/external/openssh/openbsd-compat/ |
D | bsd-getpeereid.c | 28 getpeereid(int s, uid_t *euid, gid_t *gid) in getpeereid() argument 35 *euid = cred.uid; in getpeereid() 47 getpeereid(int s, uid_t *euid, gid_t *gid) in getpeereid() argument 53 if ((*euid = ucred_geteuid(ucred)) == -1) in getpeereid() 64 getpeereid(int s, uid_t *euid, gid_t *gid) in getpeereid() argument 66 *euid = geteuid(); in getpeereid()
|
D | bsd-misc.c | 80 int seteuid(uid_t euid) in seteuid() argument 82 return (setreuid(-1, euid)); in seteuid()
|
/external/chromium/chrome/browser/ |
D | process_info_snapshot_mac_unittest.cc | 35 EXPECT_EQ(0, static_cast<int64>(proc_info.euid)); in TEST_F() 62 uid_t euid = geteuid(); in TEST_F() local 77 EXPECT_EQ(euid, proc_info.euid); in TEST_F() 90 EXPECT_EQ(euid, proc_info.euid); // under reasonable circumstances. in TEST_F() 130 EXPECT_EQ(proc_info.euid, 0u); in TEST_F()
|
D | process_info_snapshot.h | 52 uid_t euid; member 65 euid(0), in ProcInfoEntry()
|
D | process_info_snapshot_mac.cc | 369 proc_info.euid = kinfo.kp_eproc.e_ucred.cr_uid; in Sample()
|
/external/dbus/bus/ |
D | activation-helper.c | 187 uid_t uid, euid; in check_permissions() local 192 euid = 0; in check_permissions() 212 euid = geteuid(); in check_permissions() 213 if (euid != 0) in check_permissions()
|
/external/e2fsprogs/misc/ |
D | uuidd.c | 64 uid_t euid; in create_daemon() local 83 euid = geteuid(); in create_daemon() 84 if (setreuid(euid, euid) < 0) in create_daemon()
|
/external/openssh/ |
D | ssh-agent.c | 1002 uid_t euid; in after_select() local 1019 if (getpeereid(sock, &euid, &egid) < 0) { in after_select() 1025 if ((euid != 0) && (getuid() != euid)) { in after_select() 1028 (u_int) euid, (u_int) getuid()); in after_select()
|
D | channels.c | 1895 uid_t euid; local 1914 if (getpeereid(newsock, &euid, &egid) < 0) { 1920 if ((euid != 0) && (getuid() != euid)) { 1922 (u_int)euid, (u_int)getuid());
|
/external/strace/ |
D | strace.c | 260 int euid = geteuid(), uid = getuid(); in swap_uid() local 262 if (euid != uid && setreuid(euid, uid) < 0) in swap_uid()
|
/external/dbus/dbus/ |
D | dbus-sysdeps-unix.c | 1713 uid_t euid; in _dbus_read_credentials_socket() 1715 if (getpeereid (client_fd, &euid, &egid) == 0) in _dbus_read_credentials_socket() 1717 uid_read = euid; in _dbus_read_credentials_socket()
|
/external/valgrind/main/memcheck/tests/x86-linux/ |
D | scalar.stderr.exp | 728 Syscall param setreuid16(euid) contains uninitialised byte(s) 1942 Syscall param setresuid16(euid) contains uninitialised byte(s) 1957 Syscall param getresuid16(euid) contains uninitialised byte(s) 1970 Syscall param getresuid16(euid) points to unaddressable byte(s) 2640 Syscall param setreuid(euid) contains uninitialised byte(s) 2709 Syscall param setresuid(euid) contains uninitialised byte(s) 2724 Syscall param getresuid(euid) contains uninitialised byte(s) 2737 Syscall param getresuid(euid) points to unaddressable byte(s)
|
/external/valgrind/main/coregrind/m_syswrap/ |
D | syswrap-linux.c | 527 vki_old_uid_t, ruid, vki_old_uid_t, euid, vki_old_uid_t, suid); in PRE() 534 vki_uid_t, ruid, vki_uid_t, euid, vki_uid_t, suid); in PRE() 541 vki_old_uid_t *, ruid, vki_old_uid_t *, euid, in PRE() 561 vki_uid_t *, ruid, vki_uid_t *, euid, vki_uid_t *, suid); in PRE() 2176 PRE_REG_READ2(long, "setreuid16", vki_old_uid_t, ruid, vki_old_uid_t, euid); in PRE()
|
D | syswrap-generic.c | 3921 PRE_REG_READ2(long, "setreuid", vki_uid_t, ruid, vki_uid_t, euid); in PRE()
|
/external/kernel-headers/original/linux/ |
D | sched.h | 857 uid_t uid,euid,suid,fsuid; member
|
D | fs.h | 648 uid_t uid, euid; /* uid/euid of process setting the owner */ member
|