/third_party/node/test/async-hooks/ |
H A D | init-hooks.js | 154 _getActivity(uid, hook) { 155 const h = this._activities.get(uid); 161 const stub = { uid, type: 'Unknown', handleIsObject: true, handle: {} }; 162 this._activities.set(uid, stub); 176 _init(uid, type, triggerAsyncId, handle) { 178 uid, 187 this._activities.set(uid, activity); 188 this._maybeLog(uid, type, 'init'); 189 this.oninit(uid, type, triggerAsyncId, handle); 192 _before(uid) { [all...] |
/third_party/pulseaudio/src/daemon/ |
H A D | caps.c | 49 uid_t uid; in pa_drop_root() local 53 uid = getuid(); in pa_drop_root() 57 pa_assert_se(setresuid(uid, uid, uid) >= 0); in pa_drop_root() 60 pa_assert_se(setreuid(uid, uid) >= 0); in pa_drop_root() 63 pa_assert_se(setuid(uid) >= 0); in pa_drop_root() 64 pa_assert_se(seteuid(uid) >= 0); in pa_drop_root() 69 pa_assert_se(getuid() == uid); in pa_drop_root() [all...] |
/third_party/mbedtls/library/ |
H A D | psa_its_file.c | 62 static void psa_its_fill_filename(psa_storage_uid_t uid, char *filename) in psa_its_fill_filename() argument 69 (unsigned) (uid >> 32), in psa_its_fill_filename() 70 (unsigned) (uid & 0xffffffff), in psa_its_fill_filename() 74 static psa_status_t psa_its_read_file(psa_storage_uid_t uid, in psa_its_read_file() argument 83 psa_its_fill_filename(uid, filename); in psa_its_read_file() 107 psa_status_t psa_its_get_info(psa_storage_uid_t uid, in psa_its_get_info() argument 112 status = psa_its_read_file(uid, p_info, &stream); in psa_its_get_info() 119 psa_status_t psa_its_get(psa_storage_uid_t uid, in psa_its_get() argument 130 status = psa_its_read_file(uid, &info, &stream); in psa_its_get() 175 psa_status_t psa_its_set(psa_storage_uid_t uid, in psa_its_set() argument 238 psa_its_remove(psa_storage_uid_t uid) psa_its_remove() argument [all...] |
H A D | psa_crypto_se.c | 121 psa_storage_uid_t *uid) in psa_get_se_driver_its_file_uid() 133 *uid = PSA_CRYPTO_SE_DRIVER_ITS_UID_BASE + driver->location; in psa_get_se_driver_its_file_uid() 141 psa_storage_uid_t uid; in psa_load_se_persistent_data() local 144 status = psa_get_se_driver_its_file_uid(driver, &uid); in psa_load_se_persistent_data() 156 return psa_its_get(uid, 0, in psa_load_se_persistent_data() 166 psa_storage_uid_t uid; in psa_save_se_persistent_data() local 168 status = psa_get_se_driver_its_file_uid(driver, &uid); in psa_save_se_persistent_data() 176 return psa_its_set(uid, in psa_save_se_persistent_data() 184 psa_storage_uid_t uid; in psa_destroy_se_persistent_data() local 188 uid in psa_destroy_se_persistent_data() 119 psa_get_se_driver_its_file_uid( const psa_se_drv_table_entry_t *driver, psa_storage_uid_t *uid) psa_get_se_driver_its_file_uid() argument [all...] |
/third_party/ltp/testcases/kernel/syscalls/geteuid/ |
H A D | geteuid02.c | 19 long uid[4]; in verify_geteuid() local 27 &uid[0], &uid[1], &uid[2], &uid[3]); in verify_geteuid() 29 TST_EXP_EXPR(TST_RET == uid[1], in verify_geteuid() 31 TST_RET, uid[1]); in verify_geteuid()
|
/third_party/ltp/testcases/kernel/syscalls/ipc/msgctl/ |
H A D | msgctl01.c | 21 static uid_t uid; variable 84 if (buf.msg_perm.uid == uid) { in verify_msgctl() 85 tst_res(TPASS, "msg_perm.uid = %u", (unsigned)uid); in verify_msgctl() 87 tst_res(TFAIL, "msg_perm.uid = %u, expected %u", in verify_msgctl() 88 (unsigned)buf.msg_perm.uid, (unsigned)uid); in verify_msgctl() 98 if (buf.msg_perm.cuid == uid) { in verify_msgctl() 99 tst_res(TPASS, "msg_perm.cuid = %u", (unsigned)uid); in verify_msgctl() [all...] |
