/system/gatekeeper/tests/ |
gatekeeper_device_test.cpp | 55 uint8_t *password_handle; local 62 &password_handle, &password_handle_length); 67 ret = device->verify(device, 0, 0, password_handle, password_handle_length, 76 uint8_t *password_handle; local 83 &password_handle, &password_handle_length); 90 ret = device->verify(device, 0, 0, password_handle, password_handle_length, 101 uint8_t *password_handle; local 106 &password_handle, &password_handle_length); 110 password_handle_t *handle = reinterpret_cast<password_handle_t *>(password_handle); 114 &password_handle, &password_handle_length) 125 uint8_t *password_handle; local [all...] |
gatekeeper_messages_test.cpp | 71 ASSERT_EQ((uint32_t) 0, deserialized_msg.password_handle.length); 72 ASSERT_EQ(NULL, deserialized_msg.password_handle.buffer.get()); 100 ASSERT_EQ((uint32_t) 0, deserialized_msg.password_handle.length); 101 ASSERT_EQ(NULL, deserialized_msg.password_handle.buffer.get()); 109 SizedBuffer *password_handle = make_buffer(password_size); local 114 EnrollRequest msg(USER_ID, password_handle, provided_password, enrolled_password); 127 deserialized_handle = &deserialized_msg.password_handle; 134 ASSERT_EQ(0, memcmp(msg.password_handle.buffer.get(), deserialized_handle->buffer.get(), password_size)); 137 delete password_handle; 167 *password_handle = make_buffer(password_size) local [all...] |
/system/gatekeeper/ |
gatekeeper_messages.cpp | 138 this->password_handle.buffer.reset(enrolled_password_handle->buffer.release()); 139 this->password_handle.length = enrolled_password_handle->length; 145 memset_s(&password_handle, 0, sizeof(password_handle)); 150 if (password_handle.buffer.get()) { 151 password_handle.buffer.reset(); 161 return sizeof(challenge) + serialized_buffer_size(password_handle) 168 append_to_buffer(&buffer, &password_handle); 175 if (password_handle.buffer.get()) { 176 password_handle.buffer.reset() [all...] |
gatekeeper.cpp | 34 if (request.password_handle.buffer.get() == NULL) { 39 reinterpret_cast<password_handle_t *>(request.password_handle.buffer.get()); 91 SizedBuffer password_handle; local 92 if (!CreatePasswordHandle(&password_handle, 99 response->SetEnrolledPasswordHandle(&password_handle); 105 if (!request.provided_password.buffer.get() || !request.password_handle.buffer.get()) { 110 password_handle_t *password_handle = reinterpret_cast<password_handle_t *>( local 111 request.password_handle.buffer.get()); 113 if (password_handle->version > HANDLE_VERSION) { 118 secure_id_t user_id = password_handle->user_id 173 password_handle_t *password_handle = reinterpret_cast<password_handle_t *>( local [all...] |
/system/core/gatekeeperd/tests/ |
gatekeeper_test.cpp | 99 SizedBuffer password_handle; local 109 password_handle.buffer.reset(new uint8_t[enroll_response.enrolled_password_handle.length]); 110 password_handle.length = enroll_response.enrolled_password_handle.length; 111 memcpy(password_handle.buffer.get(), enroll_response.enrolled_password_handle.buffer.get(), 112 password_handle.length); 133 EnrollRequest enroll_request(0, &password_handle, &password, &provided_password); 198 SizedBuffer password_handle; local 201 VerifyRequest request(0, 0, &provided_password, &password_handle);
|
/system/gatekeeper/include/gatekeeper/ |
gatekeeper_messages.h | 151 SizedBuffer password_handle; member in struct:gatekeeper::VerifyRequest 171 EnrollRequest(uint32_t user_id, SizedBuffer *password_handle, 184 SizedBuffer password_handle; member in struct:gatekeeper::EnrollRequest
|
gatekeeper.h | 25 #include "password_handle.h" 183 * Populates password_handle with the data provided and computes HMAC. 185 bool CreatePasswordHandle(SizedBuffer *password_handle, salt_t salt,
|
/system/core/gatekeeperd/ |
gatekeeperd.cpp | 38 #include <gatekeeper/password_handle.h> // for password_handle_t
|