Home
last modified time | relevance | path

Searched refs:token (Results 1 – 25 of 55) sorted by relevance

123

/system/core/libpixelflinger/codeflinger/
DArm64Disassembler.cpp95 static void get_token(const char *instr, uint32_t index, char *token) in get_token() argument
102 token[j++] = instr[i]; in get_token()
111 token[j++] = instr[i]; in get_token()
114 token[j] = '\0'; in get_token()
134 static void decode_token(uint32_t code, char *token, char *instr_part) in decode_token() argument
136 if(strcmp(token, "<imm1>") == 0) in decode_token()
138 else if(strcmp(token, "<imm2>") == 0) in decode_token()
140 else if(strcmp(token, "<shift1>") == 0) in decode_token()
142 else if(strcmp(token, "<shift2>") == 0) in decode_token()
147 else if(strcmp(token, "<shift3>") == 0) in decode_token()
[all …]
/system/keymaster/
Dkeymaster_enforcement_test.cpp54 bool auth_token_timed_out(const hw_auth_token_t& token, uint32_t timeout) const { in auth_token_timed_out() argument
55 return current_time_ > ntoh(token.timestamp) + timeout; in auth_token_timed_out()
520 hw_auth_token_t token; in TEST_F() local
521 memset(&token, 0, sizeof(token)); in TEST_F()
522 token.version = HW_AUTH_TOKEN_VERSION; in TEST_F()
523 token.challenge = 99; in TEST_F()
524 token.user_id = 9; in TEST_F()
525 token.authenticator_id = 0; in TEST_F()
526 token.authenticator_type = hton(static_cast<uint32_t>(HW_AUTH_PASSWORD)); in TEST_F()
527 token.timestamp = 0; in TEST_F()
[all …]
/system/tools/aidl/
Daidl_language_l.ll25 /* This happens at every call to yylex (every time we receive one token) */
42 \"[^\"]*\" { yylval->token = new AidlToken(yytext, extra_text);
43 return yy::parser::token::C_STR; }
66 parcelable { return yy::parser::token::PARCELABLE; }
67 import { return yy::parser::token::IMPORT; }
68 package { return yy::parser::token::PACKAGE; }
69 int { return yy::parser::token::INT; }
70 in { return yy::parser::token::IN; }
71 out { return yy::parser::token::OUT; }
72 inout { return yy::parser::token::INOUT; }
[all …]
Daidl_language_y.yy21 AidlToken* token;
40 %token<token> IDENTIFIER INTERFACE ONEWAY C_STR
41 %token<integer> INTVALUE
43 %token '(' ')' ',' '=' '[' ']' '<' '>' '.' '{' '}' ';'
44 %token IN OUT INOUT PACKAGE IMPORT PARCELABLE CPP_HEADER CONST INT
45 %token ANNOTATION_NULLABLE ANNOTATION_UTF8 ANNOTATION_UTF8_CPP
63 %type<token> identifier error
73 * non-terminal, which is either an IDENTIFIER token, or one of the
/system/security/keystore/
Doperation.cpp31 sp<IBinder> token = new BBinder(); in addOperation() local
32 mMap[token] = Operation(handle, keyid, purpose, dev, characteristics, appToken); in addOperation()
34 mLru.push_back(token); in addOperation()
39 mAppTokenMap[appToken].push_back(token); in addOperation()
40 return token; in addOperation()
43 bool OperationMap::getOperation(sp<IBinder> token, keymaster_operation_handle_t* outHandle, in getOperation() argument
50 auto entry = mMap.find(token); in getOperation()
54 updateLru(token); in getOperation()
66 void OperationMap::updateLru(sp<IBinder> token) { in updateLru() argument
67 auto lruEntry = std::find(mLru.begin(), mLru.end(), token); in updateLru()
[all …]
Doperation.h54 bool getOperation(sp<IBinder> token, keymaster_operation_handle_t* outHandle,
58 bool removeOperation(sp<IBinder> token);
62 bool getOperationAuthToken(sp<IBinder> token, const hw_auth_token_t** outToken);
