getuid 417 lib/popt/popt.c rc = setresuid(getuid(), getuid(),-1); getuid 426 lib/popt/popt.c rc = setuid(getuid()); getuid 429 lib/popt/popt.c rc = setreuid(getuid(), getuid()); /*hlauer: not portable to hpux9.01 */ getuid 178 lib/popt/poptconfig.c if (getuid() != geteuid()) return 0; getuid 2991 nsswitch/pam_winbind.c if (getuid() == pwd->pw_uid) { getuid 91 source3/client/get_printing_ticket.c if (getuid() != LP_UID && getuid() != 0) { getuid 92 source3/client/get_printing_ticket.c DEBUG_ERROR ("Bad invoking uid %lu\n", (unsigned long)getuid ()); getuid 187 source3/client/mount.cifs.c struct passwd *password = getpwuid(getuid()); getuid 395 source3/client/mount.cifs.c if (getuid()) { getuid 397 source3/client/mount.cifs.c snprintf(user,sizeof(user),"%u",getuid()); getuid 1350 source3/client/mount.cifs.c if((getuid() != 0) && (geteuid() == 0)) { getuid 1351 source3/client/mount.cifs.c if((statbuf.st_uid == getuid()) && (S_IRWXU == (statbuf.st_mode & S_IRWXU))) { getuid 1568 source3/client/mount.cifs.c if(getuid() != 0) { getuid 115 source3/client/umount.cifs.c if(getuid() == 0) getuid 274 source3/lib/afs.c ct.ViceId = getuid(); getuid 240 source3/lib/afs_settoken.c ct.ViceId = getuid(); getuid 1031 source3/lib/debug.c (unsigned int)getuid(), (unsigned int)getgid()); getuid 124 source3/lib/fault.c if (chown(tmp_corepath, getuid(), getgid()) == -1) getuid 169 source3/lib/smbrun.c if (getuid() != uid || geteuid() != uid || getuid 328 source3/lib/smbrun.c if (getuid() != uid || geteuid() != uid || getuid 431 source3/lib/sysquotas.c DEBUG(10,("sys_get_quota() uid(%u, %u)\n", (unsigned)getuid(), (unsigned)geteuid())); getuid 498 source3/lib/sysquotas.c DEBUG(10,("sys_set_quota() uid(%u, %u)\n", (unsigned)getuid(), (unsigned)geteuid())); getuid 134 source3/lib/sysquotas_4A.c id.uid = getuid(); getuid 231 source3/lib/sysquotas_4A.c id.uid = getuid(); getuid 472 source3/lib/sysquotas_linux.c id.uid = getuid(); getuid 526 source3/lib/sysquotas_linux.c id.uid = getuid(); getuid 96 source3/lib/util_sec.c (ruid != (uid_t)-1 && getuid() != ruid)) { getuid 100 source3/lib/util_sec.c (int)getuid(), (int)geteuid())); getuid 118 source3/lib/util_sec.c (int)getuid(), (int)geteuid())); getuid 258 source3/lib/util_sec.c saved_ruid = getuid(); getuid 279 source3/lib/util_sec.c if (getuid() != saved_ruid) getuid 442 source3/lib/util_sec.c if (getuid() != 0) { getuid 465 source3/lib/util_sec.c if (getuid() == 0) { getuid 481 source3/lib/util_sec.c return (geteuid() == (uid_t)0) && (getuid() != (uid_t)0); getuid 87 source3/libsmb/libsmb_stat.c st->st_uid = getuid(); getuid 176 source3/pam_smbpass/pam_smb_passwd.c if (getuid() != 0 && !(flags & PAM_CHANGE_EXPIRED_AUTHTOK)) { getuid 314 source3/pam_smbpass/pam_smb_passwd.c user, uidtoname(getuid()), getuid()); getuid 317 source3/pam_smbpass/pam_smb_passwd.c user, uid, uidtoname(getuid()), getuid()); getuid 377 source3/pam_smbpass/support.c uidtoname(getuid()), service ? service : "**unknown**", name); getuid 433 source3/pam_smbpass/support.c uidtoname(getuid()), getuid 440 source3/pam_smbpass/support.c uidtoname(getuid()), getuid 444 source3/pam_smbpass/support.c newauth->agent = smbpXstrDup( pamh, uidtoname( getuid() ) ); getuid 451 source3/pam_smbpass/support.c uidtoname(getuid()), getuid 457 source3/pam_smbpass/support.c uidtoname(getuid()), getuid 238 source3/printing/tests/vlp.c if (!(pw = getpwuid(getuid()))) { getuid 472 source3/smbd/chgpasswd.c (int)getuid(), (int)getgid(), BOOLSTR(as_root) )); getuid 1069 source3/smbd/server.c (int)getuid(),(int)getgid(),(int)geteuid(),(int)getegid())); getuid 353 source3/smbd/uid.c (int)getuid(),(int)geteuid(),(int)getgid(),(int)getegid())); getuid 368 source3/smbd/uid.c (int)getuid(),(int)geteuid(),(int)getgid(),(int)getegid())); getuid 901 source3/utils/net_groupmap.c if (getuid() != 0) { getuid 1973 source3/utils/net_sam.c if (getuid() != 0) { getuid 98 source3/utils/smbpasswd.c if (getuid() != 0) { getuid 503 source3/utils/smbpasswd.c pwd = getpwuid_alloc(talloc_autofree_context(), getuid()); getuid 508 source3/utils/smbpasswd.c fprintf(stderr, "smbpasswd: cannot lookup user name for uid %u\n", (unsigned int)getuid()); getuid 572 source3/utils/smbpasswd.c if (getuid() == 0) { getuid 308 source3/utils/status.c if (getuid() != geteuid()) { getuid 325 source3/web/cgi.c if (geteuid() != pwd->pw_uid || getuid() != pwd->pw_uid) { getuid 327 source3/web/cgi.c head, user, (int)geteuid(), (int)getuid(), tail); getuid 47 source4/client/mount.cifs.c struct passwd *password = getpwuid(getuid()); getuid 129 source4/client/smbmnt.c if ((getuid() != 0) && getuid 130 source4/client/smbmnt.c ((getuid() != st.st_uid) || getuid 192 source4/client/smbmnt.c if (getuid() != 0) { getuid 197 source4/client/smbmnt.c fprintf(stderr, "smbmnt must be installed suid root for direct user mounts (%d,%d)\n", getuid(), geteuid()); getuid 201 source4/client/smbmnt.c mount_uid = getuid(); getuid 221 source4/client/smbmnt.c data.mounted_uid = getuid(); getuid 56 source4/client/smbumount.c if ((getuid() != 0) getuid 57 source4/client/smbumount.c && (mount_uid != getuid())) { getuid 529 source4/heimdal/lib/hcrypto/rand-fortuna.c uid_t u = getuid(); getuid 339 source4/heimdal/lib/krb5/cache.c asprintf(&append, "%u", (unsigned)getuid()); getuid 69 source4/heimdal/lib/krb5/get_default_principal.c uid = getuid(); getuid 123 source4/heimdal/lib/krb5/v4_glue.c if (asprintf(cc, "%s%u", TKT_ROOT, (unsigned)getuid()) < 0) getuid 49 source4/heimdal/lib/roken/issuid.c if(getuid() != geteuid())