Home
last modified time | relevance | path

Searched refs:hat (Results 1 – 4 of 4) sorted by relevance

/system/security/keystore2/src/
Denforcements.rs64 hat: Mutex<Option<HardwareAuthToken>>, field
71 Arc::new(Self { state: AuthRequestState::OpAuth, hat: Mutex::new(None) }) in op_auth()
77 hat: Mutex::new(None), in timestamped_op_auth()
82 hat: HardwareAuthToken, in timestamp()
85 Arc::new(Self { state: AuthRequestState::TimeStamp(receiver), hat: Mutex::new(Some(hat)) }) in timestamp()
88 fn add_auth_token(&self, hat: HardwareAuthToken) { in add_auth_token()
89 *self.hat.lock().unwrap() = Some(hat) in add_auth_token()
93 let hat = self in get_auth_tokens() localVariable
94 .hat in get_auth_tokens()
111 Ok((hat, tst)) in get_auth_tokens()
[all …]
Doperation.rs368 let (hat, tst) = self in update_aad()
377 map_km_error(km_op.updateAad(aad_input, hat.as_ref(), tst.as_ref())) in update_aad()
394 let (hat, tst) = self in update()
404 map_km_error(km_op.update(input, hat.as_ref(), tst.as_ref())) in update()
427 let (hat, tst, confirmation_token) = self in finish()
440 hat.as_ref(), in finish()
/system/gatekeeper/tests/
Dgatekeeper_device_test.cpp84 hw_auth_token_t *hat; in TEST_F() local
98 hat = reinterpret_cast<hw_auth_token_t *>(auth_token); in TEST_F()
100 ASSERT_EQ(HW_AUTH_TOKEN_VERSION, hat->version); in TEST_F()
101 ASSERT_EQ(htobe32(HW_AUTH_PASSWORD), hat->authenticator_type); in TEST_F()
/system/security/keystore2/src/km_compat/
Dkm_compat_type_conversion.h369 uint32_t hat = static_cast<uint32_t>(h); in convert() local
370 if (hat & static_cast<uint32_t>(KMV1::HardwareAuthenticatorType::PASSWORD)) { in convert()
373 if (hat & static_cast<uint32_t>(KMV1::HardwareAuthenticatorType::FINGERPRINT)) { in convert()