/system/bt/service/common/bluetooth/util/ |
H A D | address_helper.cpp | 44 const auto& token = byte_tokens[i]; local 46 if (token.length() != 2) 50 out_addr->address[i] = strtol(token.c_str(), &temp, 16);
|
/system/vold/ |
H A D | KeyStorage.h | 26 // If "token" is nonempty, it is passed in as a required Gatekeeper auth token. 31 KeyAuthentication(std::string t, std::string s) : token{t}, secret{s} {}; 32 const std::string token; member in class:android::vold::KeyAuthentication
|
H A D | ScryptParameters.cpp | 24 char *token; local 29 * The token we're looking for should be three integers separated by 32 for (i = 0, token = strtok_r(const_cast<char *>(paramstr), ":", &saveptr); 33 token != nullptr && i < 3; 34 i++, token = strtok_r(nullptr, ":", &saveptr)) { 36 params[i] = strtol(token, &endptr, 10); 41 if ((*token == '\0') || (*endptr != '\0') || params[i] < 0 || params[i] > 255) { 45 if (token != nullptr) {
|
/system/core/adb/ |
H A D | adb_auth.cpp | 39 ret = adb_auth_generate_token(t->token, sizeof(t->token)); 40 if (ret != sizeof(t->token)) { 41 D("Error generating token ret=%d", ret); 46 memcpy(p->data, t->token, ret); 53 void send_auth_response(uint8_t *token, size_t token_size, atransport *t) argument 59 ret = adb_auth_sign(t->key, token, token_size, p->data); 61 D("Error signing the token");
|
H A D | adb_auth.h | 28 void send_auth_response(uint8_t *token, size_t token_size, atransport *t); 41 int adb_auth_sign(void *key, const unsigned char* token, size_t token_size, 46 static inline int adb_auth_generate_token(void *token, size_t token_size) { return 0; } argument 47 static inline int adb_auth_verify(void *token, void *sig, int siglen) { return 0; } argument 52 static inline int adb_auth_sign(void* key, const unsigned char* token, argument 61 int adb_auth_generate_token(void *token, size_t token_size); 62 int adb_auth_verify(uint8_t* token, uint8_t* sig, int siglen);
|
H A D | console.cpp | 39 // read the token 40 std::string token; local 41 if (!android::base::ReadFileToString(auth_token_path, &token) 42 || token.empty()) { 48 // now construct and return the actual command: "auth <token>\n" 50 command += token;
|
H A D | transport.h | 93 unsigned char token[TOKEN_SIZE] = {}; member in class:atransport
|
H A D | adb_auth_client.cpp | 127 int adb_auth_generate_token(void *token, size_t token_size) argument 136 ret = fread(token, token_size, 1, f); 142 int adb_auth_verify(uint8_t* token, uint8_t* sig, int siglen) argument 155 ret = RSA_verify(&key->key, sig, siglen, token, SHA_DIGEST_SIZE);
|
H A D | adb_auth_host.cpp | 347 int adb_auth_sign(void *node, const unsigned char* token, size_t token_size, argument 354 D("Unexpected token size %zd", token_size); 358 if (!RSA_sign(NID_sha1, token, token_size, sig, &len, key->rsa)) {
|
/system/core/fingerprintd/ |
H A D | IFingerprintDaemon.cpp | 78 const uint8_t* token = static_cast<const uint8_t *>(data.readInplace(tokenSize)); local 81 const int32_t ret = enroll(token, tokenSize, groupId, timeout);
|
H A D | FingerprintDaemonProxy.cpp | 116 ALOGE("Falure sending auth token to KeyStore: %d", ret); 132 int32_t FingerprintDaemonProxy::enroll(const uint8_t* token, ssize_t tokenSize, int32_t groupId, argument 136 ALOG(LOG_VERBOSE, LOG_TAG, "enroll() : invalid token size %zu\n", tokenSize); 139 const hw_auth_token_t* authToken = reinterpret_cast<const hw_auth_token_t*>(token);
|
/system/core/libcutils/ |
