Searched refs:token (Results 1 - 25 of 29) sorted by relevance

12

/system/core/libpixelflinger/codeflinger/
H A DArm64Disassembler.cpp95 static void get_token(const char *instr, uint32_t index, char *token) argument
102 token[j++] = instr[i];
111 token[j++] = instr[i];
114 token[j] = '\0';
134 static void decode_token(uint32_t code, char *token, char *instr_part) argument
136 if(strcmp(token, "<imm1>") == 0)
138 else if(strcmp(token, "<imm2>") == 0)
140 else if(strcmp(token, "<shift1>") == 0)
142 else if(strcmp(token, "<shift2>") == 0)
147 else if(strcmp(token, "<shift
273 char token[256]; local
[all...]
/system/keymaster/
H A Dkeymaster_enforcement_test.cpp54 bool auth_token_timed_out(const hw_auth_token_t& token, uint32_t timeout) const { argument
55 return current_time_ > ntoh(token.timestamp) + timeout;
520 hw_auth_token_t token; local
521 memset(&token, 0, sizeof(token));
522 token.version = HW_AUTH_TOKEN_VERSION;
523 token.challenge = 99;
524 token.user_id = 9;
525 token.authenticator_id = 0;
526 token
543 hw_auth_token_t token; local
572 hw_auth_token_t token; local
596 hw_auth_token_t token; local
623 hw_auth_token_t token; local
652 hw_auth_token_t token; local
681 hw_auth_token_t token; local
704 hw_auth_token_t token; local
756 hw_auth_token_t token; local
781 hw_auth_token_t token; local
830 hw_auth_token_t token; local
[all...]
/system/core/adb/
H A Dadb_auth.h28 void send_auth_response(uint8_t *token, size_t token_size, atransport *t);
41 int adb_auth_sign(void *key, const unsigned char* token, size_t token_size,
46 static inline int adb_auth_generate_token(void *token, size_t token_size) { return 0; } argument
47 static inline int adb_auth_verify(void *token, void *sig, int siglen) { return 0; } argument
52 static inline int adb_auth_sign(void* key, const unsigned char* token, argument
61 int adb_auth_generate_token(void *token, size_t token_size);
62 int adb_auth_verify(uint8_t* token, uint8_t* sig, int siglen);
H A Dadb_auth.cpp39 ret = adb_auth_generate_token(t->token, sizeof(t->token));
40 if (ret != sizeof(t->token)) {
41 D("Error generating token ret=%d\n", ret);
46 memcpy(p->data, t->token, ret);
53 void send_auth_response(uint8_t *token, size_t token_size, atransport *t) argument
59 ret = adb_auth_sign(t->key, token, token_size, p->data);
61 D("Error signing the token\n");
H A Dadb_auth_client.cpp126 int adb_auth_generate_token(void *token, size_t token_size) argument
135 ret = fread(token, token_size, 1, f);
141 int adb_auth_verify(uint8_t* token, uint8_t* sig, int siglen) argument
154 ret = RSA_verify(&key->key, sig, siglen, token, SHA_DIGEST_SIZE);
H A Dadb_auth_host.cpp371 int adb_auth_sign(void *node, const unsigned char* token, size_t token_size, argument
378 D("Unexpected token size %zd\n", token_size);
382 if (!RSA_sign(NID_sha1, token, token_size, sig, &len, key->rsa)) {
/system/security/keystore/
H A Doperation.cpp33 sp<IBinder> token = new BBinder(); local
34 mMap[token] = std::move(Operation(handle, keyid, purpose, dev, characteristics, appToken));
36 mLru.push_back(token);
41 mAppTokenMap[appToken].push_back(token);
42 return token;
45 bool OperationMap::getOperation(sp<IBinder> token, keymaster_operation_handle_t* outHandle, argument
52 auto entry = mMap.find(token);
56 updateLru(token);
68 void OperationMap::updateLru(sp<IBinder> token) { argument
69 auto lruEntry = std::find(mLru.begin(), mLru.end(), token);
76 removeOperation(sp<IBinder> token) argument
91 removeOperationTracking(sp<IBinder> token, sp<IBinder> appToken) argument
121 getOperationAuthToken(sp<IBinder> token, const hw_auth_token_t** outToken) argument
130 setOperationAuthToken(sp<IBinder> token, const hw_auth_token_t* authToken) argument
[all...]
