/system/vold/ |
H A D | Ext4Crypt.h | 29 bool e4crypt_vold_create_user_key(userid_t user_id, int serial, bool ephemeral); 30 bool e4crypt_destroy_user_key(userid_t user_id); 31 bool e4crypt_add_user_key_auth(userid_t user_id, int serial, const char* token, 33 bool e4crypt_fixate_newest_user_key_auth(userid_t user_id); 35 bool e4crypt_unlock_user_key(userid_t user_id, int serial, const char* token, const char* secret); 36 bool e4crypt_lock_user_key(userid_t user_id); 38 bool e4crypt_prepare_user_storage(const char* volume_uuid, userid_t user_id, int serial, int flags); 39 bool e4crypt_destroy_user_storage(const char* volume_uuid, userid_t user_id, int flags);
|
H A D | Ext4Crypt.cpp | 177 static std::string get_de_key_path(userid_t user_id) { argument 178 return StringPrintf("%s/de/%d", user_key_dir.c_str(), user_id); 181 static std::string get_ce_key_directory_path(userid_t user_id) { argument 182 return StringPrintf("%s/ce/%d", user_key_dir.c_str(), user_id); 253 static bool read_and_fixate_user_ce_key(userid_t user_id, argument 256 auto const directory_path = get_ce_key_directory_path(user_id); 266 LOG(ERROR) << "Failed to find working ce key for user " << user_id; 270 static bool read_and_install_user_ce_key(userid_t user_id, argument 272 if (s_ce_key_raw_refs.count(user_id) != 0) return true; 274 if (!read_and_fixate_user_ce_key(user_id, aut 334 create_and_install_user_keys(userid_t user_id, bool create_ephemeral) argument 365 lookup_key_ref(const std::map<userid_t, std::string>& key_map, userid_t user_id, std::string* raw_ref) argument 414 userid_t user_id = atoi(entry->d_name); local 502 e4crypt_vold_create_user_key(userid_t user_id, int serial, bool ephemeral) argument 520 e4crypt_destroy_user_key(userid_t user_id) argument 589 e4crypt_add_user_key_auth(userid_t user_id, int serial, const char* token_hex, const char* secret_hex) argument 614 e4crypt_fixate_newest_user_key_auth(userid_t user_id) argument 629 e4crypt_unlock_user_key(userid_t user_id, int serial, const char* token_hex, const char* secret_hex) argument 662 e4crypt_lock_user_key(userid_t user_id) argument 679 e4crypt_prepare_user_storage(const char* volume_uuid, userid_t user_id, int serial, int flags) argument 750 e4crypt_destroy_user_storage(const char* volume_uuid, userid_t user_id, int flags) argument [all...] |
/system/bt/btif/include/ |
H A D | btif_sock_thread.h | 41 typedef void (*btsock_signaled_cb)(int fd, int type, int flags, uint32_t user_id); 42 typedef void (*btsock_cmd_cb)(int cmd_fd, int type, int size, uint32_t user_id); 45 int btsock_thread_add_fd(int handle, int fd, int type, int flags, uint32_t user_id); 49 int data_size, uint32_t user_id);
|
H A D | btif_sock_l2cap.h | 21 void btsock_l2cap_signaled(int fd, int flags, uint32_t user_id);
|
H A D | btif_sock_rfc.h | 38 void btsock_rfc_signaled(int fd, int flags, uint32_t user_id);
|
/system/gatekeeper/ |
