Searched defs:token (Results 1 - 25 of 33) sorted by relevance

12

/system/bt/service/common/bluetooth/util/
H A Daddress_helper.cpp44 const auto& token = byte_tokens[i]; local
46 if (token.length() != 2)
50 out_addr->address[i] = strtol(token.c_str(), &temp, 16);
/system/vold/
H A DKeyStorage.h26 // If "token" is nonempty, it is passed in as a required Gatekeeper auth token.
31 KeyAuthentication(std::string t, std::string s) : token{t}, secret{s} {};
32 const std::string token; member in class:android::vold::KeyAuthentication
H A DScryptParameters.cpp24 char *token; local
29 * The token we're looking for should be three integers separated by
32 for (i = 0, token = strtok_r(const_cast<char *>(paramstr), ":", &saveptr);
33 token != nullptr && i < 3;
34 i++, token = strtok_r(nullptr, ":", &saveptr)) {
36 params[i] = strtol(token, &endptr, 10);
41 if ((*token == '\0') || (*endptr != '\0') || params[i] < 0 || params[i] > 255) {
45 if (token != nullptr) {
/system/core/adb/
H A Dadb_auth.cpp39 ret = adb_auth_generate_token(t->token, sizeof(t->token));
40 if (ret != sizeof(t->token)) {
41 D("Error generating token ret=%d", ret);
46 memcpy(p->data, t->token, ret);
53 void send_auth_response(uint8_t *token, size_t token_size, atransport *t) argument
59 ret = adb_auth_sign(t->key, token, token_size, p->data);
61 D("Error signing the token");
H A Dadb_auth.h28 void send_auth_response(uint8_t *token, size_t token_size, atransport *t);
41 int adb_auth_sign(void *key, const unsigned char* token, size_t token_size,
46 static inline int adb_auth_generate_token(void *token, size_t token_size) { return 0; } argument
47 static inline int adb_auth_verify(void *token, void *sig, int siglen) { return 0; } argument
52 static inline int adb_auth_sign(void* key, const unsigned char* token, argument
61 int adb_auth_generate_token(void *token, size_t token_size);
62 int adb_auth_verify(uint8_t* token, uint8_t* sig, int siglen);
H A Dconsole.cpp39 // read the token
40 std::string token; local
41 if (!android::base::ReadFileToString(auth_token_path, &token)
42 || token.empty()) {
48 // now construct and return the actual command: "auth <token>\n"
50 command += token;
H A Dtransport.h93 unsigned char token[TOKEN_SIZE] = {}; member in class:atransport
H A Dadb_auth_client.cpp127 int adb_auth_generate_token(void *token, size_t token_size) argument
136 ret = fread(token, token_size, 1, f);
142 int adb_auth_verify(uint8_t* token, uint8_t* sig, int siglen) argument
155 ret = RSA_verify(&key->key, sig, siglen, token, SHA_DIGEST_SIZE);
H A Dadb_auth_host.cpp347 int adb_auth_sign(void *node, const unsigned char* token, size_t token_size, argument
354 D("Unexpected token size %zd", token_size);
358 if (!RSA_sign(NID_sha1, token, token_size, sig, &len, key->rsa)) {
/system/core/fingerprintd/
H A DIFingerprintDaemon.cpp78 const uint8_t* token = static_cast<const uint8_t *>(data.readInplace(tokenSize)); local
81 const int32_t ret = enroll(token, tokenSize, groupId, timeout);
H A DFingerprintDaemonProxy.cpp116 ALOGE("Falure sending auth token to KeyStore: %d", ret);
132 int32_t FingerprintDaemonProxy::enroll(const uint8_t* token, ssize_t tokenSize, int32_t groupId, argument
136 ALOG(LOG_VERBOSE, LOG_TAG, "enroll() : invalid token size %zu\n", tokenSize);
139 const hw_auth_token_t* authToken = reinterpret_cast<const hw_auth_token_t*>(token);
/system/core/libcutils/
H A Dcanned_fs_config.c63 char* token = NULL; local
65 token = strtok(NULL, " ");
66 if (token && strncmp(token, "capabilities=", 13) == 0) {
67 p->capabilities = strtoll(token+13, NULL, 0);
70 } while (token);
/system/core/libpackagelistparser/
H A Dpackagelistparser.c62 char* token; local
66 while ((token = strsep(&gids, ",\r\n"))) {
