2 .\" Copyright (c) 2001 Dima Dorfman.
3 .\" All rights reserved.
5 .\" Redistribution and use in source and binary forms, with or without
6 .\" modification, are permitted provided that the following conditions
8 .\" 1. Redistributions of source code must retain the above copyright
9 .\" notice, this list of conditions and the following disclaimer.
10 .\" 2. Redistributions in binary form must reproduce the above copyright
11 .\" notice, this list of conditions and the following disclaimer in the
12 .\" documentation and/or other materials provided with the distribution.
14 .\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
15 .\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
16 .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
17 .\" ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
18 .\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
19 .\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
20 .\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
21 .\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
22 .\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
23 .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
26 .\" $FreeBSD: src/lib/libc/gen/getpeereid.3,v 1.6 2002/12/18 10:13:54 ru Exp $
28 .\" $NetBSD: getpeereid.3,v 1.2 2008/01/29 13:55:27 abs Exp $
35 .Nd get the effective credentials of a UNIX-domain peer
42 .Fn getpeereid "int s" "uid_t *euid" "gid_t *egid"
46 function returns the effective user and group IDs of the
60 has been called, or one returned from
67 If non-NULL, the effective used ID is placed in
69 and the effective group ID in
72 The credentials returned to the
74 caller are those of its peer at the time it called
76 the credentials returned to the
78 caller are those of its peer at the time it called
80 This mechanism is reliable; there is no way for either side to influence
81 the credentials returned to its peer except by calling the appropriate
82 system call (i.e., either
86 under different effective credentials.
88 One common use of this routine is for a
91 to verify the credentials of its client.
92 Likewise, the client can verify the credentials of the server.
93 .Sh IMPLEMENTATION NOTES
97 is implemented in terms of the
112 is not a valid descriptor.
116 is a file, not a socket.
120 does not refer to a socket on which
122 have been called nor one returned from
127 does not refer to a socket of type
129 or the kernel returned invalid data.