Searched refs:user_id (Results 1 - 25 of 30) sorted by relevance

12

/system/vold/
H A DExt4Crypt.h29 bool e4crypt_vold_create_user_key(userid_t user_id, int serial, bool ephemeral);
30 bool e4crypt_destroy_user_key(userid_t user_id);
31 bool e4crypt_add_user_key_auth(userid_t user_id, int serial, const char* token,
33 bool e4crypt_fixate_newest_user_key_auth(userid_t user_id);
35 bool e4crypt_unlock_user_key(userid_t user_id, int serial, const char* token, const char* secret);
36 bool e4crypt_lock_user_key(userid_t user_id);
38 bool e4crypt_prepare_user_storage(const char* volume_uuid, userid_t user_id, int serial, int flags);
39 bool e4crypt_destroy_user_storage(const char* volume_uuid, userid_t user_id, int flags);
H A DExt4Crypt.cpp177 static std::string get_de_key_path(userid_t user_id) { argument
178 return StringPrintf("%s/de/%d", user_key_dir.c_str(), user_id);
181 static std::string get_ce_key_directory_path(userid_t user_id) { argument
182 return StringPrintf("%s/ce/%d", user_key_dir.c_str(), user_id);
253 static bool read_and_fixate_user_ce_key(userid_t user_id, argument
256 auto const directory_path = get_ce_key_directory_path(user_id);
266 LOG(ERROR) << "Failed to find working ce key for user " << user_id;
270 static bool read_and_install_user_ce_key(userid_t user_id, argument
272 if (s_ce_key_raw_refs.count(user_id) != 0) return true;
274 if (!read_and_fixate_user_ce_key(user_id, aut
334 create_and_install_user_keys(userid_t user_id, bool create_ephemeral) argument
365 lookup_key_ref(const std::map<userid_t, std::string>& key_map, userid_t user_id, std::string* raw_ref) argument
414 userid_t user_id = atoi(entry->d_name); local
502 e4crypt_vold_create_user_key(userid_t user_id, int serial, bool ephemeral) argument
520 e4crypt_destroy_user_key(userid_t user_id) argument
589 e4crypt_add_user_key_auth(userid_t user_id, int serial, const char* token_hex, const char* secret_hex) argument
614 e4crypt_fixate_newest_user_key_auth(userid_t user_id) argument
629 e4crypt_unlock_user_key(userid_t user_id, int serial, const char* token_hex, const char* secret_hex) argument
662 e4crypt_lock_user_key(userid_t user_id) argument
679 e4crypt_prepare_user_storage(const char* volume_uuid, userid_t user_id, int serial, int flags) argument
750 e4crypt_destroy_user_storage(const char* volume_uuid, userid_t user_id, int flags) argument
[all...]
/system/bt/btif/include/
H A Dbtif_sock_thread.h41 typedef void (*btsock_signaled_cb)(int fd, int type, int flags, uint32_t user_id);
42 typedef void (*btsock_cmd_cb)(int cmd_fd, int type, int size, uint32_t user_id);
45 int btsock_thread_add_fd(int handle, int fd, int type, int flags, uint32_t user_id);
49 int data_size, uint32_t user_id);
H A Dbtif_sock_l2cap.h21 void btsock_l2cap_signaled(int fd, int flags, uint32_t user_id);
H A Dbtif_sock_rfc.h38 void btsock_rfc_signaled(int fd, int flags, uint32_t user_id);
/system/gatekeeper/
H A Dgatekeeper.cpp33 secure_id_t user_id = 0;// todo: rename to policy local
34 uint32_t uid = request.user_id;
38 GetRandom(&user_id, sizeof(secure_id_t));
48 user_id = pw_handle->user_id;
57 if (!GetFailureRecord(uid, user_id, &record, throttle_secure)) {
64 if (!IncrementFailureRecord(uid, user_id, timestamp, &record, throttle_secure)) {
84 if (ClearFailureRecord(uid, user_id, true)) {
87 ClearFailureRecord(uid, user_id, false);
95 salt, user_id, flag
120 secure_id_t user_id = password_handle->user_id; local
169 CreatePasswordHandle(SizedBuffer *password_handle_buffer, salt_t salt, secure_id_t user_id, uint64_t flags, uint8_t handle_version, const uint8_t *password, uint32_t password_length) argument
217 MintAuthToken(UniquePtr<uint8_t> *auth_token, uint32_t *length, uint64_t timestamp, secure_id_t user_id, secure_id_t authenticator_id, uint64_t challenge) argument
306 IncrementFailureRecord(uint32_t uid, secure_id_t user_id, uint64_t timestamp, failure_record_t *record, bool secure) argument
[all...]
