/system/gatekeeper/tests/ |
D | gatekeeper_device_test.cpp | 70 ret = device->verify(device, 400, 0, password_handle, password_handle_length, in TEST_F() 93 ret = device->verify(device, 400, 0, password_handle, password_handle_length, in TEST_F() 125 ret = device->verify(device, 400, 0, password_handle, password_handle_length, in TEST_F() 142 ret = device->verify(device, 400, 0, password_handle, password_handle_length, in TEST_F() 166 ret = device->verify(device, 400, 0, password_handle, password_handle_length, in TEST_F() 195 ret = device->verify(device, 400, 0, password_handle, password_handle_length, in TEST_F()
|
/system/core/gatekeeperd/ |
D | gatekeeperd.cpp | 180 verify(uid, *enrolled_password_handle, sizeof(password_handle_t), desired_password, in enroll() 187 virtual int verify(uint32_t uid, in verify() function in android::GateKeeperProxy 219 ret = device->verify(device, uid, challenge, in verifyChallenge() 226 ret = soft_dev.verify(uid, challenge, in verifyChallenge() 237 ret = soft_device->verify(uid, challenge, in verifyChallenge()
|
D | SoftGateKeeperDevice.h | 66 int verify(uint32_t uid, uint64_t challenge,
|
D | IGateKeeperService.h | 72 virtual int verify(uint32_t uid, const uint8_t *enrolled_password_handle,
|
D | SoftGateKeeperDevice.cpp | 71 int SoftGateKeeperDevice::verify(uint32_t uid, in verify() function in android::SoftGateKeeperDevice
|
D | IGateKeeperService.cpp | 89 int ret = verify(uid, (uint8_t *) currentPasswordHandle, in onTransact()
|
/system/extras/tests/memtest/ |
D | bandwidth.h | 60 virtual bool verify() = 0; 143 bool verify() { in verify() function 458 bool verify() { return true; } in verify() function 471 bool verify() { in verify() function
|
/system/core/trusty/gatekeeper/ |
D | trusty_gatekeeper.cpp | 54 device_.verify = verify; in TrustyGateKeeperDevice() 215 int TrustyGateKeeperDevice::verify(const struct gatekeeper_device *dev, uint32_t uid, in verify() function in gatekeeper::TrustyGateKeeperDevice
|
D | trusty_gatekeeper.h | 112 static int verify(const struct gatekeeper_device *dev, uint32_t uid, uint64_t challenge,
|
/system/extras/verity/ |
D | KeystoreSigner.java | 143 public boolean verify() throws Exception { in verify() method in BootKeystore 145 return Utils.verify(signature.getPublicKey(), innerKeystore, in verify() 182 if (ks.verify()) { in main()
|
D | BootSignature.java | 169 public boolean verify(byte[] image) throws Exception { in verify() method in BootSignature 175 return Utils.verify(publicKey, signable, signature.getOctets(), in verify() 274 if (bootsig.verify(Arrays.copyOf(image, signableSize))) { in verifySignature()
|
D | VeritySigner.java | 51 if (Utils.verify(publicKey, content, signature, in main()
|
D | VerityVerifier.java | 301 return Utils.verify(key, table, signature, in verifyMetaData() 388 public boolean verify(PublicKey key) throws Exception { in verify() method in VerityVerifier 409 if (verifier.verify(key)) { in main()
|
D | verify_boot_signature.c | 362 static int verify(const char *image_file) in verify() function 428 return verify(argv[1]); in main()
|
D | Utils.java | 259 static boolean verify(PublicKey key, byte[] input, byte[] signature, in verify() method in Utils 271 return verifier.verify(signature); in verify()
|
/system/sepolicy/ |
D | racoon.te | 31 verify
|
D | binderservicedomain.te | 20 …w binderservicedomain keystore:keystore_key { get_state get insert delete exist list sign verify };
|
D | wpa.te | 33 verify
|
D | fsck.te | 24 # fsck performs a stat() on swap to verify that it is a valid
|
D | system_app.te | 66 verify
|
/system/connectivity/shill/shims/protos/ |
D | crypto_util.proto | 51 // This protobuf gives the parameters for the shim the verify credentials.
|
/system/keymaster/ |
D | keymaster0_engine.cpp | 58 rsa_method_.verify = nullptr; in Keymaster0Engine() 82 ecdsa_method_.verify = nullptr; in Keymaster0Engine()
|
D | keymaster1_engine.cpp | 396 method.verify = nullptr; in BuildRsaMethod() 421 method.verify = nullptr; in BuildEcdsaMethod()
|
/system/security/keystore/ |
D | key_store_service.h | 64 int32_t verify(const String16& name, const uint8_t* data, size_t dataLength,
|
/system/tpm/attestation/common/ |
D | database.proto | 35 // Holds information required to verify the binding of an AIK to an EK. This
|