gid_t oldgid = GID_INVALID;
int r;
- if (gid != GID_INVALID) {
+ if (gid_is_valid(gid)) {
oldgid = getgid();
r = setegid(gid);
return -errno;
}
- if (uid != UID_INVALID) {
+ if (uid_is_valid(uid)) {
olduid = getuid();
r = seteuid(uid);
/* If we fail to restore the uid or gid, things will likely
fail later on. This should only happen if an LSM interferes. */
- if (uid != UID_INVALID)
+ if (uid_is_valid(uid))
(void) seteuid(olduid);
restore_gid:
- if (gid != GID_INVALID)
+ if (gid_is_valid(gid))
(void) setegid(oldgid);
return r;
if (!(c->mask & SD_BUS_CREDS_AUDIT_LOGIN_UID))
return -ENODATA;
- if (c->audit_login_uid == UID_INVALID)
+ if (!uid_is_valid(c->audit_login_uid))
return -ENXIO;
*uid = c->audit_login_uid;
assert(message);
assert(ret);
- if (uid == UID_INVALID) {
+ if (!uid_is_valid(uid)) {
_cleanup_(sd_bus_creds_unrefp) sd_bus_creds *creds = NULL;
/* Note that we get the owner UID of the session, not the actual client UID here! */
if (r < 0)
return r;
- if (uid == UID_INVALID) {
+ if (!uid_is_valid(uid)) {
_cleanup_(sd_bus_creds_unrefp) sd_bus_creds *creds = NULL;
/* Note that we get the owner UID of the session, not the actual client UID here! */