Searched defs:user (Results 1 - 22 of 22) sorted by relevance

/system/core/metricsd/collectors/
H A Dcpu_usage_collector_test.cc38 uint64_t user, nice, system; local
40 ASSERT_FALSE(collector.ParseProcStat(invalid_contents[i], &user, &nice,
46 &user, &nice, &system));
47 ASSERT_EQ(17191, user);
/system/connectivity/shill/shims/
H A Dc_ppp.cc42 string user, pass; local
43 if (!PPP::GetInstance()->GetSecret(&user, &pass)) {
47 strcpy(username, user.c_str()); // NOLINT(runtime/printf)
/system/connectivity/shill/dbus/
H A Dchromeos_rpc_task_dbus_adaptor.cc68 brillo::ErrorPtr* /*error*/, string* user, string* password) {
69 SLOG(this, 2) << __func__ << ": " << user; local
70 task_->GetLogin(user, password);
67 getsec( brillo::ErrorPtr* , string* user, string* password) argument
/system/connectivity/shill/
H A Dprocess_manager.h72 // - the child process will run as |user| and |group|
74 // with capabilities, which |user| might not have on its own
79 const std::string& user,
84 spawn_source, program, arguments, user, group, capmask, exit_callback,
96 const std::string& user,
75 StartProcessInMinijail( const tracked_objects::Location& spawn_source, const base::FilePath& program, const std::vector<std::string>& arguments, const std::string& user, const std::string& group, uint64_t capmask, const base::Callback<void(int)>& exit_callback) argument
H A Drpc_task.cc46 void RPCTask::GetLogin(string* user, string* password) const { argument
47 delegate_->GetLogin(user, password);
H A Drpc_task_unittest.cc39 virtual void GetLogin(string* user, string* password);
53 void RPCTaskTest::GetLogin(string* user, string* password) { argument
55 last_user_ = user;
79 string user, password; local
80 task_.GetLogin(&user, &password);
82 EXPECT_EQ(&user, last_user_);
H A Dexternal_task.cc96 void ExternalTask::GetLogin(string* user, string* password) { argument
97 return task_delegate_->GetLogin(user, password);
H A Dprofile.h62 : user(u),
65 std::string user; // Empty for global. member in struct:shill::Profile::Identifier
70 // Path to the cached list of inserted user profiles to be loaded at
170 // identifier: "identifier" and "~user/identifier". Both "user" and
178 // "~user/identifier" depending on whether this profile has a user
182 // Load a list of user profile identifiers from a cache file |path|.
187 // Save a list of user profile identifiers |profiles| to a cache file |path|.
196 const std::string& GetUser() const { return name_.user; }
[all...]
H A Dprocess_manager.cc133 const std::string& user,
151 if (!minijail_->DropRoot(jail, user.c_str(), group.c_str())) {
129 StartProcessInMinijailWithPipes( const tracked_objects::Location& spawn_source, const base::FilePath& program, const std::vector<std::string>& arguments, const std::string& user, const std::string& group, uint64_t capmask, const base::Callback<void(int)>& exit_callback, int* stdin_fd, int* stdout_fd, int* stderr_fd) argument
/system/security/keystore/
H A Dpermissions.cpp143 struct user_euid user = user_euids[i]; local
144 if (user.uid == uid) {
145 return user.euid;
153 // All system users are equivalent for multi-user support.
159 struct user_perm user = user_perms[i]; local
160 if (user.uid == uid) {
161 return (user.perms & perm) && keystore_selinux_check_access(uid, perm, spid);
177 struct user_euid user = user_euids[i]; local
178 if (user.euid == callingUid && user
[all...]
/system/connectivity/shill/pppoe/
H A Dpppoe_service.cc192 void PPPoEService::GetLogin(string* user, string* password) { argument
193 CHECK(user && password);
194 *user = username_;
/system/core/crash_reporter/
H A Dcrash_reporter.cc96 SendCrashMetrics(kCrashKindUser, "user");
97 // Tell the metrics collector about the user crash, in order to log active
104 LOG(ERROR) << "Failed to send user crash notification to metrics_collector";
162 const std::string& user, const bool crash_test) {
163 // Handle a specific user space crash.
