Searched refs:user_id (Results 1 - 25 of 46) sorted by relevance

12

/system/vold/
H A DExt4Crypt.h24 bool e4crypt_vold_create_user_key(userid_t user_id, int serial, bool ephemeral);
25 bool e4crypt_destroy_user_key(userid_t user_id);
26 bool e4crypt_add_user_key_auth(userid_t user_id, int serial, const std::string& token,
28 bool e4crypt_fixate_newest_user_key_auth(userid_t user_id);
30 bool e4crypt_unlock_user_key(userid_t user_id, int serial, const std::string& token,
32 bool e4crypt_lock_user_key(userid_t user_id);
34 bool e4crypt_prepare_user_storage(const std::string& volume_uuid, userid_t user_id, int serial,
36 bool e4crypt_destroy_user_storage(const std::string& volume_uuid, userid_t user_id, int flags);
H A DExt4Crypt.cpp106 static std::string get_de_key_path(userid_t user_id) { argument
107 return StringPrintf("%s/de/%d", user_key_dir.c_str(), user_id);
110 static std::string get_ce_key_directory_path(userid_t user_id) { argument
111 return StringPrintf("%s/ce/%d", user_key_dir.c_str(), user_id);
182 static bool read_and_fixate_user_ce_key(userid_t user_id, argument
185 auto const directory_path = get_ce_key_directory_path(user_id);
195 LOG(ERROR) << "Failed to find working ce key for user " << user_id;
199 static bool read_and_install_user_ce_key(userid_t user_id, argument
201 if (s_ce_key_raw_refs.count(user_id) != 0) return true;
203 if (!read_and_fixate_user_ce_key(user_id, aut
232 create_and_install_user_keys(userid_t user_id, bool create_ephemeral) argument
263 lookup_key_ref(const std::map<userid_t, std::string>& key_map, userid_t user_id, std::string* raw_ref) argument
317 userid_t user_id = std::stoi(entry->d_name); local
395 e4crypt_vold_create_user_key(userid_t user_id, int serial, bool ephemeral) argument
422 evict_ce_key(userid_t user_id) argument
435 e4crypt_destroy_user_key(userid_t user_id) argument
550 e4crypt_add_user_key_auth(userid_t user_id, int serial, const std::string& token_hex, const std::string& secret_hex) argument
575 e4crypt_fixate_newest_user_key_auth(userid_t user_id) argument
590 e4crypt_unlock_user_key(userid_t user_id, int serial, const std::string& token_hex, const std::string& secret_hex) argument
623 e4crypt_lock_user_key(userid_t user_id) argument
641 prepare_subdirs(const std::string& action, const std::string& volume_uuid, userid_t user_id, int flags) argument
652 e4crypt_prepare_user_storage(const std::string& volume_uuid, userid_t user_id, int serial, int flags) argument
743 e4crypt_destroy_user_storage(const std::string& volume_uuid, userid_t user_id, int flags) argument
[all...]
H A Dvold_prepare_subdirs.cpp44 std::cerr << "Usage: " << progname << " [ prepare | destroy ] <volume_uuid> <user_id> <flags>"
122 static bool prepare_subdirs(const std::string& volume_uuid, int user_id, int flags) { argument
127 auto misc_de_path = android::vold::BuildDataMiscDePath(user_id);
131 auto vendor_de_path = android::vold::BuildDataVendorDePath(user_id);
137 auto misc_ce_path = android::vold::BuildDataMiscCePath(user_id);
145 static bool destroy_subdirs(const std::string& volume_uuid, int user_id, int flags) { argument
149 auto misc_ce_path = android::vold::BuildDataMiscCePath(user_id);
152 auto vendor_ce_path = android::vold::BuildDataVendorCePath(user_id);
156 auto misc_de_path = android::vold::BuildDataMiscDePath(user_id);
159 auto vendor_de_path = android::vold::BuildDataVendorDePath(user_id);
176 int user_id = stoi(args[2]); local
[all...]
