Searched refs:verify (Results 1 - 24 of 24) sorted by relevance

/system/core/gatekeeperd/
H A DSoftGateKeeperDevice.h66 int verify(uint32_t uid, uint64_t challenge,
H A DIGateKeeperService.h72 virtual int verify(uint32_t uid, const uint8_t *enrolled_password_handle,
H A Dgatekeeperd.cpp178 // immediately verify this password so we don't ask the user to enter it again
180 verify(uid, *enrolled_password_handle, sizeof(password_handle_t), desired_password,
187 virtual int verify(uint32_t uid, function in class:android::GateKeeperProxy
208 // can't verify if we're missing either param
219 ret = device->verify(device, uid, challenge,
226 ret = soft_dev.verify(uid, challenge,
237 ret = soft_device->verify(uid, challenge,
H A DSoftGateKeeperDevice.cpp71 int SoftGateKeeperDevice::verify(uint32_t uid, function in class:android::SoftGateKeeperDevice
H A DIGateKeeperService.cpp89 int ret = verify(uid, (uint8_t *) currentPasswordHandle,
/system/gatekeeper/tests/
H A Dgatekeeper_device_test.cpp70 ret = device->verify(device, 400, 0, password_handle, password_handle_length,
93 ret = device->verify(device, 400, 0, password_handle, password_handle_length,
125 ret = device->verify(device, 400, 0, password_handle, password_handle_length,
142 ret = device->verify(device, 400, 0, password_handle, password_handle_length,
166 ret = device->verify(device, 400, 0, password_handle, password_handle_length,
195 ret = device->verify(device, 400, 0, password_handle, password_handle_length,
/system/extras/verity/
H A DVeritySigner.java30 "-verify");
44 if (args.length > 3 && "-verify".equals(args[3])) {
51 if (Utils.verify(publicKey, content, signature,
H A DKeystoreSigner.java143 public boolean verify() throws Exception { method in class:BootKeystore
145 return Utils.verify(signature.getPublicKey(), innerKeystore,
165 "... <publickeyN-1.der> | -verify <keystore>");
178 if ("-verify".equals(args[0])) {
182 if (ks.verify()) {
H A DBootSignature.java169 public boolean verify(byte[] image) throws Exception { method in class:BootSignature
175 return Utils.verify(publicKey, signable, signature.getOctets(),
274 if (bootsig.verify(Arrays.copyOf(image, signableSize))) {
299 if ("-verify".equals(args[0])) {
H A DVerityVerifier.java301 return Utils.verify(key, table, signature,
388 public boolean verify(PublicKey key) throws Exception { method in class:VerityVerifier
409 if (verifier.verify(key)) {
H A Dverify_boot_signature.c362 static int verify(const char *image_file) function
428 return verify(argv[1]);
H A DUtils.java259 static boolean verify(PublicKey key, byte[] input, byte[] signature, method in class:Utils
271 return verifier.verify(signature);
/system/sepolicy/
H A Dsystem_app.te65 verify
H A Daccess_vectors598 verify
H A Dapp.te228 allow { appdomain -isolated_app } keystore:keystore_key { get_state get insert delete exist list sign verify };
/system/core/trusty/gatekeeper/
H A Dtrusty_gatekeeper.h112 static int verify(const struct gatekeeper_device *dev, uint32_t uid, uint64_t challenge,
H A Dtrusty_gatekeeper.cpp54 device_.verify = verify;
215 int TrustyGateKeeperDevice::verify(const struct gatekeeper_device *dev, uint32_t uid, function in class:gatekeeper::TrustyGateKeeperDevice
/system/extras/tests/memtest/
H A Dbandwidth.h60 virtual bool verify() = 0;
143 bool verify() { function in class:CopyBandwidthBenchmark
458 bool verify() { return true; } function in class:CopyVld1Vst1Benchmark::CopyVldrVstrBenchmark::CopyVldmiaVstmiaBenchmark::SingleBufferBandwidthBenchmark
471 bool verify() { function in class:CopyVld1Vst1Benchmark::CopyVldrVstrBenchmark::CopyVldmiaVstmiaBenchmark::WriteBandwidthBenchmark
/system/keymaster/
H A Dkeymaster0_engine.cpp58 rsa_method_.verify = nullptr;
82 ecdsa_method_.verify = nullptr;
H A Dkeymaster1_engine.cpp396 method.verify = nullptr;
421 method.verify = nullptr;
/system/security/keystore/
H A Dkey_store_service.h64 int32_t verify(const String16& name, const uint8_t* data, size_t dataLength,
H A DIKeystoreService.cpp798 virtual int32_t verify(const String16& name, const uint8_t* in, size_t inLength, function in class:android::BpKeystoreService
814 ALOGD("verify() could not contact remote: %d\n", status);
820 ALOGD("verify() caught exception %d\n", err);
1578 bool ret = verify(name, (const uint8_t*) in, (size_t) inSize, (const uint8_t*) sig,
H A Dkey_store_service.cpp387 int32_t KeyStoreService::verify(const String16& name, const uint8_t* data, size_t dataLength, function in class:android::KeyStoreService
/system/security/keystore/include/keystore/
H A DIKeystoreService.h186 virtual int32_t verify(const String16& name, const uint8_t* data, size_t dataLength,

Completed in 426 milliseconds