Home
last modified time | relevance | path

Searched refs:hw_auth_token_t (Results 1 – 24 of 24) sorted by relevance

/aosp12/system/security/keystore/tests/
H A Dauth_token_formatting_test.cpp96 static_assert(sizeof(hw_auth_token_t) == sizeof(test_token), "test_token has wrong size"); in TEST()
103 static_assert(sizeof(hw_auth_token_t) == sizeof(test_token), "test_token has wrong size"); in TEST()
110 static_assert(sizeof(hw_auth_token_t) == sizeof(test_token), "test_token has wrong size"); in TEST()
117 static_assert(sizeof(hw_auth_token_t) == sizeof(test_token), "test_token has wrong size"); in TEST()
124 static_assert(sizeof(hw_auth_token_t) == sizeof(test_token), "test_token has wrong size"); in TEST()
133 static_assert(sizeof(hw_auth_token_t) == sizeof(test_token), "test_token has wrong size"); in TEST()
141 static_assert(sizeof(hw_auth_token_t) == sizeof(test_token), "test_token has wrong size"); in TEST()
/aosp12/hardware/interfaces/gatekeeper/1.0/software/tests/
H A Dgatekeeper_test.cpp90 auto auth_token = response.auth_token.Data<hw_auth_token_t>(); in TEST()
114 auto auth_token = response.auth_token.Data<hw_auth_token_t>(); in TEST()
131 ASSERT_NE(nullptr, response.auth_token.Data<hw_auth_token_t>()); in TEST()
132 ASSERT_EQ(secure_id, response.auth_token.Data<hw_auth_token_t>()->user_id); in TEST()
151 auto auth_token = response.auth_token.Data<hw_auth_token_t>(); in TEST()
165 ASSERT_NE(nullptr, response.auth_token.Data<hw_auth_token_t>()); in TEST()
166 ASSERT_NE(secure_id, response.auth_token.Data<hw_auth_token_t>()->user_id); in TEST()
/aosp12/hardware/interfaces/gatekeeper/1.0/vts/functional/
H A DVtsHalGatekeeperV1_0TargetTest.cpp58 static const hw_auth_token_t *toAuthToken(GatekeeperResponse &rsp) { in toAuthToken()
59 const hw_auth_token_t *auth_token = in toAuthToken()
60 reinterpret_cast<hw_auth_token_t *>(rsp.data.data()); in toAuthToken()
64 EXPECT_EQ(sizeof(hw_auth_token_t), auth_token_size); in toAuthToken()
154 const hw_auth_token_t *auth_token = toAuthToken(rsp); in checkVerify()
273 const hw_auth_token_t *first = toAuthToken(verifyRsp); in TEST_P()
274 const hw_auth_token_t *second = toAuthToken(reenrollVerifyRsp); in TEST_P()
304 const hw_auth_token_t *first = toAuthToken(verifyRsp); in TEST_P()
305 const hw_auth_token_t *second = toAuthToken(reenrollVerifyRsp); in TEST_P()
/aosp12/system/keymaster/include/keymaster/
H A Dkeymaster_enforcement.h121 virtual bool auth_token_timed_out(const hw_auth_token_t& token, uint32_t timeout) const = 0;
159 virtual bool ValidateTokenSignature(const hw_auth_token_t& token) const = 0;
216 const hw_auth_token_t** token, uint32_t* token_auth_type) const;
/aosp12/system/security/keystore/include/keystore/
H A Dkeystore_hidl_support.h95 sizeof(hw_auth_token_t), in authToken2HidlVec()
99 result.resize(sizeof(hw_auth_token_t)); in authToken2HidlVec()
127 sizeof(hw_auth_token_t), in hidlVec2Km3AuthToken()
130 if (buffer.size() != sizeof(hw_auth_token_t)) return {}; in hidlVec2Km3AuthToken()
/aosp12/system/keymaster/include/keymaster/km_openssl/
H A Dsoft_keymaster_enforcement.h33 bool auth_token_timed_out(const hw_auth_token_t& /*token*/, in auth_token_timed_out() argument
39 bool ValidateTokenSignature(const hw_auth_token_t& /*token*/) const override { return true; } in ValidateTokenSignature() argument
/aosp12/system/gatekeeper/
H A Dgatekeeper.cpp245 hw_auth_token_t token; in MintAuthToken()
261 static_assert(offsetof(hw_auth_token_t, hmac) == hashable_length, in MintAuthToken()
273 uint8_t *token_buffer = new(std::nothrow) uint8_t[sizeof(hw_auth_token_t)]; in MintAuthToken()
276 *reinterpret_cast<hw_auth_token_t*>(token_buffer) = token; in MintAuthToken()
278 *auth_token = { token_buffer, sizeof(hw_auth_token_t) }; in MintAuthToken()
/aosp12/system/keymaster/tests/