/system/core/include/cutils/
H A Dmultiuser.h32 extern uid_t multiuser_get_uid(userid_t user_id, appid_t app_id);
34 extern gid_t multiuser_get_cache_gid(userid_t user_id, appid_t app_id);
35 extern gid_t multiuser_get_ext_gid(userid_t user_id, appid_t app_id);
36 extern gid_t multiuser_get_ext_cache_gid(userid_t user_id, appid_t app_id);
37 extern gid_t multiuser_get_shared_gid(userid_t user_id, appid_t app_id);
/system/core/libcutils/include/cutils/
H A Dmultiuser.h32 extern uid_t multiuser_get_uid(userid_t user_id, appid_t app_id);
34 extern gid_t multiuser_get_cache_gid(userid_t user_id, appid_t app_id);
35 extern gid_t multiuser_get_ext_gid(userid_t user_id, appid_t app_id);
36 extern gid_t multiuser_get_ext_cache_gid(userid_t user_id, appid_t app_id);
37 extern gid_t multiuser_get_shared_gid(userid_t user_id, appid_t app_id);
/system/core/libcutils/include_vndk/cutils/
H A Dmultiuser.h32 extern uid_t multiuser_get_uid(userid_t user_id, appid_t app_id);
34 extern gid_t multiuser_get_cache_gid(userid_t user_id, appid_t app_id);
35 extern gid_t multiuser_get_ext_gid(userid_t user_id, appid_t app_id);
36 extern gid_t multiuser_get_ext_cache_gid(userid_t user_id, appid_t app_id);
37 extern gid_t multiuser_get_shared_gid(userid_t user_id, appid_t app_id);
/system/bt/btif/include/
H A Dbtif_sock_thread.h43 uint32_t user_id);
44 typedef void (*btsock_cmd_cb)(int cmd_fd, int type, int size, uint32_t user_id);
48 uint32_t user_id);
53 uint32_t user_id);
H A Dbtif_sock_l2cap.h20 void btsock_l2cap_signaled(int fd, int flags, uint32_t user_id);
H A Dbtif_sock_rfc.h40 void btsock_rfc_signaled(int fd, int flags, uint32_t user_id);
/system/core/libcutils/
H A Dmultiuser.cpp28 uid_t multiuser_get_uid(userid_t user_id, appid_t app_id) { argument
29 return (user_id * AID_USER_OFFSET) + (app_id % AID_USER_OFFSET);
32 gid_t multiuser_get_cache_gid(userid_t user_id, appid_t app_id) { argument
34 return multiuser_get_uid(user_id, (app_id - AID_APP_START) + AID_CACHE_GID_START);
40 gid_t multiuser_get_ext_gid(userid_t user_id, appid_t app_id) { argument
42 return multiuser_get_uid(user_id, (app_id - AID_APP_START) + AID_EXT_GID_START);
48 gid_t multiuser_get_ext_cache_gid(userid_t user_id, appid_t app_id) { argument
50 return multiuser_get_uid(user_id, (app_id - AID_APP_START) + AID_EXT_CACHE_GID_START);
/system/gatekeeper/
H A Dgatekeeper.cpp33 secure_id_t user_id = 0;// todo: rename to policy local
34 uint32_t uid = request.user_id;
38 GetRandom(&user_id, sizeof(secure_id_t));
48 user_id = pw_handle->user_id;
57 if (!GetFailureRecord(uid, user_id, &record, throttle_secure)) {
64 if (!IncrementFailureRecord(uid, user_id, timestamp, &record, throttle_secure)) {
84 if (ClearFailureRecord(uid, user_id, true)) {
87 ClearFailureRecord(uid, user_id, false);
95 salt, user_id, flag
120 secure_id_t user_id = password_handle->user_id; local
169 CreatePasswordHandle(SizedBuffer *password_handle_buffer, salt_t salt, secure_id_t user_id, uint64_t flags, uint8_t handle_version, const uint8_t *password, uint32_t password_length) argument
223 MintAuthToken(UniquePtr<uint8_t> *auth_token, uint32_t *length, uint64_t timestamp, secure_id_t user_id, secure_id_t authenticator_id, uint64_t challenge) argument
312 IncrementFailureRecord(uint32_t uid, secure_id_t user_id, uint64_t timestamp, failure_record_t *record, bool secure) argument
[all...]
