getuid 417 lib/popt/popt.c rc = setresuid(getuid(), getuid(),-1);
getuid 426 lib/popt/popt.c rc = setuid(getuid());
getuid 429 lib/popt/popt.c rc = setreuid(getuid(), getuid()); /*hlauer: not portable to hpux9.01 */
getuid 178 lib/popt/poptconfig.c if (getuid() != geteuid()) return 0;
getuid 2991 nsswitch/pam_winbind.c if (getuid() == pwd->pw_uid) {
getuid 91 source3/client/get_printing_ticket.c if (getuid() != LP_UID && getuid() != 0) {
getuid 92 source3/client/get_printing_ticket.c DEBUG_ERROR ("Bad invoking uid %lu\n", (unsigned long)getuid ());
getuid 187 source3/client/mount.cifs.c struct passwd *password = getpwuid(getuid());
getuid 395 source3/client/mount.cifs.c if (getuid()) {
getuid 397 source3/client/mount.cifs.c snprintf(user,sizeof(user),"%u",getuid());
getuid 1350 source3/client/mount.cifs.c if((getuid() != 0) && (geteuid() == 0)) {
getuid 1351 source3/client/mount.cifs.c if((statbuf.st_uid == getuid()) && (S_IRWXU == (statbuf.st_mode & S_IRWXU))) {
getuid 1568 source3/client/mount.cifs.c if(getuid() != 0) {
getuid 115 source3/client/umount.cifs.c if(getuid() == 0)
getuid 274 source3/lib/afs.c ct.ViceId = getuid();
getuid 240 source3/lib/afs_settoken.c ct.ViceId = getuid();
getuid 1031 source3/lib/debug.c (unsigned int)getuid(), (unsigned int)getgid());
getuid 124 source3/lib/fault.c if (chown(tmp_corepath, getuid(), getgid()) == -1)
getuid 169 source3/lib/smbrun.c if (getuid() != uid || geteuid() != uid ||
getuid 328 source3/lib/smbrun.c if (getuid() != uid || geteuid() != uid ||
getuid 431 source3/lib/sysquotas.c DEBUG(10,("sys_get_quota() uid(%u, %u)\n", (unsigned)getuid(), (unsigned)geteuid()));
getuid 498 source3/lib/sysquotas.c DEBUG(10,("sys_set_quota() uid(%u, %u)\n", (unsigned)getuid(), (unsigned)geteuid()));
getuid 134 source3/lib/sysquotas_4A.c id.uid = getuid();
getuid 231 source3/lib/sysquotas_4A.c id.uid = getuid();
getuid 472 source3/lib/sysquotas_linux.c id.uid = getuid();
getuid 526 source3/lib/sysquotas_linux.c id.uid = getuid();
getuid 96 source3/lib/util_sec.c (ruid != (uid_t)-1 && getuid() != ruid)) {
getuid 100 source3/lib/util_sec.c (int)getuid(), (int)geteuid()));
getuid 118 source3/lib/util_sec.c (int)getuid(), (int)geteuid()));
getuid 258 source3/lib/util_sec.c saved_ruid = getuid();
getuid 279 source3/lib/util_sec.c if (getuid() != saved_ruid)
getuid 442 source3/lib/util_sec.c if (getuid() != 0) {
getuid 465 source3/lib/util_sec.c if (getuid() == 0) {
getuid 481 source3/lib/util_sec.c return (geteuid() == (uid_t)0) && (getuid() != (uid_t)0);
getuid 87 source3/libsmb/libsmb_stat.c st->st_uid = getuid();
getuid 176 source3/pam_smbpass/pam_smb_passwd.c if (getuid() != 0 && !(flags & PAM_CHANGE_EXPIRED_AUTHTOK)) {
getuid 314 source3/pam_smbpass/pam_smb_passwd.c user, uidtoname(getuid()), getuid());
getuid 317 source3/pam_smbpass/pam_smb_passwd.c user, uid, uidtoname(getuid()), getuid());
getuid 377 source3/pam_smbpass/support.c uidtoname(getuid()), service ? service : "**unknown**", name);
getuid 433 source3/pam_smbpass/support.c uidtoname(getuid()),
getuid 440 source3/pam_smbpass/support.c uidtoname(getuid()),
getuid 444 source3/pam_smbpass/support.c newauth->agent = smbpXstrDup( pamh, uidtoname( getuid() ) );
getuid 451 source3/pam_smbpass/support.c uidtoname(getuid()),
getuid 457 source3/pam_smbpass/support.c uidtoname(getuid()),
getuid 238 source3/printing/tests/vlp.c if (!(pw = getpwuid(getuid()))) {
getuid 472 source3/smbd/chgpasswd.c (int)getuid(), (int)getgid(), BOOLSTR(as_root) ));
getuid 1069 source3/smbd/server.c (int)getuid(),(int)getgid(),(int)geteuid(),(int)getegid()));
getuid 353 source3/smbd/uid.c (int)getuid(),(int)geteuid(),(int)getgid(),(int)getegid()));
getuid 368 source3/smbd/uid.c (int)getuid(),(int)geteuid(),(int)getgid(),(int)getegid()));
getuid 901 source3/utils/net_groupmap.c if (getuid() != 0) {
getuid 1973 source3/utils/net_sam.c if (getuid() != 0) {
getuid 98 source3/utils/smbpasswd.c if (getuid() != 0) {
getuid 503 source3/utils/smbpasswd.c pwd = getpwuid_alloc(talloc_autofree_context(), getuid());
getuid 508 source3/utils/smbpasswd.c fprintf(stderr, "smbpasswd: cannot lookup user name for uid %u\n", (unsigned int)getuid());
getuid 572 source3/utils/smbpasswd.c if (getuid() == 0) {
getuid 308 source3/utils/status.c if (getuid() != geteuid()) {
getuid 325 source3/web/cgi.c if (geteuid() != pwd->pw_uid || getuid() != pwd->pw_uid) {
getuid 327 source3/web/cgi.c head, user, (int)geteuid(), (int)getuid(), tail);
getuid 47 source4/client/mount.cifs.c struct passwd *password = getpwuid(getuid());
getuid 129 source4/client/smbmnt.c if ((getuid() != 0) &&
getuid 130 source4/client/smbmnt.c ((getuid() != st.st_uid) ||
getuid 192 source4/client/smbmnt.c if (getuid() != 0) {
getuid 197 source4/client/smbmnt.c fprintf(stderr, "smbmnt must be installed suid root for direct user mounts (%d,%d)\n", getuid(), geteuid());
getuid 201 source4/client/smbmnt.c mount_uid = getuid();
getuid 221 source4/client/smbmnt.c data.mounted_uid = getuid();
getuid 56 source4/client/smbumount.c if ((getuid() != 0)
getuid 57 source4/client/smbumount.c && (mount_uid != getuid())) {
getuid 529 source4/heimdal/lib/hcrypto/rand-fortuna.c uid_t u = getuid();
getuid 339 source4/heimdal/lib/krb5/cache.c asprintf(&append, "%u", (unsigned)getuid());
getuid 69 source4/heimdal/lib/krb5/get_default_principal.c uid = getuid();
getuid 123 source4/heimdal/lib/krb5/v4_glue.c if (asprintf(cc, "%s%u", TKT_ROOT, (unsigned)getuid()) < 0)
getuid 49 source4/heimdal/lib/roken/issuid.c if(getuid() != geteuid())