Searched defs:auth_token (Results 1 - 11 of 11) sorted by relevance

/system/core/gatekeeperd/tests/
H A Dgatekeeper_test.cpp84 hw_auth_token_t *auth_token = local
85 reinterpret_cast<hw_auth_token_t *>(response.auth_token.buffer.get());
87 ASSERT_EQ((uint32_t) HW_AUTH_PASSWORD, ntohl(auth_token->authenticator_type));
88 ASSERT_EQ((uint64_t) 1, auth_token->challenge);
89 ASSERT_NE(~((uint32_t) 0), auth_token->timestamp);
90 ASSERT_NE((uint64_t) 0, auth_token->user_id);
91 ASSERT_NE((uint64_t) 0, auth_token->authenticator_id);
119 hw_auth_token_t *auth_token = local
120 reinterpret_cast<hw_auth_token_t *>(response.auth_token.buffer.get());
122 secure_id_t secure_id = auth_token
167 hw_auth_token_t *auth_token = local
[all...]
/system/core/gatekeeperd/
H A DSoftGateKeeperDevice.cpp74 uint32_t provided_password_length, uint8_t **auth_token, uint32_t *auth_token_length,
99 if (auth_token != NULL && auth_token_length != NULL) {
100 *auth_token = response.auth_token.buffer.release();
101 *auth_token_length = response.auth_token.length;
71 verify(uint32_t uid, uint64_t challenge, const uint8_t *enrolled_password_handle, uint32_t enrolled_password_handle_length, const uint8_t *provided_password, uint32_t provided_password_length, uint8_t **auth_token, uint32_t *auth_token_length, bool *request_reenroll) argument
H A Dgatekeeperd.cpp190 uint8_t *auth_token; local
194 &auth_token, &auth_token_length, request_reenroll);
200 uint8_t **auth_token, uint32_t *auth_token_length, bool *request_reenroll) {
221 provided_password, provided_password_length, auth_token, auth_token_length,
228 provided_password, provided_password_length, auth_token, auth_token_length,
239 provided_password, provided_password_length, auth_token, auth_token_length,
243 if (ret == 0 && *auth_token != NULL && *auth_token_length > 0) {
249 status_t ret = service->addAuthToken(*auth_token, *auth_token_length);
197 verifyChallenge(uint32_t uid, uint64_t challenge, const uint8_t *enrolled_password_handle, uint32_t enrolled_password_handle_length, const uint8_t *provided_password, uint32_t provided_password_length, uint8_t **auth_token, uint32_t *auth_token_length, bool *request_reenroll) argument
/system/gatekeeper/tests/
H A Dgatekeeper_device_test.cpp59 uint8_t *auth_token; local
71 password_payload, password_len, &auth_token, &auth_token_len, &should_reenroll);
82 uint8_t *auth_token; local
94 password_payload, password_len, &auth_token, &auth_token_len, &should_reenroll);
98 hat = reinterpret_cast<hw_auth_token_t *>(auth_token);
109 uint8_t *auth_token = NULL; local
126 password_payload, password_len, &auth_token, &auth_token_len,
129 ASSERT_EQ(NULL, auth_token);
143 password_payload, password_len, &auth_token, &auth_token_len,
154 uint8_t *auth_token local
179 uint8_t *auth_token = NULL; local
[all...]
H A Dgatekeeper_messages_test.cpp196 SizedBuffer *auth_token = make_buffer(password_size); local
199 VerifyResponse msg(USER_ID, auth_token);
211 deserialized_password = &deserialized_msg.auth_token;
213 ASSERT_EQ(0, memcmp(msg.auth_token.buffer.get(), deserialized_password->buffer.get(),
/system/gatekeeper/include/gatekeeper/
H A Dgatekeeper_messages.h156 VerifyResponse(uint32_t user_id, SizedBuffer *auth_token);
160 void SetVerificationToken(SizedBuffer *auth_token);
166 SizedBuffer auth_token; member in struct:gatekeeper::VerifyResponse
/system/core/fingerprintd/
H A DFingerprintDaemonProxy.cpp107 void FingerprintDaemonProxy::notifyKeystore(const uint8_t *auth_token, const size_t auth_token_length) { argument
108 if (auth_token != NULL && auth_token_length > 0) {
114 status_t ret = service->addAuthToken(auth_token, auth_token_length);
/system/core/trusty/gatekeeper/
H A Dtrusty_gatekeeper.cpp126 uint8_t **auth_token, uint32_t *auth_token_length, bool *request_reenroll) {
148 if (auth_token != NULL && auth_token_length != NULL) {
149 *auth_token = response.auth_token.buffer.release();
150 *auth_token_length = response.auth_token.length;
218 uint32_t provided_password_length, uint8_t **auth_token, uint32_t *auth_token_length,
228 auth_token, auth_token_length, request_reenroll);
123 Verify(uint32_t uid, uint64_t challenge, const uint8_t *enrolled_password_handle, uint32_t enrolled_password_handle_length, const uint8_t *provided_password, uint32_t provided_password_length, uint8_t **auth_token, uint32_t *auth_token_length, bool *request_reenroll) argument
215 verify(const struct gatekeeper_device *dev, uint32_t uid, uint64_t challenge, const uint8_t *enrolled_password_handle, uint32_t enrolled_password_handle_length, const uint8_t *provided_password, uint32_t provided_password_length, uint8_t **auth_token, uint32_t *auth_token_length, bool *request_reenroll) argument
/system/gatekeeper/
H A Dgatekeeper.cpp155 SizedBuffer auth_token(auth_token_len);
156 memcpy(auth_token.buffer.get(), auth_token_buffer.get(), auth_token_len);
157 response->SetVerificationToken(&auth_token);
217 void GateKeeper::MintAuthToken(UniquePtr<uint8_t> *auth_token, uint32_t *length, argument
220 if (auth_token == NULL) return;
244 auth_token->reset(reinterpret_cast<uint8_t *>(token));
H A Dgatekeeper_messages.cpp194 VerifyResponse::VerifyResponse(uint32_t user_id, SizedBuffer *auth_token) { argument
196 this->auth_token.buffer.reset(auth_token->buffer.release());
197 this->auth_token.length = auth_token->length;
203 memset_s(&auth_token, 0, sizeof(auth_token));
207 if (auth_token.length > 0) {
208 auth_token.buffer.reset();
212 void VerifyResponse::SetVerificationToken(SizedBuffer *auth_token) { argument
[all...]
/system/security/keystore/
H A Dauth_token_table.cpp52 void AuthTokenTable::AddAuthenticationToken(const hw_auth_token_t* auth_token) { argument
53 Entry new_entry(auth_token, clock_function_());

Completed in 199 milliseconds