Home
last modified time | relevance | path

Searched refs:hw_auth_token_t (Results 1 – 14 of 14) sorted by relevance

/system/security/keystore/tests/
Dauth_token_formatting_test.cpp96 static_assert(sizeof(hw_auth_token_t) == sizeof(test_token), "test_token has wrong size"); in TEST()
103 static_assert(sizeof(hw_auth_token_t) == sizeof(test_token), "test_token has wrong size"); in TEST()
110 static_assert(sizeof(hw_auth_token_t) == sizeof(test_token), "test_token has wrong size"); in TEST()
117 static_assert(sizeof(hw_auth_token_t) == sizeof(test_token), "test_token has wrong size"); in TEST()
124 static_assert(sizeof(hw_auth_token_t) == sizeof(test_token), "test_token has wrong size"); in TEST()
133 static_assert(sizeof(hw_auth_token_t) == sizeof(test_token), "test_token has wrong size"); in TEST()
141 static_assert(sizeof(hw_auth_token_t) == sizeof(test_token), "test_token has wrong size"); in TEST()
/system/keymaster/include/keymaster/km_openssl/
Dsoft_keymaster_enforcement.h33 bool auth_token_timed_out(const hw_auth_token_t& /*token*/, in auth_token_timed_out() argument
39 bool ValidateTokenSignature(const hw_auth_token_t& /*token*/) const override { return true; } in ValidateTokenSignature() argument
/system/keymaster/include/keymaster/
Dkeymaster_enforcement.h121 virtual bool auth_token_timed_out(const hw_auth_token_t& token, uint32_t timeout) const = 0;
159 virtual bool ValidateTokenSignature(const hw_auth_token_t& token) const = 0;
216 const hw_auth_token_t** token, uint32_t* token_auth_type) const;
/system/security/keystore/include/keystore/
Dkeystore_hidl_support.h95 sizeof(hw_auth_token_t), in authToken2HidlVec()
99 result.resize(sizeof(hw_auth_token_t)); in authToken2HidlVec()
127 sizeof(hw_auth_token_t), in hidlVec2Km3AuthToken()
130 if (buffer.size() != sizeof(hw_auth_token_t)) return {}; in hidlVec2Km3AuthToken()
/system/gatekeeper/
Dgatekeeper.cpp245 hw_auth_token_t token; in MintAuthToken()
261 static_assert(offsetof(hw_auth_token_t, hmac) == hashable_length, in MintAuthToken()
273 uint8_t *token_buffer = new(std::nothrow) uint8_t[sizeof(hw_auth_token_t)]; in MintAuthToken()
276 *reinterpret_cast<hw_auth_token_t*>(token_buffer) = token; in MintAuthToken()
278 *auth_token = { token_buffer, sizeof(hw_auth_token_t) }; in MintAuthToken()
/system/keymaster/android_keymaster/
Dkeymaster_enforcement.cpp286 const hw_auth_token_t* auth_token; in AuthorizeBegin()
450 const hw_auth_token_t** auth_token, in GetAndValidateAuthToken()
459 LOG_E("Bug: Auth token is the wrong size (%d expected, %d found)", sizeof(hw_auth_token_t), in GetAndValidateAuthToken()
464 *auth_token = reinterpret_cast<const hw_auth_token_t*>(auth_token_blob.data); in GetAndValidateAuthToken()
490 const hw_auth_token_t* auth_token; in AuthTokenMatches()
/system/keymaster/tests/
Dkeymaster_enforcement_test.cpp54 bool auth_token_timed_out(const hw_auth_token_t& token, uint32_t timeout) const override { in auth_token_timed_out()
57 bool ValidateTokenSignature(const hw_auth_token_t&) const override { in ValidateTokenSignature()
583 hw_auth_token_t token; in TEST_F()
606 hw_auth_token_t token; in TEST_F()
635 hw_auth_token_t token; in TEST_F()
659 hw_auth_token_t token; in TEST_F()
686 hw_auth_token_t token; in TEST_F()
715 hw_auth_token_t token; in TEST_F()
744 hw_auth_token_t token; in TEST_F()
767 hw_auth_token_t token; in TEST_F()
[all …]
Dandroid_keymaster_test.cpp85 virtual bool auth_token_timed_out(const hw_auth_token_t& /* token */, in auth_token_timed_out() argument
90 virtual bool ValidateTokenSignature(const hw_auth_token_t& /* token */) const { return true; } in ValidateTokenSignature()
/system/keymaster/ng/
DKeyMintAidlUtils.cpp31 == sizeof(hw_auth_token_t), in authToken2AidlVec()
38 result.resize(sizeof(hw_auth_token_t)); in authToken2AidlVec()
DKeyMintUtils.cpp105 == sizeof(hw_auth_token_t), in authToken2AidlVec()
113 result.resize(sizeof(hw_auth_token_t)); in authToken2AidlVec()
/system/keymaster/ng/include/
Dkeystore_hidl_support.h108 == sizeof(hw_auth_token_t), in authToken2HidlVec()
112 result.resize(sizeof(hw_auth_token_t)); in authToken2HidlVec()
/system/gatekeeper/tests/
Dgatekeeper_device_test.cpp84 hw_auth_token_t *hat; in TEST_F()
98 hat = reinterpret_cast<hw_auth_token_t *>(auth_token); in TEST_F()
/system/core/gatekeeperd/
Dgatekeeperd.cpp308 if (gkResponse->payload().size() != sizeof(hw_auth_token_t)) { in verifyChallenge()
313 const hw_auth_token_t* hwAuthToken = in verifyChallenge()
314 reinterpret_cast<const hw_auth_token_t*>(gkResponse->payload().data()); in verifyChallenge()
/system/core/trusty/keymaster/4.0/
DTrustyKeymaster4Device.cpp107 p.blob.resize(sizeof(hw_auth_token_t)); in injectAuthToken()
109 hw_auth_token_t* auth_token = reinterpret_cast<hw_auth_token_t*>(p.blob.data()); in injectAuthToken()