/aosp12/system/security/keystore/tests/ |
H A D | auth_token_formatting_test.cpp | 96 static_assert(sizeof(hw_auth_token_t) == sizeof(test_token), "test_token has wrong size"); in TEST() 103 static_assert(sizeof(hw_auth_token_t) == sizeof(test_token), "test_token has wrong size"); in TEST() 110 static_assert(sizeof(hw_auth_token_t) == sizeof(test_token), "test_token has wrong size"); in TEST() 117 static_assert(sizeof(hw_auth_token_t) == sizeof(test_token), "test_token has wrong size"); in TEST() 124 static_assert(sizeof(hw_auth_token_t) == sizeof(test_token), "test_token has wrong size"); in TEST() 133 static_assert(sizeof(hw_auth_token_t) == sizeof(test_token), "test_token has wrong size"); in TEST() 141 static_assert(sizeof(hw_auth_token_t) == sizeof(test_token), "test_token has wrong size"); in TEST()
|
/aosp12/hardware/interfaces/gatekeeper/1.0/software/tests/ |
H A D | gatekeeper_test.cpp | 90 auto auth_token = response.auth_token.Data<hw_auth_token_t>(); in TEST() 114 auto auth_token = response.auth_token.Data<hw_auth_token_t>(); in TEST() 131 ASSERT_NE(nullptr, response.auth_token.Data<hw_auth_token_t>()); in TEST() 132 ASSERT_EQ(secure_id, response.auth_token.Data<hw_auth_token_t>()->user_id); in TEST() 151 auto auth_token = response.auth_token.Data<hw_auth_token_t>(); in TEST() 165 ASSERT_NE(nullptr, response.auth_token.Data<hw_auth_token_t>()); in TEST() 166 ASSERT_NE(secure_id, response.auth_token.Data<hw_auth_token_t>()->user_id); in TEST()
|
/aosp12/hardware/interfaces/gatekeeper/1.0/vts/functional/ |
H A D | VtsHalGatekeeperV1_0TargetTest.cpp | 58 static const hw_auth_token_t *toAuthToken(GatekeeperResponse &rsp) { in toAuthToken() 59 const hw_auth_token_t *auth_token = in toAuthToken() 60 reinterpret_cast<hw_auth_token_t *>(rsp.data.data()); in toAuthToken() 64 EXPECT_EQ(sizeof(hw_auth_token_t), auth_token_size); in toAuthToken() 154 const hw_auth_token_t *auth_token = toAuthToken(rsp); in checkVerify() 273 const hw_auth_token_t *first = toAuthToken(verifyRsp); in TEST_P() 274 const hw_auth_token_t *second = toAuthToken(reenrollVerifyRsp); in TEST_P() 304 const hw_auth_token_t *first = toAuthToken(verifyRsp); in TEST_P() 305 const hw_auth_token_t *second = toAuthToken(reenrollVerifyRsp); in TEST_P()
|
/aosp12/system/keymaster/include/keymaster/ |
H A D | keymaster_enforcement.h | 121 virtual bool auth_token_timed_out(const hw_auth_token_t& token, uint32_t timeout) const = 0; 159 virtual bool ValidateTokenSignature(const hw_auth_token_t& token) const = 0; 216 const hw_auth_token_t** token, uint32_t* token_auth_type) const;
|
/aosp12/system/security/keystore/include/keystore/ |
H A D | keystore_hidl_support.h | 95 sizeof(hw_auth_token_t), in authToken2HidlVec() 99 result.resize(sizeof(hw_auth_token_t)); in authToken2HidlVec() 127 sizeof(hw_auth_token_t), in hidlVec2Km3AuthToken() 130 if (buffer.size() != sizeof(hw_auth_token_t)) return {}; in hidlVec2Km3AuthToken()
|
/aosp12/system/keymaster/include/keymaster/km_openssl/ |
H A D | soft_keymaster_enforcement.h | 33 bool auth_token_timed_out(const hw_auth_token_t& /*token*/, in auth_token_timed_out() argument 39 bool ValidateTokenSignature(const hw_auth_token_t& /*token*/) const override { return true; } in ValidateTokenSignature() argument
|
/aosp12/system/gatekeeper/ |
H A D | gatekeeper.cpp | 245 hw_auth_token_t token; in MintAuthToken() 261 static_assert(offsetof(hw_auth_token_t, hmac) == hashable_length, in MintAuthToken() 273 uint8_t *token_buffer = new(std::nothrow) uint8_t[sizeof(hw_auth_token_t)]; in MintAuthToken() 276 *reinterpret_cast<hw_auth_token_t*>(token_buffer) = token; in MintAuthToken() 278 *auth_token = { token_buffer, sizeof(hw_auth_token_t) }; in MintAuthToken()
|
/aosp12/system/keymaster/tests/ |
