 fatal("seteuid %u: %.100s", (u_int)saved_euid, strerror(errno)); 258 (setuid(old_uid) != -1 || seteuid(old_uid) != -1))
|
/macosx-10.10.1/Libc-1044.1.2/compat-43/ |
H A D | setreuid.c | 57 if (euid != -1 && seteuid(euid) < 0)
|
/macosx-10.10.1/Security-57031.1.35/Security/include/security_codesigning/ |
H A D | csutilities.h | 148 UidGuard(uid_t uid) : mPrevious(-1) { seteuid(uid); } 152 UnixError::check(::seteuid(mPrevious)); 155 bool seteuid(uid_t uid) function in class:Security::CodeSigning::UidGuard 161 return ::seteuid(uid) == 0;
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_codesigning/lib/ |
H A D | csutilities.h | 148 UidGuard(uid_t uid) : mPrevious(-1) { seteuid(uid); } 152 UnixError::check(::seteuid(mPrevious)); 155 bool seteuid(uid_t uid) function in class:Security::CodeSigning::UidGuard 161 return ::seteuid(uid) == 0;
|
/macosx-10.10.1/misc_cmds-33/calendar/ |
H A D | calendar.c | 132 (void)seteuid(pw->pw_uid); 135 (void)seteuid(0);
|
/macosx-10.10.1/tcl-105/tcl_ext/expect/expect/ |
H A D | pty_unicos.c | 196 * 'setreuid'. This allows using 'seteuid' to go back and forth from 215 if (seteuid(0) == -1) { /* we need to be root! */ 216 expDiagLog("exp_getptymaster: seteuid root errno=%d\n", 252 if (seteuid(realuid) == -1) { /* back to who we are! */ 253 expDiagLog("exp_getptymaster: seteuid user errno=%d\n", 267 if (seteuid(realuid) == -1) { /* back to who we are! */ 268 expDiagLog("exp_getptymaster: seteuid user errno=%d\n",errno); 319 if (seteuid(0) == -1) { /* Need to be root */ 334 if (seteuid(realuid) == -1) 335 expDiagLog("setptyutmp: seteuid use [all...] |
/macosx-10.10.1/OpenPAM-20/openpam/lib/ |
H A D | openpam_restore_cred.c | 71 if (seteuid(scred->euid) < 0 || 92 * >seteuid 2
|
H A D | openpam_borrow_cred.c | 95 setegid(pwd->pw_gid) < 0 || seteuid(pwd->pw_uid) < 0) { 119 * >seteuid 2
|
/macosx-10.10.1/OpenSSH-189/openssh/openbsd-compat/ |
H A D | bsd-misc.h | 43 int seteuid(uid_t);
|
H A D | bsd-setres_id.c | 83 if (seteuid(euid) < 0) { 85 error("seteuid %u: %.100s", euid, strerror(errno));
|
/macosx-10.10.1/smb-759.0/lib/smb/ |
H A D | remount.c | 256 error2 = seteuid(remountInfo.mntOwner); 258 smb_log_info("%s: seteuid failed %d for mntOwner", ASL_LEVEL_ERR, 267 error2 = seteuid(rootUID); 269 smb_log_info("%s: seteuid failed %d for rootUID", ASL_LEVEL_ERR, 293 error2 = seteuid(rootUID); 295 smb_log_info("%s: seteuid failed %d for rootUID", ASL_LEVEL_ERR, 306 error2 = seteuid(rootUID); 308 smb_log_info("%s: seteuid failed %d for rootUID", ASL_LEVEL_ERR, 330 error2 = seteuid(remountInfo.mntOwner); 332 smb_log_info("%s: seteuid faile [all...] |
/macosx-10.10.1/sudo-73/src/ |
H A D | set_perms.c | 320 * Since we only have setuid() and seteuid() and semantics 324 if (seteuid(ROOT_UID)) { 325 errstr = "seteuid(ROOT_UID)"; 343 if (seteuid(user_uid)) { 344 errstr = "seteuid(user_uid)"; 362 if (seteuid(runas_pw ? runas_pw->pw_uid : user_uid)) { 391 if ((SUDOERS_MODE & S_IRGRP) && seteuid(1)) { 392 errstr = "seteuid(1)"; 396 if (seteuid(SUDOERS_UID)) { 397 errstr = "seteuid(SUDOERS_UI [all...] |
/macosx-10.10.1/cddafs-253/Classes/ |
H A D | TSystemUtils.cpp | 65 seteuid ( uid ); 95 seteuid ( 0 );
|
/macosx-10.10.1/top-100.1.2/ |
H A D | userinput_signal.c | 104 if(-1 == seteuid(getuid()) 115 if(-1 == seteuid(euid)
|
/macosx-10.10.1/cron-39/cron/ |
H A D | compat.h | 38 # define seteuid(e) setresuid(-1,e,-1) macro
|
/macosx-10.10.1/system_cmds-643.1.1/dynamic_pager.tproj/ |
H A D | dynamic_pager.c | 56 seteuid(getuid());
|
/macosx-10.10.1/system_cmds-643.1.1/newgrp.tproj/ |
H A D | newgrp.c | 69 if (seteuid(euid) < 0) \ 70 err(1, "seteuid"); \ 73 if (seteuid(getuid()) < 0) \ 74 err(1, "seteuid"); \ 83 if (seteuid(getuid()) < 0) 84 err(1, "seteuid"); 114 if (seteuid(euid) < 0) 115 err(1, "seteuid");
|
/macosx-10.10.1/uucp-11/uucp/unix/ |
H A D | uid.c | 33 using saved setuid, so use seteuid instead. */ 36 #define setuid seteuid
|