/device/generic/goldfish/gatekeeper/ |
SoftGateKeeperDevice.cpp | 25 uint8_t **enrolled_password_handle, uint32_t *enrolled_password_handle_length) { 27 if (enrolled_password_handle == NULL || enrolled_password_handle_length == NULL || 66 *enrolled_password_handle = response.enrolled_password_handle.buffer.release(); 68 reinterpret_cast<gatekeeper::password_handle_t *>(*enrolled_password_handle); 72 *enrolled_password_handle_length = response.enrolled_password_handle.length; 77 uint64_t challenge, const uint8_t *enrolled_password_handle, 82 if (enrolled_password_handle == NULL || 88 memcpy(password_handle_buffer.buffer.get(), enrolled_password_handle,
|
SoftGateKeeperDevice.h | 45 * On error, enrolled_password_handle will not be allocated. 51 uint8_t **enrolled_password_handle, uint32_t *enrolled_password_handle_length); 54 * Verifies provided_password matches enrolled_password_handle. 67 const uint8_t *enrolled_password_handle, uint32_t enrolled_password_handle_length,
|
module.cpp | 42 uint8_t **enrolled_password_handle, uint32_t *enrolled_password_handle_length) { 55 enrolled_password_handle, enrolled_password_handle_length); 59 const uint8_t *enrolled_password_handle, uint32_t enrolled_password_handle_length, 66 enrolled_password_handle, enrolled_password_handle_length,
|
/device/google/cuttlefish_common/guest/hals/gatekeeper/ |
SoftGateKeeperDevice.cpp | 25 uint8_t **enrolled_password_handle, uint32_t *enrolled_password_handle_length) { 27 if (enrolled_password_handle == NULL || enrolled_password_handle_length == NULL || 66 *enrolled_password_handle = response.enrolled_password_handle.buffer.release(); 68 reinterpret_cast<gatekeeper::password_handle_t *>(*enrolled_password_handle); 72 *enrolled_password_handle_length = response.enrolled_password_handle.length; 77 uint64_t challenge, const uint8_t *enrolled_password_handle, 82 if (enrolled_password_handle == NULL || 88 memcpy(password_handle_buffer.buffer.get(), enrolled_password_handle,
|
SoftGateKeeperDevice.h | 45 * On error, enrolled_password_handle will not be allocated. 51 uint8_t **enrolled_password_handle, uint32_t *enrolled_password_handle_length); 54 * Verifies provided_password matches enrolled_password_handle. 67 const uint8_t *enrolled_password_handle, uint32_t enrolled_password_handle_length,
|
module.cpp | 42 uint8_t **enrolled_password_handle, uint32_t *enrolled_password_handle_length) { 55 enrolled_password_handle, enrolled_password_handle_length); 59 const uint8_t *enrolled_password_handle, uint32_t enrolled_password_handle_length, 66 enrolled_password_handle, enrolled_password_handle_length,
|
/system/core/gatekeeperd/ |
SoftGateKeeperDevice.cpp | 25 uint8_t **enrolled_password_handle, uint32_t *enrolled_password_handle_length) { 27 if (enrolled_password_handle == NULL || enrolled_password_handle_length == NULL || 66 *enrolled_password_handle = response.enrolled_password_handle.buffer.release(); 67 *enrolled_password_handle_length = response.enrolled_password_handle.length; 72 uint64_t challenge, const uint8_t *enrolled_password_handle, 77 if (enrolled_password_handle == NULL || 83 memcpy(password_handle_buffer.buffer.get(), enrolled_password_handle,
|
SoftGateKeeperDevice.h | 45 * On error, enrolled_password_handle will not be allocated. 51 uint8_t **enrolled_password_handle, uint32_t *enrolled_password_handle_length); 54 * Verifies provided_password matches enrolled_password_handle. 67 const uint8_t *enrolled_password_handle, uint32_t enrolled_password_handle_length,
|
gatekeeperd.cpp | 145 uint8_t **enrolled_password_handle, uint32_t *enrolled_password_handle_length) { 185 [&ret, enrolled_password_handle, enrolled_password_handle_length] 189 if (enrolled_password_handle != nullptr && 191 *enrolled_password_handle = new uint8_t[rsp.data.size()]; 193 memcpy(*enrolled_password_handle, rsp.data.data(), 210 enrolled_password_handle, enrolled_password_handle_length); 213 if (ret == GATEKEEPER_RESPONSE_OK && (*enrolled_password_handle == nullptr || 217 *enrolled_password_handle, *enrolled_password_handle_length); 222 reinterpret_cast<gatekeeper::password_handle_t *>(*enrolled_password_handle); 228 verify(uid, *enrolled_password_handle, sizeof(password_handle_t), desired_password [all...] |
IGateKeeperService.h | 63 uint8_t **enrolled_password_handle, uint32_t *enrolled_password_handle_length) = 0; 73 virtual int verify(uint32_t uid, const uint8_t *enrolled_password_handle, 87 const uint8_t *enrolled_password_handle, uint32_t enrolled_password_handle_length,
|
/system/gatekeeper/ |