H A D | keymaster_enforcement_test.cpp | 583 hw_auth_token_t token; in TEST_F() 606 hw_auth_token_t token; in TEST_F() 635 hw_auth_token_t token; in TEST_F() 659 hw_auth_token_t token; in TEST_F() 686 hw_auth_token_t token; in TEST_F() 715 hw_auth_token_t token; in TEST_F() 744 hw_auth_token_t token; in TEST_F() 767 hw_auth_token_t token; in TEST_F() 820 hw_auth_token_t token; in TEST_F() 845 hw_auth_token_t token; in TEST_F() [all …]
|
H A D | android_keymaster_test.cpp | 85 virtual bool auth_token_timed_out(const hw_auth_token_t& /* token */, in auth_token_timed_out() argument 90 virtual bool ValidateTokenSignature(const hw_auth_token_t& /* token */) const { return true; } in ValidateTokenSignature()
|
/aosp12/system/keymaster/android_keymaster/ |
H A D | keymaster_enforcement.cpp | 286 const hw_auth_token_t* auth_token; in AuthorizeBegin() 450 const hw_auth_token_t** auth_token, in GetAndValidateAuthToken() 459 LOG_E("Bug: Auth token is the wrong size (%d expected, %d found)", sizeof(hw_auth_token_t), in GetAndValidateAuthToken() 464 *auth_token = reinterpret_cast<const hw_auth_token_t*>(auth_token_blob.data); in GetAndValidateAuthToken() 490 const hw_auth_token_t* auth_token; in AuthTokenMatches()
|
/aosp12/hardware/libhardware/include/hardware/ |
H A D | fingerprint.h | 106 hw_auth_token_t hat; 177 int (*enroll)(struct fingerprint_device *dev, const hw_auth_token_t *hat,
|
H A D | hw_auth_token.h | 47 } hw_auth_token_t; typedef
|
/aosp12/hardware/interfaces/keymaster/4.0/support/ |
H A D | keymaster_utils.cpp | 65 sizeof(hw_auth_token_t), in authToken2HidlVec() 69 result.resize(sizeof(hw_auth_token_t)); in authToken2HidlVec() 93 sizeof(hw_auth_token_t), in hidlVec2AuthToken() 96 if (buffer.size() != sizeof(hw_auth_token_t)) return {}; in hidlVec2AuthToken()
|
/aosp12/system/keymaster/ng/ |
H A D | KeyMintAidlUtils.cpp | 31 == sizeof(hw_auth_token_t), in authToken2AidlVec() 38 result.resize(sizeof(hw_auth_token_t)); in authToken2AidlVec()
|
H A D | KeyMintUtils.cpp | 105 == sizeof(hw_auth_token_t), in authToken2AidlVec() 113 result.resize(sizeof(hw_auth_token_t)); in authToken2AidlVec()
|
/aosp12/system/keymaster/ng/include/ |
H A D | keystore_hidl_support.h | 108 == sizeof(hw_auth_token_t), in authToken2HidlVec() 112 result.resize(sizeof(hw_auth_token_t)); in authToken2HidlVec()
|
/aosp12/system/gatekeeper/tests/ |
H A D | gatekeeper_device_test.cpp | 84 hw_auth_token_t *hat; in TEST_F() 98 hat = reinterpret_cast<hw_auth_token_t *>(auth_token); in TEST_F()
|
/aosp12/system/core/gatekeeperd/ |
H A D | gatekeeperd.cpp | 308 if (gkResponse->payload().size() != sizeof(hw_auth_token_t)) { in verifyChallenge() 313 const hw_auth_token_t* hwAuthToken = in verifyChallenge() 314 reinterpret_cast<const hw_auth_token_t*>(gkResponse->payload().data()); in verifyChallenge()
|
/aosp12/frameworks/base/services/core/jni/ |
H A D | com_android_server_fingerprint_FingerprintService.cpp | 137 if (tokenSize != sizeof(hw_auth_token_t)) { in nativeEnroll() 142 reinterpret_cast<const hw_auth_token_t*>(tokenData), groupId, timeout); in nativeEnroll()
|
/aosp12/hardware/libhardware/modules/fingerprint/ |
H A D | fingerprint.c | 44 const hw_auth_token_t __unused *hat, in fingerprint_enroll()
|
/aosp12/hardware/interfaces/biometrics/fingerprint/2.1/default/ |
H A D | BiometricsFingerprint.cpp | 163 const hw_auth_token_t* authToken = in enroll() 164 reinterpret_cast<const hw_auth_token_t*>(hat.data()); in enroll()
|
/aosp12/system/core/trusty/keymaster/4.0/ |
H A D | TrustyKeymaster4Device.cpp | 107 p.blob.resize(sizeof(hw_auth_token_t)); in injectAuthToken() 109 hw_auth_token_t* auth_token = reinterpret_cast<hw_auth_token_t*>(p.blob.data()); in injectAuthToken()
|
/aosp12/hardware/interfaces/keymaster/3.0/ |
H A D | types.hal | 148 * in hw_auth_token_t in hw_auth_token.h. */
|
/aosp12/hardware/interfaces/keymaster/4.0/ |
H A D | types.hal | 1239 * network order (big-endian). This odd construction is compatible with the hw_auth_token_t
|