/system/core/metricsd/collectors/ |
H A D | cpu_usage_collector_test.cc | 38 uint64_t user, nice, system; local 40 ASSERT_FALSE(collector.ParseProcStat(invalid_contents[i], &user, &nice, 46 &user, &nice, &system)); 47 ASSERT_EQ(17191, user);
|
/system/connectivity/shill/shims/ |
H A D | c_ppp.cc | 42 string user, pass; local 43 if (!PPP::GetInstance()->GetSecret(&user, &pass)) { 47 strcpy(username, user.c_str()); // NOLINT(runtime/printf)
|
/system/connectivity/shill/dbus/ |
H A D | chromeos_rpc_task_dbus_adaptor.cc | 68 brillo::ErrorPtr* /*error*/, string* user, string* password) { 69 SLOG(this, 2) << __func__ << ": " << user; local 70 task_->GetLogin(user, password); 67 getsec( brillo::ErrorPtr* , string* user, string* password) argument
|
/system/connectivity/shill/ |
H A D | process_manager.h | 72 // - the child process will run as |user| and |group| 74 // with capabilities, which |user| might not have on its own 79 const std::string& user, 84 spawn_source, program, arguments, user, group, capmask, exit_callback, 96 const std::string& user, 75 StartProcessInMinijail( const tracked_objects::Location& spawn_source, const base::FilePath& program, const std::vector<std::string>& arguments, const std::string& user, const std::string& group, uint64_t capmask, const base::Callback<void(int)>& exit_callback) argument
|
H A D | rpc_task.cc | 46 void RPCTask::GetLogin(string* user, string* password) const { argument 47 delegate_->GetLogin(user, password);
|
H A D | rpc_task_unittest.cc | 39 virtual void GetLogin(string* user, string* password); 53 void RPCTaskTest::GetLogin(string* user, string* password) { argument 55 last_user_ = user; 79 string user, password; local 80 task_.GetLogin(&user, &password); 82 EXPECT_EQ(&user, last_user_);
|
H A D | external_task.cc | 96 void ExternalTask::GetLogin(string* user, string* password) { argument 97 return task_delegate_->GetLogin(user, password);
|
H A D | profile.h | 62 : user(u), 65 std::string user; // Empty for global. member in struct:shill::Profile::Identifier 70 // Path to the cached list of inserted user profiles to be loaded at 170 // identifier: "identifier" and "~user/identifier". Both "user" and 178 // "~user/identifier" depending on whether this profile has a user 182 // Load a list of user profile identifiers from a cache file |path|. 187 // Save a list of user profile identifiers |profiles| to a cache file |path|. 196 const std::string& GetUser() const { return name_.user; } [all...] |
H A D | process_manager.cc | 133 const std::string& user, 151 if (!minijail_->DropRoot(jail, user.c_str(), group.c_str())) { 129 StartProcessInMinijailWithPipes( const tracked_objects::Location& spawn_source, const base::FilePath& program, const std::vector<std::string>& arguments, const std::string& user, const std::string& group, uint64_t capmask, const base::Callback<void(int)>& exit_callback, int* stdin_fd, int* stdout_fd, int* stderr_fd) argument
|
/system/security/keystore/ |
H A D | permissions.cpp | 143 struct user_euid user = user_euids[i]; local 144 if (user.uid == uid) { 145 return user.euid; 153 // All system users are equivalent for multi-user support. 159 struct user_perm user = user_perms[i]; local 160 if (user.uid == uid) { 161 return (user.perms & perm) && keystore_selinux_check_access(uid, perm, spid); 177 struct user_euid user = user_euids[i]; local 178 if (user.euid == callingUid && user [all...] |
/system/connectivity/shill/pppoe/ |
H A D | pppoe_service.cc | 192 void PPPoEService::GetLogin(string* user, string* password) { argument 193 CHECK(user && password); 194 *user = username_;
|
/system/core/crash_reporter/ |