H A D | canned_fs_config.c | 63 char* token = NULL; local 65 token = strtok(NULL, " "); 66 if (token && strncmp(token, "capabilities=", 13) == 0) { 67 p->capabilities = strtoll(token+13, NULL, 0); 70 } while (token);
|
/system/core/libpackagelistparser/ |
H A D | packagelistparser.c | 62 char* token; local 66 while ((token = strsep(&gids, ",\r\n"))) { 72 gid = strtoul(token, &endptr, 10); 126 errmsg = "Could not get next token for \"package name\""; 137 errmsg = "Could not get next token for field \"uid\""; 160 errmsg = "Could not get next token for field \"debuggable\""; 180 errmsg = "Could not get next token for field \"data dir\""; 191 errmsg = "Could not get next token for field \"seinfo\""; 202 errmsg = "Could not get next token for field \"gid(s)\"";
|
/system/security/keystore/tests/ |
H A D | auth_token_table_test.cpp | 71 hw_auth_token_t* token = new hw_auth_token_t; local 72 token->user_id = rsid; 73 token->authenticator_id = ssid; 74 token->authenticator_type = hton(static_cast<uint32_t>(HW_AUTH_PASSWORD)); 75 token->challenge = challenge; 76 token->timestamp = hton(timestamp); 77 return token; 280 // expired. An additional check of the secure timestamp (in the token) will be made by 281 // keymaster when the found token is passed to it. 315 // Add a third token, thi [all...] |
/system/core/init/ |
H A D | ueventd_parser.cpp | 206 int token = next_token(&state); local 207 switch (token) {
|
/system/core/libpixelflinger/codeflinger/ |
H A D | Arm64Disassembler.cpp | 95 static void get_token(const char *instr, uint32_t index, char *token) argument 102 token[j++] = instr[i]; 111 token[j++] = instr[i]; 114 token[j] = '\0'; 134 static void decode_token(uint32_t code, char *token, char *instr_part) argument 136 if(strcmp(token, "<imm1>") == 0) 138 else if(strcmp(token, "<imm2>") == 0) 140 else if(strcmp(token, "<shift1>") == 0) 142 else if(strcmp(token, "<shift2>") == 0) 147 else if(strcmp(token, "<shift 273 char token[256]; local [all...] |
/system/security/keystore/ |
H A D | auth_token_table.h | 36 * token for authorizing a key operation. 50 AUTH_TOKEN_EXPIRED = -2, // Found a matching token, but it's too old. 51 AUTH_TOKEN_WRONG_SID = -3, // Found a token with the right challenge, but wrong SID. This 59 * Add an authorization token to the table. The table takes ownership of the argument. 61 void AddAuthenticationToken(const hw_auth_token_t* token); 64 * Find an authorization token that authorizes the operation specified by \p operation_handle on 77 * Find an authorization token that authorizes the operation specified by \p operation_handle on 113 Entry(const hw_auth_token_t* token, time_t current_time); 138 const hw_auth_token_t* token() { return token_.get(); } function in class:keymaster::AuthTokenTable::Entry
|
H A D | auth_token_table.cpp | 56 LOG_W("Auth token table filled up; replacing oldest entry", 0); 111 entries_, [&](Entry& e) { return e.token()->challenge == op_handle && !e.completed(); }); 119 *found = matching_op->token(); 149 *found = newest_match->token(); 179 auto found = find_if(entries_, [&](Entry& e) { return e.token()->challenge == op_handle; }); 190 AuthTokenTable::Entry::Entry(const hw_auth_token_t* token, time_t current_time) argument 191 : token_(token), time_received_(current_time), last_use_(current_time),
|
