Searched refs:user_id (Results 1 - 25 of 26) sorted by relevance

12

/system/bt/btif/include/
H A Dbtif_sock_thread.h39 typedef void (*btsock_signaled_cb)(int fd, int type, int flags, uint32_t user_id);
40 typedef void (*btsock_cmd_cb)(int cmd_fd, int type, int size, uint32_t user_id);
43 int btsock_thread_add_fd(int handle, int fd, int type, int flags, uint32_t user_id);
47 int data_size, uint32_t user_id);
H A Dbtif_sock_l2cap.h19 void btsock_l2cap_signaled(int fd, int flags, uint32_t user_id);
H A Dbtif_sock_rfc.h36 void btsock_rfc_signaled(int fd, int flags, uint32_t user_id);
/system/gatekeeper/
H A Dgatekeeper.cpp31 secure_id_t user_id = 0;// todo: rename to policy local
32 uint32_t uid = request.user_id;
36 GetRandom(&user_id, sizeof(secure_id_t));
46 user_id = pw_handle->user_id;
55 if (!GetFailureRecord(uid, user_id, &record, throttle_secure)) {
62 if (!IncrementFailureRecord(uid, user_id, timestamp, &record, throttle_secure)) {
82 if (ClearFailureRecord(uid, user_id, true)) {
85 ClearFailureRecord(uid, user_id, false);
93 salt, user_id, flag
118 secure_id_t user_id = password_handle->user_id; local
167 CreatePasswordHandle(SizedBuffer *password_handle_buffer, salt_t salt, secure_id_t user_id, uint64_t flags, uint8_t handle_version, const uint8_t *password, uint32_t password_length) argument
215 MintAuthToken(UniquePtr<uint8_t> *auth_token, uint32_t *length, uint64_t timestamp, secure_id_t user_id, secure_id_t authenticator_id, uint64_t challenge) argument
284 IncrementFailureRecord(uint32_t uid, secure_id_t user_id, uint64_t timestamp, failure_record_t *record, bool secure) argument
[all...]
H A Dgatekeeper_messages.cpp32 uint32_t user_id; member in struct:gatekeeper::serial_header_t
89 header->user_id = user_id;
99 header->user_id = user_id;
112 user_id = header->user_id;
116 user_id = header->user_id;
134 VerifyRequest::VerifyRequest(uint32_t user_id, uint64_ argument
194 VerifyResponse(uint32_t user_id, SizedBuffer *auth_token) argument
239 EnrollRequest(uint32_t user_id, SizedBuffer *password_handle, SizedBuffer *provided_password, SizedBuffer *enrolled_password) argument
326 EnrollResponse(uint32_t user_id, SizedBuffer *enrolled_password_handle) argument
[all...]
/system/gatekeeper/include/gatekeeper/
H A Dpassword_handle.h36 secure_id_t user_id; member in struct:gatekeeper::password_handle_t
H A Dgatekeeper_messages.h133 uint32_t user_id; member in struct:gatekeeper::GateKeeperMessage
139 uint32_t user_id,
156 VerifyResponse(uint32_t user_id, SizedBuffer *auth_token);
171 EnrollRequest(uint32_t user_id, SizedBuffer *password_handle,
197 EnrollResponse(uint32_t user_id, SizedBuffer *enrolled_password_handle);
H A Dgatekeeper.h128 virtual bool GetFailureRecord(uint32_t uid, secure_id_t user_id, failure_record_t *record,
141 virtual bool ClearFailureRecord(uint32_t uid, secure_id_t user_id, bool secure) = 0;
180 secure_id_t user_id, secure_id_t authenticator_id, uint64_t challenge);
196 bool IncrementFailureRecord(uint32_t uid, secure_id_t user_id, uint64_t timestamp,
/system/core/gatekeeperd/
H A DIUserManager.cpp33 virtual int32_t getCredentialOwnerProfile(int32_t user_id) { argument
36 data.writeInt32(user_id);
H A DIUserManager.h38 virtual int32_t getCredentialOwnerProfile(int32_t user_id) = 0;
H A DSoftGateKeeper.h109 virtual bool GetFailureRecord(uint32_t uid, secure_id_t user_id, failure_record_t *record, argument
112 if (user_id != stored->secure_user_id) {
113 stored->secure_user_id = user_id;
121 virtual bool ClearFailureRecord(uint32_t uid, secure_id_t user_id, bool /* secure */) { argument
123 stored->secure_user_id = user_id;
153 FastHashMap::const_iterator it = fast_hash_map_.find(expected_handle->user_id);
160 fast_hash_map_[expected_handle->user_id] = ComputeFastHash(password, salt);
H A Dgatekeeperd.cpp175 store_sid(uid, handle->user_id);
260 enrolled_password_handle)->user_id);
/system/bt/btif/src/
H A Dbtif_sock_thread.c89 uint32_t user_id; member in struct:__anon691
