/frameworks/base/core/java/android/content/pm/ |
RegisteredServicesCache.java | 166 int uid = intent.getIntExtra(Intent.EXTRA_UID, -1); local 167 if (uid > 0) { 168 uids = new int[] { uid }; 178 final int uid = intent.getIntExtra(Intent.EXTRA_UID, -1); 179 if (uid != -1) { 180 handlePackageEvent(intent, UserHandle.getUserId(uid)); 259 public final int uid; field in class:RegisteredServicesCache.ServiceInfo 262 public ServiceInfo(V type, ComponentName componentName, int uid) { 265 this.uid = uid; 518 final int uid = applicationInfo.uid; local 562 final int uid = Integer.parseInt(uidString); local [all...] |
/frameworks/base/services/core/java/com/android/server/pm/ |
Installer.java | 44 public int install(String name, int uid, int gid, String seinfo) { 49 builder.append(uid); 57 public int patchoat(String apkPath, int uid, boolean isPublic, String pkgName, 64 return mInstaller.patchoat(apkPath, uid, isPublic, pkgName, instructionSet); 67 public int patchoat(String apkPath, int uid, boolean isPublic, String instructionSet) { 73 return mInstaller.patchoat(apkPath, uid, isPublic, instructionSet); 76 public int dexopt(String apkPath, int uid, boolean isPublic, String instructionSet) { 82 return mInstaller.dexopt(apkPath, uid, isPublic, instructionSet); 85 public int dexopt(String apkPath, int uid, boolean isPublic, String pkgName, 92 return mInstaller.dexopt(apkPath, uid, isPublic, pkgName, instructionSet, vmSafeMode) [all...] |
BasePermission.java | 43 int uid; field in class:BasePermission
|
/cts/tests/tests/security/src/android/security/cts/ |
ListeningPortsTest.java | 194 + entry.port + ", UID=" + entry.uid 195 + " " + uidToPackage(entry.uid) + " in " 204 private String uidToPackage(int uid) { 206 String[] packages = pm.getPackagesForUid(uid); 243 private final int uid; field in class:ListeningPortsTest.ParsedProcEntry 245 private ParsedProcEntry(InetAddress addr, int port, String state, int uid) { 249 this.uid = uid; 259 * sl local_address rem_address st tx_queue rx_queue tr tm->when retrnsmt uid .. 284 int uid = Integer.parseInt(fields[7]); local [all...] |
/external/iproute2/ip/ |
iptuntap.c | 48 static int tap_add_ioctl(struct ifreq *ifr, uid_t uid, gid_t gid) 66 if (uid != -1 && ioctl(fd, TUNSETOWNER, uid)) { 107 static int parse_args(int argc, char **argv, struct ifreq *ifr, uid_t *uid, gid_t *gid) 134 } else if (uid && matches(*argv, "user") == 0) { 140 *uid = user; 147 *uid = pw->pw_uid; 194 uid_t uid = -1; local 197 if (parse_args(argc, argv, &ifr, &uid, &gid) < 0) 204 return tap_add_ioctl(&ifr, uid, gid) [all...] |
/external/libcap-ng/libcap-ng-0.7/utils/ |
netcap.c | 110 // Get the effective uid 123 if (memcmp(buf, "Uid:", 4) == 0) { 125 sscanf(buf, "Uid: %d %d", 196 node.uid = euid; 224 if (n->uid == 0) { 228 } else if (last_uid != (int)n->uid) { 230 p = getpwuid(n->uid); 231 last_uid = n->uid; 254 int local_port, rem_port, d, state, timer_run, uid, timeout; local 275 &uid, &timeout, &inode, more) 288 int local_port, rem_port, d, state, timer_run, uid, timeout; local 322 int local_port, rem_port, d, state, timer_run, uid, timeout; local 392 unsigned int ref_cnt, type, proto, iface, r, rmem, uid; local [all...] |
proc-llist.h | 35 uid_t uid; // user ID member in struct:_lnode
|
/packages/apps/KeyChain/src/com/android/keychain/ |
KeyChainService.java | 61 private static final String GRANTS_GRANTEE_UID = "uid"; 101 final int uid = Binder.getCallingUid(); 102 if (!mKeyStore.grant(keystoreAlias, uid)) { 105 final int userHandle = UserHandle.getUserId(uid); 132 throw new IllegalStateException("uid " + callingUid 230 String actual = checkCaller("android.uid.system:1000"); 249 @Override public boolean hasGrant(int uid, String alias) { 251 return hasGrantInternal(mDatabaseHelper.getReadableDatabase(), uid, alias); 254 @Override public void setGrant(int uid, String alias, boolean value) { 256 setGrantInternal(mDatabaseHelper.getWritableDatabase(), uid, alias, value) 409 final int uid = cursor.getInt(0); local [all...] |
