Home
last modified time | relevance | path

Searched refs:auth_token (Results 1 – 17 of 17) sorted by relevance

/system/core/gatekeeperd/tests/
Dgatekeeper_test.cpp84 hw_auth_token_t *auth_token = in TEST() local
85 reinterpret_cast<hw_auth_token_t *>(response.auth_token.buffer.get()); in TEST()
87 ASSERT_EQ((uint32_t) HW_AUTH_PASSWORD, ntohl(auth_token->authenticator_type)); in TEST()
88 ASSERT_EQ((uint64_t) 1, auth_token->challenge); in TEST()
89 ASSERT_NE(~((uint32_t) 0), auth_token->timestamp); in TEST()
90 ASSERT_NE((uint64_t) 0, auth_token->user_id); in TEST()
91 ASSERT_NE((uint64_t) 0, auth_token->authenticator_id); in TEST()
119 hw_auth_token_t *auth_token = in TEST() local
120 reinterpret_cast<hw_auth_token_t *>(response.auth_token.buffer.get()); in TEST()
122 secure_id_t secure_id = auth_token->user_id; in TEST()
[all …]
/system/gatekeeper/tests/
Dgatekeeper_device_test.cpp59 uint8_t *auth_token; in TEST_F() local
71 password_payload, password_len, &auth_token, &auth_token_len, &should_reenroll); in TEST_F()
82 uint8_t *auth_token; in TEST_F() local
94 password_payload, password_len, &auth_token, &auth_token_len, &should_reenroll); in TEST_F()
98 hat = reinterpret_cast<hw_auth_token_t *>(auth_token); in TEST_F()
109 uint8_t *auth_token = NULL; in TEST_F() local
126 password_payload, password_len, &auth_token, &auth_token_len, in TEST_F()
129 ASSERT_EQ(NULL, auth_token); in TEST_F()
143 password_payload, password_len, &auth_token, &auth_token_len, in TEST_F()
154 uint8_t *auth_token = NULL; in TEST_F() local
[all …]
Dgatekeeper_messages_test.cpp196 SizedBuffer *auth_token = make_buffer(password_size); in TEST() local
199 VerifyResponse msg(USER_ID, auth_token); in TEST()
211 deserialized_password = &deserialized_msg.auth_token; in TEST()
213 ASSERT_EQ(0, memcmp(msg.auth_token.buffer.get(), deserialized_password->buffer.get(), in TEST()
/system/gatekeeper/
Dgatekeeper_messages.cpp194 VerifyResponse::VerifyResponse(uint32_t user_id, SizedBuffer *auth_token) { in VerifyResponse() argument
196 this->auth_token.buffer.reset(auth_token->buffer.release()); in VerifyResponse()
197 this->auth_token.length = auth_token->length; in VerifyResponse()
203 memset_s(&auth_token, 0, sizeof(auth_token)); in VerifyResponse()
207 if (auth_token.length > 0) { in ~VerifyResponse()
208 auth_token.buffer.reset(); in ~VerifyResponse()
212 void VerifyResponse::SetVerificationToken(SizedBuffer *auth_token) { in SetVerificationToken() argument
213 this->auth_token.buffer.reset(auth_token->buffer.release()); in SetVerificationToken()
214 this->auth_token.length = auth_token->length; in SetVerificationToken()
218 return serialized_buffer_size(auth_token) + sizeof(request_reenroll); in nonErrorSerializedSize()
[all …]
Dgatekeeper.cpp155 SizedBuffer auth_token(auth_token_len); in Verify() local
156 memcpy(auth_token.buffer.get(), auth_token_buffer.get(), auth_token_len); in Verify()
157 response->SetVerificationToken(&auth_token); in Verify()
217 void GateKeeper::MintAuthToken(UniquePtr<uint8_t> *auth_token, uint32_t *length, in MintAuthToken() argument
220 if (auth_token == NULL) return; in MintAuthToken()
244 auth_token->reset(reinterpret_cast<uint8_t *>(token)); in MintAuthToken()
/system/keymaster/
Dkeymaster_enforcement.cpp452 hw_auth_token_t auth_token; in AuthTokenMatches() local
453 memcpy(&auth_token, auth_token_blob.data, sizeof(hw_auth_token_t)); in AuthTokenMatches()
454 if (auth_token.version != HW_AUTH_TOKEN_VERSION) { in AuthTokenMatches()
456 auth_token.version, HW_AUTH_TOKEN_VERSION); in AuthTokenMatches()
460 if (!ValidateTokenSignature(auth_token)) { in AuthTokenMatches()
