/system/security/keystore/ |
auth_token_table.h | 61 void AddAuthenticationToken(const hw_auth_token_t* token); 74 keymaster_operation_handle_t op_handle, const hw_auth_token_t** found); 88 const hw_auth_token_t** found) { 107 Entry(const hw_auth_token_t* token, time_t current_time); 132 const hw_auth_token_t* token() { return token_.get(); } 139 std::unique_ptr<const hw_auth_token_t> token_; 148 const hw_auth_token_t** found); 151 const AuthorizationSet& key_info, const hw_auth_token_t** found);
|
keystore_keymaster_enforcement.h | 75 bool auth_token_timed_out(const hw_auth_token_t&, uint32_t) const { 81 bool ValidateTokenSignature(const hw_auth_token_t&) const override {
|
operation.h | 62 bool getOperationAuthToken(sp<IBinder> token, const hw_auth_token_t** outToken); 63 bool setOperationAuthToken(sp<IBinder> token, const hw_auth_token_t* authToken); 81 std::unique_ptr<hw_auth_token_t> authToken;
|
auth_token_table.cpp | 52 void AuthTokenTable::AddAuthenticationToken(const hw_auth_token_t* auth_token) { 88 const hw_auth_token_t** found) { 106 keymaster_operation_handle_t op_handle, const hw_auth_token_t** found) { 126 const hw_auth_token_t** found) { 179 AuthTokenTable::Entry::Entry(const hw_auth_token_t* token, time_t current_time)
|
operation.cpp | 119 bool OperationMap::getOperationAuthToken(sp<IBinder> token, const hw_auth_token_t** outToken) { 128 bool OperationMap::setOperationAuthToken(sp<IBinder> token, const hw_auth_token_t* authToken) { 133 entry->second.authToken.reset(new hw_auth_token_t);
|
key_store_service.h | 195 const hw_auth_token_t** authToken, bool failOnTokenMissing = true); 197 void addAuthToParams(std::vector<keymaster_key_param_t>* params, const hw_auth_token_t* token);
|
key_store_service.cpp | 866 const hw_auth_token_t* authToken = NULL; [all...] |
/hardware/libhardware/include/hardware/ |
hw_auth_token.h | 47 } hw_auth_token_t; typedef in typeref:struct:__anon32171
|
fingerprint.h | 102 hw_auth_token_t hat; 173 int (*enroll)(struct fingerprint_device *dev, const hw_auth_token_t *hat,
|
/system/core/gatekeeperd/tests/ |
gatekeeper_test.cpp | 84 hw_auth_token_t *auth_token = 85 reinterpret_cast<hw_auth_token_t *>(response.auth_token.buffer.get()); 119 hw_auth_token_t *auth_token = 120 reinterpret_cast<hw_auth_token_t *>(response.auth_token.buffer.get()); 145 reinterpret_cast<hw_auth_token_t *>(response.auth_token.buffer.get())->user_id); 167 hw_auth_token_t *auth_token = 168 reinterpret_cast<hw_auth_token_t *>(response.auth_token.buffer.get()); 190 reinterpret_cast<hw_auth_token_t *>(response.auth_token.buffer.get())->user_id);
|
/system/keymaster/include/keymaster/ |
keymaster_enforcement.h | 107 // of hw_auth_token_t structs). 127 virtual bool auth_token_timed_out(const hw_auth_token_t& token, uint32_t timeout) const = 0; 144 virtual bool ValidateTokenSignature(const hw_auth_token_t& token) const = 0;
|
/system/security/keystore/tests/ |
auth_token_table_test.cpp | 26 inline bool operator==(const hw_auth_token_t& a, const hw_auth_token_t& b) { 69 static hw_auth_token_t* make_token(uint64_t rsid, uint64_t ssid = 0, uint64_t challenge = 0, 71 hw_auth_token_t* token = new hw_auth_token_t; 105 const hw_auth_token_t* found; 134 const hw_auth_token_t* found; 153 const hw_auth_token_t* found; 225 const hw_auth_token_t* found; 235 const hw_auth_token_t* found [all...] |
/system/keymaster/ |
keymaster_enforcement_test.cpp | 54 bool auth_token_timed_out(const hw_auth_token_t& token, uint32_t timeout) const { 57 bool ValidateTokenSignature(const hw_auth_token_t&) const override { 520 hw_auth_token_t token; 543 hw_auth_token_t token; 572 hw_auth_token_t token; 596 hw_auth_token_t token; 623 hw_auth_token_t token; 652 hw_auth_token_t token; 681 hw_auth_token_t token; 704 hw_auth_token_t token [all...] |
keymaster_enforcement.cpp | 446 if (auth_token_blob.data_length != sizeof(hw_auth_token_t)) { 447 LOG_E("Bug: Auth token is the wrong size (%d expected, %d found)", sizeof(hw_auth_token_t), 452 hw_auth_token_t auth_token; 453 memcpy(&auth_token, auth_token_blob.data, sizeof(hw_auth_token_t));
|
android_keymaster_test.cpp | 73 virtual bool auth_token_timed_out(const hw_auth_token_t& /* token */, 78 virtual bool ValidateTokenSignature(const hw_auth_token_t& /* token */) const { return true; } [all...] |
/system/core/fingerprintd/ |
FingerprintDaemonProxy.cpp | 135 if (tokenSize != sizeof(hw_auth_token_t) ) { 139 const hw_auth_token_t* authToken = reinterpret_cast<const hw_auth_token_t*>(token);
|
/hardware/libhardware/modules/fingerprint/ |
fingerprint.c | 41 const hw_auth_token_t __unused *hat,
|
/system/vold/ |
KeyStorage.cpp | 112 if (auth.token.size() != sizeof(hw_auth_token_t)) { 113 LOG(ERROR) << "Auth token should be " << sizeof(hw_auth_token_t) << " bytes, was " 117 const hw_auth_token_t* at = reinterpret_cast<const hw_auth_token_t*>(auth.token.data());
|
/system/gatekeeper/tests/ |
gatekeeper_device_test.cpp | 84 hw_auth_token_t *hat; 98 hat = reinterpret_cast<hw_auth_token_t *>(auth_token);
|
/frameworks/base/services/core/jni/ |
com_android_server_fingerprint_FingerprintService.cpp | 137 if (tokenSize != sizeof(hw_auth_token_t)) { 142 reinterpret_cast<const hw_auth_token_t*>(tokenData), groupId, timeout);
|
/system/gatekeeper/ |
gatekeeper.cpp | 222 hw_auth_token_t *token = new hw_auth_token_t;
|
/device/generic/goldfish/fingerprint/ |
fingerprint.c | 308 const hw_auth_token_t *hat,
|