HomeSort by relevance Sort by last modified time
    Searched refs:user_id (Results 1 - 25 of 99) sorted by null

1 2 3 4

  /system/vold/
Ext4Crypt.h 29 bool e4crypt_vold_create_user_key(userid_t user_id, int serial, bool ephemeral);
30 bool e4crypt_destroy_user_key(userid_t user_id);
31 bool e4crypt_add_user_key_auth(userid_t user_id, int serial, const char* token,
33 bool e4crypt_fixate_newest_user_key_auth(userid_t user_id);
35 bool e4crypt_unlock_user_key(userid_t user_id, int serial, const char* token, const char* secret);
36 bool e4crypt_lock_user_key(userid_t user_id);
38 bool e4crypt_prepare_user_storage(const char* volume_uuid, userid_t user_id, int serial, int flags);
39 bool e4crypt_destroy_user_storage(const char* volume_uuid, userid_t user_id, int flags);
Ext4Crypt.cpp 177 static std::string get_de_key_path(userid_t user_id) {
178 return StringPrintf("%s/de/%d", user_key_dir.c_str(), user_id);
181 static std::string get_ce_key_directory_path(userid_t user_id) {
182 return StringPrintf("%s/ce/%d", user_key_dir.c_str(), user_id);
253 static bool read_and_fixate_user_ce_key(userid_t user_id,
256 auto const directory_path = get_ce_key_directory_path(user_id);
266 LOG(ERROR) << "Failed to find working ce key for user " << user_id;
270 static bool read_and_install_user_ce_key(userid_t user_id,
272 if (s_ce_key_raw_refs.count(user_id) != 0) return true;
274 if (!read_and_fixate_user_ce_key(user_id, auth, &ce_key)) return false
419 userid_t user_id = atoi(entry->d_name); local
    [all...]
  /system/core/libcutils/include/cutils/
multiuser.h 32 extern uid_t multiuser_get_uid(userid_t user_id, appid_t app_id);
34 extern gid_t multiuser_get_cache_gid(userid_t user_id, appid_t app_id);
35 extern gid_t multiuser_get_ext_gid(userid_t user_id, appid_t app_id);
36 extern gid_t multiuser_get_ext_cache_gid(userid_t user_id, appid_t app_id);
37 extern gid_t multiuser_get_shared_gid(userid_t user_id, appid_t app_id);
  /system/core/libcutils/
multiuser.c 28 uid_t multiuser_get_uid(userid_t user_id, appid_t app_id) {
29 return (user_id * AID_USER_OFFSET) + (app_id % AID_USER_OFFSET);
32 gid_t multiuser_get_cache_gid(userid_t user_id, appid_t app_id) {
34 return multiuser_get_uid(user_id, (app_id - AID_APP_START) + AID_CACHE_GID_START);
40 gid_t multiuser_get_ext_gid(userid_t user_id, appid_t app_id) {
42 return multiuser_get_uid(user_id, (app_id - AID_APP_START) + AID_EXT_GID_START);
48 gid_t multiuser_get_ext_cache_gid(userid_t user_id, appid_t app_id) {
50 return multiuser_get_uid(user_id, (app_id - AID_APP_START) + AID_EXT_CACHE_GID_START);
56 gid_t multiuser_get_shared_gid(userid_t user_id, appid_t app_id) {
58 return multiuser_get_uid(user_id, (app_id - AID_APP_START) + AID_SHARED_GID_START)
    [all...]
  /system/bt/btif/include/
btif_sock_thread.h 43 uint32_t user_id);
44 typedef void (*btsock_cmd_cb)(int cmd_fd, int type, int size, uint32_t user_id);
48 uint32_t user_id);
53 uint32_t user_id);
btif_sock_l2cap.h 21 void btsock_l2cap_signaled(int fd, int flags, uint32_t user_id);
  /external/ltp/testcases/kernel/syscalls/chown/
chown05.c 87 uid_t user_id; member in struct:test_case_t
107 uid_t user_id; /* user id of the user set for testfile */ local
119 user_id = test_cases[i].user_id;
122 TEST(CHOWN(cleanup, TESTFILE, user_id, group_id));
130 if (user_id == -1)
131 user_id = test_cases[i - 1].user_id;
135 if (stat_buf.st_uid != user_id ||
139 "%d", TESTFILE, user_id,
    [all...]
  /external/ltp/testcases/kernel/syscalls/fchown/
fchown05.c 45 uid_t user_id; member in struct:test_case_t
66 uid_t user_id; local
77 user_id = tc[i].user_id;
80 TEST(FCHOWN(cleanup, fildes, user_id, group_id));
90 if (user_id == (uid_t)-1)
91 user_id = tc[i - 1].user_id;
96 if ((stat_buf.st_uid != user_id) ||
100 TESTFILE, user_id, group_id)
    [all...]
fchown03.c 64 uid_t user_id; local
74 user_id = geteuid();
87 if ((stat_buf.st_uid != user_id) ||
91 TESTFILE, user_id, group_id);
  /external/ltp/testcases/kernel/syscalls/lchown/
lchown01.c 54 uid_t user_id; member in struct:test_case_t
86 uid_t user_id = test_cases[i].user_id; local
95 TEST(LCHOWN(cleanup, SFILE, user_id, group_id));
110 if (user_id == -1) {
112 user_id =
113 test_cases[i - 1].user_id;
115 user_id = geteuid();
130 if ((stat_buf.st_uid != user_id) ||
135 user_id, group_id)
    [all...]
  /system/gatekeeper/
