Home
last modified time | relevance | path

Searched refs:uid (Results 1 - 25 of 455) sorted by relevance

12345678910>>...19

/third_party/node/test/async-hooks/
H A Dinit-hooks.js154 _getActivity(uid, hook) {
155 const h = this._activities.get(uid);
161 const stub = { uid, type: 'Unknown', handleIsObject: true, handle: {} };
162 this._activities.set(uid, stub);
176 _init(uid, type, triggerAsyncId, handle) {
178 uid,
187 this._activities.set(uid, activity);
188 this._maybeLog(uid, type, 'init');
189 this.oninit(uid, type, triggerAsyncId, handle);
192 _before(uid) {
[all...]
/third_party/pulseaudio/src/daemon/
H A Dcaps.c49 uid_t uid; in pa_drop_root() local
53 uid = getuid(); in pa_drop_root()
57 pa_assert_se(setresuid(uid, uid, uid) >= 0); in pa_drop_root()
60 pa_assert_se(setreuid(uid, uid) >= 0); in pa_drop_root()
63 pa_assert_se(setuid(uid) >= 0); in pa_drop_root()
64 pa_assert_se(seteuid(uid) >= 0); in pa_drop_root()
69 pa_assert_se(getuid() == uid); in pa_drop_root()
[all...]
/third_party/mbedtls/library/
H A Dpsa_its_file.c62 static void psa_its_fill_filename(psa_storage_uid_t uid, char *filename) in psa_its_fill_filename() argument
69 (unsigned) (uid >> 32), in psa_its_fill_filename()
70 (unsigned) (uid & 0xffffffff), in psa_its_fill_filename()
74 static psa_status_t psa_its_read_file(psa_storage_uid_t uid, in psa_its_read_file() argument
83 psa_its_fill_filename(uid, filename); in psa_its_read_file()
107 psa_status_t psa_its_get_info(psa_storage_uid_t uid, in psa_its_get_info() argument
112 status = psa_its_read_file(uid, p_info, &stream); in psa_its_get_info()
119 psa_status_t psa_its_get(psa_storage_uid_t uid, in psa_its_get() argument
130 status = psa_its_read_file(uid, &info, &stream); in psa_its_get()
175 psa_status_t psa_its_set(psa_storage_uid_t uid, in psa_its_set() argument
238 psa_its_remove(psa_storage_uid_t uid) psa_its_remove() argument
[all...]
H A Dpsa_crypto_se.c121 psa_storage_uid_t *uid) in psa_get_se_driver_its_file_uid()
133 *uid = PSA_CRYPTO_SE_DRIVER_ITS_UID_BASE + driver->location; in psa_get_se_driver_its_file_uid()
141 psa_storage_uid_t uid; in psa_load_se_persistent_data() local
144 status = psa_get_se_driver_its_file_uid(driver, &uid); in psa_load_se_persistent_data()
156 return psa_its_get(uid, 0, in psa_load_se_persistent_data()
166 psa_storage_uid_t uid; in psa_save_se_persistent_data() local
168 status = psa_get_se_driver_its_file_uid(driver, &uid); in psa_save_se_persistent_data()
176 return psa_its_set(uid, in psa_save_se_persistent_data()
184 psa_storage_uid_t uid; in psa_destroy_se_persistent_data() local
188 uid in psa_destroy_se_persistent_data()
119 psa_get_se_driver_its_file_uid( const psa_se_drv_table_entry_t *driver, psa_storage_uid_t *uid) psa_get_se_driver_its_file_uid() argument
[all...]
/third_party/ltp/testcases/kernel/syscalls/geteuid/
H A Dgeteuid02.c19 long uid[4]; in verify_geteuid() local
27 &uid[0], &uid[1], &uid[2], &uid[3]); in verify_geteuid()
29 TST_EXP_EXPR(TST_RET == uid[1], in verify_geteuid()
31 TST_RET, uid[1]); in verify_geteuid()
/third_party/ltp/testcases/kernel/syscalls/ipc/msgctl/
H A Dmsgctl01.c21 static uid_t uid; variable
84 if (buf.msg_perm.uid == uid) { in verify_msgctl()
85 tst_res(TPASS, "msg_perm.uid = %u", (unsigned)uid); in verify_msgctl()
87 tst_res(TFAIL, "msg_perm.uid = %u, expected %u", in verify_msgctl()
88 (unsigned)buf.msg_perm.uid, (unsigned)uid); in verify_msgctl()
98 if (buf.msg_perm.cuid == uid) { in verify_msgctl()
99 tst_res(TPASS, "msg_perm.cuid = %u", (unsigned)uid); in verify_msgctl()
[all...]