H A Doperation.h54 bool getOperation(sp<IBinder> token, keymaster_operation_handle_t* outHandle,
58 bool removeOperation(sp<IBinder> token);
61 bool getOperationAuthToken(sp<IBinder> token, const hw_auth_token_t** outToken);
62 bool setOperationAuthToken(sp<IBinder> token, const hw_auth_token_t* authToken);
67 void updateLru(sp<IBinder> token);
68 void removeOperationTracking(sp<IBinder> token, sp<IBinder> appToken);
H A Dauth_token_table.h36 * token for authorizing a key operation.
50 AUTH_TOKEN_EXPIRED = -2, // Found a matching token, but it's too old.
51 AUTH_TOKEN_WRONG_SID = -3, // Found a token with the right challenge, but wrong SID. This
59 * Add an authorization token to the table. The table takes ownership of the argument.
61 void AddAuthenticationToken(const hw_auth_token_t* token);
64 * Find an authorization token that authorizes the operation specified by \p operation_handle on
77 * Find an authorization token that authorizes the operation specified by \p operation_handle on
107 Entry(const hw_auth_token_t* token, time_t current_time);
132 const hw_auth_token_t* token() { return token_.get(); } function in class:keymaster::AuthTokenTable::Entry
H A Dauth_token_table.cpp56 LOG_W("Auth token table filled up; replacing oldest entry", 0);
111 entries_, [&](Entry& e) { return e.token()->challenge == op_handle && !e.completed(); });
119 *found = matching_op->token();
142 *found = newest_match->token();
168 auto found = find_if(entries_, [&](Entry& e) { return e.token()->challenge == op_handle; });
179 AuthTokenTable::Entry::Entry(const hw_auth_token_t* token, time_t current_time) argument
180 : token_(token), time_received_(current_time), last_use_(current_time),
H A DIKeystoreService.cpp51 OperationResult::OperationResult() : resultCode(0), token(), handle(0), inputConsumed(0),
60 token = in.readStrongBinder();
84 out->writeStrongBinder(token);
1102 virtual void update(const sp<IBinder>& token, const KeymasterArguments& params, argument
1110 data.writeStrongBinder(token);
1131 virtual void finish(const sp<IBinder>& token, const KeymasterArguments& params, argument
1141 data.writeStrongBinder(token);
1163 virtual int32_t abort(const sp<IBinder>& token) argument
1167 data.writeStrongBinder(token);
1182 virtual bool isOperationAuthorized(const sp<IBinder>& token) argument
1202 addAuthToken(const uint8_t* token, size_t length) argument
1643 sp<IBinder> token = data.readStrongBinder(); local
1664 sp<IBinder> token = data.readStrongBinder(); local
1682 sp<IBinder> token = data.readStrongBinder(); local
1703 sp<IBinder> token = data.readStrongBinder(); local
1712 sp<IBinder> token = data.readStrongBinder(); local
[all...]
H A Dkeystore.cpp1704 for (auto token: operations) {
1705 abort(token);
1814 // Flush the auth token table to prevent stale tokens from sticking
2552 // application should get an auth token using the handle before the
2554 // auth token.
2556 result->token = operationToken;
2564 void update(const sp<IBinder>& token, const KeymasterArguments& params, const uint8_t* data, argument
2575 if (!mOperationMap.getOperation(token, &handle, &keyid, &purpose, &dev, &characteristics)) {
2580 int32_t authResult = addOperationAuthTokenIfNeeded(token, &opParams);
2615 void finish(const sp<IBinder>& token, cons argument
2680 abort(const sp<IBinder>& token) argument
2702 isOperationAuthorized(const sp<IBinder>& token) argument
2718 addAuthToken(const uint8_t* token, size_t length) argument
2728 memcpy(reinterpret_cast<void*>(authToken), token, sizeof(hw_auth_token_t)); local
2944 addAuthToParams(std::vector<keymaster_key_param_t>* params, const hw_auth_token_t* token) argument
2964 addOperationAuthTokenIfNeeded(sp<IBinder> token, std::vector<keymaster_key_param_t>* params) argument
3072 sp<IBinder> token; local
[all...]
