HomeSort by relevance Sort by last modified time
    Searched refs:hw_auth_token_t (Results 1 - 22 of 22) sorted by null

  /system/security/keystore/
auth_token_table.h 61 void AddAuthenticationToken(const hw_auth_token_t* token);
74 keymaster_operation_handle_t op_handle, const hw_auth_token_t** found);
88 const hw_auth_token_t** found) {
107 Entry(const hw_auth_token_t* token, time_t current_time);
132 const hw_auth_token_t* token() { return token_.get(); }
139 std::unique_ptr<const hw_auth_token_t> token_;
148 const hw_auth_token_t** found);
151 const AuthorizationSet& key_info, const hw_auth_token_t** found);
keystore_keymaster_enforcement.h 75 bool auth_token_timed_out(const hw_auth_token_t&, uint32_t) const {
81 bool ValidateTokenSignature(const hw_auth_token_t&) const override {
operation.h 62 bool getOperationAuthToken(sp<IBinder> token, const hw_auth_token_t** outToken);
63 bool setOperationAuthToken(sp<IBinder> token, const hw_auth_token_t* authToken);
81 std::unique_ptr<hw_auth_token_t> authToken;
auth_token_table.cpp 52 void AuthTokenTable::AddAuthenticationToken(const hw_auth_token_t* auth_token) {
88 const hw_auth_token_t** found) {
106 keymaster_operation_handle_t op_handle, const hw_auth_token_t** found) {
126 const hw_auth_token_t** found) {
179 AuthTokenTable::Entry::Entry(const hw_auth_token_t* token, time_t current_time)
operation.cpp 119 bool OperationMap::getOperationAuthToken(sp<IBinder> token, const hw_auth_token_t** outToken) {
128 bool OperationMap::setOperationAuthToken(sp<IBinder> token, const hw_auth_token_t* authToken) {
133 entry->second.authToken.reset(new hw_auth_token_t);
key_store_service.h 195 const hw_auth_token_t** authToken, bool failOnTokenMissing = true);
197 void addAuthToParams(std::vector<keymaster_key_param_t>* params, const hw_auth_token_t* token);
key_store_service.cpp 866 const hw_auth_token_t* authToken = NULL;
    [all...]
  /hardware/libhardware/include/hardware/
hw_auth_token.h 47 } hw_auth_token_t; typedef in typeref:struct:__anon32171
fingerprint.h 102 hw_auth_token_t hat;
173 int (*enroll)(struct fingerprint_device *dev, const hw_auth_token_t *hat,
  /system/core/gatekeeperd/tests/
gatekeeper_test.cpp 84 hw_auth_token_t *auth_token =
85 reinterpret_cast<hw_auth_token_t *>(response.auth_token.buffer.get());
119 hw_auth_token_t *auth_token =
120 reinterpret_cast<hw_auth_token_t *>(response.auth_token.buffer.get());
145 reinterpret_cast<hw_auth_token_t *>(response.auth_token.buffer.get())->user_id);
167 hw_auth_token_t *auth_token =
168 reinterpret_cast<hw_auth_token_t *>(response.auth_token.buffer.get());
190 reinterpret_cast<hw_auth_token_t *>(response.auth_token.buffer.get())->user_id);
  /system/keymaster/include/keymaster/
keymaster_enforcement.h 107 // of hw_auth_token_t structs).
127 virtual bool auth_token_timed_out(const hw_auth_token_t& token, uint32_t timeout) const = 0;
144 virtual bool ValidateTokenSignature(const hw_auth_token_t& token) const = 0;
  /system/security/keystore/tests/
auth_token_table_test.cpp 26 inline bool operator==(const hw_auth_token_t& a, const hw_auth_token_t& b) {
69 static hw_auth_token_t* make_token(uint64_t rsid, uint64_t ssid = 0, uint64_t challenge = 0,
71 hw_auth_token_t* token = new hw_auth_token_t;
105 const hw_auth_token_t* found;
134 const hw_auth_token_t* found;
153 const hw_auth_token_t* found;
225 const hw_auth_token_t* found;
235 const hw_auth_token_t* found
    [all...]
  /system/keymaster/
keymaster_enforcement_test.cpp 54 bool auth_token_timed_out(const hw_auth_token_t& token, uint32_t timeout) const {
57 bool ValidateTokenSignature(const hw_auth_token_t&) const override {
520 hw_auth_token_t token;
543 hw_auth_token_t token;
572 hw_auth_token_t token;
596 hw_auth_token_t token;
623 hw_auth_token_t token;
652 hw_auth_token_t token;
681 hw_auth_token_t token;
704 hw_auth_token_t token
    [all...]
keymaster_enforcement.cpp 446 if (auth_token_blob.data_length != sizeof(hw_auth_token_t)) {
447 LOG_E("Bug: Auth token is the wrong size (%d expected, %d found)", sizeof(hw_auth_token_t),
452 hw_auth_token_t auth_token;
453 memcpy(&auth_token, auth_token_blob.data, sizeof(hw_auth_token_t));
android_keymaster_test.cpp 73 virtual bool auth_token_timed_out(const hw_auth_token_t& /* token */,
78 virtual bool ValidateTokenSignature(const hw_auth_token_t& /* token */) const { return true; }
    [all...]
  /system/core/fingerprintd/
FingerprintDaemonProxy.cpp 135 if (tokenSize != sizeof(hw_auth_token_t) ) {
139 const hw_auth_token_t* authToken = reinterpret_cast<const hw_auth_token_t*>(token);
  /hardware/libhardware/modules/fingerprint/
fingerprint.c 41 const hw_auth_token_t __unused *hat,
  /system/vold/
KeyStorage.cpp 112 if (auth.token.size() != sizeof(hw_auth_token_t)) {
113 LOG(ERROR) << "Auth token should be " << sizeof(hw_auth_token_t) << " bytes, was "
117 const hw_auth_token_t* at = reinterpret_cast<const hw_auth_token_t*>(auth.token.data());
  /system/gatekeeper/tests/
gatekeeper_device_test.cpp 84 hw_auth_token_t *hat;
98 hat = reinterpret_cast<hw_auth_token_t *>(auth_token);
  /frameworks/base/services/core/jni/
com_android_server_fingerprint_FingerprintService.cpp 137 if (tokenSize != sizeof(hw_auth_token_t)) {
142 reinterpret_cast<const hw_auth_token_t*>(tokenData), groupId, timeout);
  /system/gatekeeper/
gatekeeper.cpp 222 hw_auth_token_t *token = new hw_auth_token_t;
  /device/generic/goldfish/fingerprint/
fingerprint.c 308 const hw_auth_token_t *hat,

Completed in 203 milliseconds