Searched defs:token (Results 1 - 22 of 22) sorted by relevance

/system/core/adb/
H A Dadb_auth.cpp39 ret = adb_auth_generate_token(t->token, sizeof(t->token));
40 if (ret != sizeof(t->token)) {
41 D("Error generating token ret=%d\n", ret);
46 memcpy(p->data, t->token, ret);
53 void send_auth_response(uint8_t *token, size_t token_size, atransport *t) argument
59 ret = adb_auth_sign(t->key, token, token_size, p->data);
61 D("Error signing the token\n");
H A Dadb_auth.h28 void send_auth_response(uint8_t *token, size_t token_size, atransport *t);
41 int adb_auth_sign(void *key, const unsigned char* token, size_t token_size,
46 static inline int adb_auth_generate_token(void *token, size_t token_size) { return 0; } argument
47 static inline int adb_auth_verify(void *token, void *sig, int siglen) { return 0; } argument
52 static inline int adb_auth_sign(void* key, const unsigned char* token, argument
61 int adb_auth_generate_token(void *token, size_t token_size);
62 int adb_auth_verify(uint8_t* token, uint8_t* sig, int siglen);
H A Dadb_auth_client.cpp126 int adb_auth_generate_token(void *token, size_t token_size) argument
135 ret = fread(token, token_size, 1, f);
141 int adb_auth_verify(uint8_t* token, uint8_t* sig, int siglen) argument
154 ret = RSA_verify(&key->key, sig, siglen, token, SHA_DIGEST_SIZE);
H A Dadb_auth_host.cpp371 int adb_auth_sign(void *node, const unsigned char* token, size_t token_size, argument
378 D("Unexpected token size %zd\n", token_size);
382 if (!RSA_sign(NID_sha1, token, token_size, sig, &len, key->rsa)) {
H A Dadb.h209 unsigned char token[TOKEN_SIZE]; member in struct:atransport
/system/core/fingerprintd/
H A DIFingerprintDaemon.cpp78 const uint8_t* token = static_cast<const uint8_t *>(data.readInplace(tokenSize)); local
81 const int32_t ret = enroll(token, tokenSize, groupId, timeout);
H A DFingerprintDaemonProxy.cpp106 ALOGE("Falure sending auth token to KeyStore: %d", ret);
122 int32_t FingerprintDaemonProxy::enroll(const uint8_t* token, ssize_t tokenSize, int32_t groupId, argument
126 ALOG(LOG_VERBOSE, LOG_TAG, "enroll() : invalid token size %zu\n", tokenSize);
129 const hw_auth_token_t* authToken = reinterpret_cast<const hw_auth_token_t*>(token);
/system/extras/ext4_utils/
H A Dcanned_fs_config.c63 char* token = NULL; local
65 token = strtok(NULL, " ");
66 if (token && strncmp(token, "capabilities=", 13) == 0) {
67 p->capabilities = strtoll(token+13, NULL, 0);
70 } while (token);
/system/core/init/
H A Dueventd_parser.cpp206 int token = next_token(&state); local
207 switch (token) {
/system/core/libpixelflinger/codeflinger/
H A DArm64Disassembler.cpp95 static void get_token(const char *instr, uint32_t index, char *token) argument
102 token[j++] = instr[i];
111 token[j++] = instr[i];
114 token[j] = '\0';
134 static void decode_token(uint32_t code, char *token, char *instr_part) argument
136 if(strcmp(token, "<imm1>") == 0)
138 else if(strcmp(token, "<imm2>") == 0)
140 else if(strcmp(token, "<shift1>") == 0)
142 else if(strcmp(token, "<shift2>") == 0)
147 else if(strcmp(token, "<shift
273 char token[256]; local
[all...]
/system/security/keystore/
H A Dauth_token_table.h36 * token for authorizing a key operation.
50 AUTH_TOKEN_EXPIRED = -2, // Found a matching token, but it's too old.
51 AUTH_TOKEN_WRONG_SID = -3, // Found a token with the right challenge, but wrong SID. This
59 * Add an authorization token to the table. The table takes ownership of the argument.
