/external/strace/ |
nsfs.c | 37 unsigned int uid; local 52 if (!umove_or_printaddr(tcp, arg, &uid)) { 53 printuid("[", uid);
|
/external/autotest/tko/ |
query_history.cgi | 8 uid = unique_cookie.unique_id('tko_history') variable 13 condition = "uid='%s'" % uid
|
/external/ltp/testcases/kernel/syscalls/setuid/ |
setuid01.c | 20 * setuid(2) returns a value of 0 and uid has been set successfully 32 uid_t uid; local 34 /* Set the effective user ID to the current real uid */ 35 uid = getuid(); 36 UID16_CHECK(uid, setuid); 38 TEST(SETUID(uid)); 40 tst_res(TFAIL | TTERRNO, "setuid(%d) failed", uid); 42 tst_res(TPASS, "setuid(%d) successfully", uid);
|
setuid03.c | 49 uid_t uid; local 52 uid = pw->pw_uid; 54 if (SETUID(uid) == -1) { 56 "setuid() failed to set the effective uid to %d", uid);
|
setuid04.c | 69 uid_t uid; local 72 uid = pw->pw_uid; 74 UID16_CHECK(uid, setuid); 78 if (SETUID(uid) == -1) { 80 "setuid() failed to set the effective uid to %d", uid);
|
/external/strace/tests/ |
fchownat.c | 43 uid_t uid = geteuid(); local 49 long rc = syscall(__NR_fchownat, AT_FDCWD, sample, uid, gid, 0); 51 sample, uid, gid, sprintrc(rc));
|
qual_signal.c | 38 static uid_t uid; variable 65 name, name, pid, uid); 74 uid = geteuid();
|
/external/strace/tests-m32/ |
fchownat.c | 43 uid_t uid = geteuid(); local 49 long rc = syscall(__NR_fchownat, AT_FDCWD, sample, uid, gid, 0); 51 sample, uid, gid, sprintrc(rc));
|
qual_signal.c | 38 static uid_t uid; variable 65 name, name, pid, uid); 74 uid = geteuid();
|
/external/strace/tests-mx32/ |
fchownat.c | 43 uid_t uid = geteuid(); local 49 long rc = syscall(__NR_fchownat, AT_FDCWD, sample, uid, gid, 0); 51 sample, uid, gid, sprintrc(rc));
|
qual_signal.c | 38 static uid_t uid; variable 65 name, name, pid, uid); 74 uid = geteuid();
|
/external/ltp/testcases/kernel/syscalls/setfsuid/ |
setfsuid01.c | 43 uid_t uid; local 49 uid = geteuid(); 50 UID16_CHECK(uid, setfsuid, cleanup); 56 TEST(SETFSUID(cleanup, uid)); 64 if (TEST_RETURN != uid) { 66 TEST_RETURN, uid);
|
setfsuid02.c | 23 * call to fail on invalid uid. 45 uid_t uid; local 51 uid = 1; 52 while (getpwuid(uid)) 53 uid++; 55 UID16_CHECK(uid, setfsuid, cleanup); 61 TEST(SETFSUID(cleanup, uid)); 69 if (TEST_RETURN == uid) { 71 TEST_RETURN, uid);
|
setfsuid03.c | 48 uid_t uid; local 54 uid = 1; 55 while (!getpwuid(uid)) 56 uid++; 58 UID16_CHECK(uid, setfsuid, cleanup); 64 TEST(SETFSUID(cleanup, uid)); 72 if (TEST_RETURN == uid) { 75 TEST_RETURN, uid); 97 "to set the effective uid to %d", ltpuser->pw_uid);
|
/cts/tests/tests/permission/src/android/permission/cts/ |
AppIdleStatePermissionTest.java | 55 int uid = pm.getApplicationInfo(pkg.packageName, 0).uid; local 56 if (UserHandle.isApp(uid)) {
|
/external/ltp/testcases/kernel/syscalls/add_key/ |
add_key03.c | 21 * "_uid.$UID" (or "_uid_ses.$UID"), and it would become the user keyring (or 22 * user session keyring) for user $UID, provided that it hadn't already been 60 uid_t uid = 1; local 67 * reproducible for a UID which already has its keyrings, so find an 68 * unused UID. Note that it would be better to directly check for the 69 * presence of the UID's keyrings than to search the passwd file. 70 * However, that's not easy to do given that even if we assumed the UID 75 while (getpwuid(uid)) 76 uid++ [all...] |
/external/ltp/testcases/kernel/syscalls/chown/ |
chown01.c | 125 int uid, gid; variable 142 TEST(CHOWN(cleanup, fname, uid, gid)); 146 fname, uid, gid); 149 fname, uid, gid, TEST_RETURN); 167 UID16_CHECK((uid = geteuid()), "chown", cleanup)
|
/external/ltp/testcases/kernel/syscalls/geteuid/ |
geteuid02.c | 36 uid_t uid; local 50 uid = geteuid(); 51 pwent = getpwuid(uid);
|
/external/ltp/testcases/kernel/syscalls/getgid/ |
getgid03.c | 42 uid_t uid; local 58 uid = getuid(); 59 pwent = getpwuid(uid); 63 "unexpected value %d", uid);
|
/external/ltp/testcases/kernel/syscalls/getuid/ |
getuid03.c | 43 uid_t uid; local 58 uid = getuid(); 59 pwent = getpwuid(uid);
|
/external/ltp/testcases/network/rpc/rpc-tirpc/tests_pack/rpc_suite/tirpc/tirpc_auth_authsys_create/ |
tirpc_authsys_create.c | 47 uid_t uid; local 52 uid = geteuid(); 57 authSys = authsys_create(argc[1], uid, gid, len, aup_gids);
|
/external/ltp/testcases/open_posix_testsuite/conformance/interfaces/sigqueue/ |
9-1.c | 41 uid_t uid; local 46 /* Search for an unused uid */ 47 for (uid = 0; uid < MAX_ATTEMPTS; uid++) { 48 if (!getpwuid(uid) && !setuid(uid)) 52 printf("Failed: No unused uid's in %d attempts\n", MAX_ATTEMPTS);
|
/external/openssh/ |
sftp-common.h | 38 u_int32_t uid; member in struct:Attrib
|
/bionic/libc/dns/include/ |
resolv_netid.h | 62 * circumstances, notably when a VPN applies to the given uid's traffic but the 65 * The introduction of per-UID routing means the uid is also an essential part 74 uid_t uid; member in struct:android_net_context
|
/bionic/libc/kernel/uapi/asm-generic/ |
ipcbuf.h | 23 __kernel_uid32_t uid; member in struct:ipc64_perm
|