Home
last modified time | relevance | path

Searched refs:challenge (Results 1 – 25 of 48) sorted by relevance

12

/hardware/interfaces/identity/aidl/vts/
DVtsAttestationTests.cpp73 string challenge = "NotSoRandomChallenge"; in TEST_P() local
74 vector<uint8_t> attestationChallenge(challenge.begin(), challenge.end()); in TEST_P()
97 string challenge = "NotSoRandomChallenge1NotSoRandomChallenge1NotSoRandomChallenge1"; in TEST_P() local
98 vector<uint8_t> attestationChallenge(challenge.begin(), challenge.end()); in TEST_P()
122 string challenge = "c"; in TEST_P() local
123 vector<uint8_t> attestationChallenge(challenge.begin(), challenge.end()); in TEST_P()
DVtsIdentityTestUtils.h36 AttestationData(sp<IWritableIdentityCredential>& writableCredential, string challenge, in AttestationData()
41 if (!challenge.empty()) { in AttestationData()
42 attestationChallenge.assign(challenge.begin(), challenge.end()); in AttestationData()
DVtsIWritableIdentityCredentialTests.cpp87 string challenge = "NotSoRandomChallenge1NotSoRandomChallenge1NotSoRandomChallenge1"; in TEST_P() local
88 vector<uint8_t> attestationChallenge(challenge.begin(), challenge.end()); in TEST_P()
111 string challenge = "NotSoRandomChallenge1"; in TEST_P() local
112 test_utils::AttestationData attData(writableCredential, challenge, {}); in TEST_P()
288 string challenge = "NotSoRandomChallenge1"; in TEST_P() local
289 test_utils::AttestationData attData(writableCredential, challenge, {}); in TEST_P()
375 string challenge = "NotSoRandomChallenge"; in TEST_P() local
376 test_utils::AttestationData attData(writableCredential, challenge, {}); in TEST_P()
534 string challenge = "NotSoRandomChallenge"; in TEST_P() local
535 test_utils::AttestationData attData(writableCredential, challenge, {}); in TEST_P()
[all …]
/hardware/interfaces/keymaster/4.1/vts/functional/
DDeviceUniqueAttestationTest.cpp129 void check_attestation_record(AttestationRecord attestation, const HidlBuf& challenge, in check_attestation_record() argument
137 EXPECT_EQ(challenge, attestation.attestation_challenge); in check_attestation_record()
205 HidlBuf challenge("challenge"); in TEST_P() local
210 .Authorization(TAG_ATTESTATION_CHALLENGE, challenge) in TEST_P()
218 check_attestation_record(attestation, challenge, in TEST_P()
246 HidlBuf challenge("challenge"); in TEST_P() local
251 .Authorization(TAG_ATTESTATION_CHALLENGE, challenge) in TEST_P()
259 check_attestation_record(attestation, challenge, in TEST_P()
/hardware/interfaces/gatekeeper/1.0/vts/functional/
DVtsHalGatekeeperV1_0TargetTest.cpp49 uint64_t challenge; member
53 GatekeeperRequest() : uid(0), challenge(0) {} in GatekeeperRequest()
101 uid_, req.challenge, req.curPwdHandle, req.newPwd, in doVerify()
148 void checkVerify(GatekeeperResponse &rsp, uint64_t challenge, in checkVerify() argument
156 EXPECT_EQ(challenge, auth_token->challenge); in checkVerify()
172 hidl_vec<uint8_t> &passwordHandle, uint64_t challenge, in verifyPassword() argument
180 verifyReq.challenge = challenge; in verifyPassword()
182 checkVerify(verifyRsp, challenge, expectSuccess); in verifyPassword()
/hardware/interfaces/keymaster/4.0/vts/functional/
DVerificationTokenTest.cpp91 EXPECT_EQ(1U, result1.token.challenge); in TEST_P()
105 EXPECT_EQ(2U, result2.token.challenge); in TEST_P()
151 EXPECT_EQ(0U, result1.token.challenge); in TEST_P()
166 EXPECT_EQ(0U, result2.token.challenge); in TEST_P()
/hardware/interfaces/keymaster/4.0/support/
Dkeymaster_utils.cpp62 static_assert(1 /* version size */ + sizeof(token.challenge) + sizeof(token.userId) + in authToken2HidlVec()
72 pos = copy_bytes_to_iterator(token.challenge, pos); in authToken2HidlVec()
90 static_assert(1 /* version size */ + sizeof(token.challenge) + sizeof(token.userId) + in hidlVec2AuthToken()
