Searched refs:enrolledPasswordHandle (Results 1 – 10 of 10) sorted by relevance
/aosp12/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/ |
H A D | FakeGateKeeperService.java | 118 public GateKeeperResponse verify(int uid, byte[] enrolledPasswordHandle, in verify() argument 120 return verifyChallenge(uid, 0, enrolledPasswordHandle, providedPassword); in verify() 125 byte[] enrolledPasswordHandle, byte[] providedPassword) throws RemoteException { in verifyChallenge() argument 127 VerifyHandle handle = new VerifyHandle(enrolledPasswordHandle); in verifyChallenge() 131 if (!Arrays.equals(knownHandle, enrolledPasswordHandle)) { in verifyChallenge()
|
/aosp12/system/core/gatekeeperd/ |
H A D | gatekeeperd.cpp | 243 Status verify(int32_t userId, const ::std::vector<uint8_t>& enrolledPasswordHandle, in verify() argument 245 return verifyChallenge(userId, 0 /* challenge */, enrolledPasswordHandle, providedPassword, in verify() 250 const std::vector<uint8_t>& enrolledPasswordHandle, in verifyChallenge() argument 261 if (enrolledPasswordHandle.size() == 0 || providedPassword.size() == 0) return GK_ERROR; in verifyChallenge() 265 if (enrolledPasswordHandle.size() != sizeof(gatekeeper::password_handle_t)) { in verifyChallenge() 271 enrolledPasswordHandle.data()); in verifyChallenge() 275 curPwdHandle.setToExternal(const_cast<uint8_t*>(enrolledPasswordHandle.data()), in verifyChallenge() 276 enrolledPasswordHandle.size()); in verifyChallenge()
|
/aosp12/system/core/gatekeeperd/binder/android/service/gatekeeper/ |
H A D | IGateKeeperService.aidl | 53 …GateKeeperResponse verify(int userId, in byte[] enrolledPasswordHandle, in byte[] providedPassword… in verify() argument 66 GateKeeperResponse verifyChallenge(int userId, long challenge, in byte[] enrolledPasswordHandle, in verifyChallenge() argument
|
/aosp12/hardware/interfaces/gatekeeper/1.0/software/ |
H A D | SoftGateKeeperDevice.cpp | 75 const ::android::hardware::hidl_vec<uint8_t>& enrolledPasswordHandle, in verify() 77 if (enrolledPasswordHandle.size() == 0) { in verify() 82 VerifyRequest request(uid, challenge, hidl_vec2sized_buffer(enrolledPasswordHandle), in verify()
|
H A D | SoftGateKeeperDevice.h | 66 const ::android::hardware::hidl_vec<uint8_t>& enrolledPasswordHandle,
|
/aosp12/hardware/interfaces/gatekeeper/1.0/default/ |
H A D | Gatekeeper.cpp | 87 const hidl_vec<uint8_t>& enrolledPasswordHandle, in verify() argument 97 enrolledPasswordHandle.data(), enrolledPasswordHandle.size(), in verify()
|
H A D | Gatekeeper.h | 54 const hidl_vec<uint8_t>& enrolledPasswordHandle,
|
/aosp12/hardware/interfaces/gatekeeper/1.0/ |
H A D | IGatekeeper.hal | 60 * Verifies that providedPassword matches enrolledPasswordHandle. 74 * @param enrolledPasswordHandle The currently enrolled password handle that 78 * enrolledPasswordHandle 91 vec<uint8_t> enrolledPasswordHandle, 96 * Deletes the enrolledPasswordHandle associated with the uid. Once deleted
|
/aosp12/system/core/trusty/gatekeeper/ |
H A D | trusty_gatekeeper.cpp | 101 const ::android::hardware::hidl_vec<uint8_t>& enrolledPasswordHandle, in verify() 108 if (enrolledPasswordHandle.size() == 0) { in verify() 113 VerifyRequest request(uid, challenge, hidl_vec2sized_buffer(enrolledPasswordHandle), in verify()
|
H A D | trusty_gatekeeper.h | 64 const ::android::hardware::hidl_vec<uint8_t>& enrolledPasswordHandle,
|