Lines Matching defs:euid

853  * compatible.  It says that setting the uid/gid to euid/egid is a special
904 * 1: We determine if the euid is going to change, and do EPERM
905 * right away. We unconditionally change the euid later if this
909 * 3: Change euid last. (after tests in #2 for "appropriate privs")
923 * Do we have "appropriate privileges" (are we root or uid == euid)
955 * In all permitted cases, we are changing the euid.
987 uid_t euid;
996 uid_t euid;
1000 euid = uap->euid;
1001 AUDIT_ARG_EUID(euid);
1003 euip = uifind(euid);
1011 error = mac_cred_check_seteuid(oldcred, euid);
1016 if (euid != oldcred->cr_ruid && /* allow seteuid(getuid()) */
1017 euid != oldcred->cr_svuid && /* allow seteuid(saved uid) */
1024 if (oldcred->cr_uid != euid) {
1293 uid_t euid;
1302 uid_t euid, ruid;
1306 euid = uap->euid;
1308 AUDIT_ARG_EUID(euid);
1311 euip = uifind(euid);
1317 error = mac_cred_check_setreuid(oldcred, ruid, euid);
1324 (euid != (uid_t)-1 && euid != oldcred->cr_uid &&
1325 euid != oldcred->cr_ruid && euid != oldcred->cr_svuid)) &&
1329 if (euid != (uid_t)-1 && oldcred->cr_uid != euid) {
1426 * setresuid(ruid, euid, suid) is like setreuid except control over the saved
1432 uid_t euid;
1442 uid_t euid, ruid, suid;
1446 euid = uap->euid;
1449 AUDIT_ARG_EUID(euid);
1453 euip = uifind(euid);
1459 error = mac_cred_check_setresuid(oldcred, ruid, euid, suid);
1467 (euid != (uid_t)-1 && euid != oldcred->cr_ruid &&
1468 euid != oldcred->cr_svuid &&
1469 euid != oldcred->cr_uid) ||
1476 if (euid != (uid_t)-1 && oldcred->cr_uid != euid) {
1586 uid_t *euid;
1601 if (uap->euid)
1603 uap->euid, sizeof(cred->cr_uid));
2031 * subject credential's ruid or euid.
2198 * effective uid? This includes p's euid, svuid, and ruid.