HomeSort by relevance Sort by last modified time
    Searched refs:hw_auth_token_t (Results 1 - 22 of 22) sorted by null

  /hardware/libhardware/include/hardware/
hw_auth_token.h 47 } hw_auth_token_t; typedef in typeref:struct:__anon43187
fingerprint.h 106 hw_auth_token_t hat;
177 int (*enroll)(struct fingerprint_device *dev, const hw_auth_token_t *hat,
  /system/security/keystore/
keystore_keymaster_enforcement.h 76 bool auth_token_timed_out(const hw_auth_token_t&, uint32_t) const {
82 bool ValidateTokenSignature(const hw_auth_token_t&) const override {
keymaster_enforcement.h 104 // of hw_auth_token_t structs).
124 virtual bool auth_token_timed_out(const hw_auth_token_t& token, uint32_t timeout) const = 0;
141 virtual bool ValidateTokenSignature(const hw_auth_token_t& token) const = 0;
keymaster_enforcement.cpp 480 if (auth_token_blob.value().size() != sizeof(hw_auth_token_t)) {
482 sizeof(hw_auth_token_t), auth_token_blob.value().size());
486 hw_auth_token_t auth_token;
487 memcpy(&auth_token, &auth_token_blob.value()[0], sizeof(hw_auth_token_t));
key_store_service.cpp     [all...]
  /system/core/gatekeeperd/tests/
gatekeeper_test.cpp 83 hw_auth_token_t *auth_token =
84 reinterpret_cast<hw_auth_token_t *>(response.auth_token.buffer.get());
118 hw_auth_token_t *auth_token =
119 reinterpret_cast<hw_auth_token_t *>(response.auth_token.buffer.get());
144 reinterpret_cast<hw_auth_token_t *>(response.auth_token.buffer.get())->user_id);
166 hw_auth_token_t *auth_token =
167 reinterpret_cast<hw_auth_token_t *>(response.auth_token.buffer.get());
189 reinterpret_cast<hw_auth_token_t *>(response.auth_token.buffer.get())->user_id);
  /system/keymaster/include/keymaster/
keymaster_enforcement.h 107 // of hw_auth_token_t structs).
127 virtual bool auth_token_timed_out(const hw_auth_token_t& token, uint32_t timeout) const = 0;
144 virtual bool ValidateTokenSignature(const hw_auth_token_t& token) const = 0;
  /system/security/keystore/tests/
auth_token_table_test.cpp 26 inline bool operator==(const hw_auth_token_t& a, const hw_auth_token_t& b) {
69 static hw_auth_token_t* make_token(uint64_t rsid, uint64_t ssid = 0, uint64_t challenge = 0,
71 hw_auth_token_t* token = new hw_auth_token_t;
105 const hw_auth_token_t* found;
134 const hw_auth_token_t* found;
153 const hw_auth_token_t* found;
225 const hw_auth_token_t* found;
235 const hw_auth_token_t* found
    [all...]
  /hardware/interfaces/gatekeeper/1.0/vts/functional/
VtsHalGatekeeperV1_0TargetTest.cpp 57 static const hw_auth_token_t *toAuthToken(GatekeeperResponse &rsp) {
58 const hw_auth_token_t *auth_token =
59 reinterpret_cast<hw_auth_token_t *>(rsp.data.data());
63 EXPECT_EQ(sizeof(hw_auth_token_t), auth_token_size);
153 const hw_auth_token_t *auth_token = toAuthToken(rsp);
272 const hw_auth_token_t *first = toAuthToken(verifyRsp);
273 const hw_auth_token_t *second = toAuthToken(reenrollVerifyRsp);
303 const hw_auth_token_t *first = toAuthToken(verifyRsp);
304 const hw_auth_token_t *second = toAuthToken(reenrollVerifyRsp);
  /system/keymaster/
keymaster_enforcement_test.cpp 54 bool auth_token_timed_out(const hw_auth_token_t& token, uint32_t timeout) const {
57 bool ValidateTokenSignature(const hw_auth_token_t&) const override {
520 hw_auth_token_t token;
543 hw_auth_token_t token;
572 hw_auth_token_t token;
596 hw_auth_token_t token;
623 hw_auth_token_t token;
652 hw_auth_token_t token;
681 hw_auth_token_t token;
704 hw_auth_token_t token
    [all...]
keymaster_enforcement.cpp 455 if (auth_token_blob.data_length != sizeof(hw_auth_token_t)) {
456 LOG_E("Bug: Auth token is the wrong size (%d expected, %d found)", sizeof(hw_auth_token_t),
461 hw_auth_token_t auth_token;
462 memcpy(&auth_token, auth_token_blob.data, sizeof(hw_auth_token_t));
android_keymaster_test.cpp 74 virtual bool auth_token_timed_out(const hw_auth_token_t& /* token */,
79 virtual bool ValidateTokenSignature(const hw_auth_token_t& /* token */) const { return true; }
    [all...]
  /system/security/keystore/include/keystore/
keystore_hidl_support.h 107 == sizeof(hw_auth_token_t),
108 "HardwareAuthToken content size does not match hw_auth_token_t size");
111 result.resize(sizeof(hw_auth_token_t));
  /hardware/libhardware/modules/fingerprint/
fingerprint.c 44 const hw_auth_token_t __unused *hat,
  /system/gatekeeper/tests/
gatekeeper_device_test.cpp 84 hw_auth_token_t *hat;
98 hat = reinterpret_cast<hw_auth_token_t *>(auth_token);
  /system/vold/
KeyStorage.cpp 121 if (auth.token.size() != sizeof(hw_auth_token_t)) {
122 LOG(ERROR) << "Auth token should be " << sizeof(hw_auth_token_t) << " bytes, was "
126 const hw_auth_token_t* at = reinterpret_cast<const hw_auth_token_t*>(auth.token.data());
  /frameworks/base/services/core/jni/
com_android_server_fingerprint_FingerprintService.cpp 137 if (tokenSize != sizeof(hw_auth_token_t)) {
142 reinterpret_cast<const hw_auth_token_t*>(tokenData), groupId, timeout);
  /hardware/interfaces/biometrics/fingerprint/2.1/default/
BiometricsFingerprint.cpp 163 const hw_auth_token_t* authToken =
164 reinterpret_cast<const hw_auth_token_t*>(hat.data());
  /system/gatekeeper/
gatekeeper.cpp 228 hw_auth_token_t *token = new hw_auth_token_t;
  /hardware/interfaces/keymaster/3.0/default/
KeymasterDevice.cpp 49 bool auth_token_timed_out(const hw_auth_token_t&, uint32_t) const override { return false; }
50 bool ValidateTokenSignature(const hw_auth_token_t&) const override { return true; }
  /device/generic/goldfish/fingerprint/
fingerprint.c 308 const hw_auth_token_t *hat,

Completed in 3578 milliseconds