/external/skqp/src/pdf/ |
SkPDFMakeToUnicodeCmap.cpp | 76 SkGlyphID gid) { 78 SkPDFUtils::WriteUInt16BE(cmap, gid); 80 SkPDFUtils::WriteUInt8(cmap, SkToU8(gid)); 171 SkGlyphID gid = i + glyphOffset; local 172 bool inSubset = i < limit && (subset == nullptr || subset->has(gid)); 181 glyphToUnicode[gid] == 196 currentRangeEntry.fUnicode = glyphToUnicode[gid];
|
/external/epid-sdk/epid/verifier/1.1/unittests/ |
context-test.cc | 83 // tweak GID 85 verifier_precomp.gid.data[0] = ~verifier_precomp.gid.data[0]; 131 prl.gid = this->kPubKeyStr.gid; 141 prl.gid = this->kPubKeyStr.gid; 149 prl.gid = this->kPubKeyStr.gid; 163 prl.gid = this->kPubKeyStr.gid [all...] |
/external/epid-sdk/epid/member/tiny/unittests/ |
provision_credential-test.cc | 57 credential.gid = this->kGrpXMember9PrivKey.gid; 87 base_credential.gid = this->kGrpXMember9PrivKey.gid; 125 credential.gid = this->kGrpXMember9PrivKey.gid; 199 base_credential.gid = this->kGrpXMember9PrivKey.gid; 210 credential.gid.data[0] = ~credential.gid.data[0] [all...] |
/external/epid-sdk/epid/member/unittests/ |
provision_credential-test.cc | 59 credential.gid = this->kGrpXMember9PrivKey.gid; 89 base_credential.gid = this->kGrpXMember9PrivKey.gid; 127 credential.gid = this->kGrpXMember9PrivKey.gid; 201 base_credential.gid = this->kGrpXMember9PrivKey.gid; 212 credential.gid.data[0] = ~credential.gid.data[0] [all...] |
/external/fonttools/Lib/fontTools/ttLib/tables/ |
C_O_L_R_.py | 20 self.getGlyphName = ttFont.getGlyphName # for use in get/set item functions, for access by GID 28 gid, firstLayerIndex, numLayers = struct.unpack(">HHH", data[glyphPos:glyphPos+6]) 30 gids.append(gid) 46 names = [glyphOrder[gid] for gid in gids] 60 gid = ttFont.getGlyphID(glyphName) 63 ordered.append([gid, glyphName, self.ColorLayers[glyphName]]) 68 for (gid, glyphName, layers) in ordered: 69 glyphMap.append(struct.pack(">HHH", gid, len(layerMap), len(layers))) 86 gid = ttFont.getGlyphID(glyphName [all...] |
/external/apache-commons-compress/src/main/java/org/apache/commons/compress/archivers/zip/ |
AsiExtraField.java | 25 * Adds Unix file permission and UID/GID fields as well as symbolic 38 * GID Short group ID 67 private int gid = 0; field in class:AsiExtraField 108 + 2 // GID 183 * @param gid the group id 185 public void setGroupId(final int gid) { 186 this.gid = gid; 194 return gid; 287 gid = ZipShort.getValue(tmp, 8) [all...] |
/external/epid-sdk/epid/common/1.1/src/ |
file_parser.c | 30 Epid11GroupId gid; ///< group ID member in struct:Epid11GroupPubKeyCertificate 70 sizeof(Epid11GroupRl) - sizeof(((Epid11GroupRl*)0)->gid[0]); 71 rl_entry_size = sizeof(((Epid11GroupRl*)0)->gid[0]); 73 sizeof(((Epid11GroupRl*)0)->gid[0]) + 163 pubkey->gid = buf_pubkey->gid;
|
grouppubkey.c | 60 pubkey->gid = pub_key_str->gid;
|
/external/python/cpython2/Modules/ |
grpmodule.c | 89 gid_t gid; local 95 if (!_Py_Gid_Converter(py_int_id, &gid)) { 101 if ((p = getgrgid(gid)) == NULL) { 102 if (gid < 0) 104 "getgrgid(): gid not found: %ld", (long)gid); 107 "getgrgid(): gid not found: %lu", (unsigned long)gid); 186 The gid is an integer, name and password are strings. (Note that most\n\
|
/external/syzkaller/pkg/osutil/ |
osutil_linux.go | 45 enabled, uid, gid, err := initSandbox() 52 Gid: gid, 60 enabled, uid, gid, err := initSandbox() 64 return os.Chown(file, int(uid), int(gid)) 85 gid, err := usernameToID("-g") 90 sandboxGID = gid
|
/external/toybox/toys/other/ |
makedevs.c | 21 <name> <type> <mode> <uid> <gid> <major> <minor> <start> <increment> <count> 60 gid_t gid; local 82 gid = *group ? xgetgid(group) : getgid(); 107 if (chown(ptr, uid, gid) || chmod(ptr, mode))
|
/bionic/tests/headers/posix/ |
sys_ipc_h.c | 36 STRUCT_MEMBER(struct ipc_perm, gid_t, gid);
|
/device/google/cuttlefish_common/common/libs/fs/ |
gce_fs.cpp | 40 int gce_fs_prepare_dir(const char* path, mode_t mode, uid_t uid, gid_t gid) { 57 if (((sb.st_mode & ALL_PERMS) == mode) && (sb.st_uid == uid) && (sb.st_gid == gid)) { 77 if (GCE_TEMP_FAILURE_RETRY(chown(path, uid, gid)) == -1) { 78 LOG(ERROR) << "Failed to chown(" << path << ", " << uid << ", " << gid
