Searched refs:hw_auth_token_t (Results 1 – 14 of 14) sorted by relevance
/system/core/gatekeeperd/tests/ |
D | gatekeeper_test.cpp | 84 hw_auth_token_t *auth_token = in TEST() 85 reinterpret_cast<hw_auth_token_t *>(response.auth_token.buffer.get()); in TEST() 119 hw_auth_token_t *auth_token = in TEST() 120 reinterpret_cast<hw_auth_token_t *>(response.auth_token.buffer.get()); in TEST() 145 reinterpret_cast<hw_auth_token_t *>(response.auth_token.buffer.get())->user_id); in TEST() 167 hw_auth_token_t *auth_token = in TEST() 168 reinterpret_cast<hw_auth_token_t *>(response.auth_token.buffer.get()); in TEST() 190 reinterpret_cast<hw_auth_token_t *>(response.auth_token.buffer.get())->user_id); in TEST()
|
/system/security/keystore/tests/ |
D | auth_token_table_test.cpp | 26 inline bool operator==(const hw_auth_token_t& a, const hw_auth_token_t& b) { in operator ==() 69 static hw_auth_token_t* make_token(uint64_t rsid, uint64_t ssid = 0, uint64_t challenge = 0, in make_token() 71 hw_auth_token_t* token = new hw_auth_token_t; in make_token() 105 const hw_auth_token_t* found; in TEST() 134 const hw_auth_token_t* found; in TEST() 153 const hw_auth_token_t* found; in TEST() 225 const hw_auth_token_t* found; in TEST() 235 const hw_auth_token_t* found; in TEST() 252 const hw_auth_token_t* found; in TEST() 262 const hw_auth_token_t* found; in TEST() [all …]
|
/system/security/keystore/ |
D | keystore_keymaster_enforcement.h | 76 bool auth_token_timed_out(const hw_auth_token_t&, uint32_t) const { in auth_token_timed_out() argument 82 bool ValidateTokenSignature(const hw_auth_token_t&) const override { in ValidateTokenSignature() argument
|
D | keymaster_enforcement.h | 124 virtual bool auth_token_timed_out(const hw_auth_token_t& token, uint32_t timeout) const = 0; 141 virtual bool ValidateTokenSignature(const hw_auth_token_t& token) const = 0;
|
D | keymaster_enforcement.cpp | 480 if (auth_token_blob.value().size() != sizeof(hw_auth_token_t)) { in AuthTokenMatches() 482 sizeof(hw_auth_token_t), auth_token_blob.value().size()); in AuthTokenMatches() 486 hw_auth_token_t auth_token; in AuthTokenMatches() 487 memcpy(&auth_token, &auth_token_blob.value()[0], sizeof(hw_auth_token_t)); in AuthTokenMatches()
|
D | key_store_service.cpp | 1321 if (length != sizeof(hw_auth_token_t)) { in addAuthToken() 1325 hw_auth_token_t authToken; in addAuthToken() 1326 memcpy(reinterpret_cast<void*>(&authToken), token, sizeof(hw_auth_token_t)); in addAuthToken()
|
/system/keymaster/include/keymaster/ |
D | keymaster_enforcement.h | 127 virtual bool auth_token_timed_out(const hw_auth_token_t& token, uint32_t timeout) const = 0; 144 virtual bool ValidateTokenSignature(const hw_auth_token_t& token) const = 0;
|
/system/keymaster/ |
D | keymaster_enforcement_test.cpp | 54 bool auth_token_timed_out(const hw_auth_token_t& token, uint32_t timeout) const { in auth_token_timed_out() 57 bool ValidateTokenSignature(const hw_auth_token_t&) const override { in ValidateTokenSignature() 520 hw_auth_token_t token; in TEST_F() 543 hw_auth_token_t token; in TEST_F() 572 hw_auth_token_t token; in TEST_F() 596 hw_auth_token_t token; in TEST_F() 623 hw_auth_token_t token; in TEST_F() 652 hw_auth_token_t token; in TEST_F() 681 hw_auth_token_t token; in TEST_F() 704 hw_auth_token_t token; in TEST_F() [all …]
|
D | keymaster_enforcement.cpp | 455 if (auth_token_blob.data_length != sizeof(hw_auth_token_t)) { in AuthTokenMatches() 456 LOG_E("Bug: Auth token is the wrong size (%d expected, %d found)", sizeof(hw_auth_token_t), in AuthTokenMatches() 461 hw_auth_token_t auth_token; in AuthTokenMatches() 462 memcpy(&auth_token, auth_token_blob.data, sizeof(hw_auth_token_t)); in AuthTokenMatches()
|
D | android_keymaster_test.cpp | 74 virtual bool auth_token_timed_out(const hw_auth_token_t& /* token */, in auth_token_timed_out() argument 79 virtual bool ValidateTokenSignature(const hw_auth_token_t& /* token */) const { return true; } in ValidateTokenSignature()
|
/system/security/keystore/include/keystore/ |
D | keystore_hidl_support.h | 107 == sizeof(hw_auth_token_t), in authToken2HidlVec() 111 result.resize(sizeof(hw_auth_token_t)); in authToken2HidlVec()
|
/system/gatekeeper/tests/ |
D | gatekeeper_device_test.cpp | 84 hw_auth_token_t *hat; in TEST_F() 98 hat = reinterpret_cast<hw_auth_token_t *>(auth_token); in TEST_F()
|
/system/vold/ |
D | KeyStorage.cpp | 120 if (auth.token.size() != sizeof(hw_auth_token_t)) { in generateKeymasterKey() 121 LOG(ERROR) << "Auth token should be " << sizeof(hw_auth_token_t) << " bytes, was " in generateKeymasterKey() 125 const hw_auth_token_t* at = reinterpret_cast<const hw_auth_token_t*>(auth.token.data()); in generateKeymasterKey()
|
/system/gatekeeper/ |
D | gatekeeper.cpp | 228 hw_auth_token_t *token = new hw_auth_token_t; in MintAuthToken()
|