/hardware/libhardware/include/hardware/ |
hw_auth_token.h | 47 } hw_auth_token_t; typedef in typeref:struct:__anon43187
|
fingerprint.h | 106 hw_auth_token_t hat; 177 int (*enroll)(struct fingerprint_device *dev, const hw_auth_token_t *hat,
|
/system/security/keystore/ |
keystore_keymaster_enforcement.h | 76 bool auth_token_timed_out(const hw_auth_token_t&, uint32_t) const { 82 bool ValidateTokenSignature(const hw_auth_token_t&) const override {
|
keymaster_enforcement.h | 104 // of hw_auth_token_t structs). 124 virtual bool auth_token_timed_out(const hw_auth_token_t& token, uint32_t timeout) const = 0; 141 virtual bool ValidateTokenSignature(const hw_auth_token_t& token) const = 0;
|
keymaster_enforcement.cpp | 480 if (auth_token_blob.value().size() != sizeof(hw_auth_token_t)) { 482 sizeof(hw_auth_token_t), auth_token_blob.value().size()); 486 hw_auth_token_t auth_token; 487 memcpy(&auth_token, &auth_token_blob.value()[0], sizeof(hw_auth_token_t));
|
key_store_service.cpp | [all...] |
/system/core/gatekeeperd/tests/ |
gatekeeper_test.cpp | 83 hw_auth_token_t *auth_token = 84 reinterpret_cast<hw_auth_token_t *>(response.auth_token.buffer.get()); 118 hw_auth_token_t *auth_token = 119 reinterpret_cast<hw_auth_token_t *>(response.auth_token.buffer.get()); 144 reinterpret_cast<hw_auth_token_t *>(response.auth_token.buffer.get())->user_id); 166 hw_auth_token_t *auth_token = 167 reinterpret_cast<hw_auth_token_t *>(response.auth_token.buffer.get()); 189 reinterpret_cast<hw_auth_token_t *>(response.auth_token.buffer.get())->user_id);
|
/system/keymaster/include/keymaster/ |
keymaster_enforcement.h | 107 // of hw_auth_token_t structs). 127 virtual bool auth_token_timed_out(const hw_auth_token_t& token, uint32_t timeout) const = 0; 144 virtual bool ValidateTokenSignature(const hw_auth_token_t& token) const = 0;
|
/system/security/keystore/tests/ |
auth_token_table_test.cpp | 26 inline bool operator==(const hw_auth_token_t& a, const hw_auth_token_t& b) { 69 static hw_auth_token_t* make_token(uint64_t rsid, uint64_t ssid = 0, uint64_t challenge = 0, 71 hw_auth_token_t* token = new hw_auth_token_t; 105 const hw_auth_token_t* found; 134 const hw_auth_token_t* found; 153 const hw_auth_token_t* found; 225 const hw_auth_token_t* found; 235 const hw_auth_token_t* found [all...] |
/hardware/interfaces/gatekeeper/1.0/vts/functional/ |
VtsHalGatekeeperV1_0TargetTest.cpp | 57 static const hw_auth_token_t *toAuthToken(GatekeeperResponse &rsp) { 58 const hw_auth_token_t *auth_token = 59 reinterpret_cast<hw_auth_token_t *>(rsp.data.data()); 63 EXPECT_EQ(sizeof(hw_auth_token_t), auth_token_size); 153 const hw_auth_token_t *auth_token = toAuthToken(rsp); 272 const hw_auth_token_t *first = toAuthToken(verifyRsp); 273 const hw_auth_token_t *second = toAuthToken(reenrollVerifyRsp); 303 const hw_auth_token_t *first = toAuthToken(verifyRsp); 304 const hw_auth_token_t *second = toAuthToken(reenrollVerifyRsp);
|
/system/keymaster/ |
keymaster_enforcement_test.cpp | 54 bool auth_token_timed_out(const hw_auth_token_t& token, uint32_t timeout) const { 57 bool ValidateTokenSignature(const hw_auth_token_t&) const override { 520 hw_auth_token_t token; 543 hw_auth_token_t token; 572 hw_auth_token_t token; 596 hw_auth_token_t token; 623 hw_auth_token_t token; 652 hw_auth_token_t token; 681 hw_auth_token_t token; 704 hw_auth_token_t token [all...] |
keymaster_enforcement.cpp | 455 if (auth_token_blob.data_length != sizeof(hw_auth_token_t)) { 456 LOG_E("Bug: Auth token is the wrong size (%d expected, %d found)", sizeof(hw_auth_token_t), 461 hw_auth_token_t auth_token; 462 memcpy(&auth_token, auth_token_blob.data, sizeof(hw_auth_token_t));
|
android_keymaster_test.cpp | 74 virtual bool auth_token_timed_out(const hw_auth_token_t& /* token */, 79 virtual bool ValidateTokenSignature(const hw_auth_token_t& /* token */) const { return true; } [all...] |
/system/security/keystore/include/keystore/ |
keystore_hidl_support.h | 107 == sizeof(hw_auth_token_t), 108 "HardwareAuthToken content size does not match hw_auth_token_t size"); 111 result.resize(sizeof(hw_auth_token_t));
|
/hardware/libhardware/modules/fingerprint/ |
fingerprint.c | 44 const hw_auth_token_t __unused *hat,
|
/system/gatekeeper/tests/ |
gatekeeper_device_test.cpp | 84 hw_auth_token_t *hat; 98 hat = reinterpret_cast<hw_auth_token_t *>(auth_token);
|
/system/vold/ |
KeyStorage.cpp | 121 if (auth.token.size() != sizeof(hw_auth_token_t)) { 122 LOG(ERROR) << "Auth token should be " << sizeof(hw_auth_token_t) << " bytes, was " 126 const hw_auth_token_t* at = reinterpret_cast<const hw_auth_token_t*>(auth.token.data());
|
/frameworks/base/services/core/jni/ |
com_android_server_fingerprint_FingerprintService.cpp | 137 if (tokenSize != sizeof(hw_auth_token_t)) { 142 reinterpret_cast<const hw_auth_token_t*>(tokenData), groupId, timeout);
|
/hardware/interfaces/biometrics/fingerprint/2.1/default/ |
BiometricsFingerprint.cpp | 163 const hw_auth_token_t* authToken = 164 reinterpret_cast<const hw_auth_token_t*>(hat.data());
|
/system/gatekeeper/ |
gatekeeper.cpp | 228 hw_auth_token_t *token = new hw_auth_token_t;
|
/hardware/interfaces/keymaster/3.0/default/ |
KeymasterDevice.cpp | 49 bool auth_token_timed_out(const hw_auth_token_t&, uint32_t) const override { return false; } 50 bool ValidateTokenSignature(const hw_auth_token_t&) const override { return true; }
|
/device/generic/goldfish/fingerprint/ |
fingerprint.c | 308 const hw_auth_token_t *hat,
|