/system/vold/ |
Ext4Crypt.h | 24 bool e4crypt_vold_create_user_key(userid_t user_id, int serial, bool ephemeral); 25 bool e4crypt_destroy_user_key(userid_t user_id); 26 bool e4crypt_add_user_key_auth(userid_t user_id, int serial, const std::string& token, 28 bool e4crypt_fixate_newest_user_key_auth(userid_t user_id); 30 bool e4crypt_unlock_user_key(userid_t user_id, int serial, const std::string& token, 32 bool e4crypt_lock_user_key(userid_t user_id); 34 bool e4crypt_prepare_user_storage(const std::string& volume_uuid, userid_t user_id, int serial, 36 bool e4crypt_destroy_user_storage(const std::string& volume_uuid, userid_t user_id, int flags);
|
Ext4Crypt.cpp | 106 static std::string get_de_key_path(userid_t user_id) { 107 return StringPrintf("%s/de/%d", user_key_dir.c_str(), user_id); 110 static std::string get_ce_key_directory_path(userid_t user_id) { 111 return StringPrintf("%s/ce/%d", user_key_dir.c_str(), user_id); 182 static bool read_and_fixate_user_ce_key(userid_t user_id, 185 auto const directory_path = get_ce_key_directory_path(user_id); 195 LOG(ERROR) << "Failed to find working ce key for user " << user_id; 199 static bool read_and_install_user_ce_key(userid_t user_id, 201 if (s_ce_key_raw_refs.count(user_id) != 0) return true; 203 if (!read_and_fixate_user_ce_key(user_id, auth, &ce_key)) return false 317 userid_t user_id = std::stoi(entry->d_name); local [all...] |
/system/core/libcutils/include/cutils/ |
multiuser.h | 32 extern uid_t multiuser_get_uid(userid_t user_id, appid_t app_id); 34 extern gid_t multiuser_get_cache_gid(userid_t user_id, appid_t app_id); 35 extern gid_t multiuser_get_ext_gid(userid_t user_id, appid_t app_id); 36 extern gid_t multiuser_get_ext_cache_gid(userid_t user_id, appid_t app_id); 37 extern gid_t multiuser_get_shared_gid(userid_t user_id, appid_t app_id);
|
/system/bt/btif/include/ |
btif_sock_thread.h | 43 uint32_t user_id); 44 typedef void (*btsock_cmd_cb)(int cmd_fd, int type, int size, uint32_t user_id); 48 uint32_t user_id); 53 uint32_t user_id);
|
/external/autotest/client/common_lib/cros/ |
enrollment.py | 31 def RemoraEnrollment(browser, user_id, password): 35 @param user_id: login credentials user_id. 40 user_id, password, enterprise_enroll=True, 44 def EnterpriseEnrollment(browser, user_id, password, auto_login=False): 48 @param user_id: login credentials user_id. 52 browser.oobe.NavigateGaiaLogin(user_id, password, 56 browser.oobe.NavigateGaiaLogin(user_id, password) 61 def EnterpriseFakeEnrollment(browser, user_id, password, gaia_id [all...] |
/system/core/libcutils/ |
multiuser.cpp | 28 uid_t multiuser_get_uid(userid_t user_id, appid_t app_id) { 29 return (user_id * AID_USER_OFFSET) + (app_id % AID_USER_OFFSET); 32 gid_t multiuser_get_cache_gid(userid_t user_id, appid_t app_id) { 34 return multiuser_get_uid(user_id, (app_id - AID_APP_START) + AID_CACHE_GID_START); 40 gid_t multiuser_get_ext_gid(userid_t user_id, appid_t app_id) { 42 return multiuser_get_uid(user_id, (app_id - AID_APP_START) + AID_EXT_GID_START); 48 gid_t multiuser_get_ext_cache_gid(userid_t user_id, appid_t app_id) { 50 return multiuser_get_uid(user_id, (app_id - AID_APP_START) + AID_EXT_CACHE_GID_START);
|
/external/ltp/testcases/kernel/syscalls/chown/ |
