• Home
  • Raw
  • Download

Lines Matching refs:token

54     bool auth_token_timed_out(const hw_auth_token_t& token, uint32_t timeout) const override {  in auth_token_timed_out()  argument
55 return current_time_ > ntoh(token.timestamp) + timeout; in auth_token_timed_out()
583 hw_auth_token_t token; in TEST_F() local
584 memset(&token, 0, sizeof(token)); in TEST_F()
585 token.version = HW_AUTH_TOKEN_VERSION; in TEST_F()
586 token.challenge = 99; in TEST_F()
587 token.user_id = 9; in TEST_F()
588 token.authenticator_id = 0; in TEST_F()
589 token.authenticator_type = hton(static_cast<uint32_t>(HW_AUTH_PASSWORD)); in TEST_F()
590 token.timestamp = 0; in TEST_F()
593 .Authorization(TAG_USER_SECURE_ID, token.user_id) in TEST_F()
598 op_params.push_back(Authorization(TAG_AUTH_TOKEN, &token, sizeof(token))); in TEST_F()
602 op_params, token.challenge, false /* is_begin_operation */)); in TEST_F()
606 hw_auth_token_t token; in TEST_F() local
607 memset(&token, 0, sizeof(token)); in TEST_F()
608 token.version = HW_AUTH_TOKEN_VERSION; in TEST_F()
609 token.challenge = 99; in TEST_F()
610 token.user_id = 9; in TEST_F()
611 token.authenticator_id = 0; in TEST_F()
612 token.authenticator_type = hton(static_cast<uint32_t>(HW_AUTH_PASSWORD)); in TEST_F()
613 token.timestamp = 0; in TEST_F()
617 .Authorization(TAG_USER_SECURE_ID, token.user_id) in TEST_F()
622 op_params.push_back(Authorization(TAG_AUTH_TOKEN, &token, sizeof(token))); in TEST_F()
627 op_params, token.challenge, false /* is_begin_operation */)); in TEST_F()
631 op_params, token.challenge, false /* is_begin_operation */)); in TEST_F()
635 hw_auth_token_t token; in TEST_F() local
636 memset(&token, 0, sizeof(token)); in TEST_F()
637 token.version = HW_AUTH_TOKEN_VERSION; in TEST_F()
638 token.challenge = 99; in TEST_F()
639 token.user_id = 9; in TEST_F()
640 token.authenticator_id = 0; in TEST_F()
641 token.authenticator_type = hton(static_cast<uint32_t>(HW_AUTH_PASSWORD)); in TEST_F()
642 token.timestamp = 0; in TEST_F()
645 .Authorization(TAG_USER_SECURE_ID, token.user_id) in TEST_F()
650 op_params.push_back(Authorization(TAG_AUTH_TOKEN, &token, sizeof(token))); in TEST_F()
654 op_params, token.challenge + 1 /* doesn't match token */, in TEST_F()
659 hw_auth_token_t token; in TEST_F() local
660 memset(&token, 0, sizeof(token)); in TEST_F()
661 token.version = HW_AUTH_TOKEN_VERSION; in TEST_F()
662 token.challenge = 99; in TEST_F()
663 token.user_id = 9; in TEST_F()
664 token.authenticator_id = 0; in TEST_F()
665 token.authenticator_type = hton(static_cast<uint32_t>(HW_AUTH_PASSWORD)); in TEST_F()
666 token.timestamp = 0; in TEST_F()
670 .Authorization(TAG_USER_SECURE_ID, token.user_id) in TEST_F()
674 op_params.push_back(Authorization(TAG_AUTH_TOKEN, &token, sizeof(token))); in TEST_F()
678 op_params, token.challenge, false /* is_begin_operation */)); in TEST_F()
682 op_params, token.challenge, false /* is_begin_operation */)); in TEST_F()
686 hw_auth_token_t token; in TEST_F() local
687 memset(&token, 0, sizeof(token)); in TEST_F()
688 token.version = HW_AUTH_TOKEN_VERSION; in TEST_F()
689 token.challenge = 99; in TEST_F()
690 token.user_id = 9; in TEST_F()
691 token.authenticator_id = 0; in TEST_F()
692 token.authenticator_type = hton(static_cast<uint32_t>(HW_AUTH_PASSWORD)); in TEST_F()
693 token.timestamp = 0; in TEST_F()
698 .Authorization(TAG_USER_SECURE_ID, token.user_id) in TEST_F()
703 op_params.push_back(Authorization(TAG_AUTH_TOKEN, &token, sizeof(token))); in TEST_F()
707 op_params, token.challenge, false /* is_begin_operation */)); in TEST_F()
711 op_params, token.challenge, false /* is_begin_operation */)); in TEST_F()
715 hw_auth_token_t token; in TEST_F() local
716 memset(&token, 0, sizeof(token)); in TEST_F()
717 token.version = HW_AUTH_TOKEN_VERSION; in TEST_F()
718 token.challenge = 99; in TEST_F()
719 token.user_id = 9; in TEST_F()
