HomeSort by relevance Sort by last modified time
    Searched refs:user_id (Results 1 - 25 of 52) sorted by null

1 2 3

  /system/bt/btif/include/
btif_sock_thread.h 39 typedef void (*btsock_signaled_cb)(int fd, int type, int flags, uint32_t user_id);
40 typedef void (*btsock_cmd_cb)(int cmd_fd, int type, int size, uint32_t user_id);
43 int btsock_thread_add_fd(int handle, int fd, int type, int flags, uint32_t user_id);
47 int data_size, uint32_t user_id);
btif_sock_l2cap.h 19 void btsock_l2cap_signaled(int fd, int flags, uint32_t user_id);
btif_sock_rfc.h 36 void btsock_rfc_signaled(int fd, int flags, uint32_t user_id);
  /system/gatekeeper/
gatekeeper.cpp 31 secure_id_t user_id = 0;// todo: rename to policy local
32 uint32_t uid = request.user_id;
36 GetRandom(&user_id, sizeof(secure_id_t));
46 user_id = pw_handle->user_id;
55 if (!GetFailureRecord(uid, user_id, &record, throttle_secure)) {
62 if (!IncrementFailureRecord(uid, user_id, timestamp, &record, throttle_secure)) {
82 if (ClearFailureRecord(uid, user_id, true)) {
85 ClearFailureRecord(uid, user_id, false);
93 salt, user_id, flags, HANDLE_VERSION, request.provided_password.buffer.get()
118 secure_id_t user_id = password_handle->user_id; local
    [all...]
gatekeeper_messages.cpp 32 uint32_t user_id; member in struct:gatekeeper::serial_header_t
89 header->user_id = user_id;
99 header->user_id = user_id;
112 user_id = header->user_id;
116 user_id = header->user_id;
134 VerifyRequest::VerifyRequest(uint32_t user_id, uint64_t challenge
    [all...]
  /hardware/libhardware/include/hardware/
hw_auth_token.h 42 uint64_t user_id; // secure user ID, not Android user ID member in struct:__anon24837
  /system/core/gatekeeperd/
IUserManager.h 38 virtual int32_t getCredentialOwnerProfile(int32_t user_id) = 0;
IUserManager.cpp 33 virtual int32_t getCredentialOwnerProfile(int32_t user_id) {
36 data.writeInt32(user_id);
SoftGateKeeper.h 109 virtual bool GetFailureRecord(uint32_t uid, secure_id_t user_id, failure_record_t *record,
112 if (user_id != stored->secure_user_id) {
113 stored->secure_user_id = user_id;
121 virtual bool ClearFailureRecord(uint32_t uid, secure_id_t user_id, bool /* secure */) {
123 stored->secure_user_id = user_id;
153 FastHashMap::const_iterator it = fast_hash_map_.find(expected_handle->user_id);
160 fast_hash_map_[expected_handle->user_id] = ComputeFastHash(password, salt);
  /system/gatekeeper/include/gatekeeper/
password_handle.h 36 secure_id_t user_id; member in struct:gatekeeper::password_handle_t
gatekeeper.h 128 virtual bool GetFailureRecord(uint32_t uid, secure_id_t user_id, failure_record_t *record,
141 virtual bool ClearFailureRecord(uint32_t uid, secure_id_t user_id, bool secure) = 0;
180 secure_id_t user_id, secure_id_t authenticator_id, uint64_t challenge);
196 bool IncrementFailureRecord(uint32_t uid, secure_id_t user_id, uint64_t timestamp,
gatekeeper_messages.h 133 uint32_t user_id; member in struct:gatekeeper::GateKeeperMessage
139 uint32_t user_id,
156 VerifyResponse(uint32_t user_id, SizedBuffer *auth_token);
171 EnrollRequest(uint32_t user_id, SizedBuffer *password_handle,
197 EnrollResponse(uint32_t user_id, SizedBuffer *enrolled_password_handle);
  /external/chromium-trace/trace-viewer/third_party/webapp2/tests/
extras_auth_test.py 20 def _check_token(self, user_id, token, subject='auth'):
21 rv = models.UserToken.get(user=user_id, subject=subject, token=token)
51 user_id = user.key.id()
59 self.assertEqual(rv['user_id'], user_id)
74 self.assertEqual(rv['user_id'], user_id)
77 rv2 = a.get_user_by_token(rv['user_id'], rv['token'])
84 self.assertEqual(rv['user_id'], user_id)
    [all...]
extras_appengine_users_test.py 10 def set_current_user(email, user_id, is_admin=False):
12 os.environ['USER_ID'] = user_id or ''
  /external/chromium-trace/trace-viewer/third_party/webapp2/webapp2_extras/appengine/auth/
models.py 152 ``{user_id}.{subject}.{token}.``
262 def get_by_auth_token(cls, user_id, token):
265 :param user_id:
266 The user_id of the requesting user.
273 token_key = cls.token_model.get_key(user_id, 'auth', token)
