/system/gatekeeper/ |
D | gatekeeper_messages.cpp | 135 SizedBuffer *enrolled_password_handle, SizedBuffer *provided_password_payload) { in VerifyRequest() argument 138 this->password_handle.buffer.reset(enrolled_password_handle->buffer.release()); in VerifyRequest() 139 this->password_handle.length = enrolled_password_handle->length; in VerifyRequest() 327 EnrollResponse::EnrollResponse(uint32_t user_id, SizedBuffer *enrolled_password_handle) { in EnrollResponse() argument 329 this->enrolled_password_handle.buffer.reset(enrolled_password_handle->buffer.release()); in EnrollResponse() 330 this->enrolled_password_handle.length = enrolled_password_handle->length; in EnrollResponse() 334 memset_s(&enrolled_password_handle, 0, sizeof(enrolled_password_handle)); in EnrollResponse() 338 if (enrolled_password_handle.buffer.get()) { in ~EnrollResponse() 339 enrolled_password_handle.buffer.reset(); in ~EnrollResponse() 343 void EnrollResponse::SetEnrolledPasswordHandle(SizedBuffer *enrolled_password_handle) { in SetEnrolledPasswordHandle() argument [all …]
|
/system/core/gatekeeperd/ |
D | SoftGateKeeperDevice.cpp | 25 uint8_t **enrolled_password_handle, uint32_t *enrolled_password_handle_length) { in enroll() argument 27 if (enrolled_password_handle == NULL || enrolled_password_handle_length == NULL || in enroll() 66 *enrolled_password_handle = response.enrolled_password_handle.buffer.release(); in enroll() 67 *enrolled_password_handle_length = response.enrolled_password_handle.length; in enroll() 72 uint64_t challenge, const uint8_t *enrolled_password_handle, in verify() argument 77 if (enrolled_password_handle == NULL || in verify() 83 memcpy(password_handle_buffer.buffer.get(), enrolled_password_handle, in verify()
|
D | gatekeeperd.cpp | 135 uint8_t **enrolled_password_handle, uint32_t *enrolled_password_handle_length) { in enroll() argument 163 enrolled_password_handle, enrolled_password_handle_length); in enroll() 169 enrolled_password_handle, enrolled_password_handle_length); in enroll() 174 reinterpret_cast<gatekeeper::password_handle_t *>(*enrolled_password_handle); in enroll() 180 verify(uid, *enrolled_password_handle, sizeof(password_handle_t), desired_password, in enroll() 188 const uint8_t *enrolled_password_handle, uint32_t enrolled_password_handle_length, in verify() argument 192 return verifyChallenge(uid, 0, enrolled_password_handle, enrolled_password_handle_length, in verify() 198 const uint8_t *enrolled_password_handle, uint32_t enrolled_password_handle_length, in verifyChallenge() argument 215 … reinterpret_cast<const gatekeeper::password_handle_t *>(enrolled_password_handle); in verifyChallenge() 220 enrolled_password_handle, enrolled_password_handle_length, in verifyChallenge() [all …]
|
D | IGateKeeperService.h | 62 uint8_t **enrolled_password_handle, uint32_t *enrolled_password_handle_length) = 0; 72 virtual int verify(uint32_t uid, const uint8_t *enrolled_password_handle, 86 const uint8_t *enrolled_password_handle, uint32_t enrolled_password_handle_length,
|
D | SoftGateKeeperDevice.h | 51 uint8_t **enrolled_password_handle, uint32_t *enrolled_password_handle_length); 67 const uint8_t *enrolled_password_handle, uint32_t enrolled_password_handle_length,
|
/system/core/trusty/gatekeeper/ |
D | trusty_gatekeeper.cpp | 83 uint32_t desired_password_length, uint8_t **enrolled_password_handle, in Enroll() argument 116 *enrolled_password_handle = response.enrolled_password_handle.buffer.release(); in Enroll() 117 *enrolled_password_handle_length = response.enrolled_password_handle.length; in Enroll() 124 const uint8_t *enrolled_password_handle, uint32_t enrolled_password_handle_length, in Verify() argument 132 memcpy(password_handle_buffer.buffer.get(), enrolled_password_handle, in Verify() 192 uint8_t **enrolled_password_handle, uint32_t *enrolled_password_handle_length) { in enroll() argument 195 enrolled_password_handle == NULL || enrolled_password_handle_length == NULL || in enroll() 210 enrolled_password_handle, enrolled_password_handle_length); in enroll() 216 uint64_t challenge, const uint8_t *enrolled_password_handle, in verify() argument 221 if (dev == NULL || enrolled_password_handle == NULL || in verify() [all …]
|
D | trusty_gatekeeper.h | 46 uint32_t desired_password_length, uint8_t **enrolled_password_handle, 61 int Verify(uint32_t uid, uint64_t challenge, const uint8_t *enrolled_password_handle, 97 uint8_t **enrolled_password_handle, uint32_t *enrolled_password_handle_length); 113 const uint8_t *enrolled_password_handle, uint32_t enrolled_password_handle_length,
|
/system/core/gatekeeperd/tests/ |
D | gatekeeper_test.cpp | 76 VerifyRequest request(0, 1, &enroll_response.enrolled_password_handle, in TEST() 108 password_handle.buffer.reset(new uint8_t[enroll_response.enrolled_password_handle.length]); in TEST() 109 password_handle.length = enroll_response.enrolled_password_handle.length; in TEST() 110 memcpy(password_handle.buffer.get(), enroll_response.enrolled_password_handle.buffer.get(), in TEST() 114 VerifyRequest request(0, 0, &enroll_response.enrolled_password_handle, in TEST() 140 VerifyRequest new_request(0, 0, &enroll_response.enrolled_password_handle, in TEST() 162 VerifyRequest request(0, 0, &enroll_response.enrolled_password_handle, in TEST() 185 VerifyRequest new_request(0, 0, &enroll_response.enrolled_password_handle, in TEST()
|
/system/gatekeeper/include/gatekeeper/ |
D | gatekeeper_messages.h | 141 SizedBuffer *enrolled_password_handle, 197 EnrollResponse(uint32_t user_id, SizedBuffer *enrolled_password_handle); 201 void SetEnrolledPasswordHandle(SizedBuffer *enrolled_password_handle); 207 SizedBuffer enrolled_password_handle; member
|
/system/gatekeeper/tests/ |
D | gatekeeper_messages_test.cpp | 157 deserialized_password = &deserialized_msg.enrolled_password_handle; in TEST() 160 ASSERT_EQ(0, memcmp(msg.enrolled_password_handle.buffer.get(), in TEST()
|