H A Dgatekeeper_messages.cpp30 uint32_t user_id; member in struct:gatekeeper::serial_header_t
87 header->user_id = user_id;
97 header->user_id = user_id;
110 user_id = header->user_id;
114 user_id = header->user_id;
132 VerifyRequest::VerifyRequest(uint32_t user_id, uint64_ argument
192 VerifyResponse(uint32_t user_id, SizedBuffer *auth_token) argument
238 EnrollRequest(uint32_t user_id, SizedBuffer *password_handle, SizedBuffer *provided_password, SizedBuffer *enrolled_password) argument
325 EnrollResponse(uint32_t user_id, SizedBuffer *enrolled_password_handle) argument
[all...]
/system/core/storaged/include/
H A Dstoraged.h91 void load_proto(userid_t user_id);
92 char* prepare_proto(userid_t user_id, StoragedProto* proto);
93 void flush_proto(userid_t user_id, StoragedProto* proto);
94 void flush_proto_data(userid_t user_id, const char* data, ssize_t size);
95 string proto_path(userid_t user_id) { argument
96 return string("/data/misc_ce/") + to_string(user_id) +
135 void add_user_ce(userid_t user_id);
136 void remove_user_ce(userid_t user_id);
H A Dstoraged_uid_monitor.h63 userid_t user_id; member in struct:uid_io_usage
122 void clear_user_history(userid_t user_id);
/system/gatekeeper/include/gatekeeper/
H A Dpassword_handle.h36 secure_id_t user_id; member in struct:gatekeeper::password_handle_t
H A Dgatekeeper_messages.h133 uint32_t user_id; member in struct:gatekeeper::GateKeeperMessage
139 uint32_t user_id,
156 VerifyResponse(uint32_t user_id, SizedBuffer *auth_token);
171 EnrollRequest(uint32_t user_id, SizedBuffer *password_handle,
197 EnrollResponse(uint32_t user_id, SizedBuffer *enrolled_password_handle);
H A Dgatekeeper.h128 virtual bool GetFailureRecord(uint32_t uid, secure_id_t user_id, failure_record_t *record,
141 virtual bool ClearFailureRecord(uint32_t uid, secure_id_t user_id, bool secure) = 0;
180 secure_id_t user_id, secure_id_t authenticator_id, uint64_t challenge);
196 bool IncrementFailureRecord(uint32_t uid, secure_id_t user_id, uint64_t timestamp,
/system/core/storaged/
H A Dstoraged.cpp165 void storaged_t::add_user_ce(userid_t user_id) { argument
166 load_proto(user_id);
167 proto_loaded[user_id] = true;
170 void storaged_t::remove_user_ce(userid_t user_id) { argument
171 proto_loaded[user_id] = false;
172 mUidm.clear_user_history(user_id);
173 RemoveFileIfExists(proto_path(user_id), nullptr);
176 void storaged_t::load_proto(userid_t user_id) { argument
177 string proto_file = proto_path(user_id);
198 if (user_id
203 prepare_proto(userid_t user_id, StoragedProto* proto) argument
237 flush_proto_data(userid_t user_id, const char* data, ssize_t size) argument
293 flush_proto(userid_t user_id, StoragedProto* proto) argument
[all...]
H A Dstoraged_uid_monitor.cpp230 record.ios.user_id = p.second.user_id;
319 usage.user_id = multiuser_get_user_id(uid.uid);
417 userid_t user_id = entry.ios.user_id; local
418 UidIOItem* item_proto = user_items[user_id];
420 item_proto = (*protos)[user_id].mutable_uid_io_usage()
422 user_items[user_id] = item_proto;
431 rec_proto->set_user_id(user_id);
449 void uid_monitor::clear_user_history(userid_t user_id) argument
[all...]
