/system/core/gatekeeperd/tests/ |
gatekeeper_test.cpp | 83 hw_auth_token_t *auth_token = local 84 reinterpret_cast<hw_auth_token_t *>(response.auth_token.buffer.get()); 86 ASSERT_EQ((uint32_t) HW_AUTH_PASSWORD, ntohl(auth_token->authenticator_type)); 87 ASSERT_EQ((uint64_t) 1, auth_token->challenge); 88 ASSERT_NE(~((uint32_t) 0), auth_token->timestamp); 89 ASSERT_NE((uint64_t) 0, auth_token->user_id); 90 ASSERT_NE((uint64_t) 0, auth_token->authenticator_id); 118 hw_auth_token_t *auth_token = local 119 reinterpret_cast<hw_auth_token_t *>(response.auth_token.buffer.get()); 121 secure_id_t secure_id = auth_token->user_id 166 hw_auth_token_t *auth_token = local [all...] |
/system/gatekeeper/tests/ |
gatekeeper_device_test.cpp | 59 uint8_t *auth_token; local 71 password_payload, password_len, &auth_token, &auth_token_len, &should_reenroll); 82 uint8_t *auth_token; local 94 password_payload, password_len, &auth_token, &auth_token_len, &should_reenroll); 98 hat = reinterpret_cast<hw_auth_token_t *>(auth_token); 109 uint8_t *auth_token = NULL; local 126 password_payload, password_len, &auth_token, &auth_token_len, 129 ASSERT_EQ(NULL, auth_token); 143 password_payload, password_len, &auth_token, &auth_token_len, 154 uint8_t *auth_token = NULL local 179 uint8_t *auth_token = NULL; local [all...] |
/test/vts/utils/python/web/ |
dashboard_rest_client.py | 34 auth_token: ServiceAccountCredentials object or None if not 41 self.auth_token = None 50 self.auth_token = service_account.ServiceAccountCredentials.from_json_keyfile_name( 52 self.auth_token.get_access_token() 72 return str(self.auth_token.get_access_token().access_token)
|
/device/generic/goldfish/gatekeeper/ |
SoftGateKeeperDevice.cpp | 79 uint32_t provided_password_length, uint8_t **auth_token, uint32_t *auth_token_length, 104 if (auth_token != NULL && auth_token_length != NULL) { 105 *auth_token = response.auth_token.buffer.release(); 106 *auth_token_length = response.auth_token.length;
|
SoftGateKeeperDevice.h | 59 * On success, writes the address of a verification token to auth_token, 69 uint8_t **auth_token, uint32_t *auth_token_length, bool *request_reenroll);
|
module.cpp | 61 uint8_t **auth_token, uint32_t *auth_token_length, bool *request_reenroll) { 68 auth_token, auth_token_length, request_reenroll);
|
/system/core/gatekeeperd/ |
SoftGateKeeperDevice.cpp | 74 uint32_t provided_password_length, uint8_t **auth_token, uint32_t *auth_token_length, 99 if (auth_token != NULL && auth_token_length != NULL) { 100 *auth_token = response.auth_token.buffer.release(); 101 *auth_token_length = response.auth_token.length;
|
SoftGateKeeperDevice.h | 59 * On success, writes the address of a verification token to auth_token, 69 uint8_t **auth_token, uint32_t *auth_token_length, bool *request_reenroll);
|
gatekeeperd.cpp | 237 uint8_t *auth_token; local 241 &auth_token, &auth_token_length, request_reenroll); 247 uint8_t **auth_token, uint32_t *auth_token_length, bool *request_reenroll) { 273 [&ret, request_reenroll, auth_token, auth_token_length] 276 if (auth_token != nullptr && auth_token_length != nullptr && 278 *auth_token = new uint8_t[rsp.data.size()]; 280 memcpy(*auth_token, rsp.data.data(), *auth_token_length); 299 provided_password, provided_password_length, auth_token, auth_token_length, 310 provided_password, provided_password_length, auth_token, auth_token_length, 314 if (ret == 0 && *auth_token != NULL && *auth_token_length > 0) [all...] |
IGateKeeperService.h | 89 uint8_t **auth_token, uint32_t *auth_token_length, bool *request_reenroll) = 0;
|
/system/gatekeeper/ |
gatekeeper_messages.cpp | 194 VerifyResponse::VerifyResponse(uint32_t user_id, SizedBuffer *auth_token) { 196 this->auth_token.buffer.reset(auth_token->buffer.release()); 197 this->auth_token.length = auth_token->length; 203 memset_s(&auth_token, 0, sizeof(auth_token)); 207 if (auth_token.length > 0) { 208 auth_token.buffer.reset(); 212 void VerifyResponse::SetVerificationToken(SizedBuffer *auth_token) { [all...] |
gatekeeper.cpp | 155 SizedBuffer auth_token(auth_token_len); 156 memcpy(auth_token.buffer.get(), auth_token_buffer.get(), auth_token_len); 157 response->SetVerificationToken(&auth_token); 223 void GateKeeper::MintAuthToken(UniquePtr<uint8_t> *auth_token, uint32_t *length, 226 if (auth_token == NULL) return; 250 auth_token->reset(reinterpret_cast<uint8_t *>(token));
|
/external/autotest/client/common_lib/cros/tendo/ |