/system/extras/ext4_utils/
H A Dcanned_fs_config.c63 char* token = NULL; local
65 token = strtok(NULL, " ");
66 if (token && strncmp(token, "capabilities=", 13) == 0) {
67 p->capabilities = strtoll(token+13, NULL, 0);
70 } while (token);
/system/gatekeeper/
H A Dgatekeeper.cpp220 hw_auth_token_t *token = new hw_auth_token_t;
223 token->version = HW_AUTH_TOKEN_VERSION;
224 token->challenge = challenge;
225 token->user_id = user_id;
226 token->authenticator_id = authenticator_id;
227 token->authenticator_type = htonl(HW_AUTH_PASSWORD);
228 token->timestamp = htobe64(timestamp);
233 uint32_t hash_len = (uint32_t)((uint8_t *)&token->hmac - (uint8_t *)token);
234 ComputeSignature(token
[all...]
/system/keymaster/include/keymaster/
H A Dkeymaster_enforcement.h127 virtual bool auth_token_timed_out(const hw_auth_token_t& token, uint32_t timeout) const = 0;
144 virtual bool ValidateTokenSignature(const hw_auth_token_t& token) const = 0;
/system/core/sdcard/
H A Dsdcard.c241 int token; member in struct:fuse_handler
789 TRACE("[%d] LOOKUP %s @ %"PRIx64" (%s)\n", handler->token, name, hdr->nodeid,
811 TRACE("[%d] FORGET #%"PRIu64" @ %"PRIx64" (%s)\n", handler->token, req->nlookup,
831 TRACE("[%d] GETATTR flags=%x fh=%"PRIx64" @ %"PRIx64" (%s)\n", handler->token,
854 TRACE("[%d] SETATTR fh=%"PRIx64" valid=%x @ %"PRIx64" (%s)\n", handler->token,
900 handler->token, path, times[0].tv_sec, times[1].tv_sec);
919 TRACE("[%d] MKNOD %s 0%o @ %"PRIx64" (%s)\n", handler->token,
948 TRACE("[%d] MKDIR %s 0%o @ %"PRIx64" (%s)\n", handler->token,
996 TRACE("[%d] UNLINK %s @ %"PRIx64" (%s)\n", handler->token,
1019 handler->token, (uint64_
[all...]
/system/core/fingerprintd/
H A DFingerprintDaemonProxy.h36 virtual int32_t enroll(const uint8_t* token, ssize_t tokenLength, int32_t groupId, int32_t timeout);
H A DIFingerprintDaemon.h55 virtual int32_t enroll(const uint8_t* token, ssize_t tokenLength, int32_t groupId,
H A DFingerprintDaemonProxy.cpp106 ALOGE("Falure sending auth token to KeyStore: %d", ret);
122 int32_t FingerprintDaemonProxy::enroll(const uint8_t* token, ssize_t tokenSize, int32_t groupId, argument
126 ALOG(LOG_VERBOSE, LOG_TAG, "enroll() : invalid token size %zu\n", tokenSize);
129 const hw_auth_token_t* authToken = reinterpret_cast<const hw_auth_token_t*>(token);
H A DIFingerprintDaemon.cpp78 const uint8_t* token = static_cast<const uint8_t *>(data.readInplace(tokenSize)); local
81 const int32_t ret = enroll(token, tokenSize, groupId, timeout);
/system/core/include/utils/
H A DPropertyMap.h97 status_t parseModifier(const String8& token, int32_t* outMetaState);
/system/core/init/
H A Dueventd_parser.cpp206 int token = next_token(&state); local
207 switch (token) {
/system/security/keystore/include/keystore/
H A DIKeystoreService.h63 sp<IBinder> token; member in struct:android::OperationResult
216 virtual void update(const sp<IBinder>& token, const KeymasterArguments& params,
219 virtual void finish(const sp<IBinder>& token, const KeymasterArguments& params,
228 virtual int32_t addAuthToken(const uint8_t* token, size_t length) = 0;
/system/security/keystore/tests/
H A Dauth_token_table_test.cpp76 hw_auth_token_t* token = new hw_auth_token_t; local
77 token->user_id = rsid;
78 token->authenticator_id = ssid;
79 token->authenticator_type = hton(static_cast<uint32_t>(HW_AUTH_PASSWORD));
80 token->challenge = challenge;
81 token->timestamp = hton(timestamp);
82 return token;
281 // expired. An additional check of the secure timestamp (in the token) will be made by
282 // keymaster when the found token is passed to it.
311 // Add a third token, thi
[all...]
/system/vold/
H A DDisk.cpp273 char* token = strtok(cline, kSgdiskToken); local
274 if (token == nullptr) continue;
276 if (!strcmp(token, "DISK")) {
283 } else if (!strcmp(token, "PART")) {

Completed in 300 milliseconds

12