/system/security/keystore/ |
H A D | keystore_keymaster_enforcement.h | 88 bool is_device_locked(int32_t userId) const override { 90 if (mIsDeviceLockedForUser.count(userId) == 0) return true; 91 return mIsDeviceLockedForUser.find(userId)->second; 94 void set_device_locked(bool isLocked, int32_t userId) { argument 95 mIsDeviceLockedForUser[userId] = isLocked;
|
H A D | KeyStore.h | 74 State getState(uid_t userId) { return getUserState(userId)->getState(); } argument 76 ResponseCode initializeUser(const android::String8& pw, uid_t userId); 79 ResponseCode writeMasterKey(const android::String8& pw, uid_t userId); 80 ResponseCode readMasterKey(const android::String8& pw, uid_t userId); 91 * Delete entries owned by userId. If keepUnencryptedEntries is true 95 void resetUser(uid_t userId, bool keepUnenryptedEntries); 96 bool isEmpty(uid_t userId) const; 98 void lock(uid_t userId); 100 ResponseCode get(const char* filename, Blob* keyBlob, const BlobType type, uid_t userId); [all...] |
H A D | user_state.cpp | 35 UserState::UserState(uid_t userId) : argument 36 mUserId(userId), mState(STATE_UNINITIALIZED), mRetry(MAX_RETRY) {
|
H A D | KeyStore.cpp | 90 ResponseCode KeyStore::initializeUser(const android::String8& pw, uid_t userId) { argument 91 UserState* userState = getUserState(userId); 101 ResponseCode KeyStore::writeMasterKey(const android::String8& pw, uid_t userId) { argument 102 UserState* userState = getUserState(userId); 106 ResponseCode KeyStore::readMasterKey(const android::String8& pw, uid_t userId) { argument 107 UserState* userState = getUserState(userId); 204 void KeyStore::resetUser(uid_t userId, bool keepUnenryptedEntries) { argument 207 UserState* userState = getUserState(userId); 208 if (list(prefix, &aliases, userId) != ResponseCode::NO_ERROR) { 218 ResponseCode rc = get(filename, &blob, ::TYPE_ANY, userId); 295 lock(uid_t userId) argument 303 get(const char* filename, Blob* keyBlob, const BlobType type, uid_t userId) argument 361 put(const char* filename, Blob* keyBlob, uid_t userId) argument 369 del(const char* filename, const BlobType type, uid_t userId) argument 477 list(const android::String8& prefix, android::Vector<android::String16>* matches, uid_t userId) argument 532 importKey(const uint8_t* key, size_t keyLen, const char* filename, uid_t userId, int32_t flags) argument 612 uid_t userId = get_user_id(uid); local 619 getUserState(uid_t userId) argument 641 uid_t userId = get_user_id(uid); local 658 uid_t userId = get_user_id(uid); local 662 upgradeBlob(const char* filename, Blob* blob, const uint8_t oldVersion, const BlobType type, uid_t userId) argument 705 importBlobAsKey(Blob* blob, const char* filename, uid_t userId) argument [all...] |
H A D | key_store_service.cpp | 151 Status KeyStoreService::getState(int32_t userId, int32_t* aidl_return) { argument 156 *aidl_return = mKeyStore->getState(userId); 282 Status KeyStoreService::onUserPasswordChanged(int32_t userId, const String16& password, argument 295 ALOGI("Secure lockscreen for user %d removed, deleting encrypted entries", userId); 296 mKeyStore->resetUser(userId, true); 300 switch (mKeyStore->getState(userId)) { 304 *aidl_return = static_cast<int32_t>(mKeyStore->initializeUser(password8, userId)); 309 *aidl_return = static_cast<int32_t>(mKeyStore->writeMasterKey(password8, userId)); 313 ALOGE("Changing user %d's password while locked, clearing old encryption", userId); 314 mKeyStore->resetUser(userId, tru 324 onUserAdded(int32_t userId, int32_t parentId, int32_t* aidl_return) argument 349 onUserRemoved(int32_t userId, int32_t* aidl_return) argument 360 lock(int32_t userId, int32_t* aidl_return) argument 379 unlock(int32_t userId, const String16& pw, int32_t* aidl_return) argument 409 isEmpty(int32_t userId, int32_t* aidl_return) argument 2291 onKeyguardVisibilityChanged(bool isShowing, int32_t userId, int32_t* aidl_return) argument [all...] |
/system/core/run-as/ |
H A D | run-as.cpp | 146 int userId = 0; local 148 userId = atoi(argv[3]); 149 if (userId < 0) error(1, 0, "negative user id: %d", userId); 168 if ((UID_MAX - info.uid) / AID_USER_OFFSET < (uid_t)userId) { 169 error(1, 0, "user id too big: %d", userId); 173 uid_t userAppId = (AID_USER_OFFSET * userId) + info.uid;
|
/system/core/storaged/ |
H A D | storaged_service.cpp | 167 binder::Status StoragedService::onUserStarted(int32_t userId) { argument 168 storaged_sp->add_user_ce(userId); 172 binder::Status StoragedService::onUserStopped(int32_t userId) { argument 173 storaged_sp->remove_user_ce(userId);
|
/system/core/logd/ |
H A D | LogStatistics.cpp | 259 uid_t userId = uid % AID_USER_OFFSET; local 260 const char* name = android::uidToName(userId); 261 if (!name && (userId > (AID_SHARED_GID_START - AID_APP))) { 262 name = android::uidToName(userId - (AID_SHARED_GID_START - AID_APP));
|
/system/vold/ |
H A D | VolumeManager.cpp | 344 int VolumeManager::linkPrimary(userid_t userId) { argument 347 source = StringPrintf("%s/%d", source.c_str(), userId); 351 std::string target(StringPrintf("/mnt/user/%d/primary", userId)); 365 int VolumeManager::onUserAdded(userid_t userId, int userSerialNumber) { argument 366 mAddedUsers[userId] = userSerialNumber; 370 int VolumeManager::onUserRemoved(userid_t userId) { argument 371 mAddedUsers.erase(userId); 375 int VolumeManager::onUserStarted(userid_t userId) { argument 379 std::string path(StringPrintf("%s/%d", kPathUserMount, userId)); 382 mStartedUsers.insert(userId); 389 onUserStopped(userid_t userId) argument [all...] |
H A D | Utils.cpp | 609 std::string BuildDataSystemLegacyPath(userid_t userId) { argument 610 return StringPrintf("%s/system/users/%u", BuildDataPath("").c_str(), userId); 613 std::string BuildDataSystemCePath(userid_t userId) { argument 614 return StringPrintf("%s/system_ce/%u", BuildDataPath("").c_str(), userId); 617 std::string BuildDataSystemDePath(userid_t userId) { argument 618 return StringPrintf("%s/system_de/%u", BuildDataPath("").c_str(), userId); 621 std::string BuildDataMiscLegacyPath(userid_t userId) { argument 622 return StringPrintf("%s/misc/user/%u", BuildDataPath("").c_str(), userId); 625 std::string BuildDataMiscCePath(userid_t userId) { argument 626 return StringPrintf("%s/misc_ce/%u", BuildDataPath("").c_str(), userId); 629 BuildDataMiscDePath(userid_t userId) argument 634 BuildDataProfilesDePath(userid_t userId) argument 638 BuildDataVendorCePath(userid_t userId) argument 642 BuildDataVendorDePath(userid_t userId) argument 656 BuildDataMediaCePath(const std::string& volumeUuid, userid_t userId) argument 662 BuildDataUserCePath(const std::string& volumeUuid, userid_t userId) argument 676 BuildDataUserDePath(const std::string& volumeUuid, userid_t userId) argument [all...] |
H A D | VoldNativeService.cpp | 250 binder::Status VoldNativeService::onUserAdded(int32_t userId, int32_t userSerial) { argument 254 return translate(VolumeManager::Instance()->onUserAdded(userId, userSerial)); 257 binder::Status VoldNativeService::onUserRemoved(int32_t userId) { argument 261 return translate(VolumeManager::Instance()->onUserRemoved(userId)); 264 binder::Status VoldNativeService::onUserStarted(int32_t userId) { argument 268 return translate(VolumeManager::Instance()->onUserStarted(userId)); 271 binder::Status VoldNativeService::onUserStopped(int32_t userId) { argument 275 return translate(VolumeManager::Instance()->onUserStopped(userId)); 695 binder::Status VoldNativeService::createUserKey(int32_t userId, int32_t userSerial, argument 700 return translateBool(e4crypt_vold_create_user_key(userId, userSeria 703 destroyUserKey(int32_t userId) argument 710 addUserKeyAuth(int32_t userId, int32_t userSerial, const std::string& token, const std::string& secret) argument 718 fixateNewestUserKeyAuth(int32_t userId) argument 725 unlockUserKey(int32_t userId, int32_t userSerial, const std::string& token, const std::string& secret) argument 733 lockUserKey(int32_t userId) argument 740 prepareUserStorage(const std::unique_ptr<std::string>& uuid, int32_t userId, int32_t userSerial, int32_t flags) argument 751 destroyUserStorage(const std::unique_ptr<std::string>& uuid, int32_t userId, int32_t flags) argument [all...] |