HomeSort by relevance Sort by last modified time
    Searched refs:auth_token (Results 1 - 25 of 39) sorted by null

1 2

  /system/core/gatekeeperd/tests/
gatekeeper_test.cpp 83 hw_auth_token_t *auth_token = local
84 reinterpret_cast<hw_auth_token_t *>(response.auth_token.buffer.get());
86 ASSERT_EQ((uint32_t) HW_AUTH_PASSWORD, ntohl(auth_token->authenticator_type));
87 ASSERT_EQ((uint64_t) 1, auth_token->challenge);
88 ASSERT_NE(~((uint32_t) 0), auth_token->timestamp);
89 ASSERT_NE((uint64_t) 0, auth_token->user_id);
90 ASSERT_NE((uint64_t) 0, auth_token->authenticator_id);
118 hw_auth_token_t *auth_token = local
119 reinterpret_cast<hw_auth_token_t *>(response.auth_token.buffer.get());
121 secure_id_t secure_id = auth_token->user_id
166 hw_auth_token_t *auth_token = local
    [all...]
  /system/gatekeeper/tests/
gatekeeper_device_test.cpp 59 uint8_t *auth_token; local
71 password_payload, password_len, &auth_token, &auth_token_len, &should_reenroll);
82 uint8_t *auth_token; local
94 password_payload, password_len, &auth_token, &auth_token_len, &should_reenroll);
98 hat = reinterpret_cast<hw_auth_token_t *>(auth_token);
109 uint8_t *auth_token = NULL; local
126 password_payload, password_len, &auth_token, &auth_token_len,
129 ASSERT_EQ(NULL, auth_token);
143 password_payload, password_len, &auth_token, &auth_token_len,
154 uint8_t *auth_token = NULL local
179 uint8_t *auth_token = NULL; local
    [all...]
  /test/vts/utils/python/web/
dashboard_rest_client.py 34 auth_token: ServiceAccountCredentials object or None if not
41 self.auth_token = None
50 self.auth_token = service_account.ServiceAccountCredentials.from_json_keyfile_name(
52 self.auth_token.get_access_token()
72 return str(self.auth_token.get_access_token().access_token)
  /device/generic/goldfish/gatekeeper/
SoftGateKeeperDevice.cpp 79 uint32_t provided_password_length, uint8_t **auth_token, uint32_t *auth_token_length,
104 if (auth_token != NULL && auth_token_length != NULL) {
105 *auth_token = response.auth_token.buffer.release();
106 *auth_token_length = response.auth_token.length;
SoftGateKeeperDevice.h 59 * On success, writes the address of a verification token to auth_token,
69 uint8_t **auth_token, uint32_t *auth_token_length, bool *request_reenroll);
module.cpp 61 uint8_t **auth_token, uint32_t *auth_token_length, bool *request_reenroll) {
68 auth_token, auth_token_length, request_reenroll);
  /system/core/gatekeeperd/
SoftGateKeeperDevice.cpp 74 uint32_t provided_password_length, uint8_t **auth_token, uint32_t *auth_token_length,
99 if (auth_token != NULL && auth_token_length != NULL) {
100 *auth_token = response.auth_token.buffer.release();
101 *auth_token_length = response.auth_token.length;
SoftGateKeeperDevice.h 59 * On success, writes the address of a verification token to auth_token,
69 uint8_t **auth_token, uint32_t *auth_token_length, bool *request_reenroll);
gatekeeperd.cpp 237 uint8_t *auth_token; local
241 &auth_token, &auth_token_length, request_reenroll);
247 uint8_t **auth_token, uint32_t *auth_token_length, bool *request_reenroll) {
273 [&ret, request_reenroll, auth_token, auth_token_length]
276 if (auth_token != nullptr && auth_token_length != nullptr &&
278 *auth_token = new uint8_t[rsp.data.size()];
280 memcpy(*auth_token, rsp.data.data(), *auth_token_length);
299 provided_password, provided_password_length, auth_token, auth_token_length,
310 provided_password, provided_password_length, auth_token, auth_token_length,
314 if (ret == 0 && *auth_token != NULL && *auth_token_length > 0)
    [all...]
IGateKeeperService.h 89 uint8_t **auth_token, uint32_t *auth_token_length, bool *request_reenroll) = 0;
  /system/gatekeeper/
gatekeeper_messages.cpp 194 VerifyResponse::VerifyResponse(uint32_t user_id, SizedBuffer *auth_token) {
196 this->auth_token.buffer.reset(auth_token->buffer.release());
197 this->auth_token.length = auth_token->length;
203 memset_s(&auth_token, 0, sizeof(auth_token));
207 if (auth_token.length > 0) {
208 auth_token.buffer.reset();
212 void VerifyResponse::SetVerificationToken(SizedBuffer *auth_token) {
    [all...]
gatekeeper.cpp 155 SizedBuffer auth_token(auth_token_len);
156 memcpy(auth_token.buffer.get(), auth_token_buffer.get(), auth_token_len);
157 response->SetVerificationToken(&auth_token);
223 void GateKeeper::MintAuthToken(UniquePtr<uint8_t> *auth_token, uint32_t *length,
226 if (auth_token == NULL) return;
250 auth_token->reset(reinterpret_cast<uint8_t *>(token));
  /external/autotest/client/common_lib/cros/tendo/