274 user_key = model.Key(cls, user_id)
306 def validate_token(cls, user_id, subject, token):
307 """Checks for existence of a token, given user_id, subject and token.
309 :param user_id:
321 return cls.token_model.get(user=user_id, subject=subject
    [all...]
  /external/lldb/include/lldb/Symbol/
ClangExternalASTSourceCommon.h 71 SetUserID (lldb::user_id_t user_id)
73 m_user_id = user_id;
  /system/bt/btif/src/
btif_sock_thread.c 89 uint32_t user_id; member in struct:__anon69205
110 static inline void add_poll(int h, int fd, int type, int flags, uint32_t user_id);
300 uint32_t user_id; member in struct:__anon69207
302 int btsock_thread_add_fd(int h, int fd, int type, int flags, uint32_t user_id)
321 add_poll(h, fd, type, flags, user_id);
326 sock_cmd_t cmd = {CMD_ADD_FD, fd, type, flags, user_id};
348 int btsock_thread_post_cmd(int h, int type, const unsigned char* data, int size, uint32_t user_id)
360 sock_cmd_t cmd = {CMD_USER_PRIVATE, 0, type, size, user_id};
444 static inline void set_poll(poll_slot_t* ps, int fd, int type, int flags, uint32_t user_id)
447 ps->user_id = user_id
552 uint32_t user_id = ts[h].ps[ps_i].user_id; local
    [all...]
btif_sock.c 38 static void btsock_signaled(int fd, int type, int flags, uint32_t user_id);
175 static void btsock_signaled(int fd, int type, int flags, uint32_t user_id) {
178 btsock_rfc_signaled(fd, flags, user_id);
181 btsock_l2cap_signaled(fd, flags, user_id);
  /external/chromium-trace/trace-viewer/third_party/webapp2/webapp2_extras/
auth.py 85 _session_attributes = ['user_id', 'remember',
158 def get_user_by_auth_token(self, user_id, token):
159 """Returns a user dict based on user_id and auth token.
161 :param user_id:
170 user, ts = self.user_model.get_by_auth_token(user_id, token)
173 def create_auth_token(self, user_id):
176 :param user_id:
181 return self.user_model.create_auth_token(user_id)
183 def delete_auth_token(self, user_id, token):
186 :param user_id
    [all...]
  /external/compiler-rt/lib/sanitizer_common/
sanitizer_thread_registry.cc 20 : tid(tid), unique_id(0), reuse_count(), os_id(0), user_id(0),
43 user_id = 0;
52 user_id = 0;
71 user_id = _user_id;
121 u32 ThreadRegistry::CreateThread(uptr user_id, bool detached, u32 parent_tid,
152 tctx->SetCreated(user_id, total_threads_++, detached,
209 void ThreadRegistry::SetThreadNameByUserId(uptr user_id, const char *name) {
213 if (tctx != 0 && tctx->user_id == user_id &&
sanitizer_thread_registry.h 43 uptr user_id; // Some opaque user thread id (e.g. pthread_t). member in class:__sanitizer::ThreadContextBase
95 u32 CreateThread(uptr user_id, bool detached, u32 parent_tid, void *arg);
113 void SetThreadNameByUserId(uptr user_id, const char *name);
  /system/gatekeeper/tests/
gatekeeper_device_test.cpp 111 secure_id_t sid = handle->user_id;
118 ASSERT_NE(sid, handle->user_id);
135 secure_id_t sid = handle->user_id;
142 ASSERT_EQ(sid, handle->user_id);
  /system/keymaster/
keymaster_enforcement_test.cpp 524 token.user_id = 9;
530 .Authorization(TAG_USER_SECURE_ID, token.user_id)
547 token.user_id = 9;
554 .Authorization(TAG_USER_SECURE_ID, token.user_id)
576 token.user_id = 9;
582 .Authorization(TAG_USER_SECURE_ID, token.user_id)
600 token.user_id = 9;
607 .Authorization(TAG_USER_SECURE_ID, token.user_id)
627 token.user_id = 9;
635 .Authorization(TAG_USER_SECURE_ID, token.user_id)
    [all...]
  /system/core/gatekeeperd/tests/
gatekeeper_test.cpp 91 ASSERT_NE((uint64_t) 0, auth_token->user_id);
123 secure_id_t secure_id = auth_token->user_id;
146 reinterpret_cast<hw_auth_token_t *>(response.auth_token.buffer.get())->user_id);
171 secure_id_t secure_id = auth_token->user_id;
191 reinterpret_cast<hw_auth_token_t *>(response.auth_token.buffer.get())->user_id);
  /external/compiler-rt/lib/lsan/
lsan_thread.cc 80 u32 ThreadCreate(u32 parent_tid, uptr user_id, bool detached) {
81 return thread_registry->CreateThread(user_id, detached, parent_tid,
111 if (tctx->user_id == uid && tctx->status != ThreadStatusInvalid) {

Completed in 168 milliseconds

1 2 3