| /system/core/libcutils/ |
| D | multiuser.cpp | 28 uid_t multiuser_get_uid(userid_t user_id, appid_t app_id) { in multiuser_get_uid() 32 gid_t multiuser_get_cache_gid(userid_t user_id, appid_t app_id) { in multiuser_get_cache_gid() 40 gid_t multiuser_get_ext_gid(userid_t user_id, appid_t app_id) { in multiuser_get_ext_gid() 48 gid_t multiuser_get_ext_cache_gid(userid_t user_id, appid_t app_id) { in multiuser_get_ext_cache_gid()
|
| /system/vold/ |
| D | Ext4Crypt.cpp | 106 static std::string get_de_key_path(userid_t user_id) { in get_de_key_path() 110 static std::string get_ce_key_directory_path(userid_t user_id) { in get_ce_key_directory_path() 182 static bool read_and_fixate_user_ce_key(userid_t user_id, in read_and_fixate_user_ce_key() 199 static bool read_and_install_user_ce_key(userid_t user_id, in read_and_install_user_ce_key() 232 static bool create_and_install_user_keys(userid_t user_id, bool create_ephemeral) { in create_and_install_user_keys() 263 static bool lookup_key_ref(const std::map<userid_t, std::string>& key_map, userid_t user_id, in lookup_key_ref() argument 317 userid_t user_id = std::stoi(entry->d_name); in load_all_de_keys() local 395 bool e4crypt_vold_create_user_key(userid_t user_id, int serial, bool ephemeral) { in e4crypt_vold_create_user_key() 422 static bool evict_ce_key(userid_t user_id) { in evict_ce_key() 435 bool e4crypt_destroy_user_key(userid_t user_id) { in e4crypt_destroy_user_key() [all …]
|
| D | vold_prepare_subdirs.cpp | 122 static bool prepare_subdirs(const std::string& volume_uuid, int user_id, int flags) { in prepare_subdirs() 145 static bool destroy_subdirs(const std::string& volume_uuid, int user_id, int flags) { in destroy_subdirs() 176 int user_id = stoi(args[2]); in main() local
|
| D | VolumeManager.cpp | 539 userid_t user_id = multiuser_get_user_id(uid); in remountUid() local
|
| /system/core/storaged/ |
| D | storaged.cpp | 165 void storaged_t::add_user_ce(userid_t user_id) { in add_user_ce() 170 void storaged_t::remove_user_ce(userid_t user_id) { in remove_user_ce() 176 void storaged_t::load_proto(userid_t user_id) { in load_proto() 203 char* storaged_t:: prepare_proto(userid_t user_id, StoragedProto* proto) { in prepare_proto() 237 void storaged_t::flush_proto_data(userid_t user_id, in flush_proto_data() 293 void storaged_t::flush_proto(userid_t user_id, StoragedProto* proto) { in flush_proto()
|
| D | storaged.proto | 25 optional uint32 user_id = 2; field
|
| D | storaged_uid_monitor.cpp | 417 userid_t user_id = entry.ios.user_id; in update_uid_io_proto() local 449 void uid_monitor::clear_user_history(userid_t user_id) in clear_user_history()
|
| /system/gatekeeper/ |
| D | gatekeeper.cpp | 33 secure_id_t user_id = 0;// todo: rename to policy in Enroll() local 120 secure_id_t user_id = password_handle->user_id; in Verify() local 170 secure_id_t user_id, uint64_t flags, uint8_t handle_version, const uint8_t *password, in CreatePasswordHandle() 224 uint64_t timestamp, secure_id_t user_id, secure_id_t authenticator_id, in MintAuthToken() 311 bool GateKeeper::IncrementFailureRecord(uint32_t uid, secure_id_t user_id, uint64_t timestamp, in IncrementFailureRecord()
|
| D | gatekeeper_messages.cpp | 30 uint32_t user_id; member 132 VerifyRequest::VerifyRequest(uint32_t user_id, uint64_t challenge, in VerifyRequest() 192 VerifyResponse::VerifyResponse(uint32_t user_id, SizedBuffer *auth_token) { in VerifyResponse() 238 EnrollRequest::EnrollRequest(uint32_t user_id, SizedBuffer *password_handle, in EnrollRequest() 325 EnrollResponse::EnrollResponse(uint32_t user_id, SizedBuffer *enrolled_password_handle) { in EnrollResponse()
|
| /system/bt/btif/src/ |
| D | btif_sock_thread.cc | 81 uint32_t user_id; member 219 uint32_t user_id; member 221 int btsock_thread_add_fd(int h, int fd, int type, int flags, uint32_t user_id) { in btsock_thread_add_fd() 270 uint32_t user_id) { in btsock_thread_post_cmd() 363 uint32_t user_id) { in set_poll() 376 uint32_t user_id) { in add_poll() 473 uint32_t user_id = ts[h].ps[ps_i].user_id; in process_data_sock() local
|
| D | btif_sock.cc | 228 static void btsock_signaled(int fd, int type, int flags, uint32_t user_id) { in btsock_signaled()
|
| D | btif_pan.cc | 762 uint32_t user_id) { in btpan_tap_fd_signaled()
|
| D | btif_sock_rfc.cc | 803 void btsock_rfc_signaled(UNUSED_ATTR int fd, int flags, uint32_t user_id) { in btsock_rfc_signaled()
|
| D | btif_sock_l2cap.cc | 935 void btsock_l2cap_signaled(int fd, int flags, uint32_t user_id) { in btsock_l2cap_signaled()
|
| /system/core/gatekeeperd/ |
| D | SoftGateKeeper.h | 104 virtual bool GetFailureRecord(uint32_t uid, secure_id_t user_id, failure_record_t *record, in GetFailureRecord() 116 virtual bool ClearFailureRecord(uint32_t uid, secure_id_t user_id, bool /* secure */) { in ClearFailureRecord() 148 uint64_t user_id = android::base::get_unaligned<secure_id_t>(&expected_handle->user_id); in DoVerify() local
|
| /system/gatekeeper/include/gatekeeper/ |
| D | password_handle.h | 36 secure_id_t user_id; member
|
| D | gatekeeper_messages.h | 133 uint32_t user_id; member
|
| /system/core/storaged/include/ |
| D | storaged_uid_monitor.h | 63 userid_t user_id; member
|
| D | storaged.h | 95 string proto_path(userid_t user_id) { in proto_path()
|
| /system/bt/bta/jv/ |
| D | bta_jv_api.cc | 486 uint32_t user_id) { in BTA_JvL2capWrite() 512 BT_HDR* msg, uint32_t user_id) { in BTA_JvL2capWriteFixed()
|
| D | bta_jv_act.cc | 1144 uint32_t user_id, tBTA_JV_L2C_CB* p_cb) { in bta_jv_l2cap_write() 1195 uint32_t req_id, BT_HDR* msg, uint32_t user_id, in bta_jv_l2cap_write_fixed()
|
| /system/security/keystore/ |
| D | keymaster_enforcement.cpp | 227 int32_t user_id = -1; in AuthorizeBegin() local
|
| D | key_store_service.cpp | 887 KeyParameter user_id; in generateKey() local 1130 KeyParameter user_id; in importKey() local
|
| /system/media/audio/include/system/ |
| D | sound_trigger.h | 176 unsigned int user_id; /* user ID */ member
|
| /system/keymaster/tests/ |
| D | android_keymaster_test.cpp | 4025 uint32_t user_id; in verify_attestation_record() local
|