Home
last modified time | relevance | path

Searched refs:token (Results 1 – 9 of 9) sorted by relevance

/trusty/user/app/sample/binder-test/service/
Dmain.cpp56 Status RepeatBoolean(bool token, bool* _aidl_return) override { in RepeatBoolean() argument
57 return Repeat(token, _aidl_return); in RepeatBoolean()
59 Status RepeatByte(int8_t token, int8_t* _aidl_return) override { in RepeatByte() argument
60 return Repeat(token, _aidl_return); in RepeatByte()
62 Status RepeatChar(char16_t token, char16_t* _aidl_return) override { in RepeatChar() argument
63 return Repeat(token, _aidl_return); in RepeatChar()
65 Status RepeatInt(int32_t token, int32_t* _aidl_return) override { in RepeatInt() argument
66 return Repeat(token, _aidl_return); in RepeatInt()
68 Status RepeatLong(int64_t token, int64_t* _aidl_return) override { in RepeatLong() argument
69 return Repeat(token, _aidl_return); in RepeatLong()
[all …]
/trusty/user/app/keymaster/
Dtrusty_keymaster_enforcement.cpp37 const hw_auth_token_t& token, in auth_token_timed_out() argument
39 uint64_t token_timestamp_millis = ntoh(token.timestamp); in auth_token_timed_out()
55 const hw_auth_token_t& token) const { in ValidateTokenSignature()
62 const uint8_t* hash_data = reinterpret_cast<const uint8_t*>(&token); in ValidateTokenSignature()
64 reinterpret_cast<const uint8_t*>(&token.hmac) - hash_data; in ValidateTokenSignature()
76 return 0 == memcmp_s(computed_hash, token.hmac, in ValidateTokenSignature()
77 min(sizeof(token.hmac), computed_hash_length)); in ValidateTokenSignature()
Dtrusty_keymaster_enforcement.h47 bool auth_token_timed_out(const hw_auth_token_t& token,
51 bool ValidateTokenSignature(const hw_auth_token_t& token) const override;
Dopenssl_keymaster_enforcement.cpp216 response.token.challenge = request.challenge; in VerifyAuthorization()
217 response.token.timestamp = get_current_time_ms(); in VerifyAuthorization()
218 response.token.security_level = SecurityLevel(); in VerifyAuthorization()
221 toBlob(response.token.challenge), in VerifyAuthorization()
222 toBlob(response.token.timestamp), in VerifyAuthorization()
223 toBlob(response.token.security_level), in VerifyAuthorization()
226 response.error = hmacSha256(hmac_key_, data_chunks, 5, &response.token.mac); in VerifyAuthorization()
/trusty/user/base/lib/keymaster/test/
Dkeymaster_test.c104 hw_auth_token_t token = {0, in TEST_F() local
112 uint64_t checksum = calculate_checksum(token.hmac, sizeof(token.hmac)); in TEST_F()
115 ret = keymaster_sign_auth_token(_state->km_handle, &token); in TEST_F()
122 checksum = calculate_checksum(token.hmac, sizeof(token.hmac)); in TEST_F()
125 ret = keymaster_validate_auth_token(_state->km_handle, &token); in TEST_F()
/trusty/user/base/lib/keymaster/
Dkeymaster.c258 hw_auth_token_t* token) { in keymaster_sign_auth_token() argument
261 if (token == NULL) { in keymaster_sign_auth_token()
274 size_t message_size = sizeof(hw_auth_token_t) - sizeof(token->hmac); in keymaster_sign_auth_token()
276 ret = mint_hmac(key_buf, key_buf_size, (uint8_t*)token, message_size, in keymaster_sign_auth_token()
277 token->hmac); in keymaster_sign_auth_token()
285 hw_auth_token_t* token) { in keymaster_validate_auth_token() argument
288 if (token == NULL) { in keymaster_validate_auth_token()
302 size_t message_size = sizeof(hw_auth_token_t) - sizeof(token->hmac); in keymaster_validate_auth_token()
304 ret = mint_hmac(key_buf, key_buf_size, (uint8_t*)token, message_size, in keymaster_validate_auth_token()
311 ret = memcmp(expected_hmac, token->hmac, sizeof(expected_hmac)); in keymaster_validate_auth_token()
/trusty/user/base/lib/keymaster/include/lib/keymaster/
Dkeymaster.h66 hw_auth_token_t* token);
77 hw_auth_token_t* token);
/trusty/user/app/sample/hwcrypto/
Dhwkey_srv.c57 access_token_t token; member
90 memset(node->token, 0, HWKEY_OPAQUE_HANDLE_SIZE); in delete_opaque_handle()
692 if (!is_empty_token(entry->token)) { in get_key_handle()
718 entry->token[token_offset] = random_buf[i]; in get_key_handle()
728 assert(entry->token[HWKEY_OPAQUE_HANDLE_SIZE - 1] == 0); in get_key_handle()
730 memcpy(kbuf, entry->token, HWKEY_OPAQUE_HANDLE_SIZE); in get_key_handle()
745 assert(!is_empty_token(entry->token)); in get_opaque_key()
756 if (CRYPTO_memcmp(entry->token, access_token, in get_opaque_key()
/trusty/user/app/keymint/
Dkeys.rs282 fn timestamp_token_mac_input(&self, token: &TimeStampToken) -> Result<Vec<u8>, Error> { in timestamp_token_mac_input()
291 result.extend_from_slice(&token.challenge.to_ne_bytes()[..]); in timestamp_token_mac_input()
292 result.extend_from_slice(&token.timestamp.milliseconds.to_ne_bytes()[..]); in timestamp_token_mac_input()