Home
last modified time | relevance | path

Searched refs:hw_auth_token_t (Results 1 – 13 of 13) sorted by relevance

/system/security/keystore/tests/
Dauth_token_formatting_test.cpp96 static_assert(sizeof(hw_auth_token_t) == sizeof(test_token), "test_token has wrong size"); in TEST()
103 static_assert(sizeof(hw_auth_token_t) == sizeof(test_token), "test_token has wrong size"); in TEST()
110 static_assert(sizeof(hw_auth_token_t) == sizeof(test_token), "test_token has wrong size"); in TEST()
117 static_assert(sizeof(hw_auth_token_t) == sizeof(test_token), "test_token has wrong size"); in TEST()
124 static_assert(sizeof(hw_auth_token_t) == sizeof(test_token), "test_token has wrong size"); in TEST()
133 static_assert(sizeof(hw_auth_token_t) == sizeof(test_token), "test_token has wrong size"); in TEST()
141 static_assert(sizeof(hw_auth_token_t) == sizeof(test_token), "test_token has wrong size"); in TEST()
/system/keymaster/include/keymaster/km_openssl/
Dsoft_keymaster_enforcement.h33 bool auth_token_timed_out(const hw_auth_token_t& /*token*/, in auth_token_timed_out() argument
39 bool ValidateTokenSignature(const hw_auth_token_t& /*token*/) const override { return true; } in ValidateTokenSignature() argument
/system/keymaster/include/keymaster/
Dkeymaster_enforcement.h121 virtual bool auth_token_timed_out(const hw_auth_token_t& token, uint32_t timeout) const = 0;
159 virtual bool ValidateTokenSignature(const hw_auth_token_t& token) const = 0;
211 const hw_auth_token_t** token, uint32_t* token_auth_type) const;
/system/security/keystore/include/keystore/
Dkeystore_hidl_support.h95 sizeof(hw_auth_token_t), in authToken2HidlVec()
99 result.resize(sizeof(hw_auth_token_t)); in authToken2HidlVec()
127 sizeof(hw_auth_token_t), in hidlVec2Km3AuthToken()
130 if (buffer.size() != sizeof(hw_auth_token_t)) return {}; in hidlVec2Km3AuthToken()
/system/gatekeeper/
Dgatekeeper.cpp231 hw_auth_token_t token; in MintAuthToken()
247 static_assert(offsetof(hw_auth_token_t, hmac) == hashable_length, in MintAuthToken()
259 uint8_t *token_buffer = new(std::nothrow) uint8_t[sizeof(hw_auth_token_t)]; in MintAuthToken()
262 *reinterpret_cast<hw_auth_token_t*>(token_buffer) = token; in MintAuthToken()
264 *auth_token = { token_buffer, sizeof(hw_auth_token_t) }; in MintAuthToken()
/system/keymaster/android_keymaster/
Dkeymaster_enforcement.cpp297 const hw_auth_token_t* auth_token; in AuthorizeBegin()
453 const hw_auth_token_t** auth_token, in GetAndValidateAuthToken()
462 LOG_E("Bug: Auth token is the wrong size (%d expected, %d found)", sizeof(hw_auth_token_t), in GetAndValidateAuthToken()
467 *auth_token = reinterpret_cast<const hw_auth_token_t*>(auth_token_blob.data); in GetAndValidateAuthToken()
493 const hw_auth_token_t* auth_token; in AuthTokenMatches()
/system/keymaster/tests/
Dkeymaster_enforcement_test.cpp54 bool auth_token_timed_out(const hw_auth_token_t& token, uint32_t timeout) const override { in auth_token_timed_out()
57 bool ValidateTokenSignature(const hw_auth_token_t&) const override { in ValidateTokenSignature()
574 hw_auth_token_t token; in TEST_F()
597 hw_auth_token_t token; in TEST_F()
626 hw_auth_token_t token; in TEST_F()
650 hw_auth_token_t token; in TEST_F()
677 hw_auth_token_t token; in TEST_F()
706 hw_auth_token_t token; in TEST_F()
735 hw_auth_token_t token; in TEST_F()
758 hw_auth_token_t token; in TEST_F()
[all …]
Dandroid_keymaster_test.cpp87 virtual bool auth_token_timed_out(const hw_auth_token_t& /* token */, in auth_token_timed_out() argument
92 virtual bool ValidateTokenSignature(const hw_auth_token_t& /* token */) const { return true; } in ValidateTokenSignature()
/system/keymaster/ng/include/
Dkeystore_hidl_support.h110 == sizeof(hw_auth_token_t), in authToken2HidlVec()
114 result.resize(sizeof(hw_auth_token_t)); in authToken2HidlVec()
/system/gatekeeper/tests/
Dgatekeeper_device_test.cpp84 hw_auth_token_t *hat; in TEST_F()
98 hat = reinterpret_cast<hw_auth_token_t *>(auth_token); in TEST_F()
/system/vold/
DKeyStorage.cpp119 if (auth.token.size() != sizeof(hw_auth_token_t)) { in generateKeymasterKey()
120 LOG(ERROR) << "Auth token should be " << sizeof(hw_auth_token_t) << " bytes, was " in generateKeymasterKey()
124 const hw_auth_token_t* at = reinterpret_cast<const hw_auth_token_t*>(auth.token.data()); in generateKeymasterKey()
/system/core/trusty/keymaster/4.0/
DTrustyKeymaster4Device.cpp107 p.blob.resize(sizeof(hw_auth_token_t)); in injectAuthToken()
109 hw_auth_token_t* auth_token = reinterpret_cast<hw_auth_token_t*>(p.blob.data()); in injectAuthToken()
/system/security/keystore/
Dkey_store_service.cpp931 if (authTokenAsVector.size() != sizeof(hw_auth_token_t)) { in addAuthToken()
936 hw_auth_token_t authToken; in addAuthToken()
937 memcpy(reinterpret_cast<void*>(&authToken), authTokenAsVector.data(), sizeof(hw_auth_token_t)); in addAuthToken()