/system/vold/ |
H A D | Ext4Crypt.h | 24 bool e4crypt_vold_create_user_key(userid_t user_id, int serial, bool ephemeral); 25 bool e4crypt_destroy_user_key(userid_t user_id); 26 bool e4crypt_add_user_key_auth(userid_t user_id, int serial, const std::string& token, 28 bool e4crypt_fixate_newest_user_key_auth(userid_t user_id); 30 bool e4crypt_unlock_user_key(userid_t user_id, int serial, const std::string& token, 32 bool e4crypt_lock_user_key(userid_t user_id); 34 bool e4crypt_prepare_user_storage(const std::string& volume_uuid, userid_t user_id, int serial, 36 bool e4crypt_destroy_user_storage(const std::string& volume_uuid, userid_t user_id, int flags);
|
H A D | Ext4Crypt.cpp | 106 static std::string get_de_key_path(userid_t user_id) { argument 107 return StringPrintf("%s/de/%d", user_key_dir.c_str(), user_id); 110 static std::string get_ce_key_directory_path(userid_t user_id) { argument 111 return StringPrintf("%s/ce/%d", user_key_dir.c_str(), user_id); 182 static bool read_and_fixate_user_ce_key(userid_t user_id, argument 185 auto const directory_path = get_ce_key_directory_path(user_id); 195 LOG(ERROR) << "Failed to find working ce key for user " << user_id; 199 static bool read_and_install_user_ce_key(userid_t user_id, argument 201 if (s_ce_key_raw_refs.count(user_id) != 0) return true; 203 if (!read_and_fixate_user_ce_key(user_id, aut 232 create_and_install_user_keys(userid_t user_id, bool create_ephemeral) argument 263 lookup_key_ref(const std::map<userid_t, std::string>& key_map, userid_t user_id, std::string* raw_ref) argument 317 userid_t user_id = std::stoi(entry->d_name); local 395 e4crypt_vold_create_user_key(userid_t user_id, int serial, bool ephemeral) argument 422 evict_ce_key(userid_t user_id) argument 435 e4crypt_destroy_user_key(userid_t user_id) argument 550 e4crypt_add_user_key_auth(userid_t user_id, int serial, const std::string& token_hex, const std::string& secret_hex) argument 575 e4crypt_fixate_newest_user_key_auth(userid_t user_id) argument 590 e4crypt_unlock_user_key(userid_t user_id, int serial, const std::string& token_hex, const std::string& secret_hex) argument 623 e4crypt_lock_user_key(userid_t user_id) argument 641 prepare_subdirs(const std::string& action, const std::string& volume_uuid, userid_t user_id, int flags) argument 652 e4crypt_prepare_user_storage(const std::string& volume_uuid, userid_t user_id, int serial, int flags) argument 743 e4crypt_destroy_user_storage(const std::string& volume_uuid, userid_t user_id, int flags) argument [all...] |
H A D | vold_prepare_subdirs.cpp | 44 std::cerr << "Usage: " << progname << " [ prepare | destroy ] <volume_uuid> <user_id> <flags>" 122 static bool prepare_subdirs(const std::string& volume_uuid, int user_id, int flags) { argument 127 auto misc_de_path = android::vold::BuildDataMiscDePath(user_id); 131 auto vendor_de_path = android::vold::BuildDataVendorDePath(user_id); 137 auto misc_ce_path = android::vold::BuildDataMiscCePath(user_id); 145 static bool destroy_subdirs(const std::string& volume_uuid, int user_id, int flags) { argument 149 auto misc_ce_path = android::vold::BuildDataMiscCePath(user_id); 152 auto vendor_ce_path = android::vold::BuildDataVendorCePath(user_id); 156 auto misc_de_path = android::vold::BuildDataMiscDePath(user_id); 159 auto vendor_de_path = android::vold::BuildDataVendorDePath(user_id); 176 int user_id = stoi(args[2]); local [all...] |