chown05.c | 88 uid_t user_id; member in struct:test_case_t 108 uid_t user_id; /* user id of the user set for testfile */ local 120 user_id = test_cases[i].user_id; 123 TEST(CHOWN(cleanup, TESTFILE, user_id, group_id)); 131 if (user_id == -1) 132 user_id = test_cases[i - 1].user_id; 136 if (stat_buf.st_uid != user_id || 140 "%d", TESTFILE, user_id, [all...] |
chown02.c | 98 uid_t user_id; member in struct:test_case_t 120 uid_t user_id; /* user id of the user set for testfile */ local 136 user_id = test_cases[i].user_id; 144 TEST(CHOWN(cleanup, file_name, user_id, group_id)); 165 if (stat_buf.st_uid != user_id || 170 user_id, group_id);
|
/external/ltp/testcases/kernel/syscalls/fchown/ |
fchown05.c | 45 uid_t user_id; member in struct:test_case_t 66 uid_t user_id; local 77 user_id = tc[i].user_id; 80 TEST(FCHOWN(cleanup, fildes, user_id, group_id)); 90 if (user_id == (uid_t)-1) 91 user_id = tc[i - 1].user_id; 96 if ((stat_buf.st_uid != user_id) || 100 TESTFILE, user_id, group_id) [all...] |
fchown03.c | 64 uid_t user_id; local 74 user_id = geteuid(); 87 if ((stat_buf.st_uid != user_id) || 91 TESTFILE, user_id, group_id);
|
/external/ltp/testcases/kernel/syscalls/lchown/ |
lchown01.c | 55 uid_t user_id; member in struct:test_case_t 87 uid_t user_id = test_cases[i].user_id; local 96 TEST(LCHOWN(cleanup, SFILE, user_id, group_id)); 111 if (user_id == -1) { 113 user_id = 114 test_cases[i - 1].user_id; 116 user_id = geteuid(); 131 if ((stat_buf.st_uid != user_id) || 136 user_id, group_id) [all...] |
/system/gatekeeper/ |
gatekeeper.cpp | 33 secure_id_t user_id = 0;// todo: rename to policy local 34 uint32_t uid = request.user_id; 38 GetRandom(&user_id, sizeof(secure_id_t)); 48 user_id = pw_handle->user_id; 57 if (!GetFailureRecord(uid, user_id, &record, throttle_secure)) { 64 if (!IncrementFailureRecord(uid, user_id, timestamp, &record, throttle_secure)) { 84 if (ClearFailureRecord(uid, user_id, true)) { 87 ClearFailureRecord(uid, user_id, false); 95 salt, user_id, flags, HANDLE_VERSION, request.provided_password.buffer.get() 120 secure_id_t user_id = password_handle->user_id; local [all...] |
/external/autotest/client/site_tests/enterprise_RemoraRequisition/ |
enterprise_RemoraRequisition.py | 18 user_id, password = utils.get_signin_credentials(os.path.join( 20 if not (user_id and password): 26 enrollment.RemoraEnrollment(cr.browser, user_id, password)
|
/external/autotest/client/site_tests/enterprise_KioskPerf/ |
enterprise_KioskPerf.py | 48 def verify_enrollment(self, user_id): 51 if not user_id in f.read(): 56 user_id, password = utils.get_signin_credentials(os.path.join( 58 if not (user_id and password): 64 user_id, password, 68 self.verify_enrollment(user_id)
|
/system/core/storaged/include/ |
storaged.h | 91 void load_proto(userid_t user_id); 92 char* prepare_proto(userid_t user_id, StoragedProto* proto); 93 void flush_proto(userid_t user_id, StoragedProto* proto); 94 void flush_proto_data(userid_t user_id, const char* data, ssize_t size); 95 string proto_path(userid_t user_id) { 96 return string("/data/misc_ce/") + to_string(user_id) + 135 void add_user_ce(userid_t user_id); 136 void remove_user_ce(userid_t user_id);
|
/external/ltp/testcases/kernel/syscalls/getresgid/ |
getresgid02.c | 142 struct passwd *user_id; /* passwd struct for test user */ local 154 if ((user_id = getpwnam(LTPUSER)) == NULL) { 159 pe_gid = user_id->pw_gid; 162 ps_gid = user_id->pw_gid;
|
/external/ltp/testcases/kernel/syscalls/getresuid/ |
getresuid02.c | 139 struct passwd *user_id; /* passwd struct for test user */ local 151 if ((user_id = getpwnam(LTPUSER)) == NULL) { 156 pe_uid = user_id->pw_uid; 159 ps_uid = user_id->pw_uid;
