/system/core/adb/ |
H A D | adb_auth.cpp | 39 ret = adb_auth_generate_token(t->token, sizeof(t->token)); 40 if (ret != sizeof(t->token)) { 41 D("Error generating token ret=%d\n", ret); 46 memcpy(p->data, t->token, ret); 53 void send_auth_response(uint8_t *token, size_t token_size, atransport *t) argument 59 ret = adb_auth_sign(t->key, token, token_size, p->data); 61 D("Error signing the token\n");
|
H A D | adb_auth.h | 28 void send_auth_response(uint8_t *token, size_t token_size, atransport *t); 41 int adb_auth_sign(void *key, const unsigned char* token, size_t token_size, 46 static inline int adb_auth_generate_token(void *token, size_t token_size) { return 0; } argument 47 static inline int adb_auth_verify(void *token, void *sig, int siglen) { return 0; } argument 52 static inline int adb_auth_sign(void* key, const unsigned char* token, argument 61 int adb_auth_generate_token(void *token, size_t token_size); 62 int adb_auth_verify(uint8_t* token, uint8_t* sig, int siglen);
|
H A D | adb_auth_client.cpp | 126 int adb_auth_generate_token(void *token, size_t token_size) argument 135 ret = fread(token, token_size, 1, f); 141 int adb_auth_verify(uint8_t* token, uint8_t* sig, int siglen) argument 154 ret = RSA_verify(&key->key, sig, siglen, token, SHA_DIGEST_SIZE);
|
H A D | adb_auth_host.cpp | 371 int adb_auth_sign(void *node, const unsigned char* token, size_t token_size, argument 378 D("Unexpected token size %zd\n", token_size); 382 if (!RSA_sign(NID_sha1, token, token_size, sig, &len, key->rsa)) {
|
H A D | adb.h | 209 unsigned char token[TOKEN_SIZE]; member in struct:atransport
|
/system/core/fingerprintd/ |
H A D | IFingerprintDaemon.cpp | 78 const uint8_t* token = static_cast<const uint8_t *>(data.readInplace(tokenSize)); local 81 const int32_t ret = enroll(token, tokenSize, groupId, timeout);
|
H A D | FingerprintDaemonProxy.cpp | 106 ALOGE("Falure sending auth token to KeyStore: %d", ret); 122 int32_t FingerprintDaemonProxy::enroll(const uint8_t* token, ssize_t tokenSize, int32_t groupId, argument 126 ALOG(LOG_VERBOSE, LOG_TAG, "enroll() : invalid token size %zu\n", tokenSize); 129 const hw_auth_token_t* authToken = reinterpret_cast<const hw_auth_token_t*>(token);
|
/system/extras/ext4_utils/ |
H A D | canned_fs_config.c | 63 char* token = NULL; local 65 token = strtok(NULL, " "); 66 if (token && strncmp(token, "capabilities=", 13) == 0) { 67 p->capabilities = strtoll(token+13, NULL, 0); 70 } while (token);
|
/system/core/init/ |
H A D | ueventd_parser.cpp | 206 int token = next_token(&state); local 207 switch (token) {
|
/system/core/libpixelflinger/codeflinger/ |
H A D | Arm64Disassembler.cpp | 95 static void get_token(const char *instr, uint32_t index, char *token) argument 102 token[j++] = instr[i]; 111 token[j++] = instr[i]; 114 token[j] = '\0'; 134 static void decode_token(uint32_t code, char *token, char *instr_part) argument 136 if(strcmp(token, "<imm1>") == 0) 138 else if(strcmp(token, "<imm2>") == 0) 140 else if(strcmp(token, "<shift1>") == 0) 142 else if(strcmp(token, "<shift2>") == 0) 147 else if(strcmp(token, "<shift 273 char token[256]; local [all...] |
/system/security/keystore/ |
H A D | auth_token_table.h | 36 * token for authorizing a key operation. 50 AUTH_TOKEN_EXPIRED = -2, // Found a matching token, but it's too old. 51 AUTH_TOKEN_WRONG_SID = -3, // Found a token with the right challenge, but wrong SID. This 59 * Add an authorization token to the table. The table takes ownership of the argument. 61 void AddAuthenticationToken(const hw_auth_token_t* token); 64 * Find an authorization token that authorizes the operation specified by \p operation_handle on 77 * Find an authorization token that authorizes the operation specified by \p operation_handle on 107 Entry(const hw_auth_token_t* token, time_t current_time); 132 const hw_auth_token_t* token() { return token_.get(); } function in class:keymaster::AuthTokenTable::Entry
