Searched refs:auth_token_length (Results 1 – 6 of 6) sorted by relevance
/system/core/gatekeeperd/ |
D | gatekeeperd.cpp | 191 uint32_t auth_token_length; in verify() local 194 &auth_token, &auth_token_length, request_reenroll); in verify() 200 uint8_t **auth_token, uint32_t *auth_token_length, bool *request_reenroll) { in verifyChallenge() argument 221 provided_password, provided_password_length, auth_token, auth_token_length, in verifyChallenge() 228 provided_password, provided_password_length, auth_token, auth_token_length, in verifyChallenge() 239 provided_password, provided_password_length, auth_token, auth_token_length, in verifyChallenge() 243 if (ret == 0 && *auth_token != NULL && *auth_token_length > 0) { in verifyChallenge() 249 status_t ret = service->addAuthToken(*auth_token, *auth_token_length); in verifyChallenge()
|
D | SoftGateKeeperDevice.cpp | 74 uint32_t provided_password_length, uint8_t **auth_token, uint32_t *auth_token_length, in verify() argument 99 if (auth_token != NULL && auth_token_length != NULL) { in verify() 101 *auth_token_length = response.auth_token.length; in verify()
|
D | SoftGateKeeperDevice.h | 69 uint8_t **auth_token, uint32_t *auth_token_length, bool *request_reenroll);
|
D | IGateKeeperService.h | 88 uint8_t **auth_token, uint32_t *auth_token_length, bool *request_reenroll) = 0;
|
/system/core/fingerprintd/ |
D | FingerprintDaemonProxy.cpp | 97 …FingerprintDaemonProxy::notifyKeystore(const uint8_t *auth_token, const size_t auth_token_length) { in notifyKeystore() argument 98 if (auth_token != NULL && auth_token_length > 0) { in notifyKeystore() 104 status_t ret = service->addAuthToken(auth_token, auth_token_length); in notifyKeystore()
|
D | FingerprintDaemonProxy.h | 52 void notifyKeystore(const uint8_t *auth_token, const size_t auth_token_length);
|