63 bool setOperationAuthToken(sp<IBinder> token, const hw_auth_token_t* authToken);
68 void updateLru(sp<IBinder> token);
69 void removeOperationTracking(sp<IBinder> token, sp<IBinder> appToken);
Dkey_store_service.h108 void update(const sp<IBinder>& token, const KeymasterArguments& params, const uint8_t* data,
110 void finish(const sp<IBinder>& token, const KeymasterArguments& params,
113 int32_t abort(const sp<IBinder>& token);
115 bool isOperationAuthorized(const sp<IBinder>& token);
117 int32_t addAuthToken(const uint8_t* token, size_t length);
197 void addAuthToParams(std::vector<keymaster_key_param_t>* params, const hw_auth_token_t* token);
210 int32_t addOperationAuthTokenIfNeeded(sp<IBinder> token,
Dauth_token_table.cpp111 entries_, [&](Entry& e) { return e.token()->challenge == op_handle && !e.completed(); }); in FindAuthPerOpAuthorization()
119 *found = matching_op->token(); in FindAuthPerOpAuthorization()
142 *found = newest_match->token(); in FindTimedAuthorization()
168 auto found = find_if(entries_, [&](Entry& e) { return e.token()->challenge == op_handle; }); in MarkCompleted()
179 AuthTokenTable::Entry::Entry(const hw_auth_token_t* token, time_t current_time) in Entry() argument
180 : token_(token), time_received_(current_time), last_use_(current_time), in Entry()
Dkey_store_service.cpp53 for (auto token : operations) { in binderDied() local
54 abort(token); in binderDied()
951 result->token = operationToken; in begin()
959 void KeyStoreService::update(const sp<IBinder>& token, const KeymasterArguments& params, in update() argument
970 if (!mOperationMap.getOperation(token, &handle, &keyid, &purpose, &dev, &characteristics)) { in update()
975 int32_t authResult = addOperationAuthTokenIfNeeded(token, &opParams); in update()
1008 void KeyStoreService::finish(const sp<IBinder>& token, const KeymasterArguments& params, in finish() argument
1021 if (!mOperationMap.getOperation(token, &handle, &keyid, &purpose, &dev, &characteristics)) { in finish()
1026 int32_t authResult = addOperationAuthTokenIfNeeded(token, &opParams); in finish()
1065 mOperationMap.removeOperation(token); in finish()
[all …]
/system/tools/aidl/tests/
Daidl_test_service.cpp105 void LogRepeatedStringToken(const String16& token) { in LogRepeatedStringToken() argument
106 ALOGI("Repeating '%s' of length=%zu", android::String8(token).string(), in LogRepeatedStringToken()
107 token.size()); in LogRepeatedStringToken()
111 void LogRepeatedToken(const T& token) { in LogRepeatedToken() argument
113 token_str << token; in LogRepeatedToken()
117 Status RepeatBoolean(bool token, bool* _aidl_return) override { in RepeatBoolean() argument
118 LogRepeatedToken(token ? 1 : 0); in RepeatBoolean()
119 *_aidl_return = token; in RepeatBoolean()
122 Status RepeatByte(int8_t token, int8_t* _aidl_return) override { in RepeatByte() argument
123 LogRepeatedToken(token); in RepeatByte()
[all …]
/system/vold/
DScryptParameters.cpp24 char *token; in parse_scrypt_parameters() local
32 for (i = 0, token = strtok_r(const_cast<char *>(paramstr), ":", &saveptr); in parse_scrypt_parameters()
33 token != nullptr && i < 3; in parse_scrypt_parameters()
34 i++, token = strtok_r(nullptr, ":", &saveptr)) { in parse_scrypt_parameters()
36 params[i] = strtol(token, &endptr, 10); in parse_scrypt_parameters()
41 if ((*token == '\0') || (*endptr != '\0') || params[i] < 0 || params[i] > 255) { in parse_scrypt_parameters()
