Home
last modified time | relevance | path

Searched refs:challenge (Results 1 – 25 of 38) sorted by relevance

12

/system/security/keystore/tests/
Dverification_token_seralization_test.cpp33 token.challenge = 12345; in TEST()
44 ASSERT_EQ(token.challenge, deserialized.value().challenge); in TEST()
53 token.challenge = 12345; in TEST()
61 ASSERT_EQ(token.challenge, deserialized.value().challenge); in TEST()
/system/gatekeeper/
Dgatekeeper_messages.cpp145 VerifyRequest::VerifyRequest(uint32_t user_id, uint64_t challenge, in VerifyRequest() argument
148 this->challenge = challenge; in VerifyRequest()
154 return sizeof(challenge) + serialized_buffer_size(password_handle) in nonErrorSerializedSize()
159 memcpy(buffer, &challenge, sizeof(challenge)); in nonErrorSerialize()
160 buffer += sizeof(challenge); in nonErrorSerialize()
171 if (!fitsBuffer(payload, end, sizeof(challenge))) return ERROR_INVALID; in nonErrorDeserialize()
173 memcpy(&challenge, payload, sizeof(challenge)); in nonErrorDeserialize()
174 payload += sizeof(challenge); in nonErrorDeserialize()
Dgatekeeper.cpp150 user_id, authenticator_id, request.challenge); in Verify()
228 uint64_t challenge) { in MintAuthToken() argument
234 token.challenge = challenge; in MintAuthToken()
241 sizeof(token.challenge) + in MintAuthToken()
/system/keymaster/tests/
Dkeymaster_enforcement_test.cpp577 token.challenge = 99; in TEST_F()
593 op_params, token.challenge, false /* is_begin_operation */)); in TEST_F()
600 token.challenge = 99; in TEST_F()
618 op_params, token.challenge, false /* is_begin_operation */)); in TEST_F()
622 op_params, token.challenge, false /* is_begin_operation */)); in TEST_F()
629 token.challenge = 99; in TEST_F()
645 op_params, token.challenge + 1 /* doesn't match token */, in TEST_F()
653 token.challenge = 99; in TEST_F()
669 op_params, token.challenge, false /* is_begin_operation */)); in TEST_F()
673 op_params, token.challenge, false /* is_begin_operation */)); in TEST_F()
[all …]
/system/security/identity/
DCredential.cpp111 int64_t challenge; in selectAuthKey() local
112 Status status = halBinder_->createAuthChallenge(&challenge); in selectAuthKey()
116 if (challenge == 0) { in selectAuthKey()
121 selectedChallenge_ = challenge; in selectAuthKey()
122 *_aidl_return = challenge; in selectAuthKey()
139 bool getTokensFromKeystore(uint64_t challenge, uint64_t secureUserId, in getTokensFromKeystore() argument
153 keystore->getTokensForCredstore(challenge, secureUserId, authTokenMaxAgeMillis, callback); in getTokensFromKeystore()
271 aidlAuthToken.challenge = 0; in getEntries()
278 aidlVerificationToken.challenge = 0; in getEntries()
301 aidlAuthToken.challenge = int64_t(authToken.challenge); in getEntries()
[all …]
DWritableCredential.h43 Status getCredentialKeyCertificateChain(const vector<uint8_t>& challenge,
62 Status ensureAttestationCertificateExists(const vector<uint8_t>& challenge);
DWritableCredential.cpp49 Status WritableCredential::ensureAttestationCertificateExists(const vector<uint8_t>& challenge) { in ensureAttestationCertificateExists() argument
63 Status status = halBinder_->getAttestationCertificate(asn1AttestationId.value(), challenge, in ensureAttestationCertificateExists()
80 Status WritableCredential::getCredentialKeyCertificateChain(const vector<uint8_t>& challenge, in getCredentialKeyCertificateChain() argument
83 Status ensureStatus = ensureAttestationCertificateExists(challenge); in getCredentialKeyCertificateChain()
/system/keymaster/ng/
DAndroidKeymaster41Device.cpp45 serializableToken.challenge = verificationToken.challenge; in deviceLocked()
DAndroidKeymaster4Device.cpp279 uint64_t challenge, const hidl_vec<KeyParameter>& parametersToVerify, in verifyAuthorization() argument
284 request.challenge = challenge; in verifyAuthorization()
286 request.auth_token.challenge = authToken.challenge; in verifyAuthorization()
297 token.challenge = response.token.challenge; in verifyAuthorization()
/system/security/keystore/
Dauth_token_table.cpp139 entries_, [&](Entry& e) { return e.token().challenge == op_handle && !e.completed(); }); in FindAuthPerOpAuthorization()
177 AuthTokenTable::FindAuthorizationForCredstore(uint64_t challenge, uint64_t secureUserId, in FindAuthorizationForCredstore() argument
