/system/security/keystore/tests/ |
D | auth_token_formatting_test.cpp | 96 static_assert(sizeof(hw_auth_token_t) == sizeof(test_token), "test_token has wrong size"); in TEST() 103 static_assert(sizeof(hw_auth_token_t) == sizeof(test_token), "test_token has wrong size"); in TEST() 110 static_assert(sizeof(hw_auth_token_t) == sizeof(test_token), "test_token has wrong size"); in TEST() 117 static_assert(sizeof(hw_auth_token_t) == sizeof(test_token), "test_token has wrong size"); in TEST() 124 static_assert(sizeof(hw_auth_token_t) == sizeof(test_token), "test_token has wrong size"); in TEST() 133 static_assert(sizeof(hw_auth_token_t) == sizeof(test_token), "test_token has wrong size"); in TEST() 141 static_assert(sizeof(hw_auth_token_t) == sizeof(test_token), "test_token has wrong size"); in TEST()
|
/system/keymaster/include/keymaster/km_openssl/ |
D | soft_keymaster_enforcement.h | 33 bool auth_token_timed_out(const hw_auth_token_t& /*token*/, in auth_token_timed_out() argument 39 bool ValidateTokenSignature(const hw_auth_token_t& /*token*/) const override { return true; } in ValidateTokenSignature() argument
|
/system/keymaster/include/keymaster/ |
D | keymaster_enforcement.h | 121 virtual bool auth_token_timed_out(const hw_auth_token_t& token, uint32_t timeout) const = 0; 159 virtual bool ValidateTokenSignature(const hw_auth_token_t& token) const = 0; 211 const hw_auth_token_t** token, uint32_t* token_auth_type) const;
|
/system/security/keystore/include/keystore/ |
D | keystore_hidl_support.h | 95 sizeof(hw_auth_token_t), in authToken2HidlVec() 99 result.resize(sizeof(hw_auth_token_t)); in authToken2HidlVec() 127 sizeof(hw_auth_token_t), in hidlVec2Km3AuthToken() 130 if (buffer.size() != sizeof(hw_auth_token_t)) return {}; in hidlVec2Km3AuthToken()
|
/system/gatekeeper/ |
D | gatekeeper.cpp | 231 hw_auth_token_t token; in MintAuthToken() 247 static_assert(offsetof(hw_auth_token_t, hmac) == hashable_length, in MintAuthToken() 259 uint8_t *token_buffer = new(std::nothrow) uint8_t[sizeof(hw_auth_token_t)]; in MintAuthToken() 262 *reinterpret_cast<hw_auth_token_t*>(token_buffer) = token; in MintAuthToken() 264 *auth_token = { token_buffer, sizeof(hw_auth_token_t) }; in MintAuthToken()
|
/system/keymaster/android_keymaster/ |
D | keymaster_enforcement.cpp | 297 const hw_auth_token_t* auth_token; in AuthorizeBegin() 453 const hw_auth_token_t** auth_token, in GetAndValidateAuthToken() 462 LOG_E("Bug: Auth token is the wrong size (%d expected, %d found)", sizeof(hw_auth_token_t), in GetAndValidateAuthToken() 467 *auth_token = reinterpret_cast<const hw_auth_token_t*>(auth_token_blob.data); in GetAndValidateAuthToken() 493 const hw_auth_token_t* auth_token; in AuthTokenMatches()
|
/system/keymaster/tests/ |
D | keymaster_enforcement_test.cpp | 54 bool auth_token_timed_out(const hw_auth_token_t& token, uint32_t timeout) const override { in auth_token_timed_out() 57 bool ValidateTokenSignature(const hw_auth_token_t&) const override { in ValidateTokenSignature() 574 hw_auth_token_t token; in TEST_F() 597 hw_auth_token_t token; in TEST_F() 626 hw_auth_token_t token; in TEST_F() 650 hw_auth_token_t token; in TEST_F() 677 hw_auth_token_t token; in TEST_F() 706 hw_auth_token_t token; in TEST_F() 735 hw_auth_token_t token; in TEST_F() 758 hw_auth_token_t token; in TEST_F() [all …]
|
D | android_keymaster_test.cpp | 87 virtual bool auth_token_timed_out(const hw_auth_token_t& /* token */, in auth_token_timed_out() argument 92 virtual bool ValidateTokenSignature(const hw_auth_token_t& /* token */) const { return true; } in ValidateTokenSignature()
|
/system/keymaster/ng/include/ |
D | keystore_hidl_support.h | 110 == sizeof(hw_auth_token_t), in authToken2HidlVec() 114 result.resize(sizeof(hw_auth_token_t)); in authToken2HidlVec()
|
/system/gatekeeper/tests/ |
D | gatekeeper_device_test.cpp | 84 hw_auth_token_t *hat; in TEST_F() 98 hat = reinterpret_cast<hw_auth_token_t *>(auth_token); in TEST_F()
|
/system/vold/ |
D | KeyStorage.cpp | 119 if (auth.token.size() != sizeof(hw_auth_token_t)) { in generateKeymasterKey() 120 LOG(ERROR) << "Auth token should be " << sizeof(hw_auth_token_t) << " bytes, was " in generateKeymasterKey() 124 const hw_auth_token_t* at = reinterpret_cast<const hw_auth_token_t*>(auth.token.data()); in generateKeymasterKey()
|
/system/core/trusty/keymaster/4.0/ |
D | TrustyKeymaster4Device.cpp | 107 p.blob.resize(sizeof(hw_auth_token_t)); in injectAuthToken() 109 hw_auth_token_t* auth_token = reinterpret_cast<hw_auth_token_t*>(p.blob.data()); in injectAuthToken()
|
/system/security/keystore/ |
D | key_store_service.cpp | 931 if (authTokenAsVector.size() != sizeof(hw_auth_token_t)) { in addAuthToken() 936 hw_auth_token_t authToken; in addAuthToken() 937 memcpy(reinterpret_cast<void*>(&authToken), authTokenAsVector.data(), sizeof(hw_auth_token_t)); in addAuthToken()
|