/system/bt/btif/include/ |
H A D | btif_sock_thread.h | 39 typedef void (*btsock_signaled_cb)(int fd, int type, int flags, uint32_t user_id); 40 typedef void (*btsock_cmd_cb)(int cmd_fd, int type, int size, uint32_t user_id); 43 int btsock_thread_add_fd(int handle, int fd, int type, int flags, uint32_t user_id); 47 int data_size, uint32_t user_id);
|
H A D | btif_sock_l2cap.h | 19 void btsock_l2cap_signaled(int fd, int flags, uint32_t user_id);
|
H A D | btif_sock_rfc.h | 36 void btsock_rfc_signaled(int fd, int flags, uint32_t user_id);
|
/system/gatekeeper/ |
H A D | gatekeeper.cpp | 31 secure_id_t user_id = 0;// todo: rename to policy local 32 uint32_t uid = request.user_id; 36 GetRandom(&user_id, sizeof(secure_id_t)); 46 user_id = pw_handle->user_id; 55 if (!GetFailureRecord(uid, user_id, &record, throttle_secure)) { 62 if (!IncrementFailureRecord(uid, user_id, timestamp, &record, throttle_secure)) { 82 if (ClearFailureRecord(uid, user_id, true)) { 85 ClearFailureRecord(uid, user_id, false); 93 salt, user_id, flag 118 secure_id_t user_id = password_handle->user_id; local 167 CreatePasswordHandle(SizedBuffer *password_handle_buffer, salt_t salt, secure_id_t user_id, uint64_t flags, uint8_t handle_version, const uint8_t *password, uint32_t password_length) argument 215 MintAuthToken(UniquePtr<uint8_t> *auth_token, uint32_t *length, uint64_t timestamp, secure_id_t user_id, secure_id_t authenticator_id, uint64_t challenge) argument 284 IncrementFailureRecord(uint32_t uid, secure_id_t user_id, uint64_t timestamp, failure_record_t *record, bool secure) argument [all...] |
H A D | gatekeeper_messages.cpp | 32 uint32_t user_id; member in struct:gatekeeper::serial_header_t 89 header->user_id = user_id; 99 header->user_id = user_id; 112 user_id = header->user_id; 116 user_id = header->user_id; 134 VerifyRequest::VerifyRequest(uint32_t user_id, uint64_ argument 194 VerifyResponse(uint32_t user_id, SizedBuffer *auth_token) argument 239 EnrollRequest(uint32_t user_id, SizedBuffer *password_handle, SizedBuffer *provided_password, SizedBuffer *enrolled_password) argument 326 EnrollResponse(uint32_t user_id, SizedBuffer *enrolled_password_handle) argument [all...] |
/system/gatekeeper/include/gatekeeper/ |
H A D | password_handle.h | 36 secure_id_t user_id; member in struct:gatekeeper::password_handle_t
|
H A D | gatekeeper_messages.h | 133 uint32_t user_id; member in struct:gatekeeper::GateKeeperMessage 139 uint32_t user_id, 156 VerifyResponse(uint32_t user_id, SizedBuffer *auth_token); 171 EnrollRequest(uint32_t user_id, SizedBuffer *password_handle, 197 EnrollResponse(uint32_t user_id, SizedBuffer *enrolled_password_handle);
|
H A D | gatekeeper.h | 128 virtual bool GetFailureRecord(uint32_t uid, secure_id_t user_id, failure_record_t *record, 141 virtual bool ClearFailureRecord(uint32_t uid, secure_id_t user_id, bool secure) = 0; 180 secure_id_t user_id, secure_id_t authenticator_id, uint64_t challenge); 196 bool IncrementFailureRecord(uint32_t uid, secure_id_t user_id, uint64_t timestamp,
|
/system/core/gatekeeperd/ |
H A D | IUserManager.cpp | 33 virtual int32_t getCredentialOwnerProfile(int32_t user_id) { argument 36 data.writeInt32(user_id);
|
H A D | IUserManager.h | 38 virtual int32_t getCredentialOwnerProfile(int32_t user_id) = 0;
|
H A D | SoftGateKeeper.h | 109 virtual bool GetFailureRecord(uint32_t uid, secure_id_t user_id, failure_record_t *record, argument 112 if (user_id != stored->secure_user_id) { 113 stored->secure_user_id = user_id; 121 virtual bool ClearFailureRecord(uint32_t uid, secure_id_t user_id, bool /* secure */) { argument 123 stored->secure_user_id = user_id; 153 FastHashMap::const_iterator it = fast_hash_map_.find(expected_handle->user_id); 160 fast_hash_map_[expected_handle->user_id] = ComputeFastHash(password, salt);
|
H A D | gatekeeperd.cpp | 175 store_sid(uid, handle->user_id); 260 enrolled_password_handle)->user_id);
|
/system/bt/btif/src/ |