164 CHECK(!user.empty()) << "--user= must be set";
173 // Accumulate logs to help in diagnosing failures during user collection.
176 bool handled = user_collector->HandleCrash(user, nullptr);
189 // Accumulate logs to help in diagnosing failures during user collectio
161 HandleUserCrash(UserCollector *user_collector, const std::string& user, const bool crash_test) argument
[all...]
/system/core/toolbox/
H A Dps.c49 char user[32]; local
152 sprintf(user,"%d",(int)stats.st_uid);
154 strcpy(user,pw->pw_name);
173 printf("%-9s %-5d %-5d %-6d %-5d", user, pid, ppid, vss / 1024, rss * 4);
H A Dtop.c481 struct passwd* user = getpwuid(proc->uid); local
484 if (user && user->pw_name) {
485 user_str = user->pw_name;
/system/connectivity/shill/vpn/
H A Dopenvpn_management_server.cc288 string user = driver_->args()->LookupString(kOpenVPNUserProperty, ""); local
292 if (user.empty() || (token.empty() && (password.empty() || otp.empty()))) {
294 << (user.empty() ? " no-user" : "")
316 SendUsername(tag, user);
322 string user = driver_->args()->LookupString(kOpenVPNUserProperty, ""); local
324 if (user.empty() || password.empty()) {
326 << (user.empty() ? " no-user" : "")
331 SendUsername(tag, user);
[all...]
H A Dl2tp_ipsec_driver.cc28 // Notably, XAUTH and other forms of user authentication on this outer link
34 // using the provided "user" and "password" properties.
280 AppendValueOption(kL2tpIpsecUserProperty, "--user", options);
341 string user = args()->LookupString(kL2tpIpsecXauthUserProperty, ""); local
343 if (user.empty() && password.empty()) {
347 if (user.empty() || password.empty()) {
353 string xauth_credentials = user + "\n" + password + "\n";
423 void L2TPIPSecDriver::GetLogin(string* user, string* password) { argument
437 *user = user_property;
H A Dl2tp_ipsec_driver_unittest.cc193 virtual void GetLogin(string* user, string* password);
213 void L2TPIPSecDriverTest::GetLogin(string* /*user*/, string* /*password*/) {}
503 string user, password; local
505 driver_->GetLogin(&user, &password);
506 EXPECT_TRUE(user.empty());
510 driver_->GetLogin(&user, &password);
511 EXPECT_TRUE(user.empty());
514 driver_->GetLogin(&user, &password);
515 EXPECT_EQ(kUser, user);
H A Dopenvpn_driver_unittest.cc87 user(user_in),
94 string user; member in struct:shill::AuthenticationExpectations
255 virtual void GetLogin(string* user, string* password);
293 void OpenVPNDriverTest::GetLogin(string* /*user*/, string* /*password*/) {}
425 if (!GetParam().user.empty()) {
426 store.SetStringProperty(kOpenVPNUserProperty, GetParam().user,
455 "", "client_cert", "user", "", "",
461 "", "", "user", "", "",
466 "", "client_cert", "user", "otp", "",
473 "", "client_cert", "user", "ot
[all...]
/system/core/libutils/
H A DThreads.cpp718 int Thread::_threadLoop(void* user) argument
720 Thread* const self = static_cast<Thread*>(user);
/system/tpm/attestation/server/
H A Dattestation_service.cc776 LOG(ERROR) << __func__ << ": Failed to store certified key for user.";
865 int AttestationService::ChooseTemporalIndex(const std::string& user, argument
867 std::string user_hash = crypto::SHA256HashString(user);
880 // We've previously chosen this index for this user, reuse it.
883 // We've previously chosen this index for another user.
/system/connectivity/shill/cellular/
H A Dcellular.cc565 // At present, there is no way of notifying user of this asynchronous error.
1067 void Cellular::GetLogin(string* user, string* password) { argument
1073 CHECK(user);
1075 *user = service()->ppp_username();
H A Dcellular_unittest.cc1435 virtual void GetLogin(std::string* user, std::string* password) {} argument
1504 const char kFakeUsername[] = "fake-user";

Completed in 522 milliseconds