/system/core/gatekeeperd/tests/ |
gatekeeper_test.cpp | 66 SizedBuffer provided_password; local 69 provided_password.buffer.reset(new uint8_t[16]); 70 provided_password.length = 16; 71 memset(provided_password.buffer.get(), 0, 16); 76 &provided_password); 95 SizedBuffer provided_password; local 100 provided_password.buffer.reset(new uint8_t[16]); 101 provided_password.length = 16; 102 memset(provided_password.buffer.get(), 0, 16); 114 &provided_password); 150 SizedBuffer provided_password; local 195 SizedBuffer provided_password; local [all...] |
/system/gatekeeper/ |
gatekeeper_messages.cpp | 140 this->provided_password.buffer.reset(provided_password_payload->buffer.release()); 141 this->provided_password.length = provided_password_payload->length; 146 memset_s(&provided_password, 0, sizeof(provided_password)); 154 if (provided_password.buffer.get()) { 155 memset_s(provided_password.buffer.get(), 0, provided_password.length); 156 provided_password.buffer.reset(); 162 + serialized_buffer_size(provided_password); 169 append_to_buffer(&buffer, &provided_password); [all...] |
gatekeeper.cpp | 28 if (!request.provided_password.buffer.get()) { 95 salt, user_id, flags, HANDLE_VERSION, request.provided_password.buffer.get(), 96 request.provided_password.length)) { 107 if (!request.provided_password.buffer.get() || !request.password_handle.buffer.get()) { 148 if (DoVerify(password_handle, request.provided_password)) {
|
/system/gatekeeper/tests/ |
gatekeeper_messages_test.cpp | 51 SizedBuffer *provided_password = make_buffer(password_size); local 54 EnrollRequest msg(USER_ID, NULL, provided_password, NULL); 65 deserialized_password = &deserialized_msg.provided_password; 68 ASSERT_EQ(0, memcmp(msg.provided_password.buffer.get(), deserialized_password->buffer.get(), password_size)); 73 delete provided_password; 78 SizedBuffer *provided_password = make_buffer(password_size); local 83 EnrollRequest msg(USER_ID, &handle, provided_password, &enrolled); 94 deserialized_password = &deserialized_msg.provided_password; 97 ASSERT_EQ(0, memcmp(msg.provided_password.buffer.get(), deserialized_password->buffer.get(), password_size)); 102 delete provided_password; 107 SizedBuffer *provided_password = make_buffer(password_size); local 166 SizedBuffer *provided_password = make_buffer(password_size), local [all...] |
/device/generic/goldfish/gatekeeper/ |
SoftGateKeeperDevice.h | 54 * Verifies provided_password matches enrolled_password_handle. 68 const uint8_t *provided_password, uint32_t provided_password_length,
|
SoftGateKeeperDevice.cpp | 78 uint32_t enrolled_password_handle_length, const uint8_t *provided_password, 83 provided_password == NULL) { 91 memcpy(provided_password_buffer.buffer.get(), provided_password, provided_password_length);
|
module.cpp | 60 const uint8_t *provided_password, uint32_t provided_password_length, 67 provided_password, provided_password_length,
|
/system/core/gatekeeperd/ |
SoftGateKeeperDevice.h | 54 * Verifies provided_password matches enrolled_password_handle. 68 const uint8_t *provided_password, uint32_t provided_password_length,
|
IGateKeeperService.h | 75 const uint8_t *provided_password, uint32_t provided_password_length, 88 const uint8_t *provided_password, uint32_t provided_password_length,
|
SoftGateKeeperDevice.cpp | 73 uint32_t enrolled_password_handle_length, const uint8_t *provided_password, 78 provided_password == NULL) { 86 memcpy(provided_password_buffer.buffer.get(), provided_password, provided_password_length);
|
gatekeeperd.cpp | 236 const uint8_t *provided_password, uint32_t provided_password_length, bool *request_reenroll) { 240 provided_password, provided_password_length, 246 const uint8_t *provided_password, uint32_t provided_password_length, 270 enteredPwd.setToExternal(const_cast<uint8_t*>(provided_password), 299 provided_password, provided_password_length, auth_token, auth_token_length, 310 provided_password, provided_password_length, auth_token, auth_token_length,
|
/system/gatekeeper/include/gatekeeper/ |
gatekeeper_messages.h | 152 SizedBuffer provided_password; member in struct:gatekeeper::VerifyRequest 172 SizedBuffer *provided_password, SizedBuffer *enrolled_password); 192 SizedBuffer provided_password; member in struct:gatekeeper::EnrollRequest
|
/system/core/trusty/gatekeeper/ |
trusty_gatekeeper.h | 50 * Verifies provided_password matches expected_password after enrolling 62 uint32_t enrolled_password_handle_length, const uint8_t *provided_password, 100 * Verifies provided_password matches enrolled_password_handle. 114 const uint8_t *provided_password, uint32_t provided_password_length,
|
trusty_gatekeeper.cpp | 127 const uint8_t *provided_password, uint32_t provided_password_length, 137 memcpy(provided_password_buffer.buffer.get(), provided_password, provided_password_length); 219 uint32_t enrolled_password_handle_length, const uint8_t *provided_password, 224 provided_password == NULL) { 229 enrolled_password_handle_length, provided_password, provided_password_length,
|
/hardware/libhardware/include/hardware/ |
gatekeeper.h | 98 * Verifies provided_password matches enrolled_password_handle. 120 * - provided_password: the plaintext password to be verified against the 123 * provided_password 143 const uint8_t *provided_password, uint32_t provided_password_length,
|