Home
last modified time | relevance | path

Searched refs:token (Results 1 – 25 of 126) sorted by relevance

123456

/system/core/libpixelflinger/codeflinger/
DArm64Disassembler.cpp95 static void get_token(const char *instr, uint32_t index, char *token) in get_token() argument
102 token[j++] = instr[i]; in get_token()
111 token[j++] = instr[i]; in get_token()
114 token[j] = '\0'; in get_token()
134 static void decode_token(uint32_t code, char *token, char *instr_part) in decode_token() argument
136 if(strcmp(token, "<imm1>") == 0) in decode_token()
138 else if(strcmp(token, "<imm2>") == 0) in decode_token()
140 else if(strcmp(token, "<shift1>") == 0) in decode_token()
142 else if(strcmp(token, "<shift2>") == 0) in decode_token()
147 else if(strcmp(token, "<shift3>") == 0) in decode_token()
[all …]
/system/security/keystore/tests/
Dverification_token_seralization_test.cpp32 VerificationToken token; in TEST() local
33 token.challenge = 12345; in TEST()
34 token.timestamp = 67890; in TEST()
35 token.securityLevel = SecurityLevel::TRUSTED_ENVIRONMENT; in TEST()
36 token.mac.resize(32); in TEST()
38 token.mac[n] = n; in TEST()
40 optional<vector<uint8_t>> serialized = serializeVerificationToken(token); in TEST()
44 ASSERT_EQ(token.challenge, deserialized.value().challenge); in TEST()
45 ASSERT_EQ(token.timestamp, deserialized.value().timestamp); in TEST()
46 ASSERT_EQ(token.securityLevel, deserialized.value().securityLevel); in TEST()
[all …]
/system/tools/aidl/
Daidl_language_l.ll45 /* This happens at every call to yylex (every time we receive one token) */
56 \"[^\"]*\" { yylval->token = new AidlToken(yytext, extra_text);
57 return yy::parser::token::C_STR; }
87 "<<" { return(yy::parser::token::LSHIFT); }
88 ">>" { return(yy::parser::token::RSHIFT); }
89 "&&" { return(yy::parser::token::LOGICAL_AND); }
90 "||" { return(yy::parser::token::LOGICAL_OR); }
93 "<=" { return(yy::parser::token::LEQ); }
94 ">=" { return(yy::parser::token::GEQ); }
95 "==" { return(yy::parser::token::EQUALITY); }
[all …]
Daidl_language_y.yy71 AidlToken* token;
106 %token<token> ANNOTATION "annotation"
107 %token<token> C_STR "string literal"
108 %token<token> IDENTIFIER "identifier"
109 %token<token> INTERFACE "interface"
110 %token<token> PARCELABLE "parcelable"
111 %token<token> ONEWAY "oneway"
112 %token<token> ENUM "enum"
113 %token<token> CONST "const"
115 %token<character> CHARVALUE "char literal"
[all …]
/system/keymaster/tests/
Dkeymaster_enforcement_test.cpp54 bool auth_token_timed_out(const hw_auth_token_t& token, uint32_t timeout) const override { in auth_token_timed_out() argument
55 return current_time_ > ntoh(token.timestamp) + timeout; in auth_token_timed_out()
574 hw_auth_token_t token; in TEST_F() local
575 memset(&token, 0, sizeof(token)); in TEST_F()
576 token.version = HW_AUTH_TOKEN_VERSION; in TEST_F()
577 token.challenge = 99; in TEST_F()
578 token.user_id = 9; in TEST_F()
579 token.authenticator_id = 0; in TEST_F()
580 token.authenticator_type = hton(static_cast<uint32_t>(HW_AUTH_PASSWORD)); in TEST_F()
581 token.timestamp = 0; in TEST_F()
[all …]
/system/security/keystore/include/keystore/
Dkeystore_hidl_support.h88 inline static hidl_vec<uint8_t> authToken2HidlVec(const Km3HardwareAuthToken& token) { in authToken2HidlVec() argument
89 static_assert(std::is_same<decltype(token.hmac), in authToken2HidlVec()
92 static_assert(1 /* version size */ + sizeof(token.challenge) + sizeof(token.userId) + in authToken2HidlVec()
93 sizeof(token.authenticatorId) + sizeof(token.authenticatorType) + in authToken2HidlVec()
94 sizeof(token.timestamp) + kHmacSize == in authToken2HidlVec()
102 pos = copy_bytes_to_iterator(token.challenge, pos); in authToken2HidlVec()
103 pos = copy_bytes_to_iterator(token.userId, pos); in authToken2HidlVec()
