Searched refs:seteuid (Results 1 - 25 of 90) sorted by relevance

1234

/macosx-10.10.1/system_cmds-643.1.1/at.tproj/
H A Dprivs.h78 if (seteuid(real_uid)<0) perr("cannot seteuid"); \
87 if (seteuid(real_uid)<0) perr("cannot seteuid"); \
91 if (seteuid(0)<0) perr("cannot regain privs"); \
93 if (seteuid(effective_uid)<0) perr("cannot reset uid"); \
97 if (seteuid(0)<0) perr("cannot regain privs"); \
99 if (seteuid(real_uid)<0) perr("cannot reset uid"); \
/macosx-10.10.1/Heimdal-398.1.2/lib/roken/
H A Dseteuid.c43 seteuid(uid_t euid) function
H A Diruserok.c250 if (seteuid(pwd->pw_uid) < 0)
253 seteuid(uid);
/macosx-10.10.1/ruby-106/ruby/nacl/
H A Dunistd.h5 int seteuid(pid_t pid);
/macosx-10.10.1/postfix-255/postfix/src/util/
H A Dset_eugid.c28 /* seteuid(2), setegid(2), setgroups(2)
59 if (seteuid(0))
60 msg_fatal("set_eugid: seteuid(0): %m");
65 if (euid != 0 && seteuid(euid) < 0)
66 msg_fatal("set_eugid: seteuid(%ld): %m", (long) euid);
H A Dset_ugid.c50 if (seteuid(0) < 0)
51 msg_fatal("seteuid(0): %m");
/macosx-10.10.1/OpenSSH-189/openssh/
H A Dsshconnect.h63 if (seteuid(original_effective_uid) != 0) \
64 fatal("PRIV_START: seteuid: %s", \
71 if (seteuid(original_real_uid) != 0) \
72 fatal("PRIV_END: seteuid: %s", \
H A Duidswap.c40 /* Lets assume that posix saved ids also work with seteuid, even though that
135 if (seteuid(pw->pw_uid) == -1)
136 fatal("seteuid %u: %.100s", (u_int)pw->pw_uid,
152 (setuid(old_uid) != -1 || seteuid(old_uid) != -1))
180 if (seteuid(saved_euid) < 0)
181 fatal("seteuid %u: %.100s", (u_int)saved_euid, strerror(errno));
258 (setuid(old_uid) != -1 || seteuid(old_uid) != -1))
/macosx-10.10.1/Libc-1044.1.2/compat-43/
H A Dsetreuid.c57 if (euid != -1 && seteuid(euid) < 0)
/macosx-10.10.1/Security-57031.1.35/Security/include/security_codesigning/
H A Dcsutilities.h148 UidGuard(uid_t uid) : mPrevious(-1) { seteuid(uid); }
152 UnixError::check(::seteuid(mPrevious));
155 bool seteuid(uid_t uid) function in class:Security::CodeSigning::UidGuard
161 return ::seteuid(uid) == 0;
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_codesigning/lib/
H A Dcsutilities.h148 UidGuard(uid_t uid) : mPrevious(-1) { seteuid(uid); }
152 UnixError::check(::seteuid(mPrevious));
155 bool seteuid(uid_t uid) function in class:Security::CodeSigning::UidGuard
161 return ::seteuid(uid) == 0;
/macosx-10.10.1/misc_cmds-33/calendar/
H A Dcalendar.c132 (void)seteuid(pw->pw_uid);
135 (void)seteuid(0);
/macosx-10.10.1/tcl-105/tcl_ext/expect/expect/
H A Dpty_unicos.c196 * 'setreuid'. This allows using 'seteuid' to go back and forth from
215 if (seteuid(0) == -1) { /* we need to be root! */
216 expDiagLog("exp_getptymaster: seteuid root errno=%d\n",
252 if (seteuid(realuid) == -1) { /* back to who we are! */
253 expDiagLog("exp_getptymaster: seteuid user errno=%d\n",
267 if (seteuid(realuid) == -1) { /* back to who we are! */
268 expDiagLog("exp_getptymaster: seteuid user errno=%d\n",errno);
319 if (seteuid(0) == -1) { /* Need to be root */
334 if (seteuid(realuid) == -1)
335 expDiagLog("setptyutmp: seteuid use
[all...]
/macosx-10.10.1/OpenPAM-20/openpam/lib/
H A Dopenpam_restore_cred.c71 if (seteuid(scred->euid) < 0 ||
92 * >seteuid 2
H A Dopenpam_borrow_cred.c95 setegid(pwd->pw_gid) < 0 || seteuid(pwd->pw_uid) < 0) {
119 * >seteuid 2
/macosx-10.10.1/OpenSSH-189/openssh/openbsd-compat/
H A Dbsd-misc.h43 int seteuid(uid_t);
H A Dbsd-setres_id.c83 if (seteuid(euid) < 0) {
85 error("seteuid %u: %.100s", euid, strerror(errno));
/macosx-10.10.1/smb-759.0/lib/smb/
H A Dremount.c256 error2 = seteuid(remountInfo.mntOwner);
258 smb_log_info("%s: seteuid failed %d for mntOwner", ASL_LEVEL_ERR,
267 error2 = seteuid(rootUID);
269 smb_log_info("%s: seteuid failed %d for rootUID", ASL_LEVEL_ERR,
293 error2 = seteuid(rootUID);
295 smb_log_info("%s: seteuid failed %d for rootUID", ASL_LEVEL_ERR,
306 error2 = seteuid(rootUID);
308 smb_log_info("%s: seteuid failed %d for rootUID", ASL_LEVEL_ERR,
330 error2 = seteuid(remountInfo.mntOwner);
332 smb_log_info("%s: seteuid faile
[all...]
/macosx-10.10.1/sudo-73/src/
H A Dset_perms.c320 * Since we only have setuid() and seteuid() and semantics
324 if (seteuid(ROOT_UID)) {
325 errstr = "seteuid(ROOT_UID)";
343 if (seteuid(user_uid)) {
344 errstr = "seteuid(user_uid)";
362 if (seteuid(runas_pw ? runas_pw->pw_uid : user_uid)) {
391 if ((SUDOERS_MODE & S_IRGRP) && seteuid(1)) {
392 errstr = "seteuid(1)";
396 if (seteuid(SUDOERS_UID)) {
397 errstr = "seteuid(SUDOERS_UI
[all...]
/macosx-10.10.1/cddafs-253/Classes/
H A DTSystemUtils.cpp65 seteuid ( uid );
95 seteuid ( 0 );
/macosx-10.10.1/top-100.1.2/
H A Duserinput_signal.c104 if(-1 == seteuid(getuid())
115 if(-1 == seteuid(euid)
/macosx-10.10.1/cron-39/cron/
H A Dcompat.h38 # define seteuid(e) setresuid(-1,e,-1) macro
/macosx-10.10.1/system_cmds-643.1.1/dynamic_pager.tproj/
H A Ddynamic_pager.c56 seteuid(getuid());
/macosx-10.10.1/system_cmds-643.1.1/newgrp.tproj/
H A Dnewgrp.c69 if (seteuid(euid) < 0) \
70 err(1, "seteuid"); \
73 if (seteuid(getuid()) < 0) \
74 err(1, "seteuid"); \
83 if (seteuid(getuid()) < 0)
84 err(1, "seteuid");
114 if (seteuid(euid) < 0)
115 err(1, "seteuid");
/macosx-10.10.1/uucp-11/uucp/unix/
H A Duid.c33 using saved setuid, so use seteuid instead. */
36 #define setuid seteuid

Completed in 476 milliseconds

1234