Home
last modified time | relevance | path

Searched refs:userId (Results 1 – 25 of 27) sorted by relevance

12

/hardware/interfaces/biometrics/face/1.0/vts/functional/
DVtsHalBiometricsFaceV1_0TargetTest.cpp70 int32_t userId; member
79 Return<void> onEnrollResult(uint64_t, uint32_t, int32_t userId, uint32_t) override { in onEnrollResult() argument
81 args.userId = userId; in onEnrollResult()
86 Return<void> onAuthenticated(uint64_t, uint32_t, int32_t userId, in onAuthenticated() argument
89 args.userId = userId; in onAuthenticated()
94 Return<void> onAcquired(uint64_t, int32_t userId, FaceAcquiredInfo, int32_t) override { in onAcquired() argument
96 args.userId = userId; in onAcquired()
101 Return<void> onError(uint64_t, int32_t userId, FaceError error, int32_t) override { in onError() argument
104 args.userId = userId; in onError()
109 Return<void> onRemoved(uint64_t, const hidl_vec<uint32_t>&, int32_t userId) override { in onRemoved() argument
[all …]
/hardware/interfaces/biometrics/face/1.0/
DIBiometricsFaceClientCallback.hal31 * @param userId The active user id for the template being enrolled.
35 oneway onEnrollResult(uint64_t deviceId, uint32_t faceId, int32_t userId,
45 * @param userId The active user id for the authenticated face.
49 oneway onAuthenticated(uint64_t deviceId, uint32_t faceId, int32_t userId,
62 * @param userId The id of the active user associated with the attempted
72 oneway onAcquired(uint64_t deviceId, int32_t userId,
80 * @param userId The id of the active user when the error occured, or
90 oneway onError(uint64_t deviceId, int32_t userId, FaceError error,
99 * @param userId The active user id for the removed face template.
101 oneway onRemoved(uint64_t deviceId, vec<uint32_t> removed, int32_t userId);
[all …]
DIBiometricsFace.hal53 * returning to the idle state. Calling this method with the same userId
60 * @param userId A non-negative user identifier that must be unique and
67 setActiveUser(int32_t userId, string storePath) generates (Status status);
Dtypes.hal21 * this userId.
/hardware/interfaces/biometrics/face/1.0/default/
DBiometricsFace.cpp40 Return<Status> BiometricsFace::setActiveUser(int32_t userId, const hidl_string& storePath) { in setActiveUser() argument
41 if (userId < 0 || storePath.empty() || std::string(storePath).find("/data") != 0) { in setActiveUser()
44 mUserId = userId; in setActiveUser()
DBiometricsFace.h45 Return<Status> setActiveUser(int32_t userId, const hidl_string& storePath) override;
/hardware/interfaces/keymaster/aidl/aidl_api/android.hardware.keymaster/current/android/hardware/keymaster/
DHardwareAuthToken.aidl22 long userId;
/hardware/interfaces/keymaster/aidl/aidl_api/android.hardware.keymaster/2/android/hardware/keymaster/
DHardwareAuthToken.aidl22 long userId;
/hardware/interfaces/keymaster/aidl/aidl_api/android.hardware.keymaster/1/android/hardware/keymaster/
DHardwareAuthToken.aidl22 long userId;
/hardware/interfaces/keymaster/aidl/android/hardware/keymaster/
DHardwareAuthToken.aidl45 long userId;
/hardware/interfaces/keymaster/4.0/support/
Dkeymaster_utils.cpp62 static_assert(1 /* version size */ + sizeof(token.challenge) + sizeof(token.userId) + in authToken2HidlVec()
73 pos = copy_bytes_to_iterator(token.userId, pos); in authToken2HidlVec()
90 static_assert(1 /* version size */ + sizeof(token.challenge) + sizeof(token.userId) + in hidlVec2AuthToken()
101 pos = copy_bytes_from_iterator(&token.userId, pos); in hidlVec2AuthToken()
/hardware/interfaces/gatekeeper/1.0/vts/functional/
DVtsHalGatekeeperV1_0TargetTest.cpp390 uint32_t userId; in TEST_P() member
394 UserData(int id) { userId = id; } in TEST_P()
401 setUid(users[i].userId); in TEST_P()
409 setUid(users[i].userId); in TEST_P()
424 setUid(users[i].userId); in TEST_P()
/hardware/interfaces/soundtrigger/2.0/
Dtypes.hal54 uint32_t userId;
/hardware/interfaces/confirmationui/support/test/
Dmsg_formatting_test.cpp117 expected.userId = 0x1122334455667788; in TEST()
/hardware/interfaces/confirmationui/support/include/android/hardware/confirmationui/support/
Dmsg_formatting.h258 return sizeof hat->challenge + sizeof hat->userId + sizeof hat->authenticatorId +
281 pos = copyField(hat.userId, pos);
302 pos = copyField(v.userId, pos);
/hardware/interfaces/confirmationui/support/include/android/hardware/confirmationui/1.0/generic/
DGenericOperation.h134 bytes_cast(secureInputToken.userId), in deliverSecureInputEvent()
/hardware/interfaces/confirmationui/1.0/vts/functional/
DVtsHalConfirmationUIV1_0TargetTest.cpp103 auth_token.userId = 0;
118 toBytes(auth_token.userId), //
/hardware/interfaces/soundtrigger/2.0/default/
DSoundTriggerHalImpl.cpp399 halExtra->levels[i].user_id = extra->levels[i].userId; in convertPhraseRecognitionExtraToHal()
483 extra->levels[i].userId = halExtra->levels[i].user_id; in convertPhraseRecognitionExtraFromHal()
/hardware/interfaces/identity/aidl/vts/
DReaderAuthTests.cpp329 authToken.userId = 0; in retrieveData()
572 authToken.userId = 0; in TEST_P()
DUserAuthTests.cpp286 authToken.userId = 65; in mintTokens()
DVtsHalIdentityEndToEndTest.cpp151 authToken.userId = 0; in TEST_P()
/hardware/interfaces/soundtrigger/2.2/default/
DSoundTriggerHw.cpp422 halExtra->levels[i].user_id = extra->levels[i].userId; in convertPhraseRecognitionExtraToHal()
508 extra->levels[i].userId = halExtra->levels[i].user_id; in convertPhraseRecognitionExtraFromHal()
/hardware/interfaces/identity/aidl/default/
DIdentityCredential.cpp209 if (profile.secureUserId != authToken.userId) { in checkUserAuthentication()
211 << ") differs from userId in authToken (" << authToken.userId << ")"; in checkUserAuthentication()
/hardware/interfaces/soundtrigger/2.3/default/
DSoundTriggerHw.cpp430 halExtra->levels[i].user_id = extra->levels[i].userId; in convertPhraseRecognitionExtraToHal()
564 extra->levels[i].userId = halExtra->levels[i].user_id; in convertPhraseRecognitionExtraFromHal()
/hardware/interfaces/keymaster/4.0/
Dtypes.hal343 * present in the userId or authenticatorId field of a HardwareAuthToken provided to begin(),
345 * with the matching userId or authenticatorId, the IKeymasterDevice must return
359 * userId or authenticatorId fields, and the current operation's operation handle in the
1201 * userId is the a "secure" user ID. It is not related to any Android user ID or UID, but is
1204 uint64_t userId;
1237 * are represented as unsigned values, the full width of the type. The challenge, userId and

12