/system/core/gatekeeperd/tests/ |
H A D | gatekeeper_test.cpp | 85 hw_auth_token_t *auth_token = local 86 reinterpret_cast<hw_auth_token_t *>(response.auth_token.buffer.get()); 88 ASSERT_EQ((uint32_t) HW_AUTH_PASSWORD, ntohl(auth_token->authenticator_type)); 89 ASSERT_EQ((uint64_t) 1, auth_token->challenge); 90 ASSERT_NE(~((uint32_t) 0), auth_token->timestamp); 91 ASSERT_NE((uint64_t) 0, auth_token->user_id); 92 ASSERT_NE((uint64_t) 0, auth_token->authenticator_id); 120 hw_auth_token_t *auth_token = local 121 reinterpret_cast<hw_auth_token_t *>(response.auth_token.buffer.get()); 123 secure_id_t secure_id = auth_token 168 hw_auth_token_t *auth_token = local [all...] |
/system/core/gatekeeperd/ |
H A D | SoftGateKeeperDevice.cpp | 74 uint32_t provided_password_length, uint8_t **auth_token, uint32_t *auth_token_length, 99 if (auth_token != NULL && auth_token_length != NULL) { 100 *auth_token = response.auth_token.buffer.release(); 101 *auth_token_length = response.auth_token.length; 71 verify(uint32_t uid, uint64_t challenge, const uint8_t *enrolled_password_handle, uint32_t enrolled_password_handle_length, const uint8_t *provided_password, uint32_t provided_password_length, uint8_t **auth_token, uint32_t *auth_token_length, bool *request_reenroll) argument
|
H A D | gatekeeperd.cpp | 190 uint8_t *auth_token; local 194 &auth_token, &auth_token_length, request_reenroll); 200 uint8_t **auth_token, uint32_t *auth_token_length, bool *request_reenroll) { 221 provided_password, provided_password_length, auth_token, auth_token_length, 228 provided_password, provided_password_length, auth_token, auth_token_length, 239 provided_password, provided_password_length, auth_token, auth_token_length, 243 if (ret == 0 && *auth_token != NULL && *auth_token_length > 0) { 249 status_t ret = service->addAuthToken(*auth_token, *auth_token_length); 197 verifyChallenge(uint32_t uid, uint64_t challenge, const uint8_t *enrolled_password_handle, uint32_t enrolled_password_handle_length, const uint8_t *provided_password, uint32_t provided_password_length, uint8_t **auth_token, uint32_t *auth_token_length, bool *request_reenroll) argument
|
/system/gatekeeper/tests/ |
H A D | gatekeeper_device_test.cpp | 57 uint8_t *auth_token; local 68 password_payload, password_len, &auth_token, &auth_token_len, &should_reenroll); 78 uint8_t *auth_token = NULL; local 91 password_payload, password_len, &auth_token, &auth_token_len, 95 ASSERT_EQ(NULL, auth_token);
|
H A D | gatekeeper_messages_test.cpp | 196 SizedBuffer *auth_token = make_buffer(password_size); local 199 VerifyResponse msg(USER_ID, auth_token); 211 deserialized_password = &deserialized_msg.auth_token; 213 ASSERT_EQ(0, memcmp(msg.auth_token.buffer.get(), deserialized_password->buffer.get(),
|
/system/gatekeeper/include/gatekeeper/ |
H A D | gatekeeper_messages.h | 156 VerifyResponse(uint32_t user_id, SizedBuffer *auth_token); 160 void SetVerificationToken(SizedBuffer *auth_token); 166 SizedBuffer auth_token; member in struct:gatekeeper::VerifyResponse
|
/system/core/fingerprintd/ |
H A D | FingerprintDaemonProxy.cpp | 97 void FingerprintDaemonProxy::notifyKeystore(const uint8_t *auth_token, const size_t auth_token_length) { argument 98 if (auth_token != NULL && auth_token_length > 0) { 104 status_t ret = service->addAuthToken(auth_token, auth_token_length);
|
/system/gatekeeper/ |
H A D | gatekeeper.cpp | 153 SizedBuffer auth_token(auth_token_len); 154 memcpy(auth_token.buffer.get(), auth_token_buffer.get(), auth_token_len); 155 response->SetVerificationToken(&auth_token); 215 void GateKeeper::MintAuthToken(UniquePtr<uint8_t> *auth_token, uint32_t *length, argument 218 if (auth_token == NULL) return; 242 auth_token->reset(reinterpret_cast<uint8_t *>(token));
|
H A D | gatekeeper_messages.cpp | 194 VerifyResponse::VerifyResponse(uint32_t user_id, SizedBuffer *auth_token) { argument 196 this->auth_token.buffer.reset(auth_token->buffer.release()); 197 this->auth_token.length = auth_token->length; 202 memset_s(&auth_token, 0, sizeof(auth_token)); 206 if (auth_token.length > 0) { 207 auth_token.buffer.reset(); 211 void VerifyResponse::SetVerificationToken(SizedBuffer *auth_token) { argument [all...] |
/system/security/keystore/ |
H A D | auth_token_table.cpp | 52 void AuthTokenTable::AddAuthenticationToken(const hw_auth_token_t* auth_token) { argument 53 Entry new_entry(auth_token, clock_function_());
|