/system/bt/btif/include/ |
btif_sock_thread.h | 39 typedef void (*btsock_signaled_cb)(int fd, int type, int flags, uint32_t user_id); 40 typedef void (*btsock_cmd_cb)(int cmd_fd, int type, int size, uint32_t user_id); 43 int btsock_thread_add_fd(int handle, int fd, int type, int flags, uint32_t user_id); 47 int data_size, uint32_t user_id);
|
btif_sock_l2cap.h | 19 void btsock_l2cap_signaled(int fd, int flags, uint32_t user_id);
|
btif_sock_rfc.h | 36 void btsock_rfc_signaled(int fd, int flags, uint32_t user_id);
|
/system/gatekeeper/ |
gatekeeper.cpp | 31 secure_id_t user_id = 0;// todo: rename to policy local 32 uint32_t uid = request.user_id; 36 GetRandom(&user_id, sizeof(secure_id_t)); 46 user_id = pw_handle->user_id; 55 if (!GetFailureRecord(uid, user_id, &record, throttle_secure)) { 62 if (!IncrementFailureRecord(uid, user_id, timestamp, &record, throttle_secure)) { 82 if (ClearFailureRecord(uid, user_id, true)) { 85 ClearFailureRecord(uid, user_id, false); 93 salt, user_id, flags, HANDLE_VERSION, request.provided_password.buffer.get() 118 secure_id_t user_id = password_handle->user_id; local [all...] |
gatekeeper_messages.cpp | 32 uint32_t user_id; member in struct:gatekeeper::serial_header_t 89 header->user_id = user_id; 99 header->user_id = user_id; 112 user_id = header->user_id; 116 user_id = header->user_id; 134 VerifyRequest::VerifyRequest(uint32_t user_id, uint64_t challenge [all...] |
/hardware/libhardware/include/hardware/ |
hw_auth_token.h | 42 uint64_t user_id; // secure user ID, not Android user ID member in struct:__anon24837
|
/system/core/gatekeeperd/ |
IUserManager.h | 38 virtual int32_t getCredentialOwnerProfile(int32_t user_id) = 0;
|
IUserManager.cpp | 33 virtual int32_t getCredentialOwnerProfile(int32_t user_id) { 36 data.writeInt32(user_id);
|
SoftGateKeeper.h | 109 virtual bool GetFailureRecord(uint32_t uid, secure_id_t user_id, failure_record_t *record, 112 if (user_id != stored->secure_user_id) { 113 stored->secure_user_id = user_id; 121 virtual bool ClearFailureRecord(uint32_t uid, secure_id_t user_id, bool /* secure */) { 123 stored->secure_user_id = user_id; 153 FastHashMap::const_iterator it = fast_hash_map_.find(expected_handle->user_id); 160 fast_hash_map_[expected_handle->user_id] = ComputeFastHash(password, salt);
|
/system/gatekeeper/include/gatekeeper/ |
password_handle.h | 36 secure_id_t user_id; member in struct:gatekeeper::password_handle_t
|
gatekeeper.h | 128 virtual bool GetFailureRecord(uint32_t uid, secure_id_t user_id, failure_record_t *record, 141 virtual bool ClearFailureRecord(uint32_t uid, secure_id_t user_id, bool secure) = 0; 180 secure_id_t user_id, secure_id_t authenticator_id, uint64_t challenge); 196 bool IncrementFailureRecord(uint32_t uid, secure_id_t user_id, uint64_t timestamp,
|
gatekeeper_messages.h | 133 uint32_t user_id; member in struct:gatekeeper::GateKeeperMessage 139 uint32_t user_id, 156 VerifyResponse(uint32_t user_id, SizedBuffer *auth_token); 171 EnrollRequest(uint32_t user_id, SizedBuffer *password_handle, 197 EnrollResponse(uint32_t user_id, SizedBuffer *enrolled_password_handle);
|
/external/chromium-trace/trace-viewer/third_party/webapp2/tests/ |
extras_auth_test.py | 20 def _check_token(self, user_id, token, subject='auth'): 21 rv = models.UserToken.get(user=user_id, subject=subject, token=token) 51 user_id = user.key.id() 59 self.assertEqual(rv['user_id'], user_id) 74 self.assertEqual(rv['user_id'], user_id) 77 rv2 = a.get_user_by_token(rv['user_id'], rv['token']) 84 self.assertEqual(rv['user_id'], user_id) [all...] |
extras_appengine_users_test.py | 10 def set_current_user(email, user_id, is_admin=False): 12 os.environ['USER_ID'] = user_id or ''
|
/external/chromium-trace/trace-viewer/third_party/webapp2/webapp2_extras/appengine/auth/ |
