/external/libweave/src/ |
access_black_list_manager.h | 17 // user_id is empty, app_id is empty: block everything. 18 // user_id is not empty, app_id is empty: block if user_id matches. 19 // user_id is empty, app_id is not empty: block if app_id matches. 20 // user_id is not empty, app_id is not empty: block if both match. 21 std::vector<uint8_t> user_id; member in struct:weave::AccessBlackListManager::Entry 29 virtual void Block(const std::vector<uint8_t>& user_id, 33 virtual void Unblock(const std::vector<uint8_t>& user_id, 36 virtual bool IsBlocked(const std::vector<uint8_t>& user_id, 45 return l.user_id == r.user_id && l.app_id == r.app_id & [all...] |
access_api_handler.cc | 32 std::string user_id; local 33 parameters.GetString(kUserId, &user_id); 34 if (!Base64Decode(user_id, user_id_decoded)) { 36 "Invalid user id '%s'", user_id.c_str()); 44 "Invalid app id '%s'", user_id.c_str()); 142 std::vector<uint8_t> user_id; local 145 if (!GetIds(parameters, &user_id, &app_id, &error)) { 156 manager_->Block(user_id, app_id, expiration, 171 std::vector<uint8_t> user_id; local 174 if (!GetIds(parameters, &user_id, &app_id, &error)) [all...] |
/hardware/libhardware/include/hardware/ |
hw_auth_token.h | 42 uint64_t user_id; // secure user ID, not Android user ID member in struct:__anon31320
|
/system/gatekeeper/include/gatekeeper/ |
password_handle.h | 36 secure_id_t user_id; member in struct:gatekeeper::password_handle_t
|
gatekeeper_messages.h | 133 uint32_t user_id; member in struct:gatekeeper::GateKeeperMessage 139 uint32_t user_id, 156 VerifyResponse(uint32_t user_id, SizedBuffer *auth_token); 171 EnrollRequest(uint32_t user_id, SizedBuffer *password_handle, 197 EnrollResponse(uint32_t user_id, SizedBuffer *enrolled_password_handle);
|
/system/core/gatekeeperd/ |
SoftGateKeeper.h | 111 virtual bool GetFailureRecord(uint32_t uid, secure_id_t user_id, failure_record_t *record, 114 if (user_id != stored->secure_user_id) { 115 stored->secure_user_id = user_id; 123 virtual bool ClearFailureRecord(uint32_t uid, secure_id_t user_id, bool /* secure */) { 125 stored->secure_user_id = user_id; 155 uint64_t user_id = android::base::get_unaligned(&expected_handle->user_id); local 156 FastHashMap::const_iterator it = fast_hash_map_.find(user_id); 163 fast_hash_map_[user_id] = ComputeFastHash(password, salt);
|
/system/gatekeeper/ |
gatekeeper.cpp | 33 secure_id_t user_id = 0;// todo: rename to policy local 34 uint32_t uid = request.user_id; 38 GetRandom(&user_id, sizeof(secure_id_t)); 48 user_id = pw_handle->user_id; 57 if (!GetFailureRecord(uid, user_id, &record, throttle_secure)) { 64 if (!IncrementFailureRecord(uid, user_id, timestamp, &record, throttle_secure)) { 84 if (ClearFailureRecord(uid, user_id, true)) { 87 ClearFailureRecord(uid, user_id, false); 95 salt, user_id, flags, HANDLE_VERSION, request.provided_password.buffer.get() 120 secure_id_t user_id = password_handle->user_id; local [all...] |
gatekeeper_messages.cpp | 32 uint32_t user_id; member in struct:gatekeeper::serial_header_t 89 header->user_id = user_id; 99 header->user_id = user_id; 112 user_id = header->user_id; 116 user_id = header->user_id; 134 VerifyRequest::VerifyRequest(uint32_t user_id, uint64_t challenge [all...] |
/external/compiler-rt/lib/sanitizer_common/ |