185 if (challenge != 0) { in FindAuthorizationForCredstore()
187 entries_, [&](Entry& e) { return e.token().challenge == challenge && !e.completed(); }); in FindAuthorizationForCredstore()
265 auto found = find_if(entries_, [&](Entry& e) { return e.token().challenge == op_handle; }); in MarkCompleted()
276 operation_completed_(token_.challenge == 0) {} in Entry()
Dauth_token_table.h78 FindAuthorizationForCredstore(uint64_t challenge, uint64_t secureUserId,
/system/security/keystore/include/keystore/
Dkeystore_hidl_support.h92 static_assert(1 /* version size */ + sizeof(token.challenge) + sizeof(token.userId) + in authToken2HidlVec()
102 pos = copy_bytes_to_iterator(token.challenge, pos); in authToken2HidlVec()
124 static_assert(1 /* version size */ + sizeof(token.challenge) + sizeof(token.userId) + in hidlVec2Km3AuthToken()
134 pos = copy_bytes_from_iterator(&token.challenge, pos); in hidlVec2Km3AuthToken()
/system/gatekeeper/include/gatekeeper/
Dgatekeeper_messages.h169 uint64_t challenge,
172 VerifyRequest() : challenge(0) {} in VerifyRequest()
178 uint64_t challenge; member
Dgatekeeper.h180 secure_id_t user_id, secure_id_t authenticator_id, uint64_t challenge);
/system/security/identity/binder/android/security/identity/
DIWritableCredential.aidl26 byte[] getCredentialKeyCertificateChain(in byte[] challenge); in getCredentialKeyCertificateChain() argument
/system/keymaster/km_openssl/
Dsoft_keymaster_enforcement.cpp185 response.token.challenge = request.challenge; in VerifyAuthorization()
190 toBlob(response.token.challenge), in VerifyAuthorization()
/system/core/gatekeeperd/binder/android/service/gatekeeper/
DIGateKeeperService.aidl65 GateKeeperResponse verifyChallenge(int uid, long challenge, in byte[] enrolledPasswordHandle, in verifyChallenge() argument
/system/core/trusty/keymaster/4.0/
DTrustyKeymaster4Device.cpp111 auth_token->challenge = authToken.challenge; in injectAuthToken()
310 uint64_t challenge, const hidl_vec<KeyParameter>& parametersToVerify, in verifyAuthorization() argument
313 request.challenge = challenge; in verifyAuthorization()
315 request.auth_token.challenge = authToken.challenge; in verifyAuthorization()
326 token.challenge = response.token.challenge; in verifyAuthorization()
/system/keymaster/ng/include/
Dkeystore_hidl_support.h107 static_assert(1 /* version size */ + sizeof(token.challenge) + sizeof(token.userId) + in authToken2HidlVec()
117 pos = copy_bytes_to_iterator(token.challenge, pos); in authToken2HidlVec()
DAndroidKeymaster41Device.h85 Return<void> verifyAuthorization(uint64_t challenge, in verifyAuthorization() argument
89 return super::verifyAuthorization(challenge, parametersToVerify, authToken, _hidl_cb); in verifyAuthorization()
/system/core/trusty/gatekeeper/
Dtrusty_gatekeeper.cpp100 uint32_t uid, uint64_t challenge, in verify() argument
113 VerifyRequest request(uid, challenge, hidl_vec2sized_buffer(enrolledPasswordHandle), in verify()
Dtrusty_gatekeeper.h63 uint32_t uid, uint64_t challenge,
/system/keymaster/include/keymaster/
Dandroid_keymaster_messages.h824 challenge = other.challenge; in HardwareAuthToken()
836 uint64_t challenge{};
847 challenge = other.challenge; in VerificationToken()
858 uint64_t challenge{};
871 return sizeof(challenge) + parameters_to_verify.SerializedSize() + in SerializedSize()
876 buf = append_uint64_to_buf(buf, end, challenge); in Serialize()
882 return (copy_uint64_from_buf(buf_ptr, end, &challenge) && in Deserialize()
887 uint64_t challenge{};
/system/keymaster/android_keymaster/
Dandroid_keymaster_messages.cpp692 return sizeof(challenge) + sizeof(user_id) + sizeof(authenticator_id) + in SerializedSize()
697 buf = append_uint64_to_buf(buf, end, challenge); in Serialize()
706 return copy_uint64_from_buf(buf_ptr, end, &challenge) && in Deserialize()
715 return sizeof(challenge) + sizeof(timestamp) + parameters_verified.SerializedSize() + in SerializedSize()
720 buf = append_uint64_to_buf(buf, end, challenge); in Serialize()
728 return copy_uint64_from_buf(buf_ptr, end, &challenge) && in Deserialize()
Dkeymaster_enforcement.cpp497 if (auth_timeout_index == -1 && op_handle && op_handle != auth_token->challenge) { in AuthTokenMatches()
498 LOG_E("Auth token has the challenge %llu, need %llu", auth_token->challenge, op_handle); in AuthTokenMatches()

12