/system/security/keystore/tests/ |
D | verification_token_seralization_test.cpp | 33 token.challenge = 12345; in TEST() 44 ASSERT_EQ(token.challenge, deserialized.value().challenge); in TEST() 53 token.challenge = 12345; in TEST() 61 ASSERT_EQ(token.challenge, deserialized.value().challenge); in TEST()
|
/system/gatekeeper/ |
D | gatekeeper_messages.cpp | 145 VerifyRequest::VerifyRequest(uint32_t user_id, uint64_t challenge, in VerifyRequest() argument 148 this->challenge = challenge; in VerifyRequest() 154 return sizeof(challenge) + serialized_buffer_size(password_handle) in nonErrorSerializedSize() 159 memcpy(buffer, &challenge, sizeof(challenge)); in nonErrorSerialize() 160 buffer += sizeof(challenge); in nonErrorSerialize() 171 if (!fitsBuffer(payload, end, sizeof(challenge))) return ERROR_INVALID; in nonErrorDeserialize() 173 memcpy(&challenge, payload, sizeof(challenge)); in nonErrorDeserialize() 174 payload += sizeof(challenge); in nonErrorDeserialize()
|
D | gatekeeper.cpp | 150 user_id, authenticator_id, request.challenge); in Verify() 228 uint64_t challenge) { in MintAuthToken() argument 234 token.challenge = challenge; in MintAuthToken() 241 sizeof(token.challenge) + in MintAuthToken()
|
/system/keymaster/tests/ |
D | keymaster_enforcement_test.cpp | 577 token.challenge = 99; in TEST_F() 593 op_params, token.challenge, false /* is_begin_operation */)); in TEST_F() 600 token.challenge = 99; in TEST_F() 618 op_params, token.challenge, false /* is_begin_operation */)); in TEST_F() 622 op_params, token.challenge, false /* is_begin_operation */)); in TEST_F() 629 token.challenge = 99; in TEST_F() 645 op_params, token.challenge + 1 /* doesn't match token */, in TEST_F() 653 token.challenge = 99; in TEST_F() 669 op_params, token.challenge, false /* is_begin_operation */)); in TEST_F() 673 op_params, token.challenge, false /* is_begin_operation */)); in TEST_F() [all …]
|
/system/security/identity/ |
D | Credential.cpp | 111 int64_t challenge; in selectAuthKey() local 112 Status status = halBinder_->createAuthChallenge(&challenge); in selectAuthKey() 116 if (challenge == 0) { in selectAuthKey() 121 selectedChallenge_ = challenge; in selectAuthKey() 122 *_aidl_return = challenge; in selectAuthKey() 139 bool getTokensFromKeystore(uint64_t challenge, uint64_t secureUserId, in getTokensFromKeystore() argument 153 keystore->getTokensForCredstore(challenge, secureUserId, authTokenMaxAgeMillis, callback); in getTokensFromKeystore() 271 aidlAuthToken.challenge = 0; in getEntries() 278 aidlVerificationToken.challenge = 0; in getEntries() 301 aidlAuthToken.challenge = int64_t(authToken.challenge); in getEntries() [all …]
|
D | WritableCredential.h | 43 Status getCredentialKeyCertificateChain(const vector<uint8_t>& challenge, 62 Status ensureAttestationCertificateExists(const vector<uint8_t>& challenge);
|
D | WritableCredential.cpp | 49 Status WritableCredential::ensureAttestationCertificateExists(const vector<uint8_t>& challenge) { in ensureAttestationCertificateExists() argument 63 Status status = halBinder_->getAttestationCertificate(asn1AttestationId.value(), challenge, in ensureAttestationCertificateExists() 80 Status WritableCredential::getCredentialKeyCertificateChain(const vector<uint8_t>& challenge, in getCredentialKeyCertificateChain() argument 83 Status ensureStatus = ensureAttestationCertificateExists(challenge); in getCredentialKeyCertificateChain()
|
/system/keymaster/ng/ |
D | AndroidKeymaster41Device.cpp | 45 serializableToken.challenge = verificationToken.challenge; in deviceLocked()
|
D | AndroidKeymaster4Device.cpp | 279 uint64_t challenge, const hidl_vec<KeyParameter>& parametersToVerify, in verifyAuthorization() argument 284 request.challenge = challenge; in verifyAuthorization() 286 request.auth_token.challenge = authToken.challenge; in verifyAuthorization() 297 token.challenge = response.token.challenge; in verifyAuthorization()
