/system/core/gatekeeperd/ |
H A D | SoftGateKeeperDevice.h | 66 int verify(uint32_t uid, uint64_t challenge,
|
H A D | IGateKeeperService.h | 72 virtual int verify(uint32_t uid, const uint8_t *enrolled_password_handle,
|
H A D | gatekeeperd.cpp | 178 // immediately verify this password so we don't ask the user to enter it again 180 verify(uid, *enrolled_password_handle, sizeof(password_handle_t), desired_password, 187 virtual int verify(uint32_t uid, function in class:android::GateKeeperProxy 208 // can't verify if we're missing either param 219 ret = device->verify(device, uid, challenge, 226 ret = soft_dev.verify(uid, challenge, 237 ret = soft_device->verify(uid, challenge,
|
H A D | SoftGateKeeperDevice.cpp | 71 int SoftGateKeeperDevice::verify(uint32_t uid, function in class:android::SoftGateKeeperDevice
|
H A D | IGateKeeperService.cpp | 89 int ret = verify(uid, (uint8_t *) currentPasswordHandle,
|
/system/gatekeeper/tests/ |
H A D | gatekeeper_device_test.cpp | 70 ret = device->verify(device, 400, 0, password_handle, password_handle_length, 93 ret = device->verify(device, 400, 0, password_handle, password_handle_length, 125 ret = device->verify(device, 400, 0, password_handle, password_handle_length, 142 ret = device->verify(device, 400, 0, password_handle, password_handle_length, 166 ret = device->verify(device, 400, 0, password_handle, password_handle_length, 195 ret = device->verify(device, 400, 0, password_handle, password_handle_length,
|
/system/extras/verity/ |
H A D | VeritySigner.java | 30 "-verify"); 44 if (args.length > 3 && "-verify".equals(args[3])) { 51 if (Utils.verify(publicKey, content, signature,
|
H A D | KeystoreSigner.java | 143 public boolean verify() throws Exception { method in class:BootKeystore 145 return Utils.verify(signature.getPublicKey(), innerKeystore, 165 "... <publickeyN-1.der> | -verify <keystore>"); 178 if ("-verify".equals(args[0])) { 182 if (ks.verify()) {
|
H A D | BootSignature.java | 169 public boolean verify(byte[] image) throws Exception { method in class:BootSignature 175 return Utils.verify(publicKey, signable, signature.getOctets(), 274 if (bootsig.verify(Arrays.copyOf(image, signableSize))) { 299 if ("-verify".equals(args[0])) {
|
H A D | VerityVerifier.java | 301 return Utils.verify(key, table, signature, 388 public boolean verify(PublicKey key) throws Exception { method in class:VerityVerifier 409 if (verifier.verify(key)) {
|
H A D | verify_boot_signature.c | 362 static int verify(const char *image_file) function 428 return verify(argv[1]);
|
H A D | Utils.java | 259 static boolean verify(PublicKey key, byte[] input, byte[] signature, method in class:Utils 271 return verifier.verify(signature);
|
/system/sepolicy/ |
H A D | system_app.te | 65 verify
|
H A D | access_vectors | 598 verify
|
H A D | app.te | 228 allow { appdomain -isolated_app } keystore:keystore_key { get_state get insert delete exist list sign verify };
|
/system/core/trusty/gatekeeper/ |
H A D | trusty_gatekeeper.h | 112 static int verify(const struct gatekeeper_device *dev, uint32_t uid, uint64_t challenge,
|
H A D | trusty_gatekeeper.cpp | 54 device_.verify = verify; 215 int TrustyGateKeeperDevice::verify(const struct gatekeeper_device *dev, uint32_t uid, function in class:gatekeeper::TrustyGateKeeperDevice
|
/system/extras/tests/memtest/ |
H A D | bandwidth.h | 60 virtual bool verify() = 0; 143 bool verify() { function in class:CopyBandwidthBenchmark 458 bool verify() { return true; } function in class:CopyVld1Vst1Benchmark::CopyVldrVstrBenchmark::CopyVldmiaVstmiaBenchmark::SingleBufferBandwidthBenchmark 471 bool verify() { function in class:CopyVld1Vst1Benchmark::CopyVldrVstrBenchmark::CopyVldmiaVstmiaBenchmark::WriteBandwidthBenchmark
|
/system/keymaster/ |
H A D | keymaster0_engine.cpp | 58 rsa_method_.verify = nullptr; 82 ecdsa_method_.verify = nullptr;
|
H A D | keymaster1_engine.cpp | 396 method.verify = nullptr; 421 method.verify = nullptr;
|
/system/security/keystore/ |
H A D | key_store_service.h | 64 int32_t verify(const String16& name, const uint8_t* data, size_t dataLength,
|
H A D | IKeystoreService.cpp | 798 virtual int32_t verify(const String16& name, const uint8_t* in, size_t inLength, function in class:android::BpKeystoreService 814 ALOGD("verify() could not contact remote: %d\n", status); 820 ALOGD("verify() caught exception %d\n", err); 1578 bool ret = verify(name, (const uint8_t*) in, (size_t) inSize, (const uint8_t*) sig,
|
H A D | key_store_service.cpp | 387 int32_t KeyStoreService::verify(const String16& name, const uint8_t* data, size_t dataLength, function in class:android::KeyStoreService
|
/system/security/keystore/include/keystore/ |
H A D | IKeystoreService.h | 186 virtual int32_t verify(const String16& name, const uint8_t* data, size_t dataLength,
|