/system/gatekeeper/tests/ |
gatekeeper_device_test.cpp | 57 uint8_t *password_handle; local 64 &password_handle, &password_handle_length); 70 ret = device->verify(device, 400, 0, password_handle, password_handle_length, 80 uint8_t *password_handle; local 88 &password_handle, &password_handle_length); 93 ret = device->verify(device, 400, 0, password_handle, password_handle_length, 107 uint8_t *password_handle; local 115 &password_handle, &password_handle_length); 125 ret = device->verify(device, 400, 0, password_handle, password_handle_length, 142 ret = device->verify(device, 400, 0, password_handle, password_handle_length 152 uint8_t *password_handle; local 177 uint8_t *password_handle; local 206 uint8_t *password_handle; local 230 uint8_t *password_handle; local [all...] |
gatekeeper_messages_test.cpp | 71 ASSERT_EQ((uint32_t) 0, deserialized_msg.password_handle.length); 72 ASSERT_EQ(NULL, deserialized_msg.password_handle.buffer.get()); 100 ASSERT_EQ((uint32_t) 0, deserialized_msg.password_handle.length); 101 ASSERT_EQ(NULL, deserialized_msg.password_handle.buffer.get()); 109 SizedBuffer *password_handle = make_buffer(password_size); local 114 EnrollRequest msg(USER_ID, password_handle, provided_password, enrolled_password); 127 deserialized_handle = &deserialized_msg.password_handle; 134 ASSERT_EQ(0, memcmp(msg.password_handle.buffer.get(), deserialized_handle->buffer.get(), password_size)); 137 delete password_handle; 167 *password_handle = make_buffer(password_size) local [all...] |
/system/gatekeeper/ |
gatekeeper_messages.cpp | 138 this->password_handle.buffer.reset(enrolled_password_handle->buffer.release()); 139 this->password_handle.length = enrolled_password_handle->length; 145 memset_s(&password_handle, 0, sizeof(password_handle)); 150 if (password_handle.buffer.get()) { 151 password_handle.buffer.reset(); 161 return sizeof(challenge) + serialized_buffer_size(password_handle) 168 append_to_buffer(&buffer, &password_handle); 175 if (password_handle.buffer.get()) { 176 password_handle.buffer.reset() [all...] |
gatekeeper.cpp | 36 if (request.password_handle.buffer.get() == NULL) { 41 reinterpret_cast<password_handle_t *>(request.password_handle.buffer.get()); 93 SizedBuffer password_handle; local 94 if (!CreatePasswordHandle(&password_handle, 101 response->SetEnrolledPasswordHandle(&password_handle); 107 if (!request.provided_password.buffer.get() || !request.password_handle.buffer.get()) { 112 password_handle_t *password_handle = reinterpret_cast<password_handle_t *>( local 113 request.password_handle.buffer.get()); 115 if (password_handle->version > HANDLE_VERSION) { 120 secure_id_t user_id = password_handle->user_id 175 password_handle_t *password_handle = reinterpret_cast<password_handle_t *>( local [all...] |
/system/core/gatekeeperd/tests/ |
gatekeeper_test.cpp | 98 SizedBuffer password_handle; local 108 password_handle.buffer.reset(new uint8_t[enroll_response.enrolled_password_handle.length]); 109 password_handle.length = enroll_response.enrolled_password_handle.length; 110 memcpy(password_handle.buffer.get(), enroll_response.enrolled_password_handle.buffer.get(), 111 password_handle.length); 132 EnrollRequest enroll_request(0, &password_handle, &password, &provided_password); 197 SizedBuffer password_handle; local 200 VerifyRequest request(0, 0, &provided_password, &password_handle);
|
/system/gatekeeper/include/gatekeeper/ |
gatekeeper_messages.h | 151 SizedBuffer password_handle; member in struct:gatekeeper::VerifyRequest 171 EnrollRequest(uint32_t user_id, SizedBuffer *password_handle, 184 SizedBuffer password_handle; member in struct:gatekeeper::EnrollRequest
|
gatekeeper.h | 25 #include "password_handle.h" 183 * Populates password_handle with the data provided and computes HMAC. 185 bool CreatePasswordHandle(SizedBuffer *password_handle, salt_t salt,
|
/system/core/gatekeeperd/ |
gatekeeperd.cpp | 38 #include <gatekeeper/password_handle.h> // for password_handle_t
|