72 gid = strtoul(token, &endptr, 10);
126 errmsg = "Could not get next token for \"package name\"";
137 errmsg = "Could not get next token for field \"uid\"";
160 errmsg = "Could not get next token for field \"debuggable\"";
180 errmsg = "Could not get next token for field \"data dir\"";
191 errmsg = "Could not get next token for field \"seinfo\"";
202 errmsg = "Could not get next token for field \"gid(s)\"";
/system/security/keystore/tests/
H A Dauth_token_table_test.cpp71 hw_auth_token_t* token = new hw_auth_token_t; local
72 token->user_id = rsid;
73 token->authenticator_id = ssid;
74 token->authenticator_type = hton(static_cast<uint32_t>(HW_AUTH_PASSWORD));
75 token->challenge = challenge;
76 token->timestamp = hton(timestamp);
77 return token;
280 // expired. An additional check of the secure timestamp (in the token) will be made by
281 // keymaster when the found token is passed to it.
315 // Add a third token, thi
[all...]
/system/core/init/
H A Dueventd_parser.cpp206 int token = next_token(&state); local
207 switch (token) {
/system/core/libpixelflinger/codeflinger/
H A DArm64Disassembler.cpp95 static void get_token(const char *instr, uint32_t index, char *token) argument
102 token[j++] = instr[i];
111 token[j++] = instr[i];
114 token[j] = '\0';
134 static void decode_token(uint32_t code, char *token, char *instr_part) argument
136 if(strcmp(token, "<imm1>") == 0)
138 else if(strcmp(token, "<imm2>") == 0)
140 else if(strcmp(token, "<shift1>") == 0)
142 else if(strcmp(token, "<shift2>") == 0)
147 else if(strcmp(token, "<shift
273 char token[256]; local
[all...]
/system/security/keystore/
H A Dauth_token_table.h36 * token for authorizing a key operation.
50 AUTH_TOKEN_EXPIRED = -2, // Found a matching token, but it's too old.
51 AUTH_TOKEN_WRONG_SID = -3, // Found a token with the right challenge, but wrong SID. This
59 * Add an authorization token to the table. The table takes ownership of the argument.
61 void AddAuthenticationToken(const hw_auth_token_t* token);
64 * Find an authorization token that authorizes the operation specified by \p operation_handle on
77 * Find an authorization token that authorizes the operation specified by \p operation_handle on
113 Entry(const hw_auth_token_t* token, time_t current_time);
138 const hw_auth_token_t* token() { return token_.get(); } function in class:keymaster::AuthTokenTable::Entry
H A Dauth_token_table.cpp56 LOG_W("Auth token table filled up; replacing oldest entry", 0);
111 entries_, [&](Entry& e) { return e.token()->challenge == op_handle && !e.completed(); });
119 *found = matching_op->token();
149 *found = newest_match->token();
179 auto found = find_if(entries_, [&](Entry& e) { return e.token()->challenge == op_handle; });
190 AuthTokenTable::Entry::Entry(const hw_auth_token_t* token, time_t current_time) argument
191 : token_(token), time_received_(current_time), last_use_(current_time),
H A Doperation.cpp31 sp<IBinder> token = new BBinder(); local
32 mMap[token] = Operation(handle, keyid, purpose, dev, characteristics, appToken);
34 mLru.push_back(token);
39 mAppTokenMap[appToken].push_back(token);
40 return token;
43 bool OperationMap::getOperation(sp<IBinder> token, keymaster_operation_handle_t* outHandle, argument
50 auto entry = mMap.find(token);
54 updateLru(token);
66 void OperationMap::updateLru(sp<IBinder> token) { argument
67 auto lruEntry = std::find(mLru.begin(), mLru.end(), token);
74 removeOperation(sp<IBinder> token) argument
89 removeOperationTracking(sp<IBinder> token, sp<IBinder> appToken) argument
119 getOperationAuthToken(sp<IBinder> token, const hw_auth_token_t** outToken) argument
128 setOperationAuthToken(sp<IBinder> token, const hw_auth_token_t* authToken) argument
[all...]
