Searched refs:password_handle (Results 1 – 6 of 6) sorted by relevance
/system/gatekeeper/tests/ |
D | gatekeeper_device_test.cpp | 57 uint8_t *password_handle; in TEST_F() local 64 &password_handle, &password_handle_length); in TEST_F() 70 ret = device->verify(device, 400, 0, password_handle, password_handle_length, in TEST_F() 80 uint8_t *password_handle; in TEST_F() local 88 &password_handle, &password_handle_length); in TEST_F() 93 ret = device->verify(device, 400, 0, password_handle, password_handle_length, in TEST_F() 107 uint8_t *password_handle; in TEST_F() local 115 &password_handle, &password_handle_length); in TEST_F() 125 ret = device->verify(device, 400, 0, password_handle, password_handle_length, in TEST_F() 142 ret = device->verify(device, 400, 0, password_handle, password_handle_length, in TEST_F() [all …]
|
D | gatekeeper_messages_test.cpp | 69 ASSERT_FALSE(deserialized_msg.password_handle); in TEST() 92 ASSERT_FALSE(deserialized_msg.password_handle); in TEST() 99 SizedBuffer password_handle = make_buffer(password_size); in TEST() local 104 …EnrollRequest msg(USER_ID, move(password_handle), move(provided_password), move(enrolled_password)… in TEST() 117 deserialized_handle = &deserialized_msg.password_handle; in TEST() 124 …ASSERT_EQ(0, memcmp(msg.password_handle.Data<uint8_t>(), deserialized_handle->Data<uint8_t>(), pas… in TEST() 167 deserialized_password = &deserialized_msg.password_handle; in TEST() 172 deserialized_password = &deserialized_msg.password_handle; in TEST() 174 ASSERT_EQ(0, memcmp(msg.password_handle.Data<uint8_t>(), deserialized_password->Data<uint8_t>(), in TEST()
|
/system/gatekeeper/ |
D | gatekeeper.cpp | 37 if (!request.password_handle) { in Enroll() 41 const password_handle_t *pw_handle = request.password_handle.Data<password_handle_t>(); in Enroll() 93 SizedBuffer password_handle; in Enroll() local 94 if (!CreatePasswordHandle(&password_handle, in Enroll() 100 response->SetEnrolledPasswordHandle(move(password_handle)); in Enroll() 106 if (!request.provided_password || !request.password_handle) { in Verify() 111 const password_handle_t *password_handle = request.password_handle.Data<password_handle_t>(); in Verify() local 113 if (!password_handle || password_handle->version > HANDLE_VERSION) { in Verify() 118 secure_id_t user_id = password_handle->user_id; in Verify() 125 bool throttle = (password_handle->version >= HANDLE_VERSION_THROTTLE); in Verify() [all …]
|
D | gatekeeper_messages.cpp | 165 this->password_handle = move(enrolled_password_handle); in VerifyRequest() 170 return sizeof(challenge) + serialized_buffer_size(password_handle) in nonErrorSerializedSize() 177 append_to_buffer(&buffer, password_handle); in nonErrorSerialize() 184 password_handle = {}; in nonErrorDeserialize() 192 error = read_from_buffer(&payload, end, &password_handle); in nonErrorDeserialize() 236 EnrollRequest::EnrollRequest(uint32_t user_id, SizedBuffer password_handle, in EnrollRequest() argument 242 this->password_handle = move(password_handle); in EnrollRequest() 247 + serialized_buffer_size(password_handle); in nonErrorSerializedSize() 253 append_to_buffer(&buffer, password_handle); in nonErrorSerialize() 261 password_handle = {}; in nonErrorDeserialize() [all …]
|
/system/gatekeeper/include/gatekeeper/ |
D | gatekeeper_messages.h | 180 SizedBuffer password_handle; member 199 EnrollRequest(uint32_t user_id, SizedBuffer password_handle, 211 SizedBuffer password_handle; member
|
D | gatekeeper.h | 201 bool CreatePasswordHandle(SizedBuffer *password_handle, salt_t salt,
|