110 static inline void add_poll(int h, int fd, int type, int flags, uint32_t user_id);
300 uint32_t user_id; member in struct:__anon693
302 int btsock_thread_add_fd(int h, int fd, int type, int flags, uint32_t user_id) argument
321 add_poll(h, fd, type, flags, user_id);
326 sock_cmd_t cmd = {CMD_ADD_FD, fd, type, flags, user_id};
348 int btsock_thread_post_cmd(int h, int type, const unsigned char* data, int size, uint32_t user_id) argument
360 sock_cmd_t cmd = {CMD_USER_PRIVATE, 0, type, size, user_id};
444 static inline void set_poll(poll_slot_t* ps, int fd, int type, int flags, uint32_t user_id) argument
447 ps->user_id
455 add_poll(int h, int fd, int type, int flags, uint32_t user_id) argument
552 uint32_t user_id = ts[h].ps[ps_i].user_id; local
[all...]
H A Dbtif_sock.c38 static void btsock_signaled(int fd, int type, int flags, uint32_t user_id);
175 static void btsock_signaled(int fd, int type, int flags, uint32_t user_id) { argument
178 btsock_rfc_signaled(fd, flags, user_id);
181 btsock_l2cap_signaled(fd, flags, user_id);
H A Dbtif_sock_l2cap.c991 void btsock_l2cap_signaled(int fd, int flags, uint32_t user_id) argument
998 sock = btsock_l2cap_find_by_id_l(user_id);
1038 (void *)user_id) != BTA_JV_SUCCESS) {
1040 on_l2cap_write_fixed_done(buffer, user_id);
1044 (void *)user_id) != BTA_JV_SUCCESS) {
1046 on_l2cap_write_done(buffer, user_id);
H A Dbtif_pan.c98 static void btpan_tap_fd_signaled(int fd, int type, int flags, uint32_t user_id);
747 static void btpan_tap_fd_signaled(int fd, int type, int flags, uint32_t user_id) { argument
H A Dbtif_sock_rfc.c765 APPL_TRACE_DEBUG("enable data flow, rfc_handle:0x%x, rfc_port_handle:0x%x, user_id:%d",
772 void btsock_rfc_signaled(UNUSED_ATTR int fd, int flags, uint32_t user_id) { argument
775 rfc_slot_t *slot = find_rfc_slot_by_id(user_id);
/system/gatekeeper/tests/
H A Dgatekeeper_device_test.cpp111 secure_id_t sid = handle->user_id;
118 ASSERT_NE(sid, handle->user_id);
135 secure_id_t sid = handle->user_id;
142 ASSERT_EQ(sid, handle->user_id);
H A Dgatekeeper_messages_test.cpp66 ASSERT_EQ(USER_ID, deserialized_msg.user_id);
95 ASSERT_EQ(USER_ID, deserialized_msg.user_id);
128 ASSERT_EQ(USER_ID, deserialized_msg.user_id);
158 ASSERT_EQ(USER_ID, deserialized_msg.user_id);
181 ASSERT_EQ(USER_ID, deserialized_msg.user_id);
210 ASSERT_EQ(USER_ID, deserialized_msg.user_id);
/system/keymaster/
H A Dkeymaster_enforcement_test.cpp524 token.user_id = 9;
530 .Authorization(TAG_USER_SECURE_ID, token.user_id)
547 token.user_id = 9;
554 .Authorization(TAG_USER_SECURE_ID, token.user_id)
576 token.user_id = 9;
582 .Authorization(TAG_USER_SECURE_ID, token.user_id)
600 token.user_id = 9;
607 .Authorization(TAG_USER_SECURE_ID, token.user_id)
627 token.user_id = 9;
635 .Authorization(TAG_USER_SECURE_ID, token.user_id)
[all...]
H A Dkeymaster_enforcement.cpp454 if (user_secure_id != auth_token.user_id && user_secure_id != auth_token.authenticator_id) {
455 LOG_I("Auth token SIDs %llu and %llu do not match key SID %llu", auth_token.user_id,
/system/core/gatekeeperd/tests/
H A Dgatekeeper_test.cpp91 ASSERT_NE((uint64_t) 0, auth_token->user_id);
123 secure_id_t secure_id = auth_token->user_id;
146 reinterpret_cast<hw_auth_token_t *>(response.auth_token.buffer.get())->user_id);
171 secure_id_t secure_id = auth_token->user_id;
191 reinterpret_cast<hw_auth_token_t *>(response.auth_token.buffer.get())->user_id);
/system/media/audio/include/system/
H A Dsound_trigger.h170 unsigned int user_id; /* user ID */ member in struct:sound_trigger_confidence_level
/system/security/keystore/
H A Dauth_token_table.cpp198 (sid == token_->user_id && (auth_type & authenticator_type()) != 0))
211 return (token_->user_id == entry.token_->user_id &&
/system/security/keystore/tests/
H A Dauth_token_table_test.cpp77 token->user_id = rsid;
113 EXPECT_EQ(1U, found->user_id);
117 EXPECT_EQ(1U, found->user_id);
121 EXPECT_EQ(3U, found->user_id);
125 EXPECT_EQ(3U, found->user_id);

Completed in 566 milliseconds

12