Searched refs:hat (Results 1 – 4 of 4) sorted by relevance
/system/security/keystore2/src/ |
D | enforcements.rs | 64 hat: Mutex<Option<HardwareAuthToken>>, field 71 Arc::new(Self { state: AuthRequestState::OpAuth, hat: Mutex::new(None) }) in op_auth() 77 hat: Mutex::new(None), in timestamped_op_auth() 82 hat: HardwareAuthToken, in timestamp() 85 Arc::new(Self { state: AuthRequestState::TimeStamp(receiver), hat: Mutex::new(Some(hat)) }) in timestamp() 88 fn add_auth_token(&self, hat: HardwareAuthToken) { in add_auth_token() 89 *self.hat.lock().unwrap() = Some(hat) in add_auth_token() 93 let hat = self in get_auth_tokens() localVariable 94 .hat in get_auth_tokens() 111 Ok((hat, tst)) in get_auth_tokens() [all …]
|
D | operation.rs | 368 let (hat, tst) = self in update_aad() 377 map_km_error(km_op.updateAad(aad_input, hat.as_ref(), tst.as_ref())) in update_aad() 394 let (hat, tst) = self in update() 404 map_km_error(km_op.update(input, hat.as_ref(), tst.as_ref())) in update() 427 let (hat, tst, confirmation_token) = self in finish() 440 hat.as_ref(), in finish()
|
/system/gatekeeper/tests/ |
D | gatekeeper_device_test.cpp | 84 hw_auth_token_t *hat; in TEST_F() local 98 hat = reinterpret_cast<hw_auth_token_t *>(auth_token); in TEST_F() 100 ASSERT_EQ(HW_AUTH_TOKEN_VERSION, hat->version); in TEST_F() 101 ASSERT_EQ(htobe32(HW_AUTH_PASSWORD), hat->authenticator_type); in TEST_F()
|
/system/security/keystore2/src/km_compat/ |
D | km_compat_type_conversion.h | 369 uint32_t hat = static_cast<uint32_t>(h); in convert() local 370 if (hat & static_cast<uint32_t>(KMV1::HardwareAuthenticatorType::PASSWORD)) { in convert() 373 if (hat & static_cast<uint32_t>(KMV1::HardwareAuthenticatorType::FINGERPRINT)) { in convert()
|