/hardware/interfaces/identity/aidl/vts/ |
D | VtsAttestationTests.cpp | 73 string challenge = "NotSoRandomChallenge"; in TEST_P() local 74 vector<uint8_t> attestationChallenge(challenge.begin(), challenge.end()); in TEST_P() 97 string challenge = "NotSoRandomChallenge1NotSoRandomChallenge1NotSoRandomChallenge1"; in TEST_P() local 98 vector<uint8_t> attestationChallenge(challenge.begin(), challenge.end()); in TEST_P() 122 string challenge = "c"; in TEST_P() local 123 vector<uint8_t> attestationChallenge(challenge.begin(), challenge.end()); in TEST_P()
|
D | VtsIdentityTestUtils.h | 36 AttestationData(sp<IWritableIdentityCredential>& writableCredential, string challenge, in AttestationData() 41 if (!challenge.empty()) { in AttestationData() 42 attestationChallenge.assign(challenge.begin(), challenge.end()); in AttestationData()
|
D | VtsIWritableIdentityCredentialTests.cpp | 87 string challenge = "NotSoRandomChallenge1NotSoRandomChallenge1NotSoRandomChallenge1"; in TEST_P() local 88 vector<uint8_t> attestationChallenge(challenge.begin(), challenge.end()); in TEST_P() 111 string challenge = "NotSoRandomChallenge1"; in TEST_P() local 112 test_utils::AttestationData attData(writableCredential, challenge, {}); in TEST_P() 288 string challenge = "NotSoRandomChallenge1"; in TEST_P() local 289 test_utils::AttestationData attData(writableCredential, challenge, {}); in TEST_P() 375 string challenge = "NotSoRandomChallenge"; in TEST_P() local 376 test_utils::AttestationData attData(writableCredential, challenge, {}); in TEST_P() 534 string challenge = "NotSoRandomChallenge"; in TEST_P() local 535 test_utils::AttestationData attData(writableCredential, challenge, {}); in TEST_P() [all …]
|
/hardware/interfaces/keymaster/4.1/vts/functional/ |
D | DeviceUniqueAttestationTest.cpp | 129 void check_attestation_record(AttestationRecord attestation, const HidlBuf& challenge, in check_attestation_record() argument 137 EXPECT_EQ(challenge, attestation.attestation_challenge); in check_attestation_record() 205 HidlBuf challenge("challenge"); in TEST_P() local 210 .Authorization(TAG_ATTESTATION_CHALLENGE, challenge) in TEST_P() 218 check_attestation_record(attestation, challenge, in TEST_P() 246 HidlBuf challenge("challenge"); in TEST_P() local 251 .Authorization(TAG_ATTESTATION_CHALLENGE, challenge) in TEST_P() 259 check_attestation_record(attestation, challenge, in TEST_P()
|
/hardware/interfaces/gatekeeper/1.0/vts/functional/ |
D | VtsHalGatekeeperV1_0TargetTest.cpp | 49 uint64_t challenge; member 53 GatekeeperRequest() : uid(0), challenge(0) {} in GatekeeperRequest() 101 uid_, req.challenge, req.curPwdHandle, req.newPwd, in doVerify() 148 void checkVerify(GatekeeperResponse &rsp, uint64_t challenge, in checkVerify() argument 156 EXPECT_EQ(challenge, auth_token->challenge); in checkVerify() 172 hidl_vec<uint8_t> &passwordHandle, uint64_t challenge, in verifyPassword() argument 180 verifyReq.challenge = challenge; in verifyPassword() 182 checkVerify(verifyRsp, challenge, expectSuccess); in verifyPassword()
|
/hardware/interfaces/keymaster/4.0/vts/functional/ |
D | VerificationTokenTest.cpp | 91 EXPECT_EQ(1U, result1.token.challenge); in TEST_P() 105 EXPECT_EQ(2U, result2.token.challenge); in TEST_P() 151 EXPECT_EQ(0U, result1.token.challenge); in TEST_P() 166 EXPECT_EQ(0U, result2.token.challenge); in TEST_P()
|
/hardware/interfaces/keymaster/4.0/support/ |
D | keymaster_utils.cpp | 62 static_assert(1 /* version size */ + sizeof(token.challenge) + sizeof(token.userId) + in authToken2HidlVec() 72 pos = copy_bytes_to_iterator(token.challenge, pos); in authToken2HidlVec() 90 static_assert(1 /* version size */ + sizeof(token.challenge) + sizeof(token.userId) + in hidlVec2AuthToken() 100 pos = copy_bytes_from_iterator(&token.challenge, pos); in hidlVec2AuthToken() 156 appendUint64(serializedToken, token.challenge); in serializeVerificationToken() 172 token.challenge = extractUint64(serializedToken, 0); in deserializeVerificationToken()