720 token.authenticator_id = 0; in TEST_F()
721 token.authenticator_type = hton(static_cast<uint32_t>(HW_AUTH_PASSWORD)); in TEST_F()
722 token.timestamp = 0; in TEST_F()
727 .Authorization(TAG_USER_SECURE_ID, token.user_id + 1 /* doesn't match token */) in TEST_F()
732 op_params.push_back(Authorization(TAG_AUTH_TOKEN, &token, sizeof(token))); in TEST_F()
736 op_params, token.challenge, false /* is_begin_operation */)); in TEST_F()
740 op_params, token.challenge, false /* is_begin_operation */)); in TEST_F()
744 hw_auth_token_t token; in TEST_F() local
745 memset(&token, 0, sizeof(token)); in TEST_F()
746 token.version = HW_AUTH_TOKEN_VERSION; in TEST_F()
747 token.challenge = 99; in TEST_F()
748 token.user_id = 9; in TEST_F()
749 token.authenticator_id = 10; in TEST_F()
750 token.authenticator_type = hton(static_cast<uint32_t>(HW_AUTH_PASSWORD)); in TEST_F()
751 token.timestamp = 0; in TEST_F()
754 .Authorization(TAG_USER_SECURE_ID, token.authenticator_id) in TEST_F()
759 op_params.push_back(Authorization(TAG_AUTH_TOKEN, &token, sizeof(token))); in TEST_F()
763 op_params, token.challenge, false /* is_begin_operation */)); in TEST_F()
767 hw_auth_token_t token; in TEST_F() local
768 memset(&token, 0, sizeof(token)); in TEST_F()
769 token.version = HW_AUTH_TOKEN_VERSION; in TEST_F()
770 token.challenge = 99; in TEST_F()
771 token.user_id = 9; in TEST_F()
772 token.authenticator_id = 0; in TEST_F()
773 token.authenticator_type = hton(static_cast<uint32_t>(HW_AUTH_PASSWORD)); in TEST_F()
774 token.timestamp = 0; in TEST_F()
778 .Authorization(TAG_USER_SECURE_ID, token.user_id) in TEST_F()
787 op_params, token.challenge, true /* is_begin_operation */)); in TEST_F()
791 op_params, token.challenge, false /* is_begin_operation */)); in TEST_F()
795 op_params, token.challenge, false /* is_begin_operation */)); in TEST_F()
799 .Authorization(TAG_USER_SECURE_ID, token.user_id) in TEST_F()
806 op_params, token.challenge, false /* is_begin_operation */)); in TEST_F()
820 hw_auth_token_t token; in TEST_F() local
821 memset(&token, 0, sizeof(token)); in TEST_F()
822 token.version = HW_AUTH_TOKEN_VERSION; in TEST_F()
823 token.challenge = 99; in TEST_F()
824 token.user_id = 9; in TEST_F()
825 token.authenticator_id = 0; in TEST_F()
826 token.authenticator_type = hton(static_cast<uint32_t>(HW_AUTH_PASSWORD)); in TEST_F()
827 token.timestamp = hton(kmen.current_time()); in TEST_F()
831 .Authorization(TAG_USER_SECURE_ID, token.user_id) in TEST_F()
837 op_params.push_back(Authorization(TAG_AUTH_TOKEN, &token, sizeof(token))); in TEST_F()
845 hw_auth_token_t token; in TEST_F() local
846 memset(&token, 0, sizeof(token)); in TEST_F()
847 token.version = HW_AUTH_TOKEN_VERSION; in TEST_F()
848 token.challenge = 99; in TEST_F()
849 token.user_id = 9; in TEST_F()
850 token.authenticator_id = 0; in TEST_F()
851 token.authenticator_type = hton(static_cast<uint32_t>(HW_AUTH_PASSWORD)); in TEST_F()
852 token.timestamp = hton(static_cast<uint64_t>(kmen.current_time())); in TEST_F()
856 .Authorization(TAG_USER_SECURE_ID, token.user_id) in TEST_F()
862 op_params.push_back(Authorization(TAG_AUTH_TOKEN, &token, sizeof(token))); in TEST_F()
895 hw_auth_token_t token; in TEST_F() local
896 memset(&token, 0, sizeof(token)); in TEST_F()
897 token.version = HW_AUTH_TOKEN_VERSION; in TEST_F()
898 token.challenge = 99; in TEST_F()
899 token.user_id = 9; in TEST_F()
900 token.authenticator_id = 0; in TEST_F()
901 token.authenticator_type = hton(static_cast<uint32_t>(HW_AUTH_PASSWORD)); in TEST_F()
902 token.timestamp = hton(static_cast<uint64_t>(kmen.current_time())); in TEST_F()
906 .Authorization(TAG_USER_SECURE_ID, token.user_id) in TEST_F()
916 op_params, token.challenge, true /* is_begin_operation */)); in TEST_F()
921 op_params, token.challenge, false /* is_begin_operation */)); in TEST_F()
926 op_params, token.challenge, true /* is_begin_operation */)); in TEST_F()