100 pos = copy_bytes_from_iterator(&token.challenge, pos); in hidlVec2AuthToken()
156 appendUint64(serializedToken, token.challenge); in serializeVerificationToken()
172 token.challenge = extractUint64(serializedToken, 0); in deserializeVerificationToken()
/hardware/interfaces/keymaster/aidl/aidl_api/android.hardware.keymaster/current/android/hardware/keymaster/
DVerificationToken.aidl21 long challenge;
DHardwareAuthToken.aidl21 long challenge;
/hardware/interfaces/keymaster/aidl/aidl_api/android.hardware.keymaster/2/android/hardware/keymaster/
DVerificationToken.aidl21 long challenge;
DHardwareAuthToken.aidl21 long challenge;
/hardware/interfaces/keymaster/aidl/aidl_api/android.hardware.keymaster/1/android/hardware/keymaster/
DHardwareAuthToken.aidl21 long challenge;
/hardware/interfaces/keymaster/aidl/android/hardware/keymaster/
DHardwareAuthToken.aidl39 long challenge;
DVerificationToken.aidl34 long challenge;
/hardware/libhardware/include/hardware/
Dhw_auth_token.h41 uint64_t challenge; member
Dgatekeeper.h141 int (*verify)(const struct gatekeeper_device *dev, uint32_t uid, uint64_t challenge,
/hardware/interfaces/identity/aidl/default/
DIdentityCredential.cpp155 uint64_t challenge = 0; in createAuthChallenge() local
156 while (challenge == 0) { in createAuthChallenge()
164 challenge = 0; in createAuthChallenge()
166 challenge |= ((bytes.value())[n] << (n * 8)); in createAuthChallenge()
170 *outChallenge = challenge; in createAuthChallenge()
171 authChallenge_ = challenge; in createAuthChallenge()
225 if (authToken.challenge == 0) { in checkUserAuthentication()
230 if (authToken.challenge != int64_t(authChallenge)) { in checkUserAuthentication()
231 LOG(ERROR) << "Challenge in authToken (" << uint64_t(authToken.challenge) << ") " in checkUserAuthentication()
/hardware/interfaces/gatekeeper/1.0/software/
DSoftGateKeeperDevice.cpp74 uint32_t uid, uint64_t challenge, in verify() argument
82 VerifyRequest request(uid, challenge, hidl_vec2sized_buffer(enrolledPasswordHandle), in verify()
DSoftGateKeeperDevice.h65 uint32_t uid, uint64_t challenge,
/hardware/interfaces/gatekeeper/1.0/default/
DGatekeeper.cpp86 uint64_t challenge, in verify() argument
96 int ret = device->verify(device, uid, challenge, in verify()
DGatekeeper.h53 uint64_t challenge,
/hardware/interfaces/biometrics/face/1.0/
DIBiometricsFace.hal78 * generateChallenge() generates a challenge which must then be wrapped by
80 * which generates a Hardware Authentication Token. The challenge prevents
88 * must invalidate the challenge. This is to prevent bugs or crashes in
89 * the system from leaving a challenge enabled indefinitely.
90 * @return result, with its "value" parameter representing a "challenge": a
103 * window of opportunity to re-use the challenge and HAT. For example,
114 * of a generateChallenge() challenge being wrapped by the gatekeeper
131 * Finishes the secure transaction by invalidating the challenge generated
/hardware/interfaces/confirmationui/support/include/android/hardware/confirmationui/1.0/generic/
DGenericOperation.h133 auto hmac = HMacer::hmac256(testKey, "\0", bytes_cast(secureInputToken.challenge), in deliverSecureInputEvent()
141 switch (static_cast<TestModeCommands>(secureInputToken.challenge)) { in deliverSecureInputEvent()
/hardware/interfaces/biometrics/fingerprint/2.1/
DIBiometricsFingerprint.hal40 * Pre-enroll only generates a challenge, a full hardwareAuthToken is
45 * @return 0 if function failed, a uint64_t of challenge otherwise.
74 * challenge. This must be called at the end of a multi-finger enrollment
97 * state. Unlike enrollDone() doesn't invalidate the preEnroll() challenge.
/hardware/interfaces/gatekeeper/1.0/
DIGatekeeper.hal69 * @param challenge An optional challenge to authenticate against, or 0.
89 verify(uint32_t uid, uint64_t challenge,

12