61 void AddAuthenticationToken(const hw_auth_token_t* token);
64 * Find an authorization token that authorizes the operation specified by \p operation_handle on
77 * Find an authorization token that authorizes the operation specified by \p operation_handle on
107 Entry(const hw_auth_token_t* token, time_t current_time);
132 const hw_auth_token_t* token() { return token_.get(); } function in class:keymaster::AuthTokenTable::Entry
H A Dauth_token_table.cpp56 LOG_W("Auth token table filled up; replacing oldest entry", 0);
111 entries_, [&](Entry& e) { return e.token()->challenge == op_handle && !e.completed(); });
119 *found = matching_op->token();
142 *found = newest_match->token();
168 auto found = find_if(entries_, [&](Entry& e) { return e.token()->challenge == op_handle; });
179 AuthTokenTable::Entry::Entry(const hw_auth_token_t* token, time_t current_time) argument
180 : token_(token), time_received_(current_time), last_use_(current_time),
H A Doperation.cpp33 sp<IBinder> token = new BBinder(); local
34 mMap[token] = std::move(Operation(handle, keyid, purpose, dev, characteristics, appToken));
36 mLru.push_back(token);
41 mAppTokenMap[appToken].push_back(token);
42 return token;
45 bool OperationMap::getOperation(sp<IBinder> token, keymaster_operation_handle_t* outHandle, argument
52 auto entry = mMap.find(token);
56 updateLru(token);
68 void OperationMap::updateLru(sp<IBinder> token) { argument
69 auto lruEntry = std::find(mLru.begin(), mLru.end(), token);
76 removeOperation(sp<IBinder> token) argument
91 removeOperationTracking(sp<IBinder> token, sp<IBinder> appToken) argument
121 getOperationAuthToken(sp<IBinder> token, const hw_auth_token_t** outToken) argument
130 setOperationAuthToken(sp<IBinder> token, const hw_auth_token_t* authToken) argument
[all...]
H A DIKeystoreService.cpp51 OperationResult::OperationResult() : resultCode(0), token(), handle(0), inputConsumed(0),
60 token = in.readStrongBinder();
84 out->writeStrongBinder(token);
1102 virtual void update(const sp<IBinder>& token, const KeymasterArguments& params, argument
1110 data.writeStrongBinder(token);
1131 virtual void finish(const sp<IBinder>& token, const KeymasterArguments& params, argument
1141 data.writeStrongBinder(token);
1163 virtual int32_t abort(const sp<IBinder>& token) argument
1167 data.writeStrongBinder(token);
1182 virtual bool isOperationAuthorized(const sp<IBinder>& token) argument
1202 addAuthToken(const uint8_t* token, size_t length) argument
1643 sp<IBinder> token = data.readStrongBinder(); local
1664 sp<IBinder> token = data.readStrongBinder(); local
1682 sp<IBinder> token = data.readStrongBinder(); local
1703 sp<IBinder> token = data.readStrongBinder(); local
1712 sp<IBinder> token = data.readStrongBinder(); local
[all...]
H A Dkeystore.cpp1704 for (auto token: operations) {
1705 abort(token);
1814 // Flush the auth token table to prevent stale tokens from sticking
2552 // application should get an auth token using the handle before the
2554 // auth token.
2556 result->token = operationToken;
2564 void update(const sp<IBinder>& token, const KeymasterArguments& params, const uint8_t* data, argument
2575 if (!mOperationMap.getOperation(token, &handle, &keyid, &purpose, &dev, &characteristics)) {
2580 int32_t authResult = addOperationAuthTokenIfNeeded(token, &opParams);
2615 void finish(const sp<IBinder>& token, cons argument
2680 abort(const sp<IBinder>& token) argument
2702 isOperationAuthorized(const sp<IBinder>& token) argument
2718 addAuthToken(const uint8_t* token, size_t length) argument
2728 memcpy(reinterpret_cast<void*>(authToken), token, sizeof(hw_auth_token_t)); local
2944 addAuthToParams(std::vector<keymaster_key_param_t>* params, const hw_auth_token_t* token) argument
2964 addOperationAuthTokenIfNeeded(sp<IBinder> token, std::vector<keymaster_key_param_t>* params) argument
3072 sp<IBinder> token; local
[all...]