H A D | gatekeeper.cpp | 33 secure_id_t user_id = 0;// todo: rename to policy local 34 uint32_t uid = request.user_id; 38 GetRandom(&user_id, sizeof(secure_id_t)); 48 user_id = pw_handle->user_id; 57 if (!GetFailureRecord(uid, user_id, &record, throttle_secure)) { 64 if (!IncrementFailureRecord(uid, user_id, timestamp, &record, throttle_secure)) { 84 if (ClearFailureRecord(uid, user_id, true)) { 87 ClearFailureRecord(uid, user_id, false); 95 salt, user_id, flag 120 secure_id_t user_id = password_handle->user_id; local 169 CreatePasswordHandle(SizedBuffer *password_handle_buffer, salt_t salt, secure_id_t user_id, uint64_t flags, uint8_t handle_version, const uint8_t *password, uint32_t password_length) argument 217 MintAuthToken(UniquePtr<uint8_t> *auth_token, uint32_t *length, uint64_t timestamp, secure_id_t user_id, secure_id_t authenticator_id, uint64_t challenge) argument 306 IncrementFailureRecord(uint32_t uid, secure_id_t user_id, uint64_t timestamp, failure_record_t *record, bool secure) argument [all...] |
H A D | gatekeeper_messages.cpp | 32 uint32_t user_id; member in struct:gatekeeper::serial_header_t 89 header->user_id = user_id; 99 header->user_id = user_id; 112 user_id = header->user_id; 116 user_id = header->user_id; 134 VerifyRequest::VerifyRequest(uint32_t user_id, uint64_ argument 194 VerifyResponse(uint32_t user_id, SizedBuffer *auth_token) argument 240 EnrollRequest(uint32_t user_id, SizedBuffer *password_handle, SizedBuffer *provided_password, SizedBuffer *enrolled_password) argument 327 EnrollResponse(uint32_t user_id, SizedBuffer *enrolled_password_handle) argument [all...] |
/system/gatekeeper/include/gatekeeper/ |
H A D | password_handle.h | 36 secure_id_t user_id; member in struct:gatekeeper::password_handle_t
|
H A D | gatekeeper_messages.h | 133 uint32_t user_id; member in struct:gatekeeper::GateKeeperMessage 139 uint32_t user_id, 156 VerifyResponse(uint32_t user_id, SizedBuffer *auth_token); 171 EnrollRequest(uint32_t user_id, SizedBuffer *password_handle, 197 EnrollResponse(uint32_t user_id, SizedBuffer *enrolled_password_handle);
|
H A D | gatekeeper.h | 128 virtual bool GetFailureRecord(uint32_t uid, secure_id_t user_id, failure_record_t *record, 141 virtual bool ClearFailureRecord(uint32_t uid, secure_id_t user_id, bool secure) = 0; 180 secure_id_t user_id, secure_id_t authenticator_id, uint64_t challenge); 196 bool IncrementFailureRecord(uint32_t uid, secure_id_t user_id, uint64_t timestamp,
|
/system/core/gatekeeperd/ |
H A D | IUserManager.cpp | 33 virtual int32_t getCredentialOwnerProfile(int32_t user_id) { argument 36 data.writeInt32(user_id);
|
H A D | IUserManager.h | 38 virtual int32_t getCredentialOwnerProfile(int32_t user_id) = 0;
|
H A D | SoftGateKeeper.h | 111 virtual bool GetFailureRecord(uint32_t uid, secure_id_t user_id, failure_record_t *record, argument 114 if (user_id != stored->secure_user_id) { 115 stored->secure_user_id = user_id; 123 virtual bool ClearFailureRecord(uint32_t uid, secure_id_t user_id, bool /* secure */) { argument 125 stored->secure_user_id = user_id; 155 uint64_t user_id = android::base::get_unaligned(&expected_handle->user_id); local 156 FastHashMap::const_iterator it = fast_hash_map_.find(user_id); 163 fast_hash_map_[user_id] = ComputeFastHash(password, salt);
|
H A D | gatekeeperd.cpp | 175 store_sid(uid, handle->user_id); 260 enrolled_password_handle)->user_id);
|
/system/bt/btif/src/ |
