/system/gatekeeper/ |
D | gatekeeper_messages.cpp | 136 SizedBuffer *enrolled_password_handle, SizedBuffer *provided_password_payload) { in VerifyRequest() argument 139 this->password_handle.buffer.reset(enrolled_password_handle->buffer.release()); in VerifyRequest() 140 this->password_handle.length = enrolled_password_handle->length; in VerifyRequest() 335 EnrollResponse::EnrollResponse(uint32_t user_id, SizedBuffer *enrolled_password_handle) { in EnrollResponse() argument 337 this->enrolled_password_handle.buffer.reset(enrolled_password_handle->buffer.release()); in EnrollResponse() 338 this->enrolled_password_handle.length = enrolled_password_handle->length; in EnrollResponse() 342 memset_s(&enrolled_password_handle, 0, sizeof(enrolled_password_handle)); in EnrollResponse() 346 if (enrolled_password_handle.buffer.get()) { in ~EnrollResponse() 347 enrolled_password_handle.buffer.reset(); in ~EnrollResponse() 351 void EnrollResponse::SetEnrolledPasswordHandle(SizedBuffer *enrolled_password_handle) { in SetEnrolledPasswordHandle() argument [all …]
|
/system/core/gatekeeperd/ |
D | SoftGateKeeperDevice.cpp | 25 uint8_t **enrolled_password_handle, uint32_t *enrolled_password_handle_length) { in enroll() argument 27 if (enrolled_password_handle == NULL || enrolled_password_handle_length == NULL || in enroll() 66 *enrolled_password_handle = response.enrolled_password_handle.buffer.release(); in enroll() 67 *enrolled_password_handle_length = response.enrolled_password_handle.length; in enroll() 72 uint64_t challenge, const uint8_t *enrolled_password_handle, in verify() argument 77 if (enrolled_password_handle == NULL || in verify() 83 memcpy(password_handle_buffer.buffer.get(), enrolled_password_handle, in verify()
|
D | gatekeeperd.cpp | 161 uint8_t **enrolled_password_handle, uint32_t *enrolled_password_handle_length) { in enroll() argument 202 [&ret, enrolled_password_handle, enrolled_password_handle_length] in enroll() 206 if (enrolled_password_handle != nullptr && in enroll() 208 *enrolled_password_handle = new uint8_t[rsp.data.size()]; in enroll() 210 memcpy(*enrolled_password_handle, rsp.data.data(), in enroll() 227 enrolled_password_handle, enrolled_password_handle_length); in enroll() 230 if (ret == GATEKEEPER_RESPONSE_OK && (*enrolled_password_handle == nullptr || in enroll() 234 *enrolled_password_handle, *enrolled_password_handle_length); in enroll() 239 reinterpret_cast<gatekeeper::password_handle_t *>(*enrolled_password_handle); in enroll() 245 verify(uid, *enrolled_password_handle, sizeof(password_handle_t), desired_password, in enroll() [all …]
|
D | IGateKeeperService.h | 63 uint8_t **enrolled_password_handle, uint32_t *enrolled_password_handle_length) = 0; 73 virtual int verify(uint32_t uid, const uint8_t *enrolled_password_handle, 87 const uint8_t *enrolled_password_handle, uint32_t enrolled_password_handle_length,
|
D | SoftGateKeeperDevice.h | 51 uint8_t **enrolled_password_handle, uint32_t *enrolled_password_handle_length); 67 const uint8_t *enrolled_password_handle, uint32_t enrolled_password_handle_length,
|
/system/core/trusty/gatekeeper/ |
D | trusty_gatekeeper.cpp | 85 uint32_t desired_password_length, uint8_t **enrolled_password_handle, in Enroll() argument 118 *enrolled_password_handle = response.enrolled_password_handle.buffer.release(); in Enroll() 119 *enrolled_password_handle_length = response.enrolled_password_handle.length; in Enroll() 126 const uint8_t *enrolled_password_handle, uint32_t enrolled_password_handle_length, in Verify() argument 134 memcpy(password_handle_buffer.buffer.get(), enrolled_password_handle, in Verify() 194 uint8_t **enrolled_password_handle, uint32_t *enrolled_password_handle_length) { in enroll() argument 197 enrolled_password_handle == NULL || enrolled_password_handle_length == NULL || in enroll() 212 enrolled_password_handle, enrolled_password_handle_length); in enroll() 218 uint64_t challenge, const uint8_t *enrolled_password_handle, in verify() argument 223 if (dev == NULL || enrolled_password_handle == NULL || in verify() [all …]
|
D | trusty_gatekeeper.h | 46 uint32_t desired_password_length, uint8_t **enrolled_password_handle, 61 int Verify(uint32_t uid, uint64_t challenge, const uint8_t *enrolled_password_handle, 97 uint8_t **enrolled_password_handle, uint32_t *enrolled_password_handle_length); 113 const uint8_t *enrolled_password_handle, uint32_t enrolled_password_handle_length,
|
/system/core/gatekeeperd/tests/ |
D | gatekeeper_test.cpp | 75 VerifyRequest request(0, 1, &enroll_response.enrolled_password_handle, in TEST() 107 password_handle.buffer.reset(new uint8_t[enroll_response.enrolled_password_handle.length]); in TEST() 108 password_handle.length = enroll_response.enrolled_password_handle.length; in TEST() 109 memcpy(password_handle.buffer.get(), enroll_response.enrolled_password_handle.buffer.get(), in TEST() 113 VerifyRequest request(0, 0, &enroll_response.enrolled_password_handle, in TEST() 139 VerifyRequest new_request(0, 0, &enroll_response.enrolled_password_handle, in TEST() 161 VerifyRequest request(0, 0, &enroll_response.enrolled_password_handle, in TEST() 184 VerifyRequest new_request(0, 0, &enroll_response.enrolled_password_handle, in TEST()
|
/system/gatekeeper/include/gatekeeper/ |
D | gatekeeper_messages.h | 141 SizedBuffer *enrolled_password_handle, 197 EnrollResponse(uint32_t user_id, SizedBuffer *enrolled_password_handle); 201 void SetEnrolledPasswordHandle(SizedBuffer *enrolled_password_handle); 207 SizedBuffer enrolled_password_handle; member
|
/system/gatekeeper/tests/ |
D | gatekeeper_messages_test.cpp | 157 deserialized_password = &deserialized_msg.enrolled_password_handle; in TEST() 160 ASSERT_EQ(0, memcmp(msg.enrolled_password_handle.buffer.get(), in TEST()
|