privet_helper.py | 130 auth_token='Privet anonymous', 137 @param auth_token: authorization token to be added as 'Authorization' 144 headers = {'Authorization': auth_token} 195 auth_token = '%s %s' % (auth['tokenType'], auth['accessToken']) 196 return auth_token 211 def setup_start(self, data, auth_token): 216 @param auth_token: string auth token returned from privet_auth() 224 auth_token=auth_token, tolerate_failure=True) 227 def wifi_setup_was_successful(self, ssid, auth_token) [all...] |
/external/webrtc/webrtc/libjingle/xmpp/ |
xmppauth.cc | 29 const std::string& auth_token) { 33 auth_token_ = auth_token;
|
prexmppauth.h | 56 const std::string& auth_token) = 0;
|
xmppauth.h | 33 const std::string& auth_token);
|
/hardware/interfaces/gatekeeper/1.0/vts/functional/ |
VtsHalGatekeeperV1_0TargetTest.cpp | 58 const hw_auth_token_t *auth_token = local 62 EXPECT_NE(nullptr, auth_token); 65 if (auth_token != nullptr && auth_token_size >= sizeof(*auth_token)) { 67 uint32_t auth_type = ntohl(auth_token->authenticator_type); 68 uint64_t auth_tstamp = ntohq(auth_token->timestamp); 72 EXPECT_EQ(HW_AUTH_TOKEN_VERSION, auth_token->version); 73 // EXPECT_NE(UINT64_C(0), auth_token->authenticator_id); 74 ALOGI("Authenticator ID: %016" PRIX64, auth_token->authenticator_id); 75 EXPECT_NE(UINT32_C(0), auth_token->user_id) 153 const hw_auth_token_t *auth_token = toAuthToken(rsp); local [all...] |
/system/keymaster/ |
keymaster_enforcement.cpp | 461 hw_auth_token_t auth_token; 462 memcpy(&auth_token, auth_token_blob.data, sizeof(hw_auth_token_t)); 463 if (auth_token.version != HW_AUTH_TOKEN_VERSION) { 465 auth_token.version, HW_AUTH_TOKEN_VERSION); 469 if (!ValidateTokenSignature(auth_token)) { 474 if (auth_timeout_index == -1 && op_handle && op_handle != auth_token.challenge) { 475 LOG_E("Auth token has the challenge %llu, need %llu", auth_token.challenge, op_handle); 479 if (user_secure_id != auth_token.user_id && user_secure_id != auth_token.authenticator_id) { 480 LOG_I("Auth token SIDs %llu and %llu do not match key SID %llu", auth_token.user_id [all...] |
/system/core/trusty/gatekeeper/ |
trusty_gatekeeper.cpp | 128 uint8_t **auth_token, uint32_t *auth_token_length, bool *request_reenroll) { 150 if (auth_token != NULL && auth_token_length != NULL) { 151 *auth_token = response.auth_token.buffer.release(); 152 *auth_token_length = response.auth_token.length; 220 uint32_t provided_password_length, uint8_t **auth_token, uint32_t *auth_token_length, 230 auth_token, auth_token_length, request_reenroll);
|
trusty_gatekeeper.h | 63 uint32_t provided_password_length, uint8_t **auth_token, uint32_t *auth_token_length, 105 * On success, writes the address of a verification token to auth_token, 115 uint8_t **auth_token, uint32_t *auth_token_length, bool *request_reenroll);
|
/system/gatekeeper/include/gatekeeper/ |
gatekeeper_messages.h | 156 VerifyResponse(uint32_t user_id, SizedBuffer *auth_token); 160 void SetVerificationToken(SizedBuffer *auth_token); 166 SizedBuffer auth_token; member in struct:gatekeeper::VerifyResponse
|
/system/security/keystore/ |
keymaster_enforcement.cpp | 287 case Tag::AUTH_TOKEN: 486 hw_auth_token_t auth_token; 487 memcpy(&auth_token, &auth_token_blob.value()[0], sizeof(hw_auth_token_t)); 488 if (auth_token.version != HW_AUTH_TOKEN_VERSION) { 490 auth_token.version, HW_AUTH_TOKEN_VERSION); 494 if (!ValidateTokenSignature(auth_token)) { 499 if (auth_timeout_index == -1 && op_handle && op_handle != auth_token.challenge) { 500 ALOGE("Auth token has the challenge %" PRIu64 ", need %" PRIu64, auth_token.challenge, 505 if (user_secure_id != auth_token.user_id && user_secure_id != auth_token.authenticator_id) [all...] |
/hardware/interfaces/gatekeeper/1.0/default/ |
Gatekeeper.cpp | 92 uint8_t *auth_token = nullptr; local 99 &auth_token, &auth_token_length, 102 rsp.data.setToExternal(auth_token, auth_token_length, true);
|
/hardware/libhardware/include/hardware/ |
gatekeeper.h | 103 * On success, writes the address of a verification token to auth_token, 125 * - auth_token: on success, a buffer containing the authentication token 126 * resulting from this verification is assigned to *auth_token. The caller 129 * token assigned to *auth_token will be assigned to *auth_token_length 144 uint8_t **auth_token, uint32_t *auth_token_length, bool *request_reenroll);
|
/external/owasp/sanitizer/tools/ |
googlecode_upload.py | 91 auth_token = base64.b64encode('%s:%s'% (user_name, password)) 93 'Authorization': 'Basic %s' % auth_token,
|