H A Dgatekeeper_messages.cpp32 uint32_t user_id; member in struct:gatekeeper::serial_header_t
89 header->user_id = user_id;
99 header->user_id = user_id;
112 user_id = header->user_id;
116 user_id = header->user_id;
134 VerifyRequest::VerifyRequest(uint32_t user_id, uint64_ argument
194 VerifyResponse(uint32_t user_id, SizedBuffer *auth_token) argument
240 EnrollRequest(uint32_t user_id, SizedBuffer *password_handle, SizedBuffer *provided_password, SizedBuffer *enrolled_password) argument
327 EnrollResponse(uint32_t user_id, SizedBuffer *enrolled_password_handle) argument
[all...]
/system/gatekeeper/include/gatekeeper/
H A Dpassword_handle.h36 secure_id_t user_id; member in struct:gatekeeper::password_handle_t
H A Dgatekeeper_messages.h133 uint32_t user_id; member in struct:gatekeeper::GateKeeperMessage
139 uint32_t user_id,
156 VerifyResponse(uint32_t user_id, SizedBuffer *auth_token);
171 EnrollRequest(uint32_t user_id, SizedBuffer *password_handle,
197 EnrollResponse(uint32_t user_id, SizedBuffer *enrolled_password_handle);
H A Dgatekeeper.h128 virtual bool GetFailureRecord(uint32_t uid, secure_id_t user_id, failure_record_t *record,
141 virtual bool ClearFailureRecord(uint32_t uid, secure_id_t user_id, bool secure) = 0;
180 secure_id_t user_id, secure_id_t authenticator_id, uint64_t challenge);
196 bool IncrementFailureRecord(uint32_t uid, secure_id_t user_id, uint64_t timestamp,
/system/core/gatekeeperd/
H A DIUserManager.cpp33 virtual int32_t getCredentialOwnerProfile(int32_t user_id) { argument
36 data.writeInt32(user_id);
H A DIUserManager.h38 virtual int32_t getCredentialOwnerProfile(int32_t user_id) = 0;
H A DSoftGateKeeper.h111 virtual bool GetFailureRecord(uint32_t uid, secure_id_t user_id, failure_record_t *record, argument
114 if (user_id != stored->secure_user_id) {
115 stored->secure_user_id = user_id;
123 virtual bool ClearFailureRecord(uint32_t uid, secure_id_t user_id, bool /* secure */) { argument
125 stored->secure_user_id = user_id;
155 uint64_t user_id = android::base::get_unaligned(&expected_handle->user_id); local
156 FastHashMap::const_iterator it = fast_hash_map_.find(user_id);
163 fast_hash_map_[user_id] = ComputeFastHash(password, salt);
H A Dgatekeeperd.cpp175 store_sid(uid, handle->user_id);
260 enrolled_password_handle)->user_id);
/system/bt/btif/src/
H A Dbtif_sock_thread.c84 uint32_t user_id; member in struct:__anon692
103 static inline void add_poll(int h, int fd, int type, int flags, uint32_t user_id);
238 uint32_t user_id; member in struct:__anon694
240 int btsock_thread_add_fd(int h, int fd, int type, int flags, uint32_t user_id) argument
259 add_poll(h, fd, type, flags, user_id);
264 sock_cmd_t cmd = {CMD_ADD_FD, fd, type, flags, user_id};
294 int btsock_thread_post_cmd(int h, int type, const unsigned char* data, int size, uint32_t user_id) argument
306 sock_cmd_t cmd = {CMD_USER_PRIVATE, 0, type, size, user_id};
401 static inline void set_poll(poll_slot_t* ps, int fd, int type, int flags, uint32_t user_id) argument
404 ps->user_id
412 add_poll(int h, int fd, int type, int flags, uint32_t user_id) argument
513 uint32_t user_id = ts[h].ps[ps_i].user_id; local
[all...]