gatekeeper.cpp 33 secure_id_t user_id = 0;// todo: rename to policy local
34 uint32_t uid = request.user_id;
38 GetRandom(&user_id, sizeof(secure_id_t));
48 user_id = pw_handle->user_id;
57 if (!GetFailureRecord(uid, user_id, &record, throttle_secure)) {
64 if (!IncrementFailureRecord(uid, user_id, timestamp, &record, throttle_secure)) {
84 if (ClearFailureRecord(uid, user_id, true)) {
87 ClearFailureRecord(uid, user_id, false);
95 salt, user_id, flags, HANDLE_VERSION, request.provided_password.buffer.get()
120 secure_id_t user_id = password_handle->user_id; local
    [all...]
  /external/autotest/client/site_tests/enterprise_KioskPerf/
enterprise_KioskPerf.py 48 def verify_enrollment(self, user_id):
51 if not user_id in f.read():
56 user_id, password = utils.get_signin_credentials(os.path.join(
58 if not (user_id and password):
64 user_id, password,
68 self.verify_enrollment(user_id)
  /external/autotest/client/common_lib/cros/
enrollment.py 30 def RemoraEnrollment(browser, user_id, password):
34 @param user_id: login credentials user_id.
40 user_id, password, enterprise_enroll=True,
44 def EnterpriseEnrollment(browser, user_id, password):
48 @param user_id: login credentials user_id.
53 user_id, password, enterprise_enroll=True,
  /external/ltp/testcases/kernel/syscalls/getresgid/
getresgid02.c 142 struct passwd *user_id; /* passwd struct for test user */ local
154 if ((user_id = getpwnam(LTPUSER)) == NULL) {
159 pe_gid = user_id->pw_gid;
162 ps_gid = user_id->pw_gid;
  /external/ltp/testcases/kernel/syscalls/getresuid/
getresuid02.c 139 struct passwd *user_id; /* passwd struct for test user */ local
151 if ((user_id = getpwnam(LTPUSER)) == NULL) {
156 pe_uid = user_id->pw_uid;
159 ps_uid = user_id->pw_uid;
  /hardware/libhardware/include/hardware/
hw_auth_token.h 42 uint64_t user_id; // secure user ID, not Android user ID member in struct:__anon41293
  /system/core/gatekeeperd/
IUserManager.h 38 virtual int32_t getCredentialOwnerProfile(int32_t user_id) = 0;
SoftGateKeeper.h 111 virtual bool GetFailureRecord(uint32_t uid, secure_id_t user_id, failure_record_t *record,
114 if (user_id != stored->secure_user_id) {
115 stored->secure_user_id = user_id;
123 virtual bool ClearFailureRecord(uint32_t uid, secure_id_t user_id, bool /* secure */) {
125 stored->secure_user_id = user_id;
155 uint64_t user_id = android::base::get_unaligned<secure_id_t>(&expected_handle->user_id); local
156 FastHashMap::const_iterator it = fast_hash_map_.find(user_id);
163 fast_hash_map_[user_id] = ComputeFastHash(password, salt);
IUserManager.cpp 33 virtual int32_t getCredentialOwnerProfile(int32_t user_id) {
36 data.writeInt32(user_id);
  /system/gatekeeper/include/gatekeeper/
password_handle.h 36 secure_id_t user_id; member in struct:gatekeeper::password_handle_t
  /external/ltp/testcases/kernel/fs/fs_perms/
fs_perms.c 69 int user_id, int group_id)
98 if (chown(file_name, user_id, group_id))
106 static int testfperm(const char *file_name, int flag, int user_id,
118 if (setuid(user_id))
120 "Could not setuid to %d.", user_id);
182 uid_t fuser_id, user_id; local
202 user_id = str_to_l(argv[4], "tester uid", 10);
213 res2 = testfperm(TEST_FILE_NAME2, 1, user_id, group_id, fperm);
221 res1 = testfperm(TEST_FILE_NAME1, 0, user_id, group_id, fperm);
225 fperm[0], fmode, fuser_id, fgroup_id, user_id, group_id)
    [all...]
  /frameworks/base/core/proto/android/service/
fingerprint.proto 25 // Each log may include multiple tuples of (user_id, num_fingerprints).
31 int32 user_id = 1;
  /frameworks/native/libs/vr/libvrflinger/
display_manager_service.cpp 45 const int user_id = message.GetEffectiveUserId(); local
46 const bool trusted = user_id == AID_ROOT || IsTrustedUid(user_id);
99 surface->user_id(), surface->attributes(),
136 const int user_id = message.GetEffectiveUserId(); local
137 const bool trusted = user_id == AID_ROOT || IsTrustedUid(user_id);
142 "by trusted UIDs: user_id=%d",
143 user_id);
  /external/ltp/testcases/kernel/syscalls/fstat/
fstat02.c 43 static uid_t user_id; variable
62 if (stat_buf.st_uid != user_id) {
64 stat_buf.st_uid, user_id);
142 user_id = getuid();
  /external/ltp/testcases/kernel/syscalls/stat/
stat01.c 44 static uid_t user_id; variable
62 if (stat_buf.st_uid != user_id) {
64 stat_buf.st_uid, user_id);
145 user_id = getuid();

Completed in 1060 milliseconds

1 2 3 4