|
/external/epid-sdk/epid/verifier/1.1/src/ |
context.c | 65 bool Epid11IsSigRlValid(Epid11GroupId const* gid, Epid11SigRl const* sig_rl, 69 if (!gid || !sig_rl || kMinSigRlSize > sig_rl_size) { 80 // verify that gid given and gid in SigRl match 81 if (0 != memcmp(gid, &sig_rl->gid, sizeof(*gid))) { 88 static bool IsEpid11PrivRlValid(Epid11GroupId const* gid, 94 if (!gid || !priv_rl || kMinPrivRlSize > priv_rl_size) { 107 // verify that gid given and gid in Epid11PrivRl matc [all...] |
verify.c | 160 // Step 3. The verifier verifies gid in the public key, PRIV-RL, and 163 if (0 != memcmp(&ctx->pub_key->gid, &ctx->priv_rl->gid, 164 sizeof(ctx->pub_key->gid))) { 170 if (0 != memcmp(&ctx->pub_key->gid, &ctx->sig_rl->gid, 171 sizeof(ctx->pub_key->gid))) { 175 // Verification of gid value in precomputation blob 184 // ...the verifier verifies that gid has not been revoked, i.e., 185 // gid does not match any entry in Group-RL [all...] |
/external/libcap/progs/old/ |
sucap.c | 57 gid_t gid; local 80 /* Convert groupname to gid */ 87 gid = gr->gr_gid; 123 /* 1. mother process sets gid and uid 138 /* Set gid and uid (this probably clears capabilities) */ 139 setregid(gid, gid);
|
/external/ltp/testcases/kernel/containers/userns/ |
userns06.c | 71 int uid, gid; local 77 gid = getegid(); 79 if (uid != CHILD2UID || gid != CHILD2GID) { 80 printf("unexpected uid=%d gid=%d\n", uid, gid);
|
/external/python/cpython2/Lib/plat-os2emx/ |
grp.py | 43 getgrgid(gid) - return the record for group-id gid as a 4-tuple 103 def __init__(self, name, passwd, gid, mem): 106 self.__dict__['gr_gid'] = gid 134 # with dictionaries to speed recall by GID or group name 165 # return the group database entry by GID 166 def getgrgid(gid): 168 return g[gid]
|
/bionic/libc/bionic/ |
grp_pwd.cpp | 203 // AID_APP_START. They exist per user, so a given uid/gid modulo AID_USER_OFFSET will map 384 static void print_app_name_from_gid(const gid_t gid, char* buffer, const int bufferlen) { 385 const uid_t appid = gid % AID_USER_OFFSET; 386 const uid_t userid = gid / AID_USER_OFFSET; 449 static group* oem_id_to_group(gid_t gid, group_state_t* state) { 450 if (!is_oem_id(gid)) { 454 if (vendor_group.FindById(gid, state)) { 459 "oem_%u", gid); 463 gr->gr_gid = gid; 500 // Translate a gid into the corresponding app_<gid [all...] |
/external/epid-sdk/epid/verifier/src/ |
context.c | 61 static bool IsPrivRlValid(GroupId const* gid, PrivRl const* priv_rl, 66 if (!gid || !priv_rl || kMinPrivRlSize > priv_rl_size) { 79 // verify that gid given and gid in PrivRl match 80 if (0 != memcmp(gid, &priv_rl->gid, sizeof(*gid))) { 87 static bool IsVerifierRlValid(GroupId const* gid, VerifierRl const* ver_rl, 92 if (!gid || !ver_rl || kMinVerifierRlSize > ver_rl_size) { 106 // verify that gid in public key and gid in SigRl matc [all...] |
/external/epid-sdk/epid/verifier/unittests/ |
context-test.cc | 88 // tweak GID 90 verifier_precomp.gid.data[0] = ~verifier_precomp.gid.data[0]; 135 prl.gid = this->kPubKeyStr.gid; 144 prl.gid = this->kPubKeyStr.gid; 152 prl.gid = this->kPubKeyStr.gid; 166 prl.gid = this->kPubKeyStr.gid [all...] |
/bionic/libc/kernel/uapi/rdma/ |
ib_user_mad.h | 39 __u8 gid[16]; member in struct:ib_user_mad_hdr_old 57 __u8 gid[16]; member in struct:ib_user_mad_hdr
|
/bionic/tests/ |
grp_pwd_file_test.cpp | 39 void FindAndCheckPasswdEntry(PasswdFile* file, const char* name, uid_t uid, gid_t gid, 48 EXPECT_EQ(gid, name_passwd.pw_gid); 60 EXPECT_EQ(gid, id_passwd.pw_gid); 66 void FindAndCheckGroupEntry(GroupFile* file, const char* name, gid_t gid) { 73 EXPECT_EQ(gid, name_group.gr_gid); 78 ASSERT_TRUE(file->FindById(gid, &id_group_state)) << gid; 83 EXPECT_EQ(gid, id_group.gr_gid);
|
/external/epid-sdk/epid/common/src/ |
grouppubkey.c | 64 pubkey->gid = pub_key_str->gid;
|
/external/epid-sdk/tools/revokegrp/src/ |
main.c | 51 GroupId gid; ///< Intel(R) EPID Group ID member in struct:GrpInfo 265 PrintBuffer(&pubkey.gid, sizeof(pubkey.gid)); 331 if (0 == memcmp(&request->groups[grp_index].gid, &pubkey.gid, 332 sizeof(pubkey.gid))) { 344 request->groups[grp_count].gid = pubkey.gid;
|