/system/core/include/cutils/ |
H A D | multiuser.h | 32 extern uid_t multiuser_get_uid(userid_t user_id, appid_t app_id); 34 extern gid_t multiuser_get_cache_gid(userid_t user_id, appid_t app_id); 35 extern gid_t multiuser_get_ext_gid(userid_t user_id, appid_t app_id); 36 extern gid_t multiuser_get_ext_cache_gid(userid_t user_id, appid_t app_id); 37 extern gid_t multiuser_get_shared_gid(userid_t user_id, appid_t app_id);
|
/system/core/libcutils/include/cutils/ |
H A D | multiuser.h | 32 extern uid_t multiuser_get_uid(userid_t user_id, appid_t app_id); 34 extern gid_t multiuser_get_cache_gid(userid_t user_id, appid_t app_id); 35 extern gid_t multiuser_get_ext_gid(userid_t user_id, appid_t app_id); 36 extern gid_t multiuser_get_ext_cache_gid(userid_t user_id, appid_t app_id); 37 extern gid_t multiuser_get_shared_gid(userid_t user_id, appid_t app_id);
|
/system/core/libcutils/include_vndk/cutils/ |
H A D | multiuser.h | 32 extern uid_t multiuser_get_uid(userid_t user_id, appid_t app_id); 34 extern gid_t multiuser_get_cache_gid(userid_t user_id, appid_t app_id); 35 extern gid_t multiuser_get_ext_gid(userid_t user_id, appid_t app_id); 36 extern gid_t multiuser_get_ext_cache_gid(userid_t user_id, appid_t app_id); 37 extern gid_t multiuser_get_shared_gid(userid_t user_id, appid_t app_id);
|
/system/bt/btif/include/ |
H A D | btif_sock_thread.h | 43 uint32_t user_id); 44 typedef void (*btsock_cmd_cb)(int cmd_fd, int type, int size, uint32_t user_id); 48 uint32_t user_id); 53 uint32_t user_id);
|
H A D | btif_sock_l2cap.h | 20 void btsock_l2cap_signaled(int fd, int flags, uint32_t user_id);
|
H A D | btif_sock_rfc.h | 40 void btsock_rfc_signaled(int fd, int flags, uint32_t user_id);
|
/system/core/libcutils/ |
H A D | multiuser.cpp | 28 uid_t multiuser_get_uid(userid_t user_id, appid_t app_id) { argument 29 return (user_id * AID_USER_OFFSET) + (app_id % AID_USER_OFFSET); 32 gid_t multiuser_get_cache_gid(userid_t user_id, appid_t app_id) { argument 34 return multiuser_get_uid(user_id, (app_id - AID_APP_START) + AID_CACHE_GID_START); 40 gid_t multiuser_get_ext_gid(userid_t user_id, appid_t app_id) { argument 42 return multiuser_get_uid(user_id, (app_id - AID_APP_START) + AID_EXT_GID_START); 48 gid_t multiuser_get_ext_cache_gid(userid_t user_id, appid_t app_id) { argument 50 return multiuser_get_uid(user_id, (app_id - AID_APP_START) + AID_EXT_CACHE_GID_START);
|
/system/gatekeeper/ |
H A D | gatekeeper.cpp | 33 secure_id_t user_id = 0;// todo: rename to policy local 34 uint32_t uid = request.user_id; 38 GetRandom(&user_id, sizeof(secure_id_t)); 48 user_id = pw_handle->user_id; 57 if (!GetFailureRecord(uid, user_id, &record, throttle_secure)) { 64 if (!IncrementFailureRecord(uid, user_id, timestamp, &record, throttle_secure)) { 84 if (ClearFailureRecord(uid, user_id, true)) { 87 ClearFailureRecord(uid, user_id, false); 95 salt, user_id, flag 120 secure_id_t user_id = password_handle->user_id; local 169 CreatePasswordHandle(SizedBuffer *password_handle_buffer, salt_t salt, secure_id_t user_id, uint64_t flags, uint8_t handle_version, const uint8_t *password, uint32_t password_length) argument 223 MintAuthToken(UniquePtr<uint8_t> *auth_token, uint32_t *length, uint64_t timestamp, secure_id_t user_id, secure_id_t authenticator_id, uint64_t challenge) argument 312 IncrementFailureRecord(uint32_t uid, secure_id_t user_id, uint64_t timestamp, failure_record_t *record, bool secure) argument [all...] |