/third_party/toybox/toys/pending/
H A Dipcs.c63 "uid=%d\tgid=%d\tcuid=%d\tcgid=%d\tmode=%#o\n", in show_msg_id()
64 TT.id, ipcperm.uid, ipcperm.gid, ipcperm.cuid, ipcperm.cgid,ipcperm.mode); in show_msg_id()
90 "uid=%d\t gid=%d\t cuid=%d\t cgid=%d\n" in show_sem_id()
95 ipcperm.uid, ipcperm.gid, ipcperm.cuid, ipcperm.cgid, in show_sem_id()
131 "uid=%d\tgid=%d\tcuid=%d\tcgid=%d\n" in show_shm_id()
135 ipcperm.uid, ipcperm.gid, ipcperm.cuid, ipcperm.cgid, in show_shm_id()
200 "shmid", "perms", "cuid", "cgid", "uid", "gid"); in shm_array()
211 if ((pw = getpwuid(buf.shm_perm.uid))) in shm_array()
213 else printf("%-10d %-10.10d", shmid, buf.shm_perm.uid); in shm_array()
221 if ((pw = getpwuid(buf.shm_perm.uid))) in shm_array()
[all...]
H A Duseradd.c37 long uid;
82 if (TT.uid > INT_MAX) error_exit("bad uid"); in useradd_main()
83 if (getpwuid(TT.uid)) error_exit("uid '%ld' in use", TT.uid); in useradd_main()
85 if (toys.optflags & FLAG_S) TT.uid = CFG_TOYBOX_UID_SYS; in useradd_main()
86 else TT.uid = CFG_TOYBOX_UID_USR; in useradd_main()
87 //find unused uid in useradd_main()
88 while (getpwuid(TT.uid)) T in useradd_main()
[all...]
/third_party/node/deps/openssl/openssl/crypto/ffc/
H A Dffc_dh.c32 # define RFC5114(name, uid, sz, tag) { \
33 name, uid, \
44 # define RFC5114(name, uid, sz, tag) { name, uid }
50 int uid; member
81 * The uid can be any unique identifier.
101 const DH_NAMED_GROUP *ossl_ffc_uid_to_dh_named_group(int uid) in ossl_ffc_uid_to_dh_named_group() argument
106 if (dh_named_groups[i].uid == uid) in ossl_ffc_uid_to_dh_named_group()
135 return group->uid; in ossl_ffc_named_group_get_uid()
[all...]
/third_party/openssl/crypto/ffc/
H A Dffc_dh.c32 # define RFC5114(name, uid, sz, tag) { \
33 name, uid, \
44 # define RFC5114(name, uid, sz, tag) { name, uid }
50 int uid; member
81 * The uid can be any unique identifier.
101 const DH_NAMED_GROUP *ossl_ffc_uid_to_dh_named_group(int uid) in ossl_ffc_uid_to_dh_named_group() argument
106 if (dh_named_groups[i].uid == uid) in ossl_ffc_uid_to_dh_named_group()
135 return group->uid; in ossl_ffc_named_group_get_uid()
[all...]
/third_party/ltp/testcases/kernel/syscalls/add_key/
H A Dadd_key03.c48 uid_t uid = 1; in do_test() local
63 while (getpwuid(uid)) in do_test()
64 uid++; in do_test()
66 sprintf(description, "_uid.%u", uid); in do_test()
68 sprintf(description, "_uid_ses.%u", uid); in do_test()
71 SAFE_SETUID(uid); in do_test()
/third_party/ltp/testcases/kernel/syscalls/getuid/
H A Dgetuid03.c18 long uid; in verify_getuid() local
25 SAFE_FILE_LINES_SCANF("/proc/self/status", "Uid: %ld", &uid); in verify_getuid()
27 if (TST_RET != uid) { in verify_getuid()
30 TST_RET, uid); in verify_getuid()
33 "getuid() ret == /proc/self/status Uid: %ld", uid); in verify_getuid()
/third_party/ltp/testcases/kernel/syscalls/setuid/
H A Dsetuid01.c10 * Verify that setuid(2) returns 0 and effective uid has