/third_party/toybox/toys/pending/ |
H A D | ipcs.c | 63 "uid=%d\tgid=%d\tcuid=%d\tcgid=%d\tmode=%#o\n", in show_msg_id() 64 TT.id, ipcperm.uid, ipcperm.gid, ipcperm.cuid, ipcperm.cgid,ipcperm.mode); in show_msg_id() 90 "uid=%d\t gid=%d\t cuid=%d\t cgid=%d\n" in show_sem_id() 95 ipcperm.uid, ipcperm.gid, ipcperm.cuid, ipcperm.cgid, in show_sem_id() 131 "uid=%d\tgid=%d\tcuid=%d\tcgid=%d\n" in show_shm_id() 135 ipcperm.uid, ipcperm.gid, ipcperm.cuid, ipcperm.cgid, in show_shm_id() 200 "shmid", "perms", "cuid", "cgid", "uid", "gid"); in shm_array() 211 if ((pw = getpwuid(buf.shm_perm.uid))) in shm_array() 213 else printf("%-10d %-10.10d", shmid, buf.shm_perm.uid); in shm_array() 221 if ((pw = getpwuid(buf.shm_perm.uid))) in shm_array() [all...] |
H A D | useradd.c | 37 long uid; 82 if (TT.uid > INT_MAX) error_exit("bad uid"); in useradd_main() 83 if (getpwuid(TT.uid)) error_exit("uid '%ld' in use", TT.uid); in useradd_main() 85 if (toys.optflags & FLAG_S) TT.uid = CFG_TOYBOX_UID_SYS; in useradd_main() 86 else TT.uid = CFG_TOYBOX_UID_USR; in useradd_main() 87 //find unused uid in useradd_main() 88 while (getpwuid(TT.uid)) T in useradd_main() [all...] |
/third_party/node/deps/openssl/openssl/crypto/ffc/ |
H A D | ffc_dh.c | 32 # define RFC5114(name, uid, sz, tag) { \ 33 name, uid, \ 44 # define RFC5114(name, uid, sz, tag) { name, uid } 50 int uid; member 81 * The uid can be any unique identifier. 101 const DH_NAMED_GROUP *ossl_ffc_uid_to_dh_named_group(int uid) in ossl_ffc_uid_to_dh_named_group() argument 106 if (dh_named_groups[i].uid == uid) in ossl_ffc_uid_to_dh_named_group() 135 return group->uid; in ossl_ffc_named_group_get_uid() [all...] |
/third_party/openssl/crypto/ffc/ |
H A D | ffc_dh.c | 32 # define RFC5114(name, uid, sz, tag) { \ 33 name, uid, \ 44 # define RFC5114(name, uid, sz, tag) { name, uid } 50 int uid; member 81 * The uid can be any unique identifier. 101 const DH_NAMED_GROUP *ossl_ffc_uid_to_dh_named_group(int uid) in ossl_ffc_uid_to_dh_named_group() argument 106 if (dh_named_groups[i].uid == uid) in ossl_ffc_uid_to_dh_named_group() 135 return group->uid; in ossl_ffc_named_group_get_uid() [all...] |
/third_party/ltp/testcases/kernel/syscalls/add_key/ |
H A D | add_key03.c | 48 uid_t uid = 1; in do_test() local 63 while (getpwuid(uid)) in do_test() 64 uid++; in do_test() 66 sprintf(description, "_uid.%u", uid); in do_test() 68 sprintf(description, "_uid_ses.%u", uid); in do_test() 71 SAFE_SETUID(uid); in do_test()
|
/third_party/ltp/testcases/kernel/syscalls/getuid/ |
H A D | getuid03.c | 18 long uid; in verify_getuid() local 25 SAFE_FILE_LINES_SCANF("/proc/self/status", "Uid: %ld", &uid); in verify_getuid() 27 if (TST_RET != uid) { in verify_getuid() 30 TST_RET, uid); in verify_getuid() 33 "getuid() ret == /proc/self/status Uid: %ld", uid); in verify_getuid()
|
/third_party/ltp/testcases/kernel/syscalls/setuid/ |
H A D | setuid01.c | 10 * Verify that setuid(2) returns 0 and effective uid has 22 uid_t uid; in verify_setuid() local 24 uid = getuid(); in verify_setuid() 25 UID16_CHECK(uid, setuid); in verify_setuid() 27 TST_EXP_PASS(SETUID(uid), "setuid(%d)", uid); in verify_setuid() local
|
H A D | setuid04.c | 57 uid_t uid; in setup() local 60 uid = pw->pw_uid; in setup() 62 UID16_CHECK(uid, setuid); in setup() 66 if (SETUID(uid) == -1) { in setup() 68 "setuid() failed to set the effective uid to %d", uid); in setup()