|
/hardware/libhardware/include/hardware/ |
hw_auth_token.h | 42 uint64_t user_id; // secure user ID, not Android user ID member in struct:__anon48237
|
/system/gatekeeper/include/gatekeeper/ |
password_handle.h | 36 secure_id_t user_id; member in struct:gatekeeper::password_handle_t
|
/external/ltp/testcases/kernel/fs/fs_perms/ |
fs_perms.c | 69 int user_id, int group_id) 98 if (chown(file_name, user_id, group_id)) 106 static int testfperm(const char *file_name, int flag, int user_id, 118 if (setuid(user_id)) 120 "Could not setuid to %d.", user_id); 182 uid_t fuser_id, user_id; local 202 user_id = str_to_l(argv[4], "tester uid", 10); 213 res2 = testfperm(TEST_FILE_NAME2, 1, user_id, group_id, fperm); 221 res1 = testfperm(TEST_FILE_NAME1, 0, user_id, group_id, fperm); 225 fperm[0], fmode, fuser_id, fgroup_id, user_id, group_id) [all...] |
/system/core/storaged/ |
storaged.cpp | 165 void storaged_t::add_user_ce(userid_t user_id) { 166 load_proto(user_id); 167 proto_loaded[user_id] = true; 170 void storaged_t::remove_user_ce(userid_t user_id) { 171 proto_loaded[user_id] = false; 172 mUidm.clear_user_history(user_id); 173 RemoveFileIfExists(proto_path(user_id), nullptr); 176 void storaged_t::load_proto(userid_t user_id) { 177 string proto_file = proto_path(user_id); 198 if (user_id == USER_SYSTEM) [all...] |
/device/generic/goldfish/gatekeeper/ |
SoftGateKeeper.h | 111 virtual bool GetFailureRecord(uint32_t uid, secure_id_t user_id, failure_record_t *record, 114 if (user_id != stored->secure_user_id) { 115 stored->secure_user_id = user_id; 123 virtual bool ClearFailureRecord(uint32_t uid, secure_id_t user_id, bool /* secure */) { 125 stored->secure_user_id = user_id; 155 uint64_t user_id = android::base::get_unaligned<secure_id_t>(&expected_handle->user_id); local 156 FastHashMap::const_iterator it = fast_hash_map_.find(user_id); 163 fast_hash_map_[user_id] = ComputeFastHash(password, salt);
|
/device/google/cuttlefish_common/guest/hals/gatekeeper/ |
SoftGateKeeper.h | 111 virtual bool GetFailureRecord(uint32_t uid, secure_id_t user_id, failure_record_t *record, 114 if (user_id != stored->secure_user_id) { 115 stored->secure_user_id = user_id; 123 virtual bool ClearFailureRecord(uint32_t uid, secure_id_t user_id, bool /* secure */) { 125 stored->secure_user_id = user_id; 155 uint64_t user_id = android::base::get_unaligned<secure_id_t>(&expected_handle->user_id); local 156 FastHashMap::const_iterator it = fast_hash_map_.find(user_id); 163 fast_hash_map_[user_id] = ComputeFastHash(password, salt);
|
/system/core/gatekeeperd/ |
SoftGateKeeper.h | 111 virtual bool GetFailureRecord(uint32_t uid, secure_id_t user_id, failure_record_t *record, 114 if (user_id != stored->secure_user_id) { 115 stored->secure_user_id = user_id; 123 virtual bool ClearFailureRecord(uint32_t uid, secure_id_t user_id, bool /* secure */) { 125 stored->secure_user_id = user_id; 155 uint64_t user_id = android::base::get_unaligned<secure_id_t>(&expected_handle->user_id); local 156 FastHashMap::const_iterator it = fast_hash_map_.find(user_id); 163 fast_hash_map_[user_id] = ComputeFastHash(password, salt);
|
/external/ltp/testcases/kernel/syscalls/fstat/ |
fstat02.c | 43 static uid_t user_id; variable 62 if (stat_buf.st_uid != user_id) { 64 stat_buf.st_uid, user_id); 142 user_id = getuid();
|