HomeSort by relevance Sort by last modified time
    Searched defs:auth_token (Results 1 - 8 of 8) sorted by null

  /system/core/gatekeeperd/tests/
gatekeeper_test.cpp 83 hw_auth_token_t *auth_token = local
84 reinterpret_cast<hw_auth_token_t *>(response.auth_token.buffer.get());
86 ASSERT_EQ((uint32_t) HW_AUTH_PASSWORD, ntohl(auth_token->authenticator_type));
87 ASSERT_EQ((uint64_t) 1, auth_token->challenge);
88 ASSERT_NE(~((uint32_t) 0), auth_token->timestamp);
89 ASSERT_NE((uint64_t) 0, auth_token->user_id);
90 ASSERT_NE((uint64_t) 0, auth_token->authenticator_id);
118 hw_auth_token_t *auth_token = local
119 reinterpret_cast<hw_auth_token_t *>(response.auth_token.buffer.get());
121 secure_id_t secure_id = auth_token->user_id
166 hw_auth_token_t *auth_token = local
    [all...]
  /hardware/interfaces/gatekeeper/1.0/default/
Gatekeeper.cpp 92 uint8_t *auth_token = nullptr; local
99 &auth_token, &auth_token_length,
102 rsp.data.setToExternal(auth_token, auth_token_length, true);
  /system/gatekeeper/tests/
gatekeeper_device_test.cpp 59 uint8_t *auth_token; local
71 password_payload, password_len, &auth_token, &auth_token_len, &should_reenroll);
82 uint8_t *auth_token; local
94 password_payload, password_len, &auth_token, &auth_token_len, &should_reenroll);
98 hat = reinterpret_cast<hw_auth_token_t *>(auth_token);
109 uint8_t *auth_token = NULL; local
126 password_payload, password_len, &auth_token, &auth_token_len,
129 ASSERT_EQ(NULL, auth_token);
143 password_payload, password_len, &auth_token, &auth_token_len,
154 uint8_t *auth_token = NULL local
179 uint8_t *auth_token = NULL; local
    [all...]
gatekeeper_messages_test.cpp 196 SizedBuffer *auth_token = make_buffer(password_size); local
199 VerifyResponse msg(USER_ID, auth_token);
211 deserialized_password = &deserialized_msg.auth_token;
213 ASSERT_EQ(0, memcmp(msg.auth_token.buffer.get(), deserialized_password->buffer.get(),
  /system/gatekeeper/include/gatekeeper/
gatekeeper_messages.h 156 VerifyResponse(uint32_t user_id, SizedBuffer *auth_token);
160 void SetVerificationToken(SizedBuffer *auth_token);
166 SizedBuffer auth_token; member in struct:gatekeeper::VerifyResponse
  /external/webrtc/webrtc/libjingle/xmpp/
xmppclientsettings.h 49 const std::string& auth_token() const { return auth_token_; } function in class:buzz::XmppUserSettings
  /hardware/interfaces/gatekeeper/1.0/vts/functional/
VtsHalGatekeeperV1_0TargetTest.cpp 58 const hw_auth_token_t *auth_token = local
62 EXPECT_NE(nullptr, auth_token);
65 if (auth_token != nullptr && auth_token_size >= sizeof(*auth_token)) {
67 uint32_t auth_type = ntohl(auth_token->authenticator_type);
68 uint64_t auth_tstamp = ntohq(auth_token->timestamp);
72 EXPECT_EQ(HW_AUTH_TOKEN_VERSION, auth_token->version);
73 // EXPECT_NE(UINT64_C(0), auth_token->authenticator_id);
74 ALOGI("Authenticator ID: %016" PRIX64, auth_token->authenticator_id);
75 EXPECT_NE(UINT32_C(0), auth_token->user_id)
153 const hw_auth_token_t *auth_token = toAuthToken(rsp); local
    [all...]
  /system/core/gatekeeperd/
gatekeeperd.cpp 237 uint8_t *auth_token; local
241 &auth_token, &auth_token_length, request_reenroll);
247 uint8_t **auth_token, uint32_t *auth_token_length, bool *request_reenroll) {
273 [&ret, request_reenroll, auth_token, auth_token_length]
276 if (auth_token != nullptr && auth_token_length != nullptr &&
278 *auth_token = new uint8_t[rsp.data.size()];
280 memcpy(*auth_token, rsp.data.data(), *auth_token_length);
299 provided_password, provided_password_length, auth_token, auth_token_length,
310 provided_password, provided_password_length, auth_token, auth_token_length,
314 if (ret == 0 && *auth_token != NULL && *auth_token_length > 0)
    [all...]

Completed in 395 milliseconds