gatekeeper_messages.cpp | 133 SizedBuffer *enrolled_password_handle, SizedBuffer *provided_password_payload) { 136 this->password_handle.buffer.reset(enrolled_password_handle->buffer.release()); 137 this->password_handle.length = enrolled_password_handle->length; 325 EnrollResponse::EnrollResponse(uint32_t user_id, SizedBuffer *enrolled_password_handle) { 327 this->enrolled_password_handle.buffer.reset(enrolled_password_handle->buffer.release()); 328 this->enrolled_password_handle.length = enrolled_password_handle->length; 332 memset_s(&enrolled_password_handle, 0, sizeof(enrolled_password_handle)); [all...] |
/system/core/trusty/gatekeeper/ |
trusty_gatekeeper.cpp | 85 uint32_t desired_password_length, uint8_t **enrolled_password_handle, 118 *enrolled_password_handle = response.enrolled_password_handle.buffer.release(); 119 *enrolled_password_handle_length = response.enrolled_password_handle.length; 126 const uint8_t *enrolled_password_handle, uint32_t enrolled_password_handle_length, 134 memcpy(password_handle_buffer.buffer.get(), enrolled_password_handle, 194 uint8_t **enrolled_password_handle, uint32_t *enrolled_password_handle_length) { 197 enrolled_password_handle == NULL || enrolled_password_handle_length == NULL || 212 enrolled_password_handle, enrolled_password_handle_length); 218 uint64_t challenge, const uint8_t *enrolled_password_handle, [all...] |
trusty_gatekeeper.h | 46 uint32_t desired_password_length, uint8_t **enrolled_password_handle, 61 int Verify(uint32_t uid, uint64_t challenge, const uint8_t *enrolled_password_handle, 91 * On error, enrolled_password_handle will not be allocated. 97 uint8_t **enrolled_password_handle, uint32_t *enrolled_password_handle_length); 100 * Verifies provided_password matches enrolled_password_handle. 113 const uint8_t *enrolled_password_handle, uint32_t enrolled_password_handle_length,
|
/hardware/libhardware/include/hardware/ |
gatekeeper.h | 76 * - enrolled_password_handle: on success, a buffer will be allocated with the 89 * On error, enrolled_password_handle will not be allocated. 95 uint8_t **enrolled_password_handle, uint32_t *enrolled_password_handle_length); 98 * Verifies provided_password matches enrolled_password_handle. 115 * - enrolled_password_handle: the currently enrolled password handle that the 118 * to by enrolled_password_handle 121 * enrolled_password_handle 142 const uint8_t *enrolled_password_handle, uint32_t enrolled_password_handle_length, 147 * Deletes the enrolled_password_handle associated wth the uid. Once deleted
|
/system/core/gatekeeperd/tests/ |
gatekeeper_test.cpp | 75 VerifyRequest request(0, 1, &enroll_response.enrolled_password_handle, 107 password_handle.buffer.reset(new uint8_t[enroll_response.enrolled_password_handle.length]); 108 password_handle.length = enroll_response.enrolled_password_handle.length; 109 memcpy(password_handle.buffer.get(), enroll_response.enrolled_password_handle.buffer.get(), 113 VerifyRequest request(0, 0, &enroll_response.enrolled_password_handle, 139 VerifyRequest new_request(0, 0, &enroll_response.enrolled_password_handle, 161 VerifyRequest request(0, 0, &enroll_response.enrolled_password_handle, 184 VerifyRequest new_request(0, 0, &enroll_response.enrolled_password_handle,
|
/hardware/interfaces/gatekeeper/1.0/default/ |
Gatekeeper.cpp | 62 uint8_t *enrolled_password_handle = nullptr; 69 &enrolled_password_handle, &enrolled_password_handle_length); 71 rsp.data.setToExternal(enrolled_password_handle,
|
/system/gatekeeper/include/gatekeeper/ |
gatekeeper_messages.h | 141 SizedBuffer *enrolled_password_handle, 197 EnrollResponse(uint32_t user_id, SizedBuffer *enrolled_password_handle); 201 void SetEnrolledPasswordHandle(SizedBuffer *enrolled_password_handle); 207 SizedBuffer enrolled_password_handle; member in struct:gatekeeper::EnrollResponse
|
/system/gatekeeper/tests/ |
gatekeeper_messages_test.cpp | 157 deserialized_password = &deserialized_msg.enrolled_password_handle; 160 ASSERT_EQ(0, memcmp(msg.enrolled_password_handle.buffer.get(),
|
/prebuilts/abi-dumps/vndk/28/32/arm_armv7-a-neon/source-based/ |
libgatekeeper.so.lsdump.gz | |
/prebuilts/abi-dumps/vndk/28/32/x86/source-based/ |
libgatekeeper.so.lsdump.gz | |
/prebuilts/abi-dumps/vndk/28/64/arm64_armv8-a/source-based/ |
libgatekeeper.so.lsdump.gz | |
/prebuilts/abi-dumps/vndk/28/64/arm_armv8-a/source-based/ |
libgatekeeper.so.lsdump.gz | |
/prebuilts/abi-dumps/vndk/28/64/x86/source-based/ |
libgatekeeper.so.lsdump.gz | |
/prebuilts/abi-dumps/vndk/28/64/x86_64/source-based/ |
libgatekeeper.so.lsdump.gz | |
/prebuilts/abi-dumps/vndk/28/64/x86_x86_64/source-based/ |
libgatekeeper.so.lsdump.gz | |