45 if (token != nullptr) { in parse_scrypt_parameters()
DExt4Crypt.h31 bool e4crypt_add_user_key_auth(userid_t user_id, int serial, const char* token,
35 bool e4crypt_unlock_user_key(userid_t user_id, int serial, const char* token, const char* secret);
DKeyStorage.h31 KeyAuthentication(std::string t, std::string s) : token{t}, secret{s} {}; in KeyAuthentication()
32 const std::string token; variable
/system/core/adb/
Dadb_auth.h28 void send_auth_response(uint8_t *token, size_t token_size, atransport *t);
41 int adb_auth_sign(void *key, const unsigned char* token, size_t token_size,
46 static inline int adb_auth_generate_token(void *token, size_t token_size) { return 0; } in adb_auth_generate_token() argument
47 static inline int adb_auth_verify(void *token, void *sig, int siglen) { return 0; } in adb_auth_verify() argument
52 static inline int adb_auth_sign(void* key, const unsigned char* token, in adb_auth_sign() argument
61 int adb_auth_generate_token(void *token, size_t token_size);
62 int adb_auth_verify(uint8_t* token, uint8_t* sig, int siglen);
Dadb_auth.cpp39 ret = adb_auth_generate_token(t->token, sizeof(t->token)); in send_auth_request()
40 if (ret != sizeof(t->token)) { in send_auth_request()
46 memcpy(p->data, t->token, ret); in send_auth_request()
53 void send_auth_response(uint8_t *token, size_t token_size, atransport *t) in send_auth_response() argument
59 ret = adb_auth_sign(t->key, token, token_size, p->data); in send_auth_response()
Dconsole.cpp40 std::string token; in adb_construct_auth_command() local
41 if (!android::base::ReadFileToString(auth_token_path, &token) in adb_construct_auth_command()
42 || token.empty()) { in adb_construct_auth_command()
50 command += token; in adb_construct_auth_command()
/system/tools/aidl/tests/android/aidl/tests/
DITestService.aidl35 boolean RepeatBoolean(boolean token); in RepeatBoolean() argument
36 byte RepeatByte(byte token); in RepeatByte() argument
37 char RepeatChar(char token); in RepeatChar() argument
38 int RepeatInt(int token); in RepeatInt() argument
39 long RepeatLong(long token); in RepeatLong() argument
40 float RepeatFloat(float token); in RepeatFloat() argument
41 double RepeatDouble(double token); in RepeatDouble() argument
42 String RepeatString(String token); in RepeatString() argument
87 @utf8InCpp String RepeatUtf8CppString(@utf8InCpp String token); in RepeatUtf8CppString() argument
89 @nullable @utf8InCpp String token); in RepeatNullableUtf8CppString()
/system/gatekeeper/
Dgatekeeper.cpp222 hw_auth_token_t *token = new hw_auth_token_t; in MintAuthToken() local
225 token->version = HW_AUTH_TOKEN_VERSION; in MintAuthToken()
226 token->challenge = challenge; in MintAuthToken()
227 token->user_id = user_id; in MintAuthToken()
228 token->authenticator_id = authenticator_id; in MintAuthToken()
229 token->authenticator_type = htonl(HW_AUTH_PASSWORD); in MintAuthToken()
230 token->timestamp = htobe64(timestamp); in MintAuthToken()
235 uint32_t hash_len = (uint32_t)((uint8_t *)&token->hmac - (uint8_t *)token); in MintAuthToken()
236 ComputeSignature(token->hmac, sizeof(token->hmac), auth_token_key, key_len, in MintAuthToken()
237 reinterpret_cast<uint8_t *>(token), hash_len); in MintAuthToken()
[all …]
/system/update_engine/
Dchrome_browser_proxy_resolver.cc159 string token = entry_tok.token(); in ParseProxyString() local
