Lines Matching refs:auth_token
286 const hw_auth_token_t* auth_token; in AuthorizeBegin() local
288 if (!GetAndValidateAuthToken(operation_params, &auth_token, &token_auth_type)) { in AuthorizeBegin()
292 uint64_t token_timestamp_millis = ntoh(auth_token->timestamp); in AuthorizeBegin()
450 const hw_auth_token_t** auth_token, in GetAndValidateAuthToken() argument
458 if (auth_token_blob.data_length != sizeof(**auth_token)) { in GetAndValidateAuthToken()
464 *auth_token = reinterpret_cast<const hw_auth_token_t*>(auth_token_blob.data); in GetAndValidateAuthToken()
465 if ((*auth_token)->version != HW_AUTH_TOKEN_VERSION) { in GetAndValidateAuthToken()
467 (*auth_token)->version, HW_AUTH_TOKEN_VERSION); in GetAndValidateAuthToken()
471 if (!ValidateTokenSignature(**auth_token)) { in GetAndValidateAuthToken()
476 *token_auth_type = ntoh((*auth_token)->authenticator_type); in GetAndValidateAuthToken()
490 const hw_auth_token_t* auth_token; in AuthTokenMatches() local
492 if (!GetAndValidateAuthToken(operation_params, &auth_token, &token_auth_type)) return false; in AuthTokenMatches()
494 if (auth_timeout_index == -1 && op_handle && op_handle != auth_token->challenge) { in AuthTokenMatches()
495 LOG_E("Auth token has the challenge %llu, need %llu", auth_token->challenge, op_handle); in AuthTokenMatches()
499 if (user_secure_id != auth_token->user_id && user_secure_id != auth_token->authenticator_id) { in AuthTokenMatches()
500 LOG_I("Auth token SIDs %llu and %llu do not match key SID %llu", auth_token->user_id, in AuthTokenMatches()
501 auth_token->authenticator_id, user_secure_id); in AuthTokenMatches()
524 if (auth_token_timed_out(*auth_token, auth_set[auth_timeout_index].integer)) { in AuthTokenMatches()