/system/security/keystore/tests/
H A Dauth_token_table_test.cpp76 hw_auth_token_t* token = new hw_auth_token_t; local
77 token->user_id = rsid;
78 token->authenticator_id = ssid;
79 token->authenticator_type = hton(static_cast<uint32_t>(HW_AUTH_PASSWORD));
80 token->challenge = challenge;
81 token->timestamp = hton(timestamp);
82 return token;
281 // expired. An additional check of the secure timestamp (in the token) will be made by
282 // keymaster when the found token is passed to it.
311 // Add a third token, thi
[all...]
/system/keymaster/
H A Dkeymaster_enforcement_test.cpp54 bool auth_token_timed_out(const hw_auth_token_t& token, uint32_t timeout) const { argument
55 return current_time_ > ntoh(token.timestamp) + timeout;
520 hw_auth_token_t token; local
521 memset(&token, 0, sizeof(token));
522 token.version = HW_AUTH_TOKEN_VERSION;
523 token.challenge = 99;
524 token.user_id = 9;
525 token.authenticator_id = 0;
526 token
543 hw_auth_token_t token; local
572 hw_auth_token_t token; local
596 hw_auth_token_t token; local
623 hw_auth_token_t token; local
652 hw_auth_token_t token; local
681 hw_auth_token_t token; local
704 hw_auth_token_t token; local
756 hw_auth_token_t token; local
781 hw_auth_token_t token; local
830 hw_auth_token_t token; local
[all...]
/system/security/keystore/include/keystore/
H A DIKeystoreService.h63 sp<IBinder> token; member in struct:android::OperationResult
216 virtual void update(const sp<IBinder>& token, const KeymasterArguments& params,
219 virtual void finish(const sp<IBinder>& token, const KeymasterArguments& params,
228 virtual int32_t addAuthToken(const uint8_t* token, size_t length) = 0;
/system/vold/
H A DDisk.cpp273 char* token = strtok(cline, kSgdiskToken); local
274 if (token == nullptr) continue;
276 if (!strcmp(token, "DISK")) {
283 } else if (!strcmp(token, "PART")) {
H A Dcryptfs.c471 char *token; local
478 * The token we're looking for should be three integers separated by
481 for (i = 0, token = strtok_r(paramstr, ":", &saveptr);
482 token != NULL && i < 3;
483 i++, token = strtok_r(NULL, ":", &saveptr)) {
485 params[i] = strtol(token, &endptr, 10);
491 if ((*token == '\0') || (*endptr != '\0') || params[i] < 0 || params[i] > 255) {
497 * If there were not enough tokens or a token was malformed (not an
501 if ((i != 3) || (token != NULL)) {
/system/bt/btif/src/
H A Dbtif_storage.c1540 char *token; local
1573 token = strtok(value, BTIF_AUTO_PAIR_CONF_VALUE_SEPARATOR);
1574 while (token != NULL)
1576 if (strstr(dev_name_str, token) != NULL)
1579 token = strtok(NULL, BTIF_AUTO_PAIR_CONF_VALUE_SEPARATOR);
/system/core/sdcard/
H A Dsdcard.c241 int token; member in struct:fuse_handler
789 TRACE("[%d] LOOKUP %s @ %"PRIx64" (%s)\n", handler->token, name, hdr->nodeid,
811 TRACE("[%d] FORGET #%"PRIu64" @ %"PRIx64" (%s)\n", handler->token, req->nlookup,
831 TRACE("[%d] GETATTR flags=%x fh=%"PRIx64" @ %"PRIx64" (%s)\n", handler->token,
854 TRACE("[%d] SETATTR fh=%"PRIx64" valid=%x @ %"PRIx64" (%s)\n", handler->token,
900 handler->token, path, times[0].tv_sec, times[1].tv_sec);
919 TRACE("[%d] MKNOD %s 0%o @ %"PRIx64" (%s)\n", handler->token,
948 TRACE("[%d] MKDIR %s 0%o @ %"PRIx64" (%s)\n", handler->token,
996 TRACE("[%d] UNLINK %s @ %"PRIx64" (%s)\n", handler->token,
1019 handler->token, (uint64_
[all...]

Completed in 245 milliseconds