160 base::TrimWhitespaceASCII(token, base::TRIM_ALL, &token); in ParseProxyString()
164 for (space = token.begin(); space != token.end(); ++space) { in ParseProxyString()
170 string scheme = base::ToLowerASCII(string(token.begin(), space)); in ParseProxyString()
182 string host_and_port = string(space, token.end()); in ParseProxyString()
/system/core/libcutils/
Dcanned_fs_config.c63 char* token = NULL; in load_canned_fs_config() local
65 token = strtok(NULL, " "); in load_canned_fs_config()
66 if (token && strncmp(token, "capabilities=", 13) == 0) { in load_canned_fs_config()
67 p->capabilities = strtoll(token+13, NULL, 0); in load_canned_fs_config()
70 } while (token); in load_canned_fs_config()
/system/core/crash_reporter/
Dlist_proxies.cc72 std::string token = entry_tok.token(); in ParseProxyString() local
73 base::TrimWhitespaceASCII(token, base::TRIM_ALL, &token); in ParseProxyString()
77 for (space = token.begin(); space != token.end(); ++space) { in ParseProxyString()
83 std::string scheme = base::ToLowerASCII(std::string(token.begin(), space)); in ParseProxyString()
95 std::string host_and_port = std::string(space, token.end()); in ParseProxyString()
/system/bt/service/common/bluetooth/util/
Daddress_helper.cpp44 const auto& token = byte_tokens[i]; in BdAddrFromString() local
46 if (token.length() != 2) in BdAddrFromString()
50 out_addr->address[i] = strtol(token.c_str(), &temp, 16); in BdAddrFromString()
/system/extras/libfec/
Dfec_verity.cpp352 for (const auto token : tokens) { in parse_table() local
355 if (token != stringify(VERITY_TABLE_VERSION)) { in parse_table()
356 error("unsupported verity table version: %s", token.c_str()); in parse_table()
363 if (token != stringify(FEC_BLOCKSIZE)) { in parse_table()
364 error("unsupported verity block size: %s", token.c_str()); in parse_table()
369 if (parse_uint64(token.c_str(), f->data_size / FEC_BLOCKSIZE, in parse_table()
372 token.c_str()); in parse_table()
377 if (parse_uint64(token.c_str(), f->data_size / FEC_BLOCKSIZE, in parse_table()
379 error("invalid verity hash start block: %s", token.c_str()); in parse_table()
386 if (token != "sha256") { in parse_table()
[all …]
/system/connectivity/shill/
Dscope_logger.cc137 enable_scope = (tokenizer.token() == "+"); in EnableScopesByName()
141 if (tokenizer.token().empty()) in EnableScopesByName()
146 if (tokenizer.token() == kScopeNames[i]) { in EnableScopesByName()
152 << "Unknown scope '" << tokenizer.token() << "'"; in EnableScopesByName()
/system/core/sdcard/
Dsdcard.c248 int token; member
806 TRACE("[%d] LOOKUP %s @ %"PRIx64" (%s)\n", handler->token, name, hdr->nodeid, in handle_lookup()
828 TRACE("[%d] FORGET #%"PRIu64" @ %"PRIx64" (%s)\n", handler->token, req->nlookup, in handle_forget()
848 TRACE("[%d] GETATTR flags=%x fh=%"PRIx64" @ %"PRIx64" (%s)\n", handler->token, in handle_getattr()
871 TRACE("[%d] SETATTR fh=%"PRIx64" valid=%x @ %"PRIx64" (%s)\n", handler->token, in handle_setattr()
917 handler->token, path, times[0].tv_sec, times[1].tv_sec); in handle_setattr()
936 TRACE("[%d] MKNOD %s 0%o @ %"PRIx64" (%s)\n", handler->token, in handle_mknod()
965 TRACE("[%d] MKDIR %s 0%o @ %"PRIx64" (%s)\n", handler->token, in handle_mkdir()
1013 TRACE("[%d] UNLINK %s @ %"PRIx64" (%s)\n", handler->token, in handle_unlink()
1036 handler->token, (uint64_t) parent_node->nid, (uint64_t) child_node->nid, name); in handle_unlink()
[all …]

123