H A D | gatekeeper_messages.cpp | 30 uint32_t user_id; member in struct:gatekeeper::serial_header_t 87 header->user_id = user_id; 97 header->user_id = user_id; 110 user_id = header->user_id; 114 user_id = header->user_id; 132 VerifyRequest::VerifyRequest(uint32_t user_id, uint64_ argument 192 VerifyResponse(uint32_t user_id, SizedBuffer *auth_token) argument 238 EnrollRequest(uint32_t user_id, SizedBuffer *password_handle, SizedBuffer *provided_password, SizedBuffer *enrolled_password) argument 325 EnrollResponse(uint32_t user_id, SizedBuffer *enrolled_password_handle) argument [all...] |
/system/core/storaged/include/ |
H A D | storaged.h | 91 void load_proto(userid_t user_id); 92 char* prepare_proto(userid_t user_id, StoragedProto* proto); 93 void flush_proto(userid_t user_id, StoragedProto* proto); 94 void flush_proto_data(userid_t user_id, const char* data, ssize_t size); 95 string proto_path(userid_t user_id) { argument 96 return string("/data/misc_ce/") + to_string(user_id) + 135 void add_user_ce(userid_t user_id); 136 void remove_user_ce(userid_t user_id);
|
H A D | storaged_uid_monitor.h | 63 userid_t user_id; member in struct:uid_io_usage 122 void clear_user_history(userid_t user_id);
|
/system/gatekeeper/include/gatekeeper/ |
H A D | password_handle.h | 36 secure_id_t user_id; member in struct:gatekeeper::password_handle_t
|
H A D | gatekeeper_messages.h | 133 uint32_t user_id; member in struct:gatekeeper::GateKeeperMessage 139 uint32_t user_id, 156 VerifyResponse(uint32_t user_id, SizedBuffer *auth_token); 171 EnrollRequest(uint32_t user_id, SizedBuffer *password_handle, 197 EnrollResponse(uint32_t user_id, SizedBuffer *enrolled_password_handle);
|
H A D | gatekeeper.h | 128 virtual bool GetFailureRecord(uint32_t uid, secure_id_t user_id, failure_record_t *record, 141 virtual bool ClearFailureRecord(uint32_t uid, secure_id_t user_id, bool secure) = 0; 180 secure_id_t user_id, secure_id_t authenticator_id, uint64_t challenge); 196 bool IncrementFailureRecord(uint32_t uid, secure_id_t user_id, uint64_t timestamp,
|
/system/core/storaged/ |
H A D | storaged.cpp | 165 void storaged_t::add_user_ce(userid_t user_id) { argument 166 load_proto(user_id); 167 proto_loaded[user_id] = true; 170 void storaged_t::remove_user_ce(userid_t user_id) { argument 171 proto_loaded[user_id] = false; 172 mUidm.clear_user_history(user_id); 173 RemoveFileIfExists(proto_path(user_id), nullptr); 176 void storaged_t::load_proto(userid_t user_id) { argument 177 string proto_file = proto_path(user_id); 198 if (user_id 203 prepare_proto(userid_t user_id, StoragedProto* proto) argument 237 flush_proto_data(userid_t user_id, const char* data, ssize_t size) argument 293 flush_proto(userid_t user_id, StoragedProto* proto) argument [all...] |
H A D | storaged_uid_monitor.cpp | 230 record.ios.user_id = p.second.user_id; 319 usage.user_id = multiuser_get_user_id(uid.uid); 417 userid_t user_id = entry.ios.user_id; local 418 UidIOItem* item_proto = user_items[user_id]; 420 item_proto = (*protos)[user_id].mutable_uid_io_usage() 422 user_items[user_id] = item_proto; 431 rec_proto->set_user_id(user_id); 449 void uid_monitor::clear_user_history(userid_t user_id) argument [all...] |