sanitizer_thread_registry.h | 43 uptr user_id; // Some opaque user thread id (e.g. pthread_t). member in class:__sanitizer::ThreadContextBase 96 u32 CreateThread(uptr user_id, bool detached, u32 parent_tid, void *arg); 114 void SetThreadNameByUserId(uptr user_id, const char *name);
|
/external/libweave/src/privet/ |
auth_manager.cc | 371 std::vector<uint8_t> user_id{ 375 AuthType type = static_cast<AuthType>(user_id.back()); 376 user_id.pop_back(); 382 *user_info = UserInfo{auth_scope, UserAppId{type, user_id, app_id}}; 516 std::vector<uint8_t> user_id{last_user_id->id, 522 UserInfo info{auth_scope, {AuthType::kLocal, user_id, app_id}}; local
|
security_manager.cc | 94 auto user_id = std::to_string(++last_user_id_); local 97 UserAppId{auth_type, {user_id.begin(), user_id.end()}, {}}};
|
/device/generic/goldfish/fingerprint/ |
fingerprint.c | 82 uint64_t user_id; member in struct:qemu_fingerprint_device_t 321 dev->secure_user_id = hat->user_id; 333 dev->user_id = hat->user_id; 563 auth_msg.data.authenticated.hat.user_id = qdev->secure_user_id;
|
/frameworks/base/core/jni/ |
com_android_internal_os_Zygote.cpp | 323 userid_t user_id = multiuser_get_user_id(uid); local 324 const String8 userSource(String8::format("/mnt/user/%d", user_id));
|
/system/bt/btif/src/ |
btif_sock_thread.c | 84 uint32_t user_id; member in struct:__anon72283 103 static inline void add_poll(int h, int fd, int type, int flags, uint32_t user_id); 238 uint32_t user_id; member in struct:__anon72285 240 int btsock_thread_add_fd(int h, int fd, int type, int flags, uint32_t user_id) 259 add_poll(h, fd, type, flags, user_id); 264 sock_cmd_t cmd = {CMD_ADD_FD, fd, type, flags, user_id}; 294 int btsock_thread_post_cmd(int h, int type, const unsigned char* data, int size, uint32_t user_id) 306 sock_cmd_t cmd = {CMD_USER_PRIVATE, 0, type, size, user_id}; 401 static inline void set_poll(poll_slot_t* ps, int fd, int type, int flags, uint32_t user_id) 404 ps->user_id = user_id 513 uint32_t user_id = ts[h].ps[ps_i].user_id; local [all...] |
/frameworks/native/cmds/installd/ |
installd.cpp | 612 uint32_t user_id = atoi(name); local 614 // /data/misc/user/<user_id> 615 if (ensure_config_user_dirs(user_id) == -1) { 625 uid_t uid = multiuser_get_uid(user_id, AID_SYSTEM);
|
/system/media/audio/include/system/ |
sound_trigger.h | 181 unsigned int user_id; /* user ID */ member in struct:sound_trigger_confidence_level
|
/system/vold/ |
Ext4Crypt.cpp | 176 static std::string get_de_key_path(userid_t user_id) { 177 return StringPrintf("%s/de/%d", user_key_dir.c_str(), user_id); 180 static std::string get_ce_key_directory_path(userid_t user_id) { 181 return StringPrintf("%s/ce/%d", user_key_dir.c_str(), user_id); 252 static bool read_and_fixate_user_ce_key(userid_t user_id, 255 auto const directory_path = get_ce_key_directory_path(user_id); 265 LOG(ERROR) << "Failed to find working ce key for user " << user_id; 269 static bool read_and_install_user_ce_key(userid_t user_id, 271 if (s_ce_key_raw_refs.count(user_id) != 0) return true; 273 if (!read_and_fixate_user_ce_key(user_id, auth, &ce_key)) return false 411 userid_t user_id = atoi(entry->d_name); local [all...] |
VolumeManager.cpp | 594 userid_t user_id = multiuser_get_user_id(uid); local 595 std::string userSource(StringPrintf("/mnt/user/%d", user_id)); [all...] |
/external/chromium-trace/catapult/third_party/gsutil/third_party/oauth2client/tests/ |
test_appengine.py | 101 def user_id(self): member in class:UserMock
|
/system/keymaster/ |
android_keymaster_test.cpp | 3585 uint32_t user_id; local [all...] |