Home
last modified time | relevance | path

Searched refs:enrolledPasswordHandle (Results 1 – 10 of 10) sorted by relevance

/aosp12/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/
H A DFakeGateKeeperService.java118 public GateKeeperResponse verify(int uid, byte[] enrolledPasswordHandle, in verify() argument
120 return verifyChallenge(uid, 0, enrolledPasswordHandle, providedPassword); in verify()
125 byte[] enrolledPasswordHandle, byte[] providedPassword) throws RemoteException { in verifyChallenge() argument
127 VerifyHandle handle = new VerifyHandle(enrolledPasswordHandle); in verifyChallenge()
131 if (!Arrays.equals(knownHandle, enrolledPasswordHandle)) { in verifyChallenge()
/aosp12/system/core/gatekeeperd/
H A Dgatekeeperd.cpp243 Status verify(int32_t userId, const ::std::vector<uint8_t>& enrolledPasswordHandle, in verify() argument
245 return verifyChallenge(userId, 0 /* challenge */, enrolledPasswordHandle, providedPassword, in verify()
250 const std::vector<uint8_t>& enrolledPasswordHandle, in verifyChallenge() argument
261 if (enrolledPasswordHandle.size() == 0 || providedPassword.size() == 0) return GK_ERROR; in verifyChallenge()
265 if (enrolledPasswordHandle.size() != sizeof(gatekeeper::password_handle_t)) { in verifyChallenge()
271 enrolledPasswordHandle.data()); in verifyChallenge()
275 curPwdHandle.setToExternal(const_cast<uint8_t*>(enrolledPasswordHandle.data()), in verifyChallenge()
276 enrolledPasswordHandle.size()); in verifyChallenge()
/aosp12/system/core/gatekeeperd/binder/android/service/gatekeeper/
H A DIGateKeeperService.aidl53 …GateKeeperResponse verify(int userId, in byte[] enrolledPasswordHandle, in byte[] providedPassword… in verify() argument
66 GateKeeperResponse verifyChallenge(int userId, long challenge, in byte[] enrolledPasswordHandle, in verifyChallenge() argument
/aosp12/hardware/interfaces/gatekeeper/1.0/software/
H A DSoftGateKeeperDevice.cpp75 const ::android::hardware::hidl_vec<uint8_t>& enrolledPasswordHandle, in verify()
77 if (enrolledPasswordHandle.size() == 0) { in verify()
82 VerifyRequest request(uid, challenge, hidl_vec2sized_buffer(enrolledPasswordHandle), in verify()
H A DSoftGateKeeperDevice.h66 const ::android::hardware::hidl_vec<uint8_t>& enrolledPasswordHandle,
/aosp12/hardware/interfaces/gatekeeper/1.0/default/
H A DGatekeeper.cpp87 const hidl_vec<uint8_t>& enrolledPasswordHandle, in verify() argument
97 enrolledPasswordHandle.data(), enrolledPasswordHandle.size(), in verify()
H A DGatekeeper.h54 const hidl_vec<uint8_t>& enrolledPasswordHandle,
/aosp12/hardware/interfaces/gatekeeper/1.0/
H A DIGatekeeper.hal60 * Verifies that providedPassword matches enrolledPasswordHandle.
74 * @param enrolledPasswordHandle The currently enrolled password handle that
78 * enrolledPasswordHandle
91 vec<uint8_t> enrolledPasswordHandle,
96 * Deletes the enrolledPasswordHandle associated with the uid. Once deleted
/aosp12/system/core/trusty/gatekeeper/
H A Dtrusty_gatekeeper.cpp101 const ::android::hardware::hidl_vec<uint8_t>& enrolledPasswordHandle, in verify()
108 if (enrolledPasswordHandle.size() == 0) { in verify()
113 VerifyRequest request(uid, challenge, hidl_vec2sized_buffer(enrolledPasswordHandle), in verify()
H A Dtrusty_gatekeeper.h64 const ::android::hardware::hidl_vec<uint8_t>& enrolledPasswordHandle,