|
/third_party/ntfs-3g/libntfs-3g/ |
H A D | security.c | 1134 static BOOL staticgroupmember(struct SECURITY_CONTEXT *scx, uid_t uid, gid_t gid) in staticgroupmember() argument 1142 if (uid) { in staticgroupmember() 1144 while (user && ((uid_t)user->xid != uid)) in staticgroupmember() 1167 static BOOL groupmember(struct SECURITY_CONTEXT *scx, uid_t uid, gid_t gid) in groupmember() argument 1193 ismember = staticgroupmember(scx, uid, gid); in groupmember() 1254 static BOOL groupmember(struct SECURITY_CONTEXT *scx, uid_t uid, gid_t gid) in groupmember() argument 1270 ismember = staticgroupmember(scx, uid, gid); in groupmember() 1384 * - from uid, gid and perm to securid (CACHED_SECURID) 1385 * - from a securid to uid, gid and perm (CACHED_PERMISSIONS) 1496 return ((cached->uid ! in compare() 1573 enter_cache(struct SECURITY_CONTEXT *scx, ntfs_inode *ni, uid_t uid, gid_t gid, struct POSIX_SECURITY *pxdesc) enter_cache() argument 1928 access_check_posix(struct SECURITY_CONTEXT *scx, struct POSIX_SECURITY *pxdesc, mode_t request, uid_t uid, gid_t gid) access_check_posix() argument 2076 uid_t uid; ntfs_get_perm() local 2178 uid_t uid; ntfs_get_posix_acl() local 2310 uid_t uid; ntfs_get_perm() local 2564 uid_t uid; inherit_posix() local 2647 ntfs_alloc_securid(struct SECURITY_CONTEXT *scx, uid_t uid, gid_t gid, ntfs_inode *dir_ni, mode_t mode, BOOL isdir) ntfs_alloc_securid() argument 2729 ntfs_set_inherited_posix(struct SECURITY_CONTEXT *scx, ntfs_inode *ni, uid_t uid, gid_t gid, ntfs_inode *dir_ni, mode_t mode) ntfs_set_inherited_posix() argument 2792 ntfs_alloc_securid(struct SECURITY_CONTEXT *scx, uid_t uid, gid_t gid, mode_t mode, BOOL isdir) ntfs_alloc_securid() argument 2870 ntfs_set_owner_mode(struct SECURITY_CONTEXT *scx, ntfs_inode *ni, uid_t uid, gid_t gid, mode_t mode, struct POSIX_SECURITY *pxdesc) ntfs_set_owner_mode() argument 3013 uid_t uid; ntfs_allowed_as_owner() local 3084 uid_t uid; ntfs_set_posix_acl() local 3260 uid_t uid; ntfs_set_mode() local 3628 ntfs_set_owner(struct SECURITY_CONTEXT *scx, ntfs_inode *ni, uid_t uid, gid_t gid) ntfs_set_owner() argument 3752 ntfs_set_ownmod(struct SECURITY_CONTEXT *scx, ntfs_inode *ni, uid_t uid, gid_t gid, const mode_t mode) ntfs_set_ownmod() argument 4169 ntfs_do_default_mapping(struct SECURITY_CONTEXT *scx, uid_t uid, gid_t gid, const SID *usid) ntfs_do_default_mapping() argument 5226 ntfs_get_usid(struct SECURITY_API *scapi, uid_t uid, char *buf) ntfs_get_usid() argument 5279 int uid; ntfs_get_user() local [all...] |
/third_party/ltp/testcases/kernel/syscalls/utils/ |
H A D | compat_tst_16.h | 57 #define UID16_CHECK(uid, sys_name) ({ \ 58 if (!UID_SIZE_CHECK(uid)) { \ 60 "uid %d of %s is too large for testing 16-bit " \ 61 "version of %s()", uid, #uid, #sys_name); \ 82 int SETUID(UID_T uid) in SETUID() argument 84 TST_CREATE_SYSCALL(setuid, uid); in SETUID() 112 int SETFSUID(UID_T uid) in SETFSUID() argument 114 TST_CREATE_SYSCALL(setfsuid, uid); in SETFSUID()
|
/third_party/musl/libc-test/src/functionalext/supplement/stat/ |
H A D | fstatat.c | 41 uid_t uid = getuid(); in fstatat_0100() local 42 EXPECT_EQ("fstatat_0100", st.st_uid, uid); in fstatat_0100() 68 uid_t uid = getuid(); in fstatat_0200() local 69 EXPECT_EQ("fstatat_0200", st.st_uid, uid); in fstatat_0200() 97 uid_t uid = getuid(); in fstatat_0300() local 98 EXPECT_EQ("fstatat_0300", st.st_uid, uid); in fstatat_0300() 120 uid_t uid = getuid(); in fstatat_time64_0100() local 121 EXPECT_EQ("fstatat_0100", st.st_uid, uid); in fstatat_time64_0100()