465 if (auth_timeout_index == -1 && op_handle && op_handle != auth_token.challenge) { in AuthTokenMatches()
466 LOG_E("Auth token has the challenge %llu, need %llu", auth_token.challenge, op_handle); in AuthTokenMatches()
470 if (user_secure_id != auth_token.user_id && user_secure_id != auth_token.authenticator_id) { in AuthTokenMatches()
471 LOG_I("Auth token SIDs %llu and %llu do not match key SID %llu", auth_token.user_id, in AuthTokenMatches()
472 auth_token.authenticator_id, user_secure_id); in AuthTokenMatches()
[all …]
/system/core/gatekeeperd/
DSoftGateKeeperDevice.cpp74 uint32_t provided_password_length, uint8_t **auth_token, uint32_t *auth_token_length, in verify() argument
99 if (auth_token != NULL && auth_token_length != NULL) { in verify()
100 *auth_token = response.auth_token.buffer.release(); in verify()
101 *auth_token_length = response.auth_token.length; in verify()
Dgatekeeperd.cpp190 uint8_t *auth_token; in verify() local
194 &auth_token, &auth_token_length, request_reenroll); in verify()
200 uint8_t **auth_token, uint32_t *auth_token_length, bool *request_reenroll) { in verifyChallenge() argument
221 provided_password, provided_password_length, auth_token, auth_token_length, in verifyChallenge()
228 provided_password, provided_password_length, auth_token, auth_token_length, in verifyChallenge()
239 provided_password, provided_password_length, auth_token, auth_token_length, in verifyChallenge()
243 if (ret == 0 && *auth_token != NULL && *auth_token_length > 0) { in verifyChallenge()
249 status_t ret = service->addAuthToken(*auth_token, *auth_token_length); in verifyChallenge()
DSoftGateKeeperDevice.h69 uint8_t **auth_token, uint32_t *auth_token_length, bool *request_reenroll);
DIGateKeeperService.h88 uint8_t **auth_token, uint32_t *auth_token_length, bool *request_reenroll) = 0;
/system/core/trusty/gatekeeper/
Dtrusty_gatekeeper.cpp126 uint8_t **auth_token, uint32_t *auth_token_length, bool *request_reenroll) { in Verify() argument
148 if (auth_token != NULL && auth_token_length != NULL) { in Verify()
149 *auth_token = response.auth_token.buffer.release(); in Verify()
150 *auth_token_length = response.auth_token.length; in Verify()
218 uint32_t provided_password_length, uint8_t **auth_token, uint32_t *auth_token_length, in verify() argument
228 auth_token, auth_token_length, request_reenroll); in verify()
Dtrusty_gatekeeper.h63 uint32_t provided_password_length, uint8_t **auth_token, uint32_t *auth_token_length,
115 uint8_t **auth_token, uint32_t *auth_token_length, bool *request_reenroll);
/system/gatekeeper/include/gatekeeper/
Dgatekeeper_messages.h156 VerifyResponse(uint32_t user_id, SizedBuffer *auth_token);
160 void SetVerificationToken(SizedBuffer *auth_token);
166 SizedBuffer auth_token; member
Dgatekeeper.h179 void MintAuthToken(UniquePtr<uint8_t> *auth_token, uint32_t *length, uint64_t timestamp,
/system/core/fingerprintd/
DFingerprintDaemonProxy.cpp107 void FingerprintDaemonProxy::notifyKeystore(const uint8_t *auth_token, const size_t auth_token_leng… in notifyKeystore() argument
108 if (auth_token != NULL && auth_token_length > 0) { in notifyKeystore()
114 status_t ret = service->addAuthToken(auth_token, auth_token_length); in notifyKeystore()
DFingerprintDaemonProxy.h53 void notifyKeystore(const uint8_t *auth_token, const size_t auth_token_length);
/system/security/keystore/
Dauth_token_table.cpp52 void AuthTokenTable::AddAuthenticationToken(const hw_auth_token_t* auth_token) { in AddAuthenticationToken() argument
53 Entry new_entry(auth_token, clock_function_()); in AddAuthenticationToken()