H A D | btif_sock_thread.c | 89 uint32_t user_id; member in struct:__anon691 110 static inline void add_poll(int h, int fd, int type, int flags, uint32_t user_id); 300 uint32_t user_id; member in struct:__anon693 302 int btsock_thread_add_fd(int h, int fd, int type, int flags, uint32_t user_id) argument 321 add_poll(h, fd, type, flags, user_id); 326 sock_cmd_t cmd = {CMD_ADD_FD, fd, type, flags, user_id}; 348 int btsock_thread_post_cmd(int h, int type, const unsigned char* data, int size, uint32_t user_id) argument 360 sock_cmd_t cmd = {CMD_USER_PRIVATE, 0, type, size, user_id}; 444 static inline void set_poll(poll_slot_t* ps, int fd, int type, int flags, uint32_t user_id) argument 447 ps->user_id 455 add_poll(int h, int fd, int type, int flags, uint32_t user_id) argument 552 uint32_t user_id = ts[h].ps[ps_i].user_id; local [all...] |
H A D | btif_sock.c | 38 static void btsock_signaled(int fd, int type, int flags, uint32_t user_id); 175 static void btsock_signaled(int fd, int type, int flags, uint32_t user_id) { argument 178 btsock_rfc_signaled(fd, flags, user_id); 181 btsock_l2cap_signaled(fd, flags, user_id);
|
H A D | btif_sock_l2cap.c | 991 void btsock_l2cap_signaled(int fd, int flags, uint32_t user_id) argument 998 sock = btsock_l2cap_find_by_id_l(user_id); 1038 (void *)user_id) != BTA_JV_SUCCESS) { 1040 on_l2cap_write_fixed_done(buffer, user_id); 1044 (void *)user_id) != BTA_JV_SUCCESS) { 1046 on_l2cap_write_done(buffer, user_id);
|
H A D | btif_pan.c | 98 static void btpan_tap_fd_signaled(int fd, int type, int flags, uint32_t user_id); 747 static void btpan_tap_fd_signaled(int fd, int type, int flags, uint32_t user_id) { argument
|
H A D | btif_sock_rfc.c | 765 APPL_TRACE_DEBUG("enable data flow, rfc_handle:0x%x, rfc_port_handle:0x%x, user_id:%d", 772 void btsock_rfc_signaled(UNUSED_ATTR int fd, int flags, uint32_t user_id) { argument 775 rfc_slot_t *slot = find_rfc_slot_by_id(user_id);
|
/system/gatekeeper/tests/ |
H A D | gatekeeper_device_test.cpp | 111 secure_id_t sid = handle->user_id; 118 ASSERT_NE(sid, handle->user_id); 135 secure_id_t sid = handle->user_id; 142 ASSERT_EQ(sid, handle->user_id);
|
H A D | gatekeeper_messages_test.cpp | 66 ASSERT_EQ(USER_ID, deserialized_msg.user_id); 95 ASSERT_EQ(USER_ID, deserialized_msg.user_id); 128 ASSERT_EQ(USER_ID, deserialized_msg.user_id); 158 ASSERT_EQ(USER_ID, deserialized_msg.user_id); 181 ASSERT_EQ(USER_ID, deserialized_msg.user_id); 210 ASSERT_EQ(USER_ID, deserialized_msg.user_id);
|
/system/keymaster/ |
H A D | keymaster_enforcement_test.cpp | 524 token.user_id = 9; 530 .Authorization(TAG_USER_SECURE_ID, token.user_id) 547 token.user_id = 9; 554 .Authorization(TAG_USER_SECURE_ID, token.user_id) 576 token.user_id = 9; 582 .Authorization(TAG_USER_SECURE_ID, token.user_id) 600 token.user_id = 9; 607 .Authorization(TAG_USER_SECURE_ID, token.user_id) 627 token.user_id = 9; 635 .Authorization(TAG_USER_SECURE_ID, token.user_id) [all...] |
H A D | keymaster_enforcement.cpp | 454 if (user_secure_id != auth_token.user_id && user_secure_id != auth_token.authenticator_id) { 455 LOG_I("Auth token SIDs %llu and %llu do not match key SID %llu", auth_token.user_id,
|
/system/core/gatekeeperd/tests/ |
H A D | gatekeeper_test.cpp | 91 ASSERT_NE((uint64_t) 0, auth_token->user_id); 123 secure_id_t secure_id = auth_token->user_id; 146 reinterpret_cast<hw_auth_token_t *>(response.auth_token.buffer.get())->user_id); 171 secure_id_t secure_id = auth_token->user_id; 191 reinterpret_cast<hw_auth_token_t *>(response.auth_token.buffer.get())->user_id);
|
/system/media/audio/include/system/ |
H A D | sound_trigger.h | 170 unsigned int user_id; /* user ID */ member in struct:sound_trigger_confidence_level
|
/system/security/keystore/ |
H A D | auth_token_table.cpp | 198 (sid == token_->user_id && (auth_type & authenticator_type()) != 0)) 211 return (token_->user_id == entry.token_->user_id &&
|
/system/security/keystore/tests/ |
H A D | auth_token_table_test.cpp | 77 token->user_id = rsid; 113 EXPECT_EQ(1U, found->user_id); 117 EXPECT_EQ(1U, found->user_id); 121 EXPECT_EQ(3U, found->user_id); 125 EXPECT_EQ(3U, found->user_id);
|