models.py | 152 ``{user_id}.{subject}.{token}.`` 262 def get_by_auth_token(cls, user_id, token): 265 :param user_id: 266 The user_id of the requesting user. 273 token_key = cls.token_model.get_key(user_id, 'auth', token) 274 user_key = model.Key(cls, user_id) 306 def validate_token(cls, user_id, subject, token): 307 """Checks for existence of a token, given user_id, subject and token. 309 :param user_id: 321 return cls.token_model.get(user=user_id, subject=subject [all...] |
/external/lldb/include/lldb/Symbol/ |
ClangExternalASTSourceCommon.h | 71 SetUserID (lldb::user_id_t user_id) 73 m_user_id = user_id;
|
/system/bt/btif/src/ |
btif_sock_thread.c | 89 uint32_t user_id; member in struct:__anon69205 110 static inline void add_poll(int h, int fd, int type, int flags, uint32_t user_id); 300 uint32_t user_id; member in struct:__anon69207 302 int btsock_thread_add_fd(int h, int fd, int type, int flags, uint32_t user_id) 321 add_poll(h, fd, type, flags, user_id); 326 sock_cmd_t cmd = {CMD_ADD_FD, fd, type, flags, user_id}; 348 int btsock_thread_post_cmd(int h, int type, const unsigned char* data, int size, uint32_t user_id) 360 sock_cmd_t cmd = {CMD_USER_PRIVATE, 0, type, size, user_id}; 444 static inline void set_poll(poll_slot_t* ps, int fd, int type, int flags, uint32_t user_id) 447 ps->user_id = user_id 552 uint32_t user_id = ts[h].ps[ps_i].user_id; local [all...] |
btif_sock.c | 38 static void btsock_signaled(int fd, int type, int flags, uint32_t user_id); 175 static void btsock_signaled(int fd, int type, int flags, uint32_t user_id) { 178 btsock_rfc_signaled(fd, flags, user_id); 181 btsock_l2cap_signaled(fd, flags, user_id);
|
/external/chromium-trace/trace-viewer/third_party/webapp2/webapp2_extras/ |
auth.py | 85 _session_attributes = ['user_id', 'remember', 158 def get_user_by_auth_token(self, user_id, token): 159 """Returns a user dict based on user_id and auth token. 161 :param user_id: 170 user, ts = self.user_model.get_by_auth_token(user_id, token) 173 def create_auth_token(self, user_id): 176 :param user_id: 181 return self.user_model.create_auth_token(user_id) 183 def delete_auth_token(self, user_id, token): 186 :param user_id [all...] |
/external/compiler-rt/lib/sanitizer_common/ |
sanitizer_thread_registry.cc | 20 : tid(tid), unique_id(0), reuse_count(), os_id(0), user_id(0), 43 user_id = 0; 52 user_id = 0; 71 user_id = _user_id; 121 u32 ThreadRegistry::CreateThread(uptr user_id, bool detached, u32 parent_tid, 152 tctx->SetCreated(user_id, total_threads_++, detached, 209 void ThreadRegistry::SetThreadNameByUserId(uptr user_id, const char *name) { 213 if (tctx != 0 && tctx->user_id == user_id &&
|
sanitizer_thread_registry.h | 43 uptr user_id; // Some opaque user thread id (e.g. pthread_t). member in class:__sanitizer::ThreadContextBase 95 u32 CreateThread(uptr user_id, bool detached, u32 parent_tid, void *arg); 113 void SetThreadNameByUserId(uptr user_id, const char *name);
|
/system/gatekeeper/tests/ |
gatekeeper_device_test.cpp | 111 secure_id_t sid = handle->user_id; 118 ASSERT_NE(sid, handle->user_id); 135 secure_id_t sid = handle->user_id; 142 ASSERT_EQ(sid, handle->user_id);
|
/system/keymaster/ |
keymaster_enforcement_test.cpp | 524 token.user_id = 9; 530 .Authorization(TAG_USER_SECURE_ID, token.user_id) 547 token.user_id = 9; 554 .Authorization(TAG_USER_SECURE_ID, token.user_id) 576 token.user_id = 9; 582 .Authorization(TAG_USER_SECURE_ID, token.user_id) 600 token.user_id = 9; 607 .Authorization(TAG_USER_SECURE_ID, token.user_id) 627 token.user_id = 9; 635 .Authorization(TAG_USER_SECURE_ID, token.user_id) [all...] |
/system/core/gatekeeperd/tests/ |
gatekeeper_test.cpp | 91 ASSERT_NE((uint64_t) 0, auth_token->user_id); 123 secure_id_t secure_id = auth_token->user_id; 146 reinterpret_cast<hw_auth_token_t *>(response.auth_token.buffer.get())->user_id); 171 secure_id_t secure_id = auth_token->user_id; 191 reinterpret_cast<hw_auth_token_t *>(response.auth_token.buffer.get())->user_id);
|
/external/compiler-rt/lib/lsan/ |
lsan_thread.cc | 80 u32 ThreadCreate(u32 parent_tid, uptr user_id, bool detached) { 81 return thread_registry->CreateThread(user_id, detached, parent_tid, 111 if (tctx->user_id == uid && tctx->status != ThreadStatusInvalid) {
|