|
/third_party/ltp/testcases/kernel/syscalls/chown/ |
H A D | chown05.c | 12 * specified by path to any numeric owner(uid)/group(gid) values when invoked 25 uid_t uid; member 39 uid_t expect_uid = tc[i].uid == (uid_t)-1 ? tc[i - 1].uid : tc[i].uid; in run() 42 TST_EXP_PASS(CHOWN(TESTFILE, tc[i].uid, tc[i].gid), "chown(%s, %d, %d), %s", in run() 43 TESTFILE, tc[i].uid, tc[i].gid, tc[i].desc); in run()
|
H A D | chown02.c | 38 uid_t uid; in run() local 41 UID16_CHECK((uid = geteuid()), "chown"); in run() 46 TST_EXP_PASS(CHOWN(tc[i].filename, uid, gid), "chown(%s, %d, %d)", in run() 47 tc[i].filename, uid, gid); in run() local 52 if (stat_buf.st_uid != uid || stat_buf.st_gid != gid) { in run() 53 tst_res(TFAIL, "%s: owner set to (uid=%d, gid=%d), expected (uid=%d, gid=%d)", in run() 54 tc[i].filename, stat_buf.st_uid, stat_buf.st_gid, uid, gid); in run()
|
/third_party/ltp/testcases/kernel/syscalls/fchown/ |
H A D | fchown05.c | 12 * specified by file descriptor to any numeric owner(uid)/group(gid) values 27 uid_t uid; member 41 uid_t expect_uid = tc[i].uid == (uid_t)-1 ? tc[i - 1].uid : tc[i].uid; in run() 44 TST_EXP_PASS(FCHOWN(fd, tc[i].uid, tc[i].gid), "fchown(%i, %i, %i), %s", in run() 45 fd, tc[i].uid, tc[i].gid, tc[i].desc); in run()
|
/third_party/ltp/testcases/open_posix_testsuite/conformance/interfaces/sigqueue/ |
H A D | 9-1.c | 41 uid_t uid; in reset_uid() local 46 /* Search for an unused uid */ in reset_uid() 47 for (uid = 0; uid < MAX_ATTEMPTS; uid++) { in reset_uid() 48 if (!getpwuid(uid) && !setuid(uid)) in reset_uid() 52 printf("Failed: No unused uid's in %d attempts\n", MAX_ATTEMPTS); in reset_uid()
|
/third_party/musl/libc-test/src/functionalext/supplement/unistd/ |
H A D | setreuid.c | 37 uid_t uid = getuid(); in setreuid_0100() local 39 if ((uid != sruid) || (euid != seuid)) { in setreuid_0100() 40 t_error("%s failed: uid = %d\n", __func__, uid); in setreuid_0100() 67 uid_t uid = getuid(); in setreuid_0200() local 69 if ((uid != sruid) || (euid != seuid)) { in setreuid_0200() 70 t_error("%s failed: uid = %d\n", __func__, uid); in setreuid_0200()
|
/third_party/node/lib/internal/process/ |
H A D | promises.js | 154 uid: ++lastPromiseId, 169 const { uid } = promiseInfo; 173 `asynchronously (rejection id: ${uid})`); 175 warning.id = uid; 186 function emitUnhandledRejectionWarning(uid, reason) { 195 `(rejection id: ${uid})`, 238 const { reason, uid, emit } = promiseInfo; 270 if (!handled) emitUnhandledRejectionWarning(uid, reason); 279 emitUnhandledRejectionWarning(uid, reason); 296 emitUnhandledRejectionWarning(uid, reaso [all...] |
/third_party/ltp/include/lapi/ |
H A D | ipcbuf.h | 27 __kernel_uid_t uid; member 57 __kernel_uid_t uid; member 85 __kernel_uid32_t uid; member 117 __kernel_uid32_t uid; member 148 __kernel_uid32_t uid; member 178 __kernel_uid32_t uid; member
|
/third_party/libuv/test/ |
H A D | test-get-passwd.c | 71 ASSERT_EQ(pwd.uid, (unsigned)-1); in TEST_IMPL() 74 ASSERT_NE(pwd.uid, (unsigned)-1); in TEST_IMPL() 76 ASSERT_EQ(pwd.uid, geteuid()); in TEST_IMPL() 77 if (pwd.uid != 0 && pwd.gid != getgid()) in TEST_IMPL() 119 r = uv_os_get_passwd2(&pwd2, pwd.uid); in TEST_IMPL() 127 ASSERT_EQ(pwd.uid, pwd2.uid); in TEST_IMPL() 139 // uid 0 is qsecofr on IBM i in TEST_IMPL() 159 r = uv_os_get_passwd2(NULL, pwd.uid); in TEST_IMPL()
|