|
/system/security/keystore/ |
D | auth_token_table.cpp | 139 entries_, [&](Entry& e) { return e.token().challenge == op_handle && !e.completed(); }); in FindAuthPerOpAuthorization() 177 AuthTokenTable::FindAuthorizationForCredstore(uint64_t challenge, uint64_t secureUserId, in FindAuthorizationForCredstore() argument 185 if (challenge != 0) { in FindAuthorizationForCredstore() 187 entries_, [&](Entry& e) { return e.token().challenge == challenge && !e.completed(); }); in FindAuthorizationForCredstore() 265 auto found = find_if(entries_, [&](Entry& e) { return e.token().challenge == op_handle; }); in MarkCompleted() 276 operation_completed_(token_.challenge == 0) {} in Entry()
|
D | auth_token_table.h | 78 FindAuthorizationForCredstore(uint64_t challenge, uint64_t secureUserId,
|
/system/security/keystore/include/keystore/ |
D | keystore_hidl_support.h | 92 static_assert(1 /* version size */ + sizeof(token.challenge) + sizeof(token.userId) + in authToken2HidlVec() 102 pos = copy_bytes_to_iterator(token.challenge, pos); in authToken2HidlVec() 124 static_assert(1 /* version size */ + sizeof(token.challenge) + sizeof(token.userId) + in hidlVec2Km3AuthToken() 134 pos = copy_bytes_from_iterator(&token.challenge, pos); in hidlVec2Km3AuthToken()
|
/system/gatekeeper/include/gatekeeper/ |
D | gatekeeper_messages.h | 169 uint64_t challenge, 172 VerifyRequest() : challenge(0) {} in VerifyRequest() 178 uint64_t challenge; member
|
D | gatekeeper.h | 180 secure_id_t user_id, secure_id_t authenticator_id, uint64_t challenge);
|
/system/security/identity/binder/android/security/identity/ |
D | IWritableCredential.aidl | 26 byte[] getCredentialKeyCertificateChain(in byte[] challenge); in getCredentialKeyCertificateChain() argument
|
/system/keymaster/km_openssl/ |
D | soft_keymaster_enforcement.cpp | 185 response.token.challenge = request.challenge; in VerifyAuthorization() 190 toBlob(response.token.challenge), in VerifyAuthorization()
|
/system/core/gatekeeperd/binder/android/service/gatekeeper/ |
D | IGateKeeperService.aidl | 65 GateKeeperResponse verifyChallenge(int uid, long challenge, in byte[] enrolledPasswordHandle, in verifyChallenge() argument
|
/system/core/trusty/keymaster/4.0/ |
D | TrustyKeymaster4Device.cpp | 111 auth_token->challenge = authToken.challenge; in injectAuthToken() 310 uint64_t challenge, const hidl_vec<KeyParameter>& parametersToVerify, in verifyAuthorization() argument 313 request.challenge = challenge; in verifyAuthorization() 315 request.auth_token.challenge = authToken.challenge; in verifyAuthorization() 326 token.challenge = response.token.challenge; in verifyAuthorization()
|
/system/keymaster/ng/include/ |
D | keystore_hidl_support.h | 107 static_assert(1 /* version size */ + sizeof(token.challenge) + sizeof(token.userId) + in authToken2HidlVec() 117 pos = copy_bytes_to_iterator(token.challenge, pos); in authToken2HidlVec()
|
D | AndroidKeymaster41Device.h | 85 Return<void> verifyAuthorization(uint64_t challenge, in verifyAuthorization() argument 89 return super::verifyAuthorization(challenge, parametersToVerify, authToken, _hidl_cb); in verifyAuthorization()
|
/system/core/trusty/gatekeeper/ |
D | trusty_gatekeeper.cpp | 100 uint32_t uid, uint64_t challenge, in verify() argument 113 VerifyRequest request(uid, challenge, hidl_vec2sized_buffer(enrolledPasswordHandle), in verify()
|
D | trusty_gatekeeper.h | 63 uint32_t uid, uint64_t challenge,
|
/system/keymaster/include/keymaster/ |
D | android_keymaster_messages.h | 824 challenge = other.challenge; in HardwareAuthToken() 836 uint64_t challenge{}; 847 challenge = other.challenge; in VerificationToken() 858 uint64_t challenge{}; 871 return sizeof(challenge) + parameters_to_verify.SerializedSize() + in SerializedSