/system/core/gatekeeperd/ |
H A D | SoftGateKeeperDevice.cpp | 21 int SoftGateKeeperDevice::enroll(uint32_t uid, argument 54 EnrollRequest request(uid, ¤t_password_handle_buffer, &desired_password_buffer, 71 int SoftGateKeeperDevice::verify(uint32_t uid, argument 88 VerifyRequest request(uid, challenge, &password_handle_buffer, &provided_password_buffer);
|
/system/core/init/ |
H A D | descriptors.h | 30 DescriptorInfo(const std::string& name, const std::string& type, uid_t uid, 43 uid_t uid() const { return uid_; } function in class:android::init::DescriptorInfo 64 SocketInfo(const std::string& name, const std::string& type, uid_t uid, 74 FileInfo(const std::string& name, const std::string& type, uid_t uid,
|
H A D | service_test.cpp | 46 EXPECT_EQ(0U, service_in_old_memory->uid()); 66 EXPECT_EQ(0U, service_in_old_memory2->uid()); 95 args.push_back("root"); // uid. 105 static void Test_make_temporary_oneshot_service(bool dash_dash, bool seclabel, bool uid, bool gid, argument 111 if (uid) { 112 args.push_back("log"); // uid 135 if (uid) { 138 ASSERT_EQ(*decoded_uid, svc->uid()); 140 ASSERT_EQ(0U, svc->uid());
|
/system/core/libpackagelistparser/include/packagelistparser/ |
H A D | packagelistparser.h | 50 uid_t uid; member in struct:pkg_info
|
/system/core/logd/ |
H A D | LogBufferInterface.h | 33 virtual int log(log_id_t log_id, log_time realtime, uid_t uid, pid_t pid,
|
H A D | libaudit.h | 39 uid_t uid; member in struct:audit_sig_info
|
H A D | LogUtils.h | 33 char* uidToName(uid_t uid); 70 bool clientHasLogCredentials(uid_t uid, gid_t gid, pid_t pid);
|
H A D | LogWhiteBlackList.h | 34 int cmp(uid_t uid, pid_t pid) const; 40 Prune(uid_t uid, pid_t pid);
|
H A D | CommandListener.cpp | 82 uid_t uid = cli->getUid(); local 84 uid = AID_ROOT; 98 cli->sendMsg(mBuf.clear((log_id_t)id, uid) ? "busy" : "success"); 202 uid_t uid = cli->getUid(); local 204 uid = AID_ROOT; 232 package_string(mBuf.formatStatistics(uid, pid, logMask)).c_str()); 286 uid_t uid = cli->getUid(); local 288 uid = AID_ROOT; 319 cli->sendMsg(package_string(mBuf.formatEntry(atoi(id), uid)).c_str()); 324 package_string(mBuf.formatGetEventTag(uid, nam [all...] |
/system/netd/server/ |
H A D | NetlinkHandler.cpp | 162 const char *uid = evt->findParam("UID"); local 164 notifyStrictCleartext(uid, hex); 170 const char *uid = evt->findParam("UID"); local 173 timestamp, uid); 221 const char *uid) { 225 else if (uid != NULL && isActive) 227 "IfaceClass active %s %s %s", name, timestamp, uid); 261 void NetlinkHandler::notifyStrictCleartext(const char* uid, const char* hex) { argument 262 notify(ResponseCode::StrictCleartext, "%s %s", uid, hex); 218 notifyInterfaceClassActivity(const char *name, bool isActive, const char *timestamp, const char *uid) argument
|
H A D | TrafficController.cpp | 125 ALOGE("Failed to delete data(uid=%u): %s\n", key, strerror(res.code())); 284 int TrafficController::tagSocket(int sockFd, uint32_t tag, uid_t uid) { argument 286 if (legacy_tagSocket(sockFd, tag, uid)) return -errno; 292 UidTag newKey = {.uid = (uint32_t)uid, .tag = tag}; 322 int TrafficController::setCounterSet(int counterSetNum, uid_t uid) { argument 326 if (legacy_setCounterSet(counterSetNum, uid)) return -errno; 330 // The default counter set for all uid is 0, so deleting the current counterset for that uid 333 Status res = mUidCounterSetMap.deleteValue(uid); 351 deleteTagData(uint32_t tag, uid_t uid) argument 432 updateOwnerMapEntry(BpfMap<uint32_t, uint8_t>& map, uid_t uid, FirewallRule rule, FirewallType type) argument 450 changeUidOwnerRule(ChildChain chain, uid_t uid, FirewallRule rule, FirewallType type) argument [all...] |
H A D | UidRanges.cpp | 33 bool UidRanges::hasUid(uid_t uid) const { 34 if (uid > (unsigned) INT32_MAX) { 35 ALOGW("UID larger than 32 bits: %" PRIu64, static_cast<uint64_t>(uid)); 38 const int32_t intUid = static_cast<int32_t>(uid); 77 // Not a single uid, not a range. Found some other illegal char.
|
H A D | UidRanges.h | 34 bool hasUid(uid_t uid) const;
|
H A D | FwmarkServer.cpp | 132 return mNetworkController->checkUserNetworkAccess(command.uid, command.netId); 139 return mTrafficCtrl->setCounterSet(command.trafficCtrlInfo, command.uid); 146 return mTrafficCtrl->deleteTagData(command.trafficCtrlInfo, command.uid); 220 // uid, connect latency, and connect errno if any. 287 fwmark.netId = mNetworkController->getNetworkForUser(command.uid); 298 if (static_cast<int>(command.uid) == -1) { 299 command.uid = client->getUid(); 301 if (command.uid != client->getUid() && !hasUpdateDeviceStatsPermission(client)) { 304 return mTrafficCtrl->tagSocket(*socketFd, command.trafficCtrlInfo, command.uid);
|
H A D | FirewallController.cpp | 213 int FirewallController::setUidRule(ChildChain chain, int uid, FirewallRule rule) { argument 246 return gCtls->trafficCtrl.changeUidOwnerRule(chain, uid, rule, firewallType); 251 StringAppendF(&command, "%s %s -m owner --uid-owner %d -j %s\n", 252 op, chainName.c_str(), uid, target); 284 for (auto uid : uids) { 285 StringAppendF(&commands, "-A %s -m owner --uid-owner %d -j RETURN\n", name, uid); 290 "-A %s -m owner --uid-owner %d-%d -j RETURN\n", name, 0, MAX_SYSTEM_UID); 295 "-A %s -m owner ! --uid-owner %d-%u -j RETURN\n", name, 0, UINT32_MAX-1); 315 for (auto uid [all...] |
/system/core/storaged/ |
H A D | uid_info.cpp | 25 parcel->writeInt32(uid); 39 uid = parcel->readInt32();
|
/system/core/trusty/gatekeeper/ |
H A D | trusty_gatekeeper.cpp | 82 int TrustyGateKeeperDevice::Enroll(uint32_t uid, const uint8_t *current_password_handle, argument 106 EnrollRequest request(uid, ¤t_password_handle_buffer, &desired_password_buffer, 125 int TrustyGateKeeperDevice::Verify(uint32_t uid, uint64_t challenge, argument 139 VerifyRequest request(uid, challenge, &password_handle_buffer, &provided_password_buffer); 190 int TrustyGateKeeperDevice::enroll(const struct gatekeeper_device *dev, uint32_t uid, argument 210 return convert_device(dev)->Enroll(uid, current_password_handle, current_password_handle_length, 217 int TrustyGateKeeperDevice::verify(const struct gatekeeper_device *dev, uint32_t uid, argument 228 return convert_device(dev)->Verify(uid, challenge, enrolled_password_handle,
|
/system/netd/server/binder/android/net/ |
H A D | UidRange.h | 42 void setStart(int32_t uid); 43 void setStop(int32_t uid);
|
/system/security/keystore/ |
H A D | KeyStore.h | 83 android::String8 getKeyNameForUid(const android::String8& keyName, uid_t uid, 85 android::String8 getKeyNameForUidWithDir(const android::String8& keyName, uid_t uid, 87 NullOr<android::String8> getBlobFileNameIfExists(const android::String8& alias, uid_t uid, 115 ResponseCode getKeyForName(Blob* keyBlob, const android::String8& keyName, const uid_t uid, 126 UserState* getUserStateByUid(uid_t uid); 136 const UserState* getUserStateByUid(uid_t uid) const; 160 const BlobType type, uid_t uid); 167 ResponseCode importBlobAsKey(Blob* blob, const char* filename, uid_t uid);
|
H A D | grant_store.h | 40 uid_t owner_uid_; ///< key owner uid 49 * The uid parameter to each of the GrantStore function determines the grantee's 59 std::string put(const uid_t uid, const std::string& alias, const std::string& owner_dir_name, 61 const Grant* get(const uid_t uid, const std::string& alias) const;
|
H A D | key_store_service.h | 48 ::android::binder::Status get(const ::android::String16& name, int32_t uid, 51 const ::std::vector<uint8_t>& item, int32_t uid, int32_t flags, 53 ::android::binder::Status del(const ::android::String16& name, int32_t uid, 55 ::android::binder::Status exist(const ::android::String16& name, int32_t uid, 57 ::android::binder::Status list(const ::android::String16& namePrefix, int32_t uid, 67 ::android::binder::Status generate(const ::android::String16& name, int32_t uid, 72 const ::std::vector<uint8_t>& data, int32_t uid, 98 ::android::binder::Status getmtime(const ::android::String16& name, int32_t uid, 102 ::android::binder::Status clear_uid(int64_t uid, int32_t* _aidl_return) override; 108 const ::std::vector<uint8_t>& entropy, int32_t uid, int32_ [all...] |
H A D | KeyStore.cpp | 155 android::String8 KeyStore::getKeyNameForUid(const android::String8& keyName, uid_t uid, argument 160 return android::String8::format(".%u_chr_%s", uid, encoded.data()); 162 return android::String8::format("%u_%s", uid, encoded.data()); 166 android::String8 KeyStore::getKeyNameForUidWithDir(const android::String8& keyName, uid_t uid, argument 172 return android::String8::format("%s/.%u_chr_%s", getUserStateByUid(uid)->getUserDirName(), 173 uid, encoded.data()); 175 return android::String8::format("%s/%u_%s", getUserStateByUid(uid)->getUserDirName(), uid, 180 NullOr<android::String8> KeyStore::getBlobFileNameIfExists(const android::String8& alias, uid_t uid, argument 182 android::String8 filepath8(getKeyNameForUidWithDir(alias, uid, typ 372 uid_t uid; local 465 uid_t uid; local 466 s >> uid; local 609 getKeyForName(Blob* keyBlob, const android::String8& keyName, const uid_t uid, const BlobType type) argument 640 getUserStateByUid(uid_t uid) argument 846 uid_t uid = -1; local [all...] |
/system/netd/libbpf/ |
H A D | BpfNetworkStats.cpp | 44 int bpfGetUidStatsInternal(uid_t uid, Stats* stats, argument 46 auto statsEntry = appUidStatsMap.readValue(uid); 56 int bpfGetUidStats(uid_t uid, Stats* stats) { argument 65 return bpfGetUidStatsInternal(uid, stats, appUidStatsMap); 117 newLine.uid = (int32_t)statsKey.uid; 150 if (limitUid != UID_ALL && uint32_t(limitUid) != key.uid) { 160 ALOGE("failed to iterate per uid Stats map for detail traffic stats: %s", 219 .uid = (uint32_t)UID_ALL, .counterSet = (uint32_t)SET_ALL, .tag = (uint32_t)TAG_NONE}; 225 ALOGE("failed to iterate per uid Stat 251 combineUidTag(const uid_t uid, const uint32_t tag) argument [all...] |
/system/netd/libbpf/include/bpf/ |
H A D | BpfNetworkStats.h | 39 int32_t uid; member in struct:android::bpf::stats_line 48 int bpfGetUidStatsInternal(uid_t uid, struct Stats* stats, 103 int bpfGetUidStats(uid_t uid, struct Stats* stats);
|
/system/core/liblog/ |
H A D | pmsg_reader.c | 70 static bool uid_has_log_permission(uid_t uid) { argument 71 return (uid == AID_SYSTEM) || (uid == AID_LOG) || (uid == AID_ROOT) || 72 (uid == AID_LOGD); 77 uid_t uid; local 85 uid = __android_log_uid(); 86 if (uid_has_log_permission(uid)) { 87 return last_uid = uid; 112 return last_uid = uid; 137 uid_t uid; local [all...] |