/system/tools/aidl/tests/
H A Daidl_test_service.cpp105 void LogRepeatedStringToken(const String16& token) { argument
106 ALOGI("Repeating '%s' of length=%zu", android::String8(token).string(),
107 token.size());
111 void LogRepeatedToken(const T& token) { argument
113 token_str << token; local
114 ALOGI("Repeating token %s", token_str.str().c_str());
117 Status RepeatBoolean(bool token, bool* _aidl_return) override {
118 LogRepeatedToken(token ? 1 : 0);
119 *_aidl_return = token;
122 Status RepeatByte(int8_t token, int8_
123 LogRepeatedToken(token); variable
133 LogRepeatedToken(token); variable
138 LogRepeatedToken(token); variable
143 LogRepeatedToken(token); variable
148 LogRepeatedToken(token); variable
153 LogRepeatedStringToken(token); variable
[all...]
/system/update_engine/
H A Dchrome_browser_proxy_resolver.cc159 string token = entry_tok.token(); local
160 base::TrimWhitespaceASCII(token, base::TRIM_ALL, &token);
164 for (space = token.begin(); space != token.end(); ++space) {
170 string scheme = base::ToLowerASCII(string(token.begin(), space));
182 string host_and_port = string(space, token.end());
/system/core/crash_reporter/
H A Dlist_proxies.cc72 std::string token = entry_tok.token(); local
73 base::TrimWhitespaceASCII(token, base::TRIM_ALL, &token);
77 for (space = token.begin(); space != token.end(); ++space) {
83 std::string scheme = base::ToLowerASCII(std::string(token.begin(), space));
95 std::string host_and_port = std::string(space, token.end());
/system/keymaster/
H A Dkeymaster_enforcement_test.cpp54 bool auth_token_timed_out(const hw_auth_token_t& token, uint32_t timeout) const { argument
55 return current_time_ > ntoh(token.timestamp) + timeout;
520 hw_auth_token_t token; local
521 memset(&token, 0, sizeof(token));
522 token.version = HW_AUTH_TOKEN_VERSION;
523 token.challenge = 99;
524 token.user_id = 9;
525 token.authenticator_id = 0;
526 token
543 hw_auth_token_t token; local
572 hw_auth_token_t token; local
596 hw_auth_token_t token; local
623 hw_auth_token_t token; local
652 hw_auth_token_t token; local
681 hw_auth_token_t token; local
704 hw_auth_token_t token; local
756 hw_auth_token_t token; local
781 hw_auth_token_t token; local
830 hw_auth_token_t token; local
[all...]
/system/security/keystore/include/keystore/
H A DIKeystoreService.h63 sp<IBinder> token; member in struct:android::OperationResult
231 virtual void update(const sp<IBinder>& token, const KeymasterArguments& params,
234 virtual void finish(const sp<IBinder>& token, const KeymasterArguments& params,
243 virtual int32_t addAuthToken(const uint8_t* token, size_t length) = 0;
/system/connectivity/shill/
H A Dprofile.cc268 bool Profile::IsValidIdentifierToken(const string& token) { argument
269 if (token.empty()) {
272 for (auto chr : token) {

Completed in 240 milliseconds

12