/frameworks/base/core/proto/android/service/ |
package.proto | 51 optional int32 user_id = 1;
|
print.proto | 37 optional int32 user_id = 1;
|
usb.proto | 278 optional int32 user_id = 1; 328 optional int32 user_id = 1;
|
/external/ltp/testcases/kernel/security/prot_hsymlinks/ |
prot_hsymlinks.c | 560 uid_t user_id = 0; local 570 user_id = pswd->pw_uid; 575 SAFE_SETEUID(cleanup, user_id);
|
/external/syslinux/core/fs/ufs/ |
ufs.h | 183 uint32_t user_id; member in struct:ufs2_inode
|
/system/bt/bta/include/ |
bta_jv_api.h | 672 uint32_t user_id); 686 BT_HDR* msg, uint32_t user_id); [all...] |
/device/generic/goldfish/fingerprint/ |
fingerprint.c | 83 uint64_t user_id; member in struct:qemu_fingerprint_device_t 326 dev->secure_user_id = hat->user_id; 340 dev->user_id = hat->user_id; 589 auth_msg.data.authenticated.hat.user_id = qdev->secure_user_id;
|
/system/security/keystore/ |
keymaster_enforcement.cpp | 227 int32_t user_id = -1; local 287 case Tag::USER_ID: 288 user_id = authorizationValue(TAG_USER_ID, param).value(); 369 if (unlocked_device_required && is_device_locked(user_id)) {
|
key_store_service.cpp | 860 KeyParameter user_id; local 1101 KeyParameter user_id; local [all...] |
/external/selinux/checkpolicy/ |
module_compiler.c | 461 char *user_id, user_datum_t *user) 466 delim = strrchr(user_id, '.'); 470 bounds_id = strdup(user_id); 475 bounds_id[(size_t)(delim - user_id)] = '\0'; 480 bounds_id, user_id); 488 user_id, bounds_id, [all...] |
/external/compiler-rt/lib/tsan/rtl/ |
tsan_rtl_thread.cc | 290 if (tctx->user_id == uid && tctx->status != ThreadStatusInvalid) { 291 tctx->user_id = 0;
|
/system/core/gatekeeperd/ |
gatekeeperd.cpp | 223 store_sid(uid, handle->user_id); 336 enrolled_password_handle)->user_id);
|
/system/keymaster/android_keymaster/ |
keymaster_enforcement.cpp | 456 if (user_secure_id != auth_token.user_id && user_secure_id != auth_token.authenticator_id) { 457 LOG_I("Auth token SIDs %llu and %llu do not match key SID %llu", auth_token.user_id,
|
android_keymaster_messages.cpp | 691 return sizeof(challenge) + sizeof(user_id) + sizeof(authenticator_id) + 697 buf = append_uint64_to_buf(buf, end, user_id); 706 copy_uint64_from_buf(buf_ptr, end, &user_id) &&
|
/external/compiler-rt/lib/sanitizer_common/tests/ |
sanitizer_thread_registry_test.cc | 59 return (tctx->user_id == uid);
|
/frameworks/native/libs/vr/libdisplay/include/private/dvr/ |
display_protocol.h | 141 int32_t user_id; member in struct:android::SurfaceState
|
/system/bt/btif/src/ |
btif_sock_l2cap.cc | 935 void btsock_l2cap_signaled(int fd, int flags, uint32_t user_id) { 941 l2cap_socket* sock = btsock_l2cap_find_by_id_l(user_id); 981 btsock_l2cap_cbk, buffer, user_id); [all...] |
/frameworks/base/core/proto/android/server/ |
activitymanagerservice.proto | 170 optional int32 user_id = 4; 179 optional int32 user_id = 1; 428 optional int32 user_id = 1; 556 optional int32 user_id = 2; [all...] |
/hardware/interfaces/soundtrigger/2.0/default/ |
SoundTriggerHalImpl.cpp | 399 halExtra->levels[i].user_id = extra->levels[i].userId; 483 extra->levels[i].userId = halExtra->levels[i].user_id;
|
/frameworks/native/services/vr/performanced/ |
performance_service.cpp | 111 task.user_id()[Task::kUidReal], task.group_id()[Task::kUidReal]);
|
/system/core/storaged/ |
storaged_service.cpp | 67 record.name.c_str(), record.ios.user_id,
|
/system/keymaster/include/keymaster/ |
android_keymaster_messages.h | 818 user_id = other.user_id; 830 uint64_t user_id{}; [all...] |
/frameworks/av/services/soundtrigger/ |
SoundTriggerHalHidl.cpp | 520 halExtra->levels[i].userId = extra->levels[i].user_id; 688 extra->levels[i].user_id = halExtra->levels[i].userId;
|
/frameworks/base/core/jni/ |
android_hardware_SoundTrigger.cpp | 252 phraseEvent->phrase_extras[i].levels[j].user_id, 761 config->phrases[i].levels[j].user_id = env->GetIntField(jConfidenceLevel, [all...] |
com_android_internal_os_Zygote.cpp | 417 userid_t user_id = multiuser_get_user_id(uid); local 418 const String8 userSource(String8::format("/mnt/user/%d", user_id)); [all...] |