/external/chromium_org/mojo/nacl/generator/ |
interface_dsl.py | 19 def __init__(self, parent, uid, name, return_type): 21 self.uid = uid 48 def __init__(self, parent, uid, name, param_type=None): 50 self.uid = uid
|
/frameworks/base/services/core/java/com/android/server/net/ |
NetworkPolicyManagerService.java | 201 private static final String TAG_UID_POLICY = "uid-policy"; 218 private static final String ATTR_UID = "uid"; 262 /** Defined UID policies. */ 264 /** Currently derived rules for each UID. */ 281 /** Foreground at both UID and PID granularity. */ 355 mPowerSaveWhitelistAppIds.put(UserHandle.getAppId(ai.uid), true); 412 // listen for UID changes to update policy 449 public void onForegroundActivitiesChanged(int pid, int uid, boolean foregroundActivities) { 453 public void onProcessStateChanged(int pid, int uid, int procState) { 455 // because a uid can have multiple pids running inside, we need t 1321 final int uid = readIntAttribute(in, ATTR_UID); local 1334 final int uid = UserHandle.getUid(UserHandle.USER_OWNER, appId); local 1415 final int uid = mUidPolicy.keyAt(i); local 1514 final int uid = mUidPolicy.keyAt(i); local 1547 final int uid = mUidPolicy.keyAt(i); local 1825 final int uid = mUidPolicy.keyAt(i); local 1857 final int uid = knownUids.keyAt(i); local 1953 final int uid = mUidState.keyAt(i); local 1981 final int uid = UserHandle.getUid(user.id, app.uid); local [all...] |
/system/security/keystore/ |
keystore_cli.cpp | 83 fprintf(stderr, "Usage: %s " #cmd " <name> <uid>\n", argv[0]); \ 86 int uid = -1; \ 88 uid = atoi(argv[3]); \ 89 fprintf(stderr, "Running as uid %d\n", uid); \ 91 int32_t ret = service->cmd(String16(argv[2]), uid); \ 148 static int saw(sp<IKeystoreService> service, const String16& name, int uid) { 150 int32_t ret = service->saw(name, uid, &matches);
|
/build/tools/fs_config/ |
fs_config.c | 33 // filename along with its desired uid, gid, and mode (in octal). 116 unsigned uid = 0, gid = 0, mode = 0; local 118 fs_config(buffer, is_dir, &uid, &gid, &mode, &capabilities); 119 printf("%s %d %d %o", buffer, uid, gid, mode);
|
/cts/apps/CtsVerifier/src/com/android/cts/verifier/os/ |
FileUtils.java | 56 private int uid; field in class:FileUtils.FileStatus 68 return uid; 108 public native static String getUserName(int uid);
|
/external/lldb/include/lldb/Symbol/ |
CompileUnit.h | 43 /// Construct with a module, path, UID and language. 47 /// \a uid, and the source language type. 59 /// @param[in] uid 71 CompileUnit(const lldb::ModuleSP &module_sp, void *user_data, const char *pathname, lldb::user_id_t uid, lldb::LanguageType language); 74 /// Construct with a module, file spec, UID and language. 78 /// \a uid, and the source language type. 91 /// @param[in] uid 103 CompileUnit(const lldb::ModuleSP &module_sp, void *user_data, const FileSpec &file_spec, lldb::user_id_t uid, lldb::LanguageType language); 303 /// @param[in] uid 314 FindFunctionByUID (lldb::user_id_t uid); [all...] |
/frameworks/base/core/java/android/os/ |
INetworkManagementService.aidl | 240 * without any UID-level granularity. 246 * Return detailed network statistics with UID-level granularity, 252 * Return detailed network statistics for the requested UID, 255 NetworkStats getNetworkStatsUidDetail(int uid); 288 * Control network activity of a UID over interfaces with a quota limit. 290 void setUidNetworkRules(int uid, boolean rejectOnQuotaInterfaces); 331 void setFirewallUidRule(int uid, boolean allow); 398 void addLegacyRouteForNetId(int netId, in RouteInfo routeInfo, int uid); 407 * Allow UID to call protect(). 409 void allowProtect(int uid); [all...] |
/packages/apps/Email/src/com/android/email/activity/ |
EventViewer.java | 45 String uid = info.get(MeetingInfo.MEETING_UID); local 47 if (uid != null) { 51 new String[] {uid}, null);
|