privet_helper.py 130 auth_token='Privet anonymous',
137 @param auth_token: authorization token to be added as 'Authorization'
144 headers = {'Authorization': auth_token}
195 auth_token = '%s %s' % (auth['tokenType'], auth['accessToken'])
196 return auth_token
211 def setup_start(self, data, auth_token):
216 @param auth_token: string auth token returned from privet_auth()
224 auth_token=auth_token, tolerate_failure=True)
227 def wifi_setup_was_successful(self, ssid, auth_token)
    [all...]
  /external/webrtc/webrtc/libjingle/xmpp/
xmppauth.cc 29 const std::string& auth_token) {
33 auth_token_ = auth_token;
prexmppauth.h 56 const std::string& auth_token) = 0;
xmppauth.h 33 const std::string& auth_token);
  /hardware/interfaces/gatekeeper/1.0/vts/functional/
VtsHalGatekeeperV1_0TargetTest.cpp 58 const hw_auth_token_t *auth_token = local
62 EXPECT_NE(nullptr, auth_token);
65 if (auth_token != nullptr && auth_token_size >= sizeof(*auth_token)) {
67 uint32_t auth_type = ntohl(auth_token->authenticator_type);
68 uint64_t auth_tstamp = ntohq(auth_token->timestamp);
72 EXPECT_EQ(HW_AUTH_TOKEN_VERSION, auth_token->version);
73 // EXPECT_NE(UINT64_C(0), auth_token->authenticator_id);
74 ALOGI("Authenticator ID: %016" PRIX64, auth_token->authenticator_id);
75 EXPECT_NE(UINT32_C(0), auth_token->user_id)
153 const hw_auth_token_t *auth_token = toAuthToken(rsp); local
    [all...]
  /system/keymaster/
keymaster_enforcement.cpp 461 hw_auth_token_t auth_token;
462 memcpy(&auth_token, auth_token_blob.data, sizeof(hw_auth_token_t));
463 if (auth_token.version != HW_AUTH_TOKEN_VERSION) {
465 auth_token.version, HW_AUTH_TOKEN_VERSION);
469 if (!ValidateTokenSignature(auth_token)) {
474 if (auth_timeout_index == -1 && op_handle && op_handle != auth_token.challenge) {
475 LOG_E("Auth token has the challenge %llu, need %llu", auth_token.challenge, op_handle);
479 if (user_secure_id != auth_token.user_id && user_secure_id != auth_token.authenticator_id) {
480 LOG_I("Auth token SIDs %llu and %llu do not match key SID %llu", auth_token.user_id
    [all...]
  /system/core/trusty/gatekeeper/
trusty_gatekeeper.cpp 128 uint8_t **auth_token, uint32_t *auth_token_length, bool *request_reenroll) {
150 if (auth_token != NULL && auth_token_length != NULL) {
151 *auth_token = response.auth_token.buffer.release();
152 *auth_token_length = response.auth_token.length;
220 uint32_t provided_password_length, uint8_t **auth_token, uint32_t *auth_token_length,
230 auth_token, auth_token_length, request_reenroll);
trusty_gatekeeper.h 63 uint32_t provided_password_length, uint8_t **auth_token, uint32_t *auth_token_length,
105 * On success, writes the address of a verification token to auth_token,
115 uint8_t **auth_token, uint32_t *auth_token_length, bool *request_reenroll);
  /system/gatekeeper/include/gatekeeper/
gatekeeper_messages.h 156 VerifyResponse(uint32_t user_id, SizedBuffer *auth_token);
160 void SetVerificationToken(SizedBuffer *auth_token);
166 SizedBuffer auth_token; member in struct:gatekeeper::VerifyResponse
  /system/security/keystore/
keymaster_enforcement.cpp 287 case Tag::AUTH_TOKEN:
486 hw_auth_token_t auth_token;
487 memcpy(&auth_token, &auth_token_blob.value()[0], sizeof(hw_auth_token_t));
488 if (auth_token.version != HW_AUTH_TOKEN_VERSION) {
490 auth_token.version, HW_AUTH_TOKEN_VERSION);
494 if (!ValidateTokenSignature(auth_token)) {
499 if (auth_timeout_index == -1 && op_handle && op_handle != auth_token.challenge) {
500 ALOGE("Auth token has the challenge %" PRIu64 ", need %" PRIu64, auth_token.challenge,
505 if (user_secure_id != auth_token.user_id && user_secure_id != auth_token.authenticator_id)
    [all...]
  /hardware/interfaces/gatekeeper/1.0/default/
Gatekeeper.cpp 92 uint8_t *auth_token = nullptr; local
99 &auth_token, &auth_token_length,
102 rsp.data.setToExternal(auth_token, auth_token_length, true);
  /hardware/libhardware/include/hardware/
gatekeeper.h 103 * On success, writes the address of a verification token to auth_token,
125 * - auth_token: on success, a buffer containing the authentication token
126 * resulting from this verification is assigned to *auth_token. The caller
129 * token assigned to *auth_token will be assigned to *auth_token_length
144 uint8_t **auth_token, uint32_t *auth_token_length, bool *request_reenroll);
  /external/owasp/sanitizer/tools/
googlecode_upload.py 91 auth_token = base64.b64encode('%s:%s'% (user_name, password))
93 'Authorization': 'Basic %s' % auth_token,

Completed in 843 milliseconds

1 2