H A D | operation.cpp | 31 sp<IBinder> token = new BBinder(); local 32 mMap[token] = Operation(handle, keyid, purpose, dev, characteristics, appToken); 34 mLru.push_back(token); 39 mAppTokenMap[appToken].push_back(token); 40 return token; 43 bool OperationMap::getOperation(sp<IBinder> token, keymaster_operation_handle_t* outHandle, argument 50 auto entry = mMap.find(token); 54 updateLru(token); 66 void OperationMap::updateLru(sp<IBinder> token) { argument 67 auto lruEntry = std::find(mLru.begin(), mLru.end(), token); 74 removeOperation(sp<IBinder> token) argument 89 removeOperationTracking(sp<IBinder> token, sp<IBinder> appToken) argument 119 getOperationAuthToken(sp<IBinder> token, const hw_auth_token_t** outToken) argument 128 setOperationAuthToken(sp<IBinder> token, const hw_auth_token_t* authToken) argument [all...] |
/system/tools/aidl/tests/ |
H A D | aidl_test_service.cpp | 105 void LogRepeatedStringToken(const String16& token) { argument 106 ALOGI("Repeating '%s' of length=%zu", android::String8(token).string(), 107 token.size()); 111 void LogRepeatedToken(const T& token) { argument 113 token_str << token; local 114 ALOGI("Repeating token %s", token_str.str().c_str()); 117 Status RepeatBoolean(bool token, bool* _aidl_return) override { 118 LogRepeatedToken(token ? 1 : 0); 119 *_aidl_return = token; 122 Status RepeatByte(int8_t token, int8_ 123 LogRepeatedToken(token); variable 133 LogRepeatedToken(token); variable 138 LogRepeatedToken(token); variable 143 LogRepeatedToken(token); variable 148 LogRepeatedToken(token); variable 153 LogRepeatedStringToken(token); variable [all...] |
/system/update_engine/ |
H A D | chrome_browser_proxy_resolver.cc | 159 string token = entry_tok.token(); local 160 base::TrimWhitespaceASCII(token, base::TRIM_ALL, &token); 164 for (space = token.begin(); space != token.end(); ++space) { 170 string scheme = base::ToLowerASCII(string(token.begin(), space)); 182 string host_and_port = string(space, token.end());
|
/system/core/crash_reporter/ |
H A D | list_proxies.cc | 72 std::string token = entry_tok.token(); local 73 base::TrimWhitespaceASCII(token, base::TRIM_ALL, &token); 77 for (space = token.begin(); space != token.end(); ++space) { 83 std::string scheme = base::ToLowerASCII(std::string(token.begin(), space)); 95 std::string host_and_port = std::string(space, token.end());
|
/system/keymaster/ |
H A D | keymaster_enforcement_test.cpp | 54 bool auth_token_timed_out(const hw_auth_token_t& token, uint32_t timeout) const { argument 55 return current_time_ > ntoh(token.timestamp) + timeout; 520 hw_auth_token_t token; local 521 memset(&token, 0, sizeof(token)); 522 token.version = HW_AUTH_TOKEN_VERSION; 523 token.challenge = 99; 524 token.user_id = 9; 525 token.authenticator_id = 0; 526 token 543 hw_auth_token_t token; local 572 hw_auth_token_t token; local 596 hw_auth_token_t token; local 623 hw_auth_token_t token; local 652 hw_auth_token_t token; local 681 hw_auth_token_t token; local 704 hw_auth_token_t token; local 756 hw_auth_token_t token; local 781 hw_auth_token_t token; local 830 hw_auth_token_t token; local [all...] |
/system/security/keystore/include/keystore/ |
H A D | IKeystoreService.h | 63 sp<IBinder> token; member in struct:android::OperationResult 231 virtual void update(const sp<IBinder>& token, const KeymasterArguments& params, 234 virtual void finish(const sp<IBinder>& token, const KeymasterArguments& params, 243 virtual int32_t addAuthToken(const uint8_t* token, size_t length) = 0;
|
/system/connectivity/shill/ |
H A D | profile.cc | 268 bool Profile::IsValidIdentifierToken(const string& token) { argument 269 if (token.empty()) { 272 for (auto chr : token) {
|