22 uid_t uid; in verify_setuid() local
24 uid = getuid(); in verify_setuid()
25 UID16_CHECK(uid, setuid); in verify_setuid()
27 TST_EXP_PASS(SETUID(uid), "setuid(%d)", uid); in verify_setuid() local
H A Dsetuid04.c57 uid_t uid; in setup() local
60 uid = pw->pw_uid; in setup()
62 UID16_CHECK(uid, setuid); in setup()
66 if (SETUID(uid) == -1) { in setup()
68 "setuid() failed to set the effective uid to %d", uid); in setup()
/third_party/ntfs-3g/libntfs-3g/
H A Dsecurity.c1134 static BOOL staticgroupmember(struct SECURITY_CONTEXT *scx, uid_t uid, gid_t gid) in staticgroupmember() argument
1142 if (uid) { in staticgroupmember()
1144 while (user && ((uid_t)user->xid != uid)) in staticgroupmember()
1167 static BOOL groupmember(struct SECURITY_CONTEXT *scx, uid_t uid, gid_t gid) in groupmember() argument
1193 ismember = staticgroupmember(scx, uid, gid); in groupmember()
1254 static BOOL groupmember(struct SECURITY_CONTEXT *scx, uid_t uid, gid_t gid) in groupmember() argument
1270 ismember = staticgroupmember(scx, uid, gid); in groupmember()
1384 * - from uid, gid and perm to securid (CACHED_SECURID)
1385 * - from a securid to uid, gid and perm (CACHED_PERMISSIONS)
1496 return ((cached->uid ! in compare()
1573 enter_cache(struct SECURITY_CONTEXT *scx, ntfs_inode *ni, uid_t uid, gid_t gid, struct POSIX_SECURITY *pxdesc) enter_cache() argument
1928 access_check_posix(struct SECURITY_CONTEXT *scx, struct POSIX_SECURITY *pxdesc, mode_t request, uid_t uid, gid_t gid) access_check_posix() argument
2076 uid_t uid; ntfs_get_perm() local
2178 uid_t uid; ntfs_get_posix_acl() local
2310 uid_t uid; ntfs_get_perm() local
2564 uid_t uid; inherit_posix() local
2647 ntfs_alloc_securid(struct SECURITY_CONTEXT *scx, uid_t uid, gid_t gid, ntfs_inode *dir_ni, mode_t mode, BOOL isdir) ntfs_alloc_securid() argument
2729 ntfs_set_inherited_posix(struct SECURITY_CONTEXT *scx, ntfs_inode *ni, uid_t uid, gid_t gid, ntfs_inode *dir_ni, mode_t mode) ntfs_set_inherited_posix() argument
2792 ntfs_alloc_securid(struct SECURITY_CONTEXT *scx, uid_t uid, gid_t gid, mode_t mode, BOOL isdir) ntfs_alloc_securid() argument
2870 ntfs_set_owner_mode(struct SECURITY_CONTEXT *scx, ntfs_inode *ni, uid_t uid, gid_t gid, mode_t mode, struct POSIX_SECURITY *pxdesc) ntfs_set_owner_mode() argument
3013 uid_t uid; ntfs_allowed_as_owner() local
3084 uid_t uid; ntfs_set_posix_acl() local
3260 uid_t uid; ntfs_set_mode() local
3628 ntfs_set_owner(struct SECURITY_CONTEXT *scx, ntfs_inode *ni, uid_t uid, gid_t gid) ntfs_set_owner() argument
3752 ntfs_set_ownmod(struct SECURITY_CONTEXT *scx, ntfs_inode *ni, uid_t uid, gid_t gid, const mode_t mode) ntfs_set_ownmod() argument
4169 ntfs_do_default_mapping(struct SECURITY_CONTEXT *scx, uid_t uid, gid_t gid, const SID *usid) ntfs_do_default_mapping() argument
5226 ntfs_get_usid(struct SECURITY_API *scapi, uid_t uid, char *buf) ntfs_get_usid() argument
5279 int uid; ntfs_get_user() local
[all...]