/packages/apps/Nfc/src/com/android/nfc/ |
NfceeAccessControl.java | 55 * Map from UID to NFCEE access, used as a cache. 56 * Note: if a UID contains multiple packages they must all be 57 * signed with the same certificate so in effect UID == certificate 73 * Check if the {uid, pkg} combination may use NFCEE. 74 * Also verify with package manager that this {uid, pkg} combination 77 public boolean check(int uid, String pkg) { 79 Boolean cached = mUidCache.get(uid); 86 // Ensure the claimed package is present in the calling UID 88 String[] pkgs = pm.getPackagesForUid(uid); 99 mUidCache.put(uid, access) [all...] |
/bionic/libc/bionic/ |
stubs.cpp | 57 static int do_getpw_r(int by_name, const char* name, uid_t uid, 68 const passwd* src = by_name ? getpwnam(name) : getpwuid(uid); // NOLINT: see above. 111 int getpwuid_r(uid_t uid, passwd* pwd, 113 return do_getpw_r(0, NULL, uid, pwd, buf, byte_count, result); 284 static void print_app_name_from_uid(const uid_t uid, char* buffer, const int bufferlen) { 285 const uid_t appid = uid % AID_USER; 286 const uid_t userid = uid / AID_USER; 290 // Translate a uid into the corresponding name. 296 static passwd* app_id_to_passwd(uid_t uid, stubs_state_t* state) { 299 if (uid < AID_APP) [all...] |
/external/chromium_org/cc/resources/ |
scoped_ui_resource.cc | 35 UIResourceBitmap ScopedUIResource::GetBitmap(UIResourceId uid,
|
/external/linux-tools-perf/perf-3.12.0/tools/perf/util/ |
target.c | 30 /* UID and PID are mutually exclusive */ 37 /* UID and CPU are mutually exclusive */ 51 /* UID and SYSTEM are mutually exclusive */ 67 target->uid = UINT_MAX; 76 * The user name not found. Maybe it's a UID number. 79 int uid = strtol(str, &endptr, 10); local 84 getpwuid_r(uid, &pwd, buf, sizeof(buf), &result); 90 target->uid = result->pw_uid; 99 "PID/TID switch overriding UID", 100 "UID switch overriding CPU" [all...] |
/frameworks/base/core/java/android/hardware/usb/ |
IUsbManager.aidl | 73 /* Grants permission for the given UID to access the device */ 74 void grantDevicePermission(in UsbDevice device, int uid); 76 /* Grants permission for the given UID to access the accessory */ 77 void grantAccessoryPermission(in UsbAccessory accessory, int uid);
|
/system/core/logd/ |
LogBuffer.cpp | 136 uid_t uid, pid_t pid, pid_t tid, 142 uid, pid, tid, msg, len); 209 stats.add(len, log_id, uid, pid); 266 uid_t uid = e->getUid(); local 268 if (uid == caller_uid) { 270 stats.subtract(e->getMsgLen(), id, uid, e->getPid()); 284 // prune by worst offender by uid 318 uid_t uid = e->getUid(); local 320 if ((uid == worst) || mPrune.naughty(e)) { // Worst or BlackListed 323 stats.subtract(len, id, uid, e->getPid()) 444 uid_t uid = reader->getUid(); local [all...] |
libaudit.h | 42 uid_t uid; member in struct:audit_sig_info
|
/frameworks/base/services/core/java/com/android/server/clipboard/ |
ClipboardService.java | 70 ListenerInfo(int uid, String packageName) { 71 mUid = uid; 308 private final void checkUriOwnerLocked(Uri uri, int uid) { 315 mAm.checkGrantUriPermission(uid, null, ContentProvider.getUriWithoutUserId(uri), 317 ContentProvider.getUserIdFromUri(uri, UserHandle.getUserId(uid))); 324 private final void checkItemOwnerLocked(ClipData.Item item, int uid) { 326 checkUriOwnerLocked(item.getUri(), uid); local 330 checkUriOwnerLocked(intent.getData(), uid); local 334 private final void checkDataOwnerLocked(ClipData data, int uid) { 337 checkItemOwnerLocked(data.getItemAt(i), uid); local [all...] |
/system/core/debuggerd/ |
debuggerd.cpp | 51 uid_t uid, gid; member in struct:debugger_request_t 115 } else if (len > 5 && !memcmp(line, "Uid:\t", 5)) { 145 ALOGE("timed out reading tid (from pid=%d uid=%d)\n", cr.pid, cr.uid); 153 ALOGE("read failure? %s (pid=%d uid=%d)\n", strerror(errno), cr.pid, cr.uid); 157 ALOGE("invalid crash request of size %d (from pid=%d uid=%d)\n", status, cr.pid, cr.uid); 164 out_request->uid = cr.uid; [all...] |