H A Dkeymaster_enforcement_test.cpp583 hw_auth_token_t token; in TEST_F()
606 hw_auth_token_t token; in TEST_F()
635 hw_auth_token_t token; in TEST_F()
659 hw_auth_token_t token; in TEST_F()
686 hw_auth_token_t token; in TEST_F()
715 hw_auth_token_t token; in TEST_F()
744 hw_auth_token_t token; in TEST_F()
767 hw_auth_token_t token; in TEST_F()
820 hw_auth_token_t token; in TEST_F()
845 hw_auth_token_t token; in TEST_F()
[all …]
H A Dandroid_keymaster_test.cpp85 virtual bool auth_token_timed_out(const hw_auth_token_t& /* token */, in auth_token_timed_out() argument
90 virtual bool ValidateTokenSignature(const hw_auth_token_t& /* token */) const { return true; } in ValidateTokenSignature()
/aosp12/system/keymaster/android_keymaster/
H A Dkeymaster_enforcement.cpp286 const hw_auth_token_t* auth_token; in AuthorizeBegin()
450 const hw_auth_token_t** auth_token, in GetAndValidateAuthToken()
459 LOG_E("Bug: Auth token is the wrong size (%d expected, %d found)", sizeof(hw_auth_token_t), in GetAndValidateAuthToken()
464 *auth_token = reinterpret_cast<const hw_auth_token_t*>(auth_token_blob.data); in GetAndValidateAuthToken()
490 const hw_auth_token_t* auth_token; in AuthTokenMatches()
/aosp12/hardware/libhardware/include/hardware/
H A Dfingerprint.h106 hw_auth_token_t hat;
177 int (*enroll)(struct fingerprint_device *dev, const hw_auth_token_t *hat,
H A Dhw_auth_token.h47 } hw_auth_token_t; typedef
/aosp12/hardware/interfaces/keymaster/4.0/support/
H A Dkeymaster_utils.cpp65 sizeof(hw_auth_token_t), in authToken2HidlVec()
69 result.resize(sizeof(hw_auth_token_t)); in authToken2HidlVec()
93 sizeof(hw_auth_token_t), in hidlVec2AuthToken()
96 if (buffer.size() != sizeof(hw_auth_token_t)) return {}; in hidlVec2AuthToken()
/aosp12/system/keymaster/ng/
H A DKeyMintAidlUtils.cpp31 == sizeof(hw_auth_token_t), in authToken2AidlVec()
38 result.resize(sizeof(hw_auth_token_t)); in authToken2AidlVec()
H A DKeyMintUtils.cpp105 == sizeof(hw_auth_token_t), in authToken2AidlVec()
113 result.resize(sizeof(hw_auth_token_t)); in authToken2AidlVec()
/aosp12/system/keymaster/ng/include/
H A Dkeystore_hidl_support.h108 == sizeof(hw_auth_token_t), in authToken2HidlVec()
112 result.resize(sizeof(hw_auth_token_t)); in authToken2HidlVec()
/aosp12/system/gatekeeper/tests/
H A Dgatekeeper_device_test.cpp84 hw_auth_token_t *hat; in TEST_F()
98 hat = reinterpret_cast<hw_auth_token_t *>(auth_token); in TEST_F()
/aosp12/system/core/gatekeeperd/
H A Dgatekeeperd.cpp308 if (gkResponse->payload().size() != sizeof(hw_auth_token_t)) { in verifyChallenge()
313 const hw_auth_token_t* hwAuthToken = in verifyChallenge()
314 reinterpret_cast<const hw_auth_token_t*>(gkResponse->payload().data()); in verifyChallenge()
/aosp12/frameworks/base/services/core/jni/
H A Dcom_android_server_fingerprint_FingerprintService.cpp137 if (tokenSize != sizeof(hw_auth_token_t)) { in nativeEnroll()
142 reinterpret_cast<const hw_auth_token_t*>(tokenData), groupId, timeout); in nativeEnroll()
/aosp12/hardware/libhardware/modules/fingerprint/
H A Dfingerprint.c44 const hw_auth_token_t __unused *hat, in fingerprint_enroll()
/aosp12/hardware/interfaces/biometrics/fingerprint/2.1/default/
H A DBiometricsFingerprint.cpp163 const hw_auth_token_t* authToken = in enroll()
164 reinterpret_cast<const hw_auth_token_t*>(hat.data()); in enroll()
/aosp12/system/core/trusty/keymaster/4.0/
H A DTrustyKeymaster4Device.cpp107 p.blob.resize(sizeof(hw_auth_token_t)); in injectAuthToken()
109 hw_auth_token_t* auth_token = reinterpret_cast<hw_auth_token_t*>(p.blob.data()); in injectAuthToken()
/aosp12/hardware/interfaces/keymaster/3.0/
H A Dtypes.hal148 * in hw_auth_token_t in hw_auth_token.h. */
/aosp12/hardware/interfaces/keymaster/4.0/
H A Dtypes.hal1239 * network order (big-endian). This odd construction is compatible with the hw_auth_token_t