Home
last modified time | relevance | path

Searched refs:enrolled_password_handle (Results 1 – 10 of 10) sorted by relevance

/system/gatekeeper/
Dgatekeeper_messages.cpp136 SizedBuffer *enrolled_password_handle, SizedBuffer *provided_password_payload) { in VerifyRequest() argument
139 this->password_handle.buffer.reset(enrolled_password_handle->buffer.release()); in VerifyRequest()
140 this->password_handle.length = enrolled_password_handle->length; in VerifyRequest()
335 EnrollResponse::EnrollResponse(uint32_t user_id, SizedBuffer *enrolled_password_handle) { in EnrollResponse() argument
337 this->enrolled_password_handle.buffer.reset(enrolled_password_handle->buffer.release()); in EnrollResponse()
338 this->enrolled_password_handle.length = enrolled_password_handle->length; in EnrollResponse()
342 memset_s(&enrolled_password_handle, 0, sizeof(enrolled_password_handle)); in EnrollResponse()
346 if (enrolled_password_handle.buffer.get()) { in ~EnrollResponse()
347 enrolled_password_handle.buffer.reset(); in ~EnrollResponse()
351 void EnrollResponse::SetEnrolledPasswordHandle(SizedBuffer *enrolled_password_handle) { in SetEnrolledPasswordHandle() argument
[all …]
/system/core/gatekeeperd/
DSoftGateKeeperDevice.cpp25 uint8_t **enrolled_password_handle, uint32_t *enrolled_password_handle_length) { in enroll() argument
27 if (enrolled_password_handle == NULL || enrolled_password_handle_length == NULL || in enroll()
66 *enrolled_password_handle = response.enrolled_password_handle.buffer.release(); in enroll()
67 *enrolled_password_handle_length = response.enrolled_password_handle.length; in enroll()
72 uint64_t challenge, const uint8_t *enrolled_password_handle, in verify() argument
77 if (enrolled_password_handle == NULL || in verify()
83 memcpy(password_handle_buffer.buffer.get(), enrolled_password_handle, in verify()
Dgatekeeperd.cpp161 uint8_t **enrolled_password_handle, uint32_t *enrolled_password_handle_length) { in enroll() argument
202 [&ret, enrolled_password_handle, enrolled_password_handle_length] in enroll()
206 if (enrolled_password_handle != nullptr && in enroll()
208 *enrolled_password_handle = new uint8_t[rsp.data.size()]; in enroll()
210 memcpy(*enrolled_password_handle, rsp.data.data(), in enroll()
227 enrolled_password_handle, enrolled_password_handle_length); in enroll()
230 if (ret == GATEKEEPER_RESPONSE_OK && (*enrolled_password_handle == nullptr || in enroll()
234 *enrolled_password_handle, *enrolled_password_handle_length); in enroll()
239 reinterpret_cast<gatekeeper::password_handle_t *>(*enrolled_password_handle); in enroll()
245 verify(uid, *enrolled_password_handle, sizeof(password_handle_t), desired_password, in enroll()
[all …]
DIGateKeeperService.h63 uint8_t **enrolled_password_handle, uint32_t *enrolled_password_handle_length) = 0;
73 virtual int verify(uint32_t uid, const uint8_t *enrolled_password_handle,
87 const uint8_t *enrolled_password_handle, uint32_t enrolled_password_handle_length,
DSoftGateKeeperDevice.h51 uint8_t **enrolled_password_handle, uint32_t *enrolled_password_handle_length);
67 const uint8_t *enrolled_password_handle, uint32_t enrolled_password_handle_length,
/system/core/trusty/gatekeeper/
Dtrusty_gatekeeper.cpp85 uint32_t desired_password_length, uint8_t **enrolled_password_handle, in Enroll() argument
118 *enrolled_password_handle = response.enrolled_password_handle.buffer.release(); in Enroll()
119 *enrolled_password_handle_length = response.enrolled_password_handle.length; in Enroll()
126 const uint8_t *enrolled_password_handle, uint32_t enrolled_password_handle_length, in Verify() argument
134 memcpy(password_handle_buffer.buffer.get(), enrolled_password_handle, in Verify()
194 uint8_t **enrolled_password_handle, uint32_t *enrolled_password_handle_length) { in enroll() argument
197 enrolled_password_handle == NULL || enrolled_password_handle_length == NULL || in enroll()
212 enrolled_password_handle, enrolled_password_handle_length); in enroll()
218 uint64_t challenge, const uint8_t *enrolled_password_handle, in verify() argument
223 if (dev == NULL || enrolled_password_handle == NULL || in verify()
[all …]
Dtrusty_gatekeeper.h46 uint32_t desired_password_length, uint8_t **enrolled_password_handle,
61 int Verify(uint32_t uid, uint64_t challenge, const uint8_t *enrolled_password_handle,
97 uint8_t **enrolled_password_handle, uint32_t *enrolled_password_handle_length);
113 const uint8_t *enrolled_password_handle, uint32_t enrolled_password_handle_length,
/system/core/gatekeeperd/tests/
Dgatekeeper_test.cpp75 VerifyRequest request(0, 1, &enroll_response.enrolled_password_handle, in TEST()
107 password_handle.buffer.reset(new uint8_t[enroll_response.enrolled_password_handle.length]); in TEST()
108 password_handle.length = enroll_response.enrolled_password_handle.length; in TEST()
109 memcpy(password_handle.buffer.get(), enroll_response.enrolled_password_handle.buffer.get(), in TEST()
113 VerifyRequest request(0, 0, &enroll_response.enrolled_password_handle, in TEST()
139 VerifyRequest new_request(0, 0, &enroll_response.enrolled_password_handle, in TEST()
161 VerifyRequest request(0, 0, &enroll_response.enrolled_password_handle, in TEST()
184 VerifyRequest new_request(0, 0, &enroll_response.enrolled_password_handle, in TEST()
/system/gatekeeper/include/gatekeeper/
Dgatekeeper_messages.h141 SizedBuffer *enrolled_password_handle,
197 EnrollResponse(uint32_t user_id, SizedBuffer *enrolled_password_handle);
201 void SetEnrolledPasswordHandle(SizedBuffer *enrolled_password_handle);
207 SizedBuffer enrolled_password_handle; member
/system/gatekeeper/tests/
Dgatekeeper_messages_test.cpp157 deserialized_password = &deserialized_msg.enrolled_password_handle; in TEST()
160 ASSERT_EQ(0, memcmp(msg.enrolled_password_handle.buffer.get(), in TEST()