/hardware/interfaces/biometrics/face/1.0/vts/functional/ |
D | VtsHalBiometricsFaceV1_0TargetTest.cpp | 70 int32_t userId; member 79 Return<void> onEnrollResult(uint64_t, uint32_t, int32_t userId, uint32_t) override { in onEnrollResult() argument 81 args.userId = userId; in onEnrollResult() 86 Return<void> onAuthenticated(uint64_t, uint32_t, int32_t userId, in onAuthenticated() argument 89 args.userId = userId; in onAuthenticated() 94 Return<void> onAcquired(uint64_t, int32_t userId, FaceAcquiredInfo, int32_t) override { in onAcquired() argument 96 args.userId = userId; in onAcquired() 101 Return<void> onError(uint64_t, int32_t userId, FaceError error, int32_t) override { in onError() argument 104 args.userId = userId; in onError() 109 Return<void> onRemoved(uint64_t, const hidl_vec<uint32_t>&, int32_t userId) override { in onRemoved() argument [all …]
|
/hardware/interfaces/biometrics/face/1.0/ |
D | IBiometricsFaceClientCallback.hal | 31 * @param userId The active user id for the template being enrolled. 35 oneway onEnrollResult(uint64_t deviceId, uint32_t faceId, int32_t userId, 45 * @param userId The active user id for the authenticated face. 49 oneway onAuthenticated(uint64_t deviceId, uint32_t faceId, int32_t userId, 62 * @param userId The id of the active user associated with the attempted 72 oneway onAcquired(uint64_t deviceId, int32_t userId, 80 * @param userId The id of the active user when the error occured, or 90 oneway onError(uint64_t deviceId, int32_t userId, FaceError error, 99 * @param userId The active user id for the removed face template. 101 oneway onRemoved(uint64_t deviceId, vec<uint32_t> removed, int32_t userId); [all …]
|
D | IBiometricsFace.hal | 53 * returning to the idle state. Calling this method with the same userId 60 * @param userId A non-negative user identifier that must be unique and 67 setActiveUser(int32_t userId, string storePath) generates (Status status);
|
D | types.hal | 21 * this userId.
|
/hardware/interfaces/biometrics/face/1.0/default/ |
D | BiometricsFace.cpp | 40 Return<Status> BiometricsFace::setActiveUser(int32_t userId, const hidl_string& storePath) { in setActiveUser() argument 41 if (userId < 0 || storePath.empty() || std::string(storePath).find("/data") != 0) { in setActiveUser() 44 mUserId = userId; in setActiveUser()
|
D | BiometricsFace.h | 45 Return<Status> setActiveUser(int32_t userId, const hidl_string& storePath) override;
|
/hardware/interfaces/keymaster/aidl/aidl_api/android.hardware.keymaster/current/android/hardware/keymaster/ |
D | HardwareAuthToken.aidl | 22 long userId;
|
/hardware/interfaces/keymaster/aidl/aidl_api/android.hardware.keymaster/2/android/hardware/keymaster/ |
D | HardwareAuthToken.aidl | 22 long userId;
|
/hardware/interfaces/keymaster/aidl/aidl_api/android.hardware.keymaster/1/android/hardware/keymaster/ |
D | HardwareAuthToken.aidl | 22 long userId;
|
/hardware/interfaces/keymaster/aidl/android/hardware/keymaster/ |
D | HardwareAuthToken.aidl | 45 long userId;
|
/hardware/interfaces/keymaster/4.0/support/ |
D | keymaster_utils.cpp | 62 static_assert(1 /* version size */ + sizeof(token.challenge) + sizeof(token.userId) + in authToken2HidlVec() 73 pos = copy_bytes_to_iterator(token.userId, pos); in authToken2HidlVec() 90 static_assert(1 /* version size */ + sizeof(token.challenge) + sizeof(token.userId) + in hidlVec2AuthToken() 101 pos = copy_bytes_from_iterator(&token.userId, pos); in hidlVec2AuthToken()
|
/hardware/interfaces/gatekeeper/1.0/vts/functional/ |
D | VtsHalGatekeeperV1_0TargetTest.cpp | 390 uint32_t userId; in TEST_P() member 394 UserData(int id) { userId = id; } in TEST_P() 401 setUid(users[i].userId); in TEST_P() 409 setUid(users[i].userId); in TEST_P() 424 setUid(users[i].userId); in TEST_P()
|
/hardware/interfaces/soundtrigger/2.0/ |
D | types.hal | 54 uint32_t userId;
|
/hardware/interfaces/confirmationui/support/test/ |
D | msg_formatting_test.cpp | 117 expected.userId = 0x1122334455667788; in TEST()
|
/hardware/interfaces/confirmationui/support/include/android/hardware/confirmationui/support/ |
D | msg_formatting.h | 258 return sizeof hat->challenge + sizeof hat->userId + sizeof hat->authenticatorId + 281 pos = copyField(hat.userId, pos); 302 pos = copyField(v.userId, pos);
|
/hardware/interfaces/confirmationui/support/include/android/hardware/confirmationui/1.0/generic/ |
D | GenericOperation.h | 134 bytes_cast(secureInputToken.userId), in deliverSecureInputEvent()
|
/hardware/interfaces/confirmationui/1.0/vts/functional/ |
D | VtsHalConfirmationUIV1_0TargetTest.cpp | 103 auth_token.userId = 0; 118 toBytes(auth_token.userId), //
|
/hardware/interfaces/soundtrigger/2.0/default/ |
D | SoundTriggerHalImpl.cpp | 399 halExtra->levels[i].user_id = extra->levels[i].userId; in convertPhraseRecognitionExtraToHal() 483 extra->levels[i].userId = halExtra->levels[i].user_id; in convertPhraseRecognitionExtraFromHal()
|
/hardware/interfaces/identity/aidl/vts/ |
D | ReaderAuthTests.cpp | 329 authToken.userId = 0; in retrieveData() 572 authToken.userId = 0; in TEST_P()
|
D | UserAuthTests.cpp | 286 authToken.userId = 65; in mintTokens()
|
D | VtsHalIdentityEndToEndTest.cpp | 151 authToken.userId = 0; in TEST_P()
|
/hardware/interfaces/soundtrigger/2.2/default/ |
D | SoundTriggerHw.cpp | 422 halExtra->levels[i].user_id = extra->levels[i].userId; in convertPhraseRecognitionExtraToHal() 508 extra->levels[i].userId = halExtra->levels[i].user_id; in convertPhraseRecognitionExtraFromHal()
|
/hardware/interfaces/identity/aidl/default/ |
D | IdentityCredential.cpp | 209 if (profile.secureUserId != authToken.userId) { in checkUserAuthentication() 211 << ") differs from userId in authToken (" << authToken.userId << ")"; in checkUserAuthentication()
|
/hardware/interfaces/soundtrigger/2.3/default/ |
D | SoundTriggerHw.cpp | 430 halExtra->levels[i].user_id = extra->levels[i].userId; in convertPhraseRecognitionExtraToHal() 564 extra->levels[i].userId = halExtra->levels[i].user_id; in convertPhraseRecognitionExtraFromHal()
|
/hardware/interfaces/keymaster/4.0/ |
D | types.hal | 343 * present in the userId or authenticatorId field of a HardwareAuthToken provided to begin(), 345 * with the matching userId or authenticatorId, the IKeymasterDevice must return 359 * userId or authenticatorId fields, and the current operation's operation handle in the 1201 * userId is the a "secure" user ID. It is not related to any Android user ID or UID, but is 1204 uint64_t userId; 1237 * are represented as unsigned values, the full width of the type. The challenge, userId and
|