HomeSort by relevance Sort by last modified time
    Searched refs:provided_password (Results 1 - 12 of 12) sorted by null

  /system/core/gatekeeperd/tests/
gatekeeper_test.cpp 67 SizedBuffer provided_password; local
70 provided_password.buffer.reset(new uint8_t[16]);
71 provided_password.length = 16;
72 memset(provided_password.buffer.get(), 0, 16);
77 &provided_password);
96 SizedBuffer provided_password; local
101 provided_password.buffer.reset(new uint8_t[16]);
102 provided_password.length = 16;
103 memset(provided_password.buffer.get(), 0, 16);
115 &provided_password);
151 SizedBuffer provided_password; local
196 SizedBuffer provided_password; local
    [all...]
  /system/gatekeeper/
gatekeeper_messages.cpp 140 this->provided_password.buffer.reset(provided_password_payload->buffer.release());
141 this->provided_password.length = provided_password_payload->length;
146 memset_s(&provided_password, 0, sizeof(provided_password));
154 if (provided_password.buffer.get()) {
155 memset_s(provided_password.buffer.get(), 0, provided_password.length);
156 provided_password.buffer.reset();
162 + serialized_buffer_size(provided_password);
169 append_to_buffer(&buffer, &provided_password);
    [all...]
gatekeeper.cpp 28 if (!request.provided_password.buffer.get()) {
95 salt, user_id, flags, HANDLE_VERSION, request.provided_password.buffer.get(),
96 request.provided_password.length)) {
107 if (!request.provided_password.buffer.get() || !request.password_handle.buffer.get()) {
148 if (DoVerify(password_handle, request.provided_password)) {
  /system/gatekeeper/tests/
gatekeeper_messages_test.cpp 51 SizedBuffer *provided_password = make_buffer(password_size); local
54 EnrollRequest msg(USER_ID, NULL, provided_password, NULL);
65 deserialized_password = &deserialized_msg.provided_password;
68 ASSERT_EQ(0, memcmp(msg.provided_password.buffer.get(), deserialized_password->buffer.get(), password_size));
73 delete provided_password;
78 SizedBuffer *provided_password = make_buffer(password_size); local
83 EnrollRequest msg(USER_ID, &handle, provided_password, &enrolled);
94 deserialized_password = &deserialized_msg.provided_password;
97 ASSERT_EQ(0, memcmp(msg.provided_password.buffer.get(), deserialized_password->buffer.get(), password_size));
102 delete provided_password;
107 SizedBuffer *provided_password = make_buffer(password_size); local
166 SizedBuffer *provided_password = make_buffer(password_size), local
    [all...]
  /system/core/gatekeeperd/
SoftGateKeeperDevice.h 54 * Verifies provided_password matches enrolled_password_handle.
68 const uint8_t *provided_password, uint32_t provided_password_length,
IGateKeeperService.h 74 const uint8_t *provided_password, uint32_t provided_password_length,
87 const uint8_t *provided_password, uint32_t provided_password_length,
SoftGateKeeperDevice.cpp 73 uint32_t enrolled_password_handle_length, const uint8_t *provided_password,
78 provided_password == NULL) {
86 memcpy(provided_password_buffer.buffer.get(), provided_password, provided_password_length);
gatekeeperd.cpp 223 const uint8_t *provided_password, uint32_t provided_password_length, bool *request_reenroll) {
227 provided_password, provided_password_length,
233 const uint8_t *provided_password, uint32_t provided_password_length,
257 enteredPwd.setToExternal(const_cast<uint8_t*>(provided_password),
286 provided_password, provided_password_length, auth_token, auth_token_length,
297 provided_password, provided_password_length, auth_token, auth_token_length,
  /system/gatekeeper/include/gatekeeper/
gatekeeper_messages.h 152 SizedBuffer provided_password; member in struct:gatekeeper::VerifyRequest
172 SizedBuffer *provided_password, SizedBuffer *enrolled_password);
192 SizedBuffer provided_password; member in struct:gatekeeper::EnrollRequest
  /system/core/trusty/gatekeeper/
trusty_gatekeeper.h 50 * Verifies provided_password matches expected_password after enrolling
62 uint32_t enrolled_password_handle_length, const uint8_t *provided_password,
100 * Verifies provided_password matches enrolled_password_handle.
114 const uint8_t *provided_password, uint32_t provided_password_length,
trusty_gatekeeper.cpp 127 const uint8_t *provided_password, uint32_t provided_password_length,
137 memcpy(provided_password_buffer.buffer.get(), provided_password, provided_password_length);
219 uint32_t enrolled_password_handle_length, const uint8_t *provided_password,
224 provided_password == NULL) {
229 enrolled_password_handle_length, provided_password, provided_password_length,
  /hardware/libhardware/include/hardware/
gatekeeper.h 98 * Verifies provided_password matches enrolled_password_handle.
120 * - provided_password: the plaintext password to be verified against the
123 * provided_password
143 const uint8_t *provided_password, uint32_t provided_password_length,

Completed in 360 milliseconds