|
/hardware/interfaces/keymaster/aidl/aidl_api/android.hardware.keymaster/current/android/hardware/keymaster/ |
D | VerificationToken.aidl | 21 long challenge;
|
D | HardwareAuthToken.aidl | 21 long challenge;
|
/hardware/interfaces/keymaster/aidl/aidl_api/android.hardware.keymaster/2/android/hardware/keymaster/ |
D | VerificationToken.aidl | 21 long challenge;
|
D | HardwareAuthToken.aidl | 21 long challenge;
|
/hardware/interfaces/keymaster/aidl/aidl_api/android.hardware.keymaster/1/android/hardware/keymaster/ |
D | HardwareAuthToken.aidl | 21 long challenge;
|
/hardware/interfaces/keymaster/aidl/android/hardware/keymaster/ |
D | HardwareAuthToken.aidl | 39 long challenge;
|
D | VerificationToken.aidl | 34 long challenge;
|
/hardware/libhardware/include/hardware/ |
D | hw_auth_token.h | 41 uint64_t challenge; member
|
D | gatekeeper.h | 141 int (*verify)(const struct gatekeeper_device *dev, uint32_t uid, uint64_t challenge,
|
/hardware/interfaces/identity/aidl/default/ |
D | IdentityCredential.cpp | 155 uint64_t challenge = 0; in createAuthChallenge() local 156 while (challenge == 0) { in createAuthChallenge() 164 challenge = 0; in createAuthChallenge() 166 challenge |= ((bytes.value())[n] << (n * 8)); in createAuthChallenge() 170 *outChallenge = challenge; in createAuthChallenge() 171 authChallenge_ = challenge; in createAuthChallenge() 225 if (authToken.challenge == 0) { in checkUserAuthentication() 230 if (authToken.challenge != int64_t(authChallenge)) { in checkUserAuthentication() 231 LOG(ERROR) << "Challenge in authToken (" << uint64_t(authToken.challenge) << ") " in checkUserAuthentication()
|
/hardware/interfaces/gatekeeper/1.0/software/ |
D | SoftGateKeeperDevice.cpp | 74 uint32_t uid, uint64_t challenge, in verify() argument 82 VerifyRequest request(uid, challenge, hidl_vec2sized_buffer(enrolledPasswordHandle), in verify()
|
D | SoftGateKeeperDevice.h | 65 uint32_t uid, uint64_t challenge,
|
/hardware/interfaces/gatekeeper/1.0/default/ |
D | Gatekeeper.cpp | 86 uint64_t challenge, in verify() argument 96 int ret = device->verify(device, uid, challenge, in verify()
|
D | Gatekeeper.h | 53 uint64_t challenge,
|
/hardware/interfaces/biometrics/face/1.0/ |
D | IBiometricsFace.hal | 78 * generateChallenge() generates a challenge which must then be wrapped by 80 * which generates a Hardware Authentication Token. The challenge prevents 88 * must invalidate the challenge. This is to prevent bugs or crashes in 89 * the system from leaving a challenge enabled indefinitely. 90 * @return result, with its "value" parameter representing a "challenge": a 103 * window of opportunity to re-use the challenge and HAT. For example, 114 * of a generateChallenge() challenge being wrapped by the gatekeeper 131 * Finishes the secure transaction by invalidating the challenge generated
|
/hardware/interfaces/confirmationui/support/include/android/hardware/confirmationui/1.0/generic/ |
D | GenericOperation.h | 133 auto hmac = HMacer::hmac256(testKey, "\0", bytes_cast(secureInputToken.challenge), in deliverSecureInputEvent() 141 switch (static_cast<TestModeCommands>(secureInputToken.challenge)) { in deliverSecureInputEvent()
|
/hardware/interfaces/biometrics/fingerprint/2.1/ |
D | IBiometricsFingerprint.hal | 40 * Pre-enroll only generates a challenge, a full hardwareAuthToken is 45 * @return 0 if function failed, a uint64_t of challenge otherwise. 74 * challenge. This must be called at the end of a multi-finger enrollment 97 * state. Unlike enrollDone() doesn't invalidate the preEnroll() challenge.
|
/hardware/interfaces/gatekeeper/1.0/ |
D | IGatekeeper.hal | 69 * @param challenge An optional challenge to authenticate against, or 0. 89 verify(uint32_t uid, uint64_t challenge,
|