/system/core/gatekeeperd/
H A DSoftGateKeeper.h111 virtual bool GetFailureRecord(uint32_t uid, secure_id_t user_id, failure_record_t *record, argument
114 if (user_id != stored->secure_user_id) {
115 stored->secure_user_id = user_id;
123 virtual bool ClearFailureRecord(uint32_t uid, secure_id_t user_id, bool /* secure */) { argument
125 stored->secure_user_id = user_id;
155 uint64_t user_id = android::base::get_unaligned<secure_id_t>(&expected_handle->user_id); local
156 FastHashMap::const_iterator it = fast_hash_map_.find(user_id);
163 fast_hash_map_[user_id] = ComputeFastHash(password, salt);
/system/bt/btif/src/
H A Dbtif_sock_thread.cc81 uint32_t user_id; member in struct:__anon608
101 uint32_t user_id);
219 uint32_t user_id; member in struct:__anon610
221 int btsock_thread_add_fd(int h, int fd, int type, int flags, uint32_t user_id) { argument
236 add_poll(h, fd, type, flags, user_id);
242 sock_cmd_t cmd = {CMD_ADD_FD, fd, type, flags, user_id};
270 uint32_t user_id) {
280 sock_cmd_t cmd = {CMD_USER_PRIVATE, 0, type, size, user_id};
363 uint32_t user_id) {
365 ps->user_id
269 btsock_thread_post_cmd(int h, int type, const unsigned char* data, int size, uint32_t user_id) argument
362 set_poll(poll_slot_t* ps, int fd, int type, int flags, uint32_t user_id) argument
375 add_poll(int h, int fd, int type, int flags, uint32_t user_id) argument
473 uint32_t user_id = ts[h].ps[ps_i].user_id; local
[all...]
H A Dbtif_sock.cc51 static void btsock_signaled(int fd, int type, int flags, uint32_t user_id);
228 static void btsock_signaled(int fd, int type, int flags, uint32_t user_id) { argument
231 btsock_rfc_signaled(fd, flags, user_id);
237 btsock_l2cap_signaled(fd, flags, user_id);
/system/core/gatekeeperd/tests/
H A Dgatekeeper_test.cpp89 ASSERT_NE((uint64_t) 0, auth_token->user_id);
121 secure_id_t secure_id = auth_token->user_id;
144 reinterpret_cast<hw_auth_token_t *>(response.auth_token.buffer.get())->user_id);
169 secure_id_t secure_id = auth_token->user_id;
189 reinterpret_cast<hw_auth_token_t *>(response.auth_token.buffer.get())->user_id);
/system/core/storaged/tests/
H A Dstoraged_test.cpp451 .user_id = 0,
456 .user_id = 0,
461 .user_id = 1,
473 .user_id = 1,
478 .user_id = 0,
499 EXPECT_EQ(user_0_item_0.records().entries(0).user_id(), 0UL);
502 EXPECT_EQ(user_0_item_0.records().entries(1).user_id(), 0UL);
509 EXPECT_EQ(user_0_item_1.records().entries(0).user_id(), 0UL);
518 EXPECT_EQ(user_1_item_0.records().entries(0).user_id(), 1UL);
526 EXPECT_EQ(user_1_item_1.records().entries(0).user_id(),
[all...]
/system/keymaster/tests/
H A Dkeymaster_enforcement_test.cpp578 token.user_id = 9;
584 .Authorization(TAG_USER_SECURE_ID, token.user_id)
601 token.user_id = 9;
608 .Authorization(TAG_USER_SECURE_ID, token.user_id)
630 token.user_id = 9;
636 .Authorization(TAG_USER_SECURE_ID, token.user_id)
654 token.user_id = 9;
661 .Authorization(TAG_USER_SECURE_ID, token.user_id)
681 token.user_id = 9;
689 .Authorization(TAG_USER_SECURE_ID, token.user_id)
[all...]

Completed in 422 milliseconds

12