H A D | crash_reporter.cc | 96 SendCrashMetrics(kCrashKindUser, "user"); 97 // Tell the metrics collector about the user crash, in order to log active 104 LOG(ERROR) << "Failed to send user crash notification to metrics_collector"; 162 const std::string& user, const bool crash_test) { 163 // Handle a specific user space crash. 164 CHECK(!user.empty()) << "--user= must be set"; 173 // Accumulate logs to help in diagnosing failures during user collection. 176 bool handled = user_collector->HandleCrash(user, nullptr); 189 // Accumulate logs to help in diagnosing failures during user collectio 161 HandleUserCrash(UserCollector *user_collector, const std::string& user, const bool crash_test) argument [all...] |
/system/core/toolbox/ |
H A D | ps.c | 49 char user[32]; local 152 sprintf(user,"%d",(int)stats.st_uid); 154 strcpy(user,pw->pw_name); 173 printf("%-9s %-5d %-5d %-6d %-5d", user, pid, ppid, vss / 1024, rss * 4);
|
H A D | top.c | 481 struct passwd* user = getpwuid(proc->uid); local 484 if (user && user->pw_name) { 485 user_str = user->pw_name;
|
/system/connectivity/shill/vpn/ |
H A D | openvpn_management_server.cc | 288 string user = driver_->args()->LookupString(kOpenVPNUserProperty, ""); local 292 if (user.empty() || (token.empty() && (password.empty() || otp.empty()))) { 294 << (user.empty() ? " no-user" : "") 316 SendUsername(tag, user); 322 string user = driver_->args()->LookupString(kOpenVPNUserProperty, ""); local 324 if (user.empty() || password.empty()) { 326 << (user.empty() ? " no-user" : "") 331 SendUsername(tag, user); [all...] |
H A D | l2tp_ipsec_driver.cc | 28 // Notably, XAUTH and other forms of user authentication on this outer link 34 // using the provided "user" and "password" properties. 280 AppendValueOption(kL2tpIpsecUserProperty, "--user", options); 341 string user = args()->LookupString(kL2tpIpsecXauthUserProperty, ""); local 343 if (user.empty() && password.empty()) { 347 if (user.empty() || password.empty()) { 353 string xauth_credentials = user + "\n" + password + "\n"; 423 void L2TPIPSecDriver::GetLogin(string* user, string* password) { argument 437 *user = user_property;
|
H A D | l2tp_ipsec_driver_unittest.cc | 193 virtual void GetLogin(string* user, string* password); 213 void L2TPIPSecDriverTest::GetLogin(string* /*user*/, string* /*password*/) {} 503 string user, password; local 505 driver_->GetLogin(&user, &password); 506 EXPECT_TRUE(user.empty()); 510 driver_->GetLogin(&user, &password); 511 EXPECT_TRUE(user.empty()); 514 driver_->GetLogin(&user, &password); 515 EXPECT_EQ(kUser, user);
|
H A D | openvpn_driver_unittest.cc | 87 user(user_in), 94 string user; member in struct:shill::AuthenticationExpectations 255 virtual void GetLogin(string* user, string* password); 293 void OpenVPNDriverTest::GetLogin(string* /*user*/, string* /*password*/) {} 425 if (!GetParam().user.empty()) { 426 store.SetStringProperty(kOpenVPNUserProperty, GetParam().user, 455 "", "client_cert", "user", "", "", 461 "", "", "user", "", "", 466 "", "client_cert", "user", "otp", "", 473 "", "client_cert", "user", "ot [all...] |
/system/core/libutils/ |
H A D | Threads.cpp | 718 int Thread::_threadLoop(void* user) argument 720 Thread* const self = static_cast<Thread*>(user);
|
/system/tpm/attestation/server/ |
H A D | attestation_service.cc | 776 LOG(ERROR) << __func__ << ": Failed to store certified key for user."; 865 int AttestationService::ChooseTemporalIndex(const std::string& user, argument 867 std::string user_hash = crypto::SHA256HashString(user); 880 // We've previously chosen this index for this user, reuse it. 883 // We've previously chosen this index for another user.
|
/system/connectivity/shill/cellular/ |
H A D | cellular.cc | 565 // At present, there is no way of notifying user of this asynchronous error. 1067 void Cellular::GetLogin(string* user, string* password) { argument 1073 CHECK(user); 1075 *user = service()->ppp_username();
|
H A D | cellular_unittest.cc | 1435 virtual void GetLogin(std::string* user, std::string* password) {} argument 1504 const char kFakeUsername[] = "fake-user";
|