H A Dbtif_sock.c40 static void btsock_signaled(int fd, int type, int flags, uint32_t user_id);
178 static void btsock_signaled(int fd, int type, int flags, uint32_t user_id) { argument
181 btsock_rfc_signaled(fd, flags, user_id);
184 btsock_l2cap_signaled(fd, flags, user_id);
H A Dbtif_sock_l2cap.c1023 void btsock_l2cap_signaled(int fd, int flags, uint32_t user_id) argument
1030 sock = btsock_l2cap_find_by_id_l(user_id);
1079 UINT_TO_PTR(user_id)) != BTA_JV_SUCCESS) {
1081 on_l2cap_write_fixed_done(buffer, count, user_id);
1086 UINT_TO_PTR(user_id)) != BTA_JV_SUCCESS) {
1088 on_l2cap_write_done(buffer, count, user_id);
/system/keymaster/
H A Dkeymaster_enforcement_test.cpp524 token.user_id = 9;
530 .Authorization(TAG_USER_SECURE_ID, token.user_id)
547 token.user_id = 9;
554 .Authorization(TAG_USER_SECURE_ID, token.user_id)
576 token.user_id = 9;
582 .Authorization(TAG_USER_SECURE_ID, token.user_id)
600 token.user_id = 9;
607 .Authorization(TAG_USER_SECURE_ID, token.user_id)
627 token.user_id = 9;
635 .Authorization(TAG_USER_SECURE_ID, token.user_id)
[all...]
H A Dkeymaster_enforcement.cpp470 if (user_secure_id != auth_token.user_id && user_secure_id != auth_token.authenticator_id) {
471 LOG_I("Auth token SIDs %llu and %llu do not match key SID %llu", auth_token.user_id,
/system/core/gatekeeperd/tests/
H A Dgatekeeper_test.cpp90 ASSERT_NE((uint64_t) 0, auth_token->user_id);
122 secure_id_t secure_id = auth_token->user_id;
145 reinterpret_cast<hw_auth_token_t *>(response.auth_token.buffer.get())->user_id);
170 secure_id_t secure_id = auth_token->user_id;
190 reinterpret_cast<hw_auth_token_t *>(response.auth_token.buffer.get())->user_id);
/system/gatekeeper/tests/
H A Dgatekeeper_device_test.cpp216 secure_id_t sid = handle->user_id;
223 ASSERT_NE(sid, handle->user_id);
240 secure_id_t sid = handle->user_id;
247 ASSERT_EQ(sid, handle->user_id);
H A Dgatekeeper_messages_test.cpp66 ASSERT_EQ(USER_ID, deserialized_msg.user_id);
95 ASSERT_EQ(USER_ID, deserialized_msg.user_id);
128 ASSERT_EQ(USER_ID, deserialized_msg.user_id);
158 ASSERT_EQ(USER_ID, deserialized_msg.user_id);
181 ASSERT_EQ(USER_ID, deserialized_msg.user_id);
210 ASSERT_EQ(USER_ID, deserialized_msg.user_id);
/system/media/audio/include/system/
H A Dsound_trigger.h181 unsigned int user_id; /* user ID */ member in struct:sound_trigger_confidence_level
/system/security/keystore/
H A Dauth_token_table.cpp198 (sid == token_->user_id && (auth_type & authenticator_type()) != 0))
211 return (token_->user_id == entry.token_->user_id &&
/system/security/keystore/tests/
H A Dauth_token_table_test.cpp72 token->user_id = rsid;
108 EXPECT_EQ(1U, found->user_id);
112 EXPECT_EQ(1U, found->user_id);
116 EXPECT_EQ(3U, found->user_id);
120 EXPECT_EQ(3U, found->user_id);

Completed in 343 milliseconds

12