H A D | btif_sock_thread.c | 84 uint32_t user_id; member in struct:__anon692 103 static inline void add_poll(int h, int fd, int type, int flags, uint32_t user_id); 238 uint32_t user_id; member in struct:__anon694 240 int btsock_thread_add_fd(int h, int fd, int type, int flags, uint32_t user_id) argument 259 add_poll(h, fd, type, flags, user_id); 264 sock_cmd_t cmd = {CMD_ADD_FD, fd, type, flags, user_id}; 294 int btsock_thread_post_cmd(int h, int type, const unsigned char* data, int size, uint32_t user_id) argument 306 sock_cmd_t cmd = {CMD_USER_PRIVATE, 0, type, size, user_id}; 401 static inline void set_poll(poll_slot_t* ps, int fd, int type, int flags, uint32_t user_id) argument 404 ps->user_id 412 add_poll(int h, int fd, int type, int flags, uint32_t user_id) argument 513 uint32_t user_id = ts[h].ps[ps_i].user_id; local [all...] |
H A D | btif_sock.c | 40 static void btsock_signaled(int fd, int type, int flags, uint32_t user_id); 178 static void btsock_signaled(int fd, int type, int flags, uint32_t user_id) { argument 181 btsock_rfc_signaled(fd, flags, user_id); 184 btsock_l2cap_signaled(fd, flags, user_id);
|
H A D | btif_sock_l2cap.c | 1023 void btsock_l2cap_signaled(int fd, int flags, uint32_t user_id) argument 1030 sock = btsock_l2cap_find_by_id_l(user_id); 1079 UINT_TO_PTR(user_id)) != BTA_JV_SUCCESS) { 1081 on_l2cap_write_fixed_done(buffer, count, user_id); 1086 UINT_TO_PTR(user_id)) != BTA_JV_SUCCESS) { 1088 on_l2cap_write_done(buffer, count, user_id);
|
/system/keymaster/ |
H A D | keymaster_enforcement_test.cpp | 524 token.user_id = 9; 530 .Authorization(TAG_USER_SECURE_ID, token.user_id) 547 token.user_id = 9; 554 .Authorization(TAG_USER_SECURE_ID, token.user_id) 576 token.user_id = 9; 582 .Authorization(TAG_USER_SECURE_ID, token.user_id) 600 token.user_id = 9; 607 .Authorization(TAG_USER_SECURE_ID, token.user_id) 627 token.user_id = 9; 635 .Authorization(TAG_USER_SECURE_ID, token.user_id) [all...] |
H A D | keymaster_enforcement.cpp | 470 if (user_secure_id != auth_token.user_id && user_secure_id != auth_token.authenticator_id) { 471 LOG_I("Auth token SIDs %llu and %llu do not match key SID %llu", auth_token.user_id,
|
/system/core/gatekeeperd/tests/ |
H A D | gatekeeper_test.cpp | 90 ASSERT_NE((uint64_t) 0, auth_token->user_id); 122 secure_id_t secure_id = auth_token->user_id; 145 reinterpret_cast<hw_auth_token_t *>(response.auth_token.buffer.get())->user_id); 170 secure_id_t secure_id = auth_token->user_id; 190 reinterpret_cast<hw_auth_token_t *>(response.auth_token.buffer.get())->user_id);
|
/system/gatekeeper/tests/ |
H A D | gatekeeper_device_test.cpp | 216 secure_id_t sid = handle->user_id; 223 ASSERT_NE(sid, handle->user_id); 240 secure_id_t sid = handle->user_id; 247 ASSERT_EQ(sid, handle->user_id);
|
H A D | gatekeeper_messages_test.cpp | 66 ASSERT_EQ(USER_ID, deserialized_msg.user_id); 95 ASSERT_EQ(USER_ID, deserialized_msg.user_id); 128 ASSERT_EQ(USER_ID, deserialized_msg.user_id); 158 ASSERT_EQ(USER_ID, deserialized_msg.user_id); 181 ASSERT_EQ(USER_ID, deserialized_msg.user_id); 210 ASSERT_EQ(USER_ID, deserialized_msg.user_id);
|
/system/media/audio/include/system/ |
H A D | sound_trigger.h | 181 unsigned int user_id; /* user ID */ member in struct:sound_trigger_confidence_level
|
/system/security/keystore/ |
H A D | auth_token_table.cpp | 198 (sid == token_->user_id && (auth_type & authenticator_type()) != 0)) 211 return (token_->user_id == entry.token_->user_id &&
|
/system/security/keystore/tests/ |
H A D | auth_token_table_test.cpp | 72 token->user_id = rsid; 108 EXPECT_EQ(1U, found->user_id); 112 EXPECT_EQ(1U, found->user_id); 116 EXPECT_EQ(3U, found->user_id); 120 EXPECT_EQ(3U, found->user_id);
|