/third_party/ltp/testcases/kernel/syscalls/utils/
H A Dcompat_tst_16.h57 #define UID16_CHECK(uid, sys_name) ({ \
58 if (!UID_SIZE_CHECK(uid)) { \
60 "uid %d of %s is too large for testing 16-bit " \
61 "version of %s()", uid, #uid, #sys_name); \
82 int SETUID(UID_T uid) in SETUID() argument
84 TST_CREATE_SYSCALL(setuid, uid); in SETUID()
112 int SETFSUID(UID_T uid) in SETFSUID() argument
114 TST_CREATE_SYSCALL(setfsuid, uid); in SETFSUID()
/third_party/musl/libc-test/src/functionalext/supplement/stat/
H A Dfstatat.c41 uid_t uid = getuid(); in fstatat_0100() local
42 EXPECT_EQ("fstatat_0100", st.st_uid, uid); in fstatat_0100()
68 uid_t uid = getuid(); in fstatat_0200() local
69 EXPECT_EQ("fstatat_0200", st.st_uid, uid); in fstatat_0200()
97 uid_t uid = getuid(); in fstatat_0300() local
98 EXPECT_EQ("fstatat_0300", st.st_uid, uid); in fstatat_0300()
120 uid_t uid = getuid(); in fstatat_time64_0100() local
121 EXPECT_EQ("fstatat_0100", st.st_uid, uid); in fstatat_time64_0100()
/third_party/ltp/testcases/kernel/syscalls/chown/
H A Dchown05.c12 * specified by path to any numeric owner(uid)/group(gid) values when invoked
25 uid_t uid; member
39 uid_t expect_uid = tc[i].uid == (uid_t)-1 ? tc[i - 1].uid : tc[i].uid; in run()
42 TST_EXP_PASS(CHOWN(TESTFILE, tc[i].uid, tc[i].gid), "chown(%s, %d, %d), %s", in run()
43 TESTFILE, tc[i].uid, tc[i].gid, tc[i].desc); in run()
H A Dchown02.c38 uid_t uid; in run() local
41 UID16_CHECK((uid = geteuid()), "chown"); in run()
46 TST_EXP_PASS(CHOWN(tc[i].filename, uid, gid), "chown(%s, %d, %d)", in run()
47 tc[i].filename, uid, gid); in run() local
52 if (stat_buf.st_uid != uid || stat_buf.st_gid != gid) { in run()
53 tst_res(TFAIL, "%s: owner set to (uid=%d, gid=%d), expected (uid=%d, gid=%d)", in run()
54 tc[i].filename, stat_buf.st_uid, stat_buf.st_gid, uid, gid); in run()
/third_party/ltp/testcases/kernel/syscalls/fchown/
H A Dfchown05.c12 * specified by file descriptor to any numeric owner(uid)/group(gid) values
27 uid_t uid; member
41 uid_t expect_uid = tc[i].uid == (uid_t)-1 ? tc[i - 1].uid : tc[i].uid; in run()
44 TST_EXP_PASS(FCHOWN(fd, tc[i].uid, tc[i].gid), "fchown(%i, %i, %i), %s", in run()
45 fd, tc[i].uid, tc[i].gid, tc[i].desc); in run()
/third_party/ltp/testcases/open_posix_testsuite/conformance/interfaces/sigqueue/
H A D9-1.c41 uid_t uid; in reset_uid() local
46 /* Search for an unused uid */ in reset_uid()
47 for (uid = 0; uid < MAX_ATTEMPTS; uid++) { in reset_uid()
48 if (!getpwuid(uid) && !setuid(uid)) in reset_uid()
52 printf("Failed: No unused uid's in %d attempts\n", MAX_ATTEMPTS); in reset_uid()
/third_party/musl/libc-test/src/functionalext/supplement/unistd/
H A Dsetreuid.c37 uid_t uid = getuid(); in setreuid_0100() local
39 if ((uid != sruid) || (euid != seuid)) { in setreuid_0100()
40 t_error("%s failed: uid = %d\n", __func__, uid); in setreuid_0100()
67 uid_t uid = getuid(); in setreuid_0200() local
69 if ((uid != sruid) || (euid != seuid)) { in setreuid_0200()
70 t_error("%s failed: uid = %d\n", __func__, uid); in setreuid_0200()
/third_party/node/lib/internal/process/
H A Dpromises.js154 uid: ++lastPromiseId,
169 const { uid } = promiseInfo;
173 `asynchronously (rejection id: ${uid})`);
175 warning.id = uid;
186 function emitUnhandledRejectionWarning(uid, reason) {
195 `(rejection id: ${uid})`,
238 const { reason, uid, emit } = promiseInfo;
270 if (!handled) emitUnhandledRejectionWarning(uid, reason);
279 emitUnhandledRejectionWarning(uid, reason);
296 emitUnhandledRejectionWarning(uid, reaso
[all...]
/third_party/ltp/include/lapi/
H A Dipcbuf.h27 __kernel_uid_t uid; member
57 __kernel_uid_t uid; member
85 __kernel_uid32_t uid; member
117 __kernel_uid32_t uid; member
148 __kernel_uid32_t uid; member
178 __kernel_uid32_t uid; member
/third_party/libuv/test/
H A Dtest-get-passwd.c71 ASSERT_EQ(pwd.uid, (unsigned)-1); in TEST_IMPL()
74 ASSERT_NE(pwd.uid, (unsigned)-1); in TEST_IMPL()
76 ASSERT_EQ(pwd.uid, geteuid()); in TEST_IMPL()
77 if (pwd.uid != 0 && pwd.gid != getgid()) in TEST_IMPL()
119 r = uv_os_get_passwd2(&pwd2, pwd.uid); in TEST_IMPL()
127 ASSERT_EQ(pwd.uid, pwd2.uid); in TEST_IMPL()
139 // uid 0 is qsecofr on IBM i in TEST_IMPL()
159 r = uv_os_get_passwd2(NULL, pwd.uid); in TEST_IMPL()

Completed in 14 milliseconds

12345678910>>...19