/system/core/gatekeeperd/ |
H A D | SoftGateKeeper.h | 111 virtual bool GetFailureRecord(uint32_t uid, secure_id_t user_id, failure_record_t *record, argument 114 if (user_id != stored->secure_user_id) { 115 stored->secure_user_id = user_id; 123 virtual bool ClearFailureRecord(uint32_t uid, secure_id_t user_id, bool /* secure */) { argument 125 stored->secure_user_id = user_id; 155 uint64_t user_id = android::base::get_unaligned<secure_id_t>(&expected_handle->user_id); local 156 FastHashMap::const_iterator it = fast_hash_map_.find(user_id); 163 fast_hash_map_[user_id] = ComputeFastHash(password, salt);
|
/system/bt/btif/src/ |
H A D | btif_sock_thread.cc | 81 uint32_t user_id; member in struct:__anon608 101 uint32_t user_id); 219 uint32_t user_id; member in struct:__anon610 221 int btsock_thread_add_fd(int h, int fd, int type, int flags, uint32_t user_id) { argument 236 add_poll(h, fd, type, flags, user_id); 242 sock_cmd_t cmd = {CMD_ADD_FD, fd, type, flags, user_id}; 270 uint32_t user_id) { 280 sock_cmd_t cmd = {CMD_USER_PRIVATE, 0, type, size, user_id}; 363 uint32_t user_id) { 365 ps->user_id 269 btsock_thread_post_cmd(int h, int type, const unsigned char* data, int size, uint32_t user_id) argument 362 set_poll(poll_slot_t* ps, int fd, int type, int flags, uint32_t user_id) argument 375 add_poll(int h, int fd, int type, int flags, uint32_t user_id) argument 473 uint32_t user_id = ts[h].ps[ps_i].user_id; local [all...] |
H A D | btif_sock.cc | 51 static void btsock_signaled(int fd, int type, int flags, uint32_t user_id); 228 static void btsock_signaled(int fd, int type, int flags, uint32_t user_id) { argument 231 btsock_rfc_signaled(fd, flags, user_id); 237 btsock_l2cap_signaled(fd, flags, user_id);
|
/system/core/gatekeeperd/tests/ |
H A D | gatekeeper_test.cpp | 89 ASSERT_NE((uint64_t) 0, auth_token->user_id); 121 secure_id_t secure_id = auth_token->user_id; 144 reinterpret_cast<hw_auth_token_t *>(response.auth_token.buffer.get())->user_id); 169 secure_id_t secure_id = auth_token->user_id; 189 reinterpret_cast<hw_auth_token_t *>(response.auth_token.buffer.get())->user_id);
|
/system/core/storaged/tests/ |
H A D | storaged_test.cpp | 451 .user_id = 0, 456 .user_id = 0, 461 .user_id = 1, 473 .user_id = 1, 478 .user_id = 0, 499 EXPECT_EQ(user_0_item_0.records().entries(0).user_id(), 0UL); 502 EXPECT_EQ(user_0_item_0.records().entries(1).user_id(), 0UL); 509 EXPECT_EQ(user_0_item_1.records().entries(0).user_id(), 0UL); 518 EXPECT_EQ(user_1_item_0.records().entries(0).user_id(), 1UL); 526 EXPECT_EQ(user_1_item_1.records().entries(0).user_id(), [all...] |
/system/keymaster/tests/ |
H A D | keymaster_enforcement_test.cpp | 578 token.user_id = 9; 584 .Authorization(TAG_USER_SECURE_ID, token.user_id) 601 token.user_id = 9; 608 .Authorization(TAG_USER_SECURE_ID, token.user_id) 630 token.user_id = 9; 636 .Authorization(TAG_USER_SECURE_ID, token.user_id) 654 token.user_id = 9; 661 .Authorization(TAG_USER_SECURE_ID, token.user_id) 681 token.user_id = 9; 689 .Authorization(TAG_USER_SECURE_ID, token.user_id) [all...] |