/system/core/gatekeeperd/tests/ |
gatekeeper_test.cpp | 83 hw_auth_token_t *auth_token = local 84 reinterpret_cast<hw_auth_token_t *>(response.auth_token.buffer.get()); 86 ASSERT_EQ((uint32_t) HW_AUTH_PASSWORD, ntohl(auth_token->authenticator_type)); 87 ASSERT_EQ((uint64_t) 1, auth_token->challenge); 88 ASSERT_NE(~((uint32_t) 0), auth_token->timestamp); 89 ASSERT_NE((uint64_t) 0, auth_token->user_id); 90 ASSERT_NE((uint64_t) 0, auth_token->authenticator_id); 118 hw_auth_token_t *auth_token = local 119 reinterpret_cast<hw_auth_token_t *>(response.auth_token.buffer.get()); 121 secure_id_t secure_id = auth_token->user_id 166 hw_auth_token_t *auth_token = local [all...] |
/hardware/interfaces/gatekeeper/1.0/default/ |
Gatekeeper.cpp | 92 uint8_t *auth_token = nullptr; local 99 &auth_token, &auth_token_length, 102 rsp.data.setToExternal(auth_token, auth_token_length, true);
|
/system/gatekeeper/tests/ |
gatekeeper_device_test.cpp | 59 uint8_t *auth_token; local 71 password_payload, password_len, &auth_token, &auth_token_len, &should_reenroll); 82 uint8_t *auth_token; local 94 password_payload, password_len, &auth_token, &auth_token_len, &should_reenroll); 98 hat = reinterpret_cast<hw_auth_token_t *>(auth_token); 109 uint8_t *auth_token = NULL; local 126 password_payload, password_len, &auth_token, &auth_token_len, 129 ASSERT_EQ(NULL, auth_token); 143 password_payload, password_len, &auth_token, &auth_token_len, 154 uint8_t *auth_token = NULL local 179 uint8_t *auth_token = NULL; local [all...] |
gatekeeper_messages_test.cpp | 196 SizedBuffer *auth_token = make_buffer(password_size); local 199 VerifyResponse msg(USER_ID, auth_token); 211 deserialized_password = &deserialized_msg.auth_token; 213 ASSERT_EQ(0, memcmp(msg.auth_token.buffer.get(), deserialized_password->buffer.get(),
|
/system/gatekeeper/include/gatekeeper/ |
gatekeeper_messages.h | 156 VerifyResponse(uint32_t user_id, SizedBuffer *auth_token); 160 void SetVerificationToken(SizedBuffer *auth_token); 166 SizedBuffer auth_token; member in struct:gatekeeper::VerifyResponse
|
/external/webrtc/webrtc/libjingle/xmpp/ |
xmppclientsettings.h | 49 const std::string& auth_token() const { return auth_token_; } function in class:buzz::XmppUserSettings
|
/hardware/interfaces/gatekeeper/1.0/vts/functional/ |
VtsHalGatekeeperV1_0TargetTest.cpp | 58 const hw_auth_token_t *auth_token = local 62 EXPECT_NE(nullptr, auth_token); 65 if (auth_token != nullptr && auth_token_size >= sizeof(*auth_token)) { 67 uint32_t auth_type = ntohl(auth_token->authenticator_type); 68 uint64_t auth_tstamp = ntohq(auth_token->timestamp); 72 EXPECT_EQ(HW_AUTH_TOKEN_VERSION, auth_token->version); 73 // EXPECT_NE(UINT64_C(0), auth_token->authenticator_id); 74 ALOGI("Authenticator ID: %016" PRIX64, auth_token->authenticator_id); 75 EXPECT_NE(UINT32_C(0), auth_token->user_id) 153 const hw_auth_token_t *auth_token = toAuthToken(rsp); local [all...] |
/system/core/gatekeeperd/ |
gatekeeperd.cpp | 237 uint8_t *auth_token; local 241 &auth_token, &auth_token_length, request_reenroll); 247 uint8_t **auth_token, uint32_t *auth_token_length, bool *request_reenroll) { 273 [&ret, request_reenroll, auth_token, auth_token_length] 276 if (auth_token != nullptr && auth_token_length != nullptr && 278 *auth_token = new uint8_t[rsp.data.size()]; 280 memcpy(*auth_token, rsp.data.data(), *auth_token_length); 299 provided_password, provided_password_length, auth_token, auth_token_length, 310 provided_password, provided_password_length, auth_token, auth_token_length, 314 if (ret == 0 && *auth_token != NULL && *auth_token_length > 0) [all...] |