|
H A D | auth_token_table.cpp | 56 LOG_W("Auth token table filled up; replacing oldest entry", 0); 111 entries_, [&](Entry& e) { return e.token()->challenge == op_handle && !e.completed(); }); 119 *found = matching_op->token(); 142 *found = newest_match->token(); 168 auto found = find_if(entries_, [&](Entry& e) { return e.token()->challenge == op_handle; }); 179 AuthTokenTable::Entry::Entry(const hw_auth_token_t* token, time_t current_time) argument 180 : token_(token), time_received_(current_time), last_use_(current_time),
|
H A D | operation.cpp | 33 sp<IBinder> token = new BBinder(); local 34 mMap[token] = std::move(Operation(handle, keyid, purpose, dev, characteristics, appToken)); 36 mLru.push_back(token); 41 mAppTokenMap[appToken].push_back(token); 42 return token; 45 bool OperationMap::getOperation(sp<IBinder> token, keymaster_operation_handle_t* outHandle, argument 52 auto entry = mMap.find(token); 56 updateLru(token); 68 void OperationMap::updateLru(sp<IBinder> token) { argument 69 auto lruEntry = std::find(mLru.begin(), mLru.end(), token); 76 removeOperation(sp<IBinder> token) argument 91 removeOperationTracking(sp<IBinder> token, sp<IBinder> appToken) argument 121 getOperationAuthToken(sp<IBinder> token, const hw_auth_token_t** outToken) argument 130 setOperationAuthToken(sp<IBinder> token, const hw_auth_token_t* authToken) argument [all...] |
H A D | IKeystoreService.cpp | 51 OperationResult::OperationResult() : resultCode(0), token(), handle(0), inputConsumed(0), 60 token = in.readStrongBinder(); 84 out->writeStrongBinder(token); 1102 virtual void update(const sp<IBinder>& token, const KeymasterArguments& params, argument 1110 data.writeStrongBinder(token); 1131 virtual void finish(const sp<IBinder>& token, const KeymasterArguments& params, argument 1141 data.writeStrongBinder(token); 1163 virtual int32_t abort(const sp<IBinder>& token) argument 1167 data.writeStrongBinder(token); 1182 virtual bool isOperationAuthorized(const sp<IBinder>& token) argument 1202 addAuthToken(const uint8_t* token, size_t length) argument 1643 sp<IBinder> token = data.readStrongBinder(); local 1664 sp<IBinder> token = data.readStrongBinder(); local 1682 sp<IBinder> token = data.readStrongBinder(); local 1703 sp<IBinder> token = data.readStrongBinder(); local 1712 sp<IBinder> token = data.readStrongBinder(); local [all...] |
H A D | keystore.cpp | 1704 for (auto token: operations) { 1705 abort(token); 1814 // Flush the auth token table to prevent stale tokens from sticking 2552 // application should get an auth token using the handle before the 2554 // auth token. 2556 result->token = operationToken; 2564 void update(const sp<IBinder>& token, const KeymasterArguments& params, const uint8_t* data, argument 2575 if (!mOperationMap.getOperation(token, &handle, &keyid, &purpose, &dev, &characteristics)) { 2580 int32_t authResult = addOperationAuthTokenIfNeeded(token, &opParams); 2615 void finish(const sp<IBinder>& token, cons argument 2680 abort(const sp<IBinder>& token) argument 2702 isOperationAuthorized(const sp<IBinder>& token) argument 2718 addAuthToken(const uint8_t* token, size_t length) argument 2728 memcpy(reinterpret_cast<void*>(authToken), token, sizeof(hw_auth_token_t)); local 2944 addAuthToParams(std::vector<keymaster_key_param_t>* params, const hw_auth_token_t* token) argument 2964 addOperationAuthTokenIfNeeded(sp<IBinder> token, std::vector<keymaster_key_param_t>* params) argument 3072 sp<IBinder> token; local [all...] |
/system/security/keystore/tests/ |
H A D | auth_token_table_test.cpp | 76 hw_auth_token_t* token = new hw_auth_token_t; local 77 token->user_id = rsid; 78 token->authenticator_id = ssid; 79 token->authenticator_type = hton(static_cast<uint32_t>(HW_AUTH_PASSWORD)); 80 token->challenge = challenge; 81 token->timestamp = hton(timestamp); 82 return token; 281 // expired. An additional check of the secure timestamp (in the token) will be made by 282 // keymaster when the found token is passed to it. 311 // Add a third token, thi [all...] |
/system/keymaster/ |
H A D | keymaster_enforcement_test.cpp | 54 bool auth_token_timed_out(const hw_auth_token_t& token, uint32_t timeout) const { argument 55 return current_time_ > ntoh(token.timestamp) + timeout; 520 hw_auth_token_t token; local 521 memset(&token, 0, sizeof(token)); 522 token.version = HW_AUTH_TOKEN_VERSION; 523 token.challenge = 99; 524 token.user_id = 9; 525 token.authenticator_id = 0; 526 token 543 hw_auth_token_t token; local 572 hw_auth_token_t token; local 596 hw_auth_token_t token; local 623 hw_auth_token_t token; local 652 hw_auth_token_t token; local 681 hw_auth_token_t token; local 704 hw_auth_token_t token; local 756 hw_auth_token_t token; local 781 hw_auth_token_t token; local 830 hw_auth_token_t token; local [all...] |
/system/security/keystore/include/keystore/ |
H A D | IKeystoreService.h | 63 sp<IBinder> token; member in struct:android::OperationResult 216 virtual void update(const sp<IBinder>& token, const KeymasterArguments& params, 219 virtual void finish(const sp<IBinder>& token, const KeymasterArguments& params, 228 virtual int32_t addAuthToken(const uint8_t* token, size_t length) = 0;
|
/system/vold/ |
H A D | Disk.cpp | 273 char* token = strtok(cline, kSgdiskToken); local 274 if (token == nullptr) continue; 276 if (!strcmp(token, "DISK")) { 283 } else if (!strcmp(token, "PART")) {
|
H A D | cryptfs.c | 471 char *token; local 478 * The token we're looking for should be three integers separated by 481 for (i = 0, token = strtok_r(paramstr, ":", &saveptr); 482 token != NULL && i < 3; 483 i++, token = strtok_r(NULL, ":", &saveptr)) { 485 params[i] = strtol(token, &endptr, 10); 491 if ((*token == '\0') || (*endptr != '\0') || params[i] < 0 || params[i] > 255) { 497 * If there were not enough tokens or a token was malformed (not an 501 if ((i != 3) || (token != NULL)) {
|
/system/bt/btif/src/ |
H A D | btif_storage.c | 1540 char *token; local 1573 token = strtok(value, BTIF_AUTO_PAIR_CONF_VALUE_SEPARATOR); 1574 while (token != NULL) 1576 if (strstr(dev_name_str, token) != NULL) 1579 token = strtok(NULL, BTIF_AUTO_PAIR_CONF_VALUE_SEPARATOR);
|
/system/core/sdcard/ |
H A D | sdcard.c | 241 int token; member in struct:fuse_handler 789 TRACE("[%d] LOOKUP %s @ %"PRIx64" (%s)\n", handler->token, name, hdr->nodeid, 811 TRACE("[%d] FORGET #%"PRIu64" @ %"PRIx64" (%s)\n", handler->token, req->nlookup, 831 TRACE("[%d] GETATTR flags=%x fh=%"PRIx64" @ %"PRIx64" (%s)\n", handler->token, 854 TRACE("[%d] SETATTR fh=%"PRIx64" valid=%x @ %"PRIx64" (%s)\n", handler->token, 900 handler->token, path, times[0].tv_sec, times[1].tv_sec); 919 TRACE("[%d] MKNOD %s 0%o @ %"PRIx64" (%s)\n", handler->token, 948 TRACE("[%d] MKDIR %s 0%o @ %"PRIx64" (%s)\n", handler->token, 996 TRACE("[%d] UNLINK %s @ %"PRIx64" (%s)\n", handler->token, 1019 handler->token, (uint64_ [all...] |