104 pos = copy_bytes_to_iterator(token.authenticatorId, pos); in authToken2HidlVec()
105 pos = copy_bytes_to_iterator(token.authenticatorType, pos); in authToken2HidlVec()
106 pos = copy_bytes_to_iterator(token.timestamp, pos); in authToken2HidlVec()
[all …]
/system/bt/gd/packet/parser/
Dlanguage_l.ll10 using token = yy::parser::token;
53 "_body_" { return(token::BODY); }
54 "_payload_" { return(token::PAYLOAD); }
55 "_size_" { return(token::SIZE); }
56 "_count_" { return(token::COUNT); }
57 "_fixed_" { return(token::FIXED); }
58 "_reserved_" { return(token::RESERVED); }
59 "_checksum_start_" { return(token::CHECKSUM_START); }
60 "_padding_" { return(token::PADDING); }
62 "checksum" { return(token::CHECKSUM); }
[all …]
/system/tools/hidl/
Dhidl-gen_l.ll57 using token = yy::parser::token;
62 return token::TYPE; \
95 return isDoc ? token::DOC_COMMENT : token::MULTILINE_COMMENT;
105 "enum" { return token::ENUM; }
106 "extends" { return token::EXTENDS; }
107 "generates" { return token::GENERATES; }
108 "import" { return token::IMPORT; }
109 "interface" { return token::INTERFACE; }
110 "package" { return token::PACKAGE; }
111 "safe_union" { return token::SAFE_UNION; }
[all …]
/system/security/keystore/
Doperation.cpp33 sp<IBinder> token = new ::android::BBinder(); in addOperation() local
34 mMap.emplace(token, std::make_shared<Operation>(handle, keyid, purpose, dev, in addOperation()
36 if (pruneable) mLru.push_back(token); in addOperation()
38 mAppTokenMap[appToken].push_back(token); in addOperation()
39 return token; in addOperation()
42 std::shared_ptr<Operation> OperationMap::getOperation(const sp<IBinder>& token) { in getOperation() argument
43 auto entry = mMap.find(token); in getOperation()
48 updateLru(token); in getOperation()
52 void OperationMap::updateLru(const sp<IBinder>& token) { in updateLru() argument
53 auto lruEntry = std::find(mLru.begin(), mLru.end(), token); in updateLru()
[all …]
/system/hwservicemanager/
DTokenManager.cpp30 namespace token { namespace
65 uint64_t id = getTokenId(interface.token); in createToken()
80 hidl_cb(interface.token); in createToken()
85 TokenManager::lookupToken(const hidl_vec<uint8_t> &token) { in lookupToken() argument
86 uint64_t tokenId = getTokenId(token); in lookupToken()
100 if (!constantTimeCompare(token, interface.token)) { in lookupToken()
108 Return<bool> TokenManager::unregister(const hidl_vec<uint8_t> &token) { in unregister() argument
109 auto it = lookupToken(token); in unregister()
119 Return<sp<IBase>> TokenManager::get(const hidl_vec<uint8_t> &token) { in get() argument
120 auto it = lookupToken(token); in get()
[all …]
DTokenManager.h28 namespace token {
33 using ::android::hidl::token::V1_0::ITokenManager;
46 Return<bool> unregister(const hidl_vec<uint8_t> &token) override;
47 Return<sp<IBase>> get(const hidl_vec<uint8_t> &token) override;
57 static uint64_t getTokenId(const hidl_vec<uint8_t> &token);
64 hidl_vec<uint8_t> token; // First eight bytes are tokenId. Remaining bytes are hmac. member
71 lookupToken(const hidl_vec<uint8_t> &token);
/system/vold/
DScryptParameters.cpp24 char* token; in parse_scrypt_parameters() local
32 for (i = 0, token = strtok_r(const_cast<char*>(paramstr), ":", &saveptr); in parse_scrypt_parameters()
33 token != nullptr && i < 3; i++, token = strtok_r(nullptr, ":", &saveptr)) { in parse_scrypt_parameters()
35 params[i] = strtol(token, &endptr, 10); in parse_scrypt_parameters()
40 if ((*token == '\0') || (*endptr != '\0') || params[i] < 0 || params[i] > 255) { in parse_scrypt_parameters()
44 if (token != nullptr) { in parse_scrypt_parameters()
/system/libhidl/transport/token/1.0/
DITokenManager.hal17 package android.hidl.token@1.0;
27 * to the interface until the token is destroyed by calling unregister.
29 * Must return empty token on failure.
31 * @param store Interface which can later be fetched with the returned token.
32 * @return token Opaque value which may be used as inputs to other functions.
34 createToken(interface store) generates (vec<uint8_t>token);
37 * Destory a token and the strong reference to the associated interface.
39 * @param token Token received from createToken
40 * @return success Whether or not the token was successfully unregistered.
42 unregister(vec<uint8_t> token) generates (bool success);
[all …]
/system/keymaster/ng/include/
Dkeystore_hidl_support.h103 inline static hidl_vec<uint8_t> authToken2HidlVec(const HardwareAuthToken& token) { in authToken2HidlVec() argument
105 std::is_same<decltype(token.hmac), ::android::hardware::hidl_array<uint8_t, 32>>::value, in authToken2HidlVec()
107 static_assert(1 /* version size */ + sizeof(token.challenge) + sizeof(token.userId) + in authToken2HidlVec()
108 sizeof(token.authenticatorId) + sizeof(token.authenticatorType) + in authToken2HidlVec()
109 sizeof(token.timestamp) + 32 /* HMAC size */ in authToken2HidlVec()
117 pos = copy_bytes_to_iterator(token.challenge, pos); in authToken2HidlVec()
118 pos = copy_bytes_to_iterator(token.userId, pos); in authToken2HidlVec()
119 pos = copy_bytes_to_iterator(token.authenticatorId, pos); in authToken2HidlVec()
120 pos = copy_bytes_to_iterator(token.authenticatorType, pos); in authToken2HidlVec()
121 pos = copy_bytes_to_iterator(token.timestamp, pos); in authToken2HidlVec()
[all …]
/system/tools/aidl/tests/
Daidl_test_service.cpp119 void LogRepeatedStringToken(const String16& token) { in LogRepeatedStringToken() argument
120 ALOGI("Repeating '%s' of length=%zu", android::String8(token).string(), in LogRepeatedStringToken()
121 token.size()); in LogRepeatedStringToken()
125 void LogRepeatedToken(const T& token) { in LogRepeatedToken() argument
127 token_str << token; in LogRepeatedToken()
131 Status RepeatBoolean(bool token, bool* _aidl_return) override { in RepeatBoolean() argument
132 LogRepeatedToken(token ? 1 : 0); in RepeatBoolean()
133 *_aidl_return = token; in RepeatBoolean()
136 Status RepeatByte(int8_t token, int8_t* _aidl_return) override { in RepeatByte() argument
137 LogRepeatedToken(token); in RepeatByte()
[all …]
/system/bt/main/shim/
Ddumpsys.cc31 void bluetooth::shim::RegisterDumpsysFunction(const void* token, in RegisterDumpsysFunction() argument
35 CHECK(dumpsys_functions_->find(token) == dumpsys_functions_->end()); in RegisterDumpsysFunction()
36 dumpsys_functions_->insert({token, func}); in RegisterDumpsysFunction()
39 void bluetooth::shim::UnregisterDumpsysFunction(const void* token) { in UnregisterDumpsysFunction() argument
40 CHECK(dumpsys_functions_->find(token) != dumpsys_functions_->end()); in UnregisterDumpsysFunction()
41 dumpsys_functions_->erase(token); in UnregisterDumpsysFunction()
/system/gatekeeper/
Dgatekeeper.cpp231 hw_auth_token_t token; in MintAuthToken() local
233 token.version = HW_AUTH_TOKEN_VERSION; in MintAuthToken()
234 token.challenge = challenge; in MintAuthToken()
235 token.user_id = user_id; in MintAuthToken()
236 token.authenticator_id = authenticator_id; in MintAuthToken()
237 token.authenticator_type = htobe32(HW_AUTH_PASSWORD); in MintAuthToken()
238 token.timestamp = htobe64(timestamp); in MintAuthToken()
240 constexpr uint32_t hashable_length = sizeof(token.version) + in MintAuthToken()
241 sizeof(token.challenge) + in MintAuthToken()
242 sizeof(token.user_id) + in MintAuthToken()
[all …]
/system/libhidl/transport/token/1.0/utils/
DHybridInterface.cpp26 using ::android::hidl::token::V1_0::ITokenManager;
76 sp<HInterface> retrieveHalInterface(const HalToken& token) { in retrieveHalInterface() argument
83 transaction = gTokenManager->get(token); in retrieveHalInterface()
91 bool createHalToken(const sp<HInterface>& interface, HalToken* token) { in createHalToken() argument
99 *token = newToken; in createHalToken()
105 bool deleteHalToken(const HalToken& token) { in deleteHalToken() argument
112 transaction = gTokenManager->unregister(token); in deleteHalToken()
/system/tools/hidl/lint/lints/
DenumMaxAndAll.cpp49 for (const std::string& token : tokens) { in enumValueNames() local
50 if (token == "ALL" || token == "COUNT" || token == "MAX") { in enumValueNames()
51 errorString = "\"" + token + "\"" + in enumValueNames()
/system/tools/hidl/c2hal/
Dc2hal_y.yy85 %token START_HEADER
86 %token START_EXPR
88 %token STRUCT
89 %token UNION
90 %token ENUM
91 %token CLASS
92 %token CONST
93 %token VOID
94 %token INCLUDE
95 %token DEFINE
[all …]
/system/tools/aidl/tests/android/aidl/tests/
DITestService.aidl48 boolean RepeatBoolean(boolean token); in RepeatBoolean() argument
49 byte RepeatByte(byte token); in RepeatByte() argument
50 char RepeatChar(char token); in RepeatChar() argument
51 int RepeatInt(int token); in RepeatInt() argument
52 long RepeatLong(long token); in RepeatLong() argument
53 float RepeatFloat(float token); in RepeatFloat() argument
54 double RepeatDouble(double token); in RepeatDouble() argument
55 String RepeatString(String token); in RepeatString() argument
56 ByteEnum RepeatByteEnum(ByteEnum token); in RepeatByteEnum() argument
57 IntEnum RepeatIntEnum(IntEnum token); in RepeatIntEnum() argument
[all …]
/system/bt/gd/hci/
Daddress.cc71 std::string token; in FromString() local
73 while (getline(stream, token, ':')) { in FromString()
78 if (token.length() != 2) { in FromString()
83 addr.address.at(5 - index) = std::strtol(token.c_str(), &temp, 16); in FromString()
84 if (temp == token.c_str()) { in FromString()
88 if (temp != (token.c_str() + token.size())) { in FromString()
/system/core/adb/crypto/tests/
Dkey_test.cpp48 const char token[SHA_DIGEST_LENGTH] = "abcdefghij123456789"; in TEST() local
51 EXPECT_EQ(RSA_sign(NID_sha1, reinterpret_cast<const uint8_t*>(token), sizeof(token), sig.data(), in TEST()
62 EXPECT_EQ(RSA_verify(NID_sha1, reinterpret_cast<const uint8_t*>(token), sizeof(token), in TEST()
Drsa_2048_key_test.cpp51 const char token[SHA_DIGEST_LENGTH] = "abcdefghij123456789"; in TEST() local
54 EXPECT_EQ(RSA_sign(NID_sha1, reinterpret_cast<const uint8_t*>(token), sizeof(token), sig.data(), in TEST()
65 EXPECT_EQ(RSA_verify(NID_sha1, reinterpret_cast<const uint8_t*>(token), sizeof(token), in TEST()
/system/core/libcutils/
Dcanned_fs_config.cpp56 char* token; in load_canned_fs_config() local
74 token = strtok(NULL, " "); in load_canned_fs_config()
75 if (token && strncmp(token, "capabilities=", 13) == 0) { in load_canned_fs_config()
76 p->capabilities = strtoll(token+13, NULL, 0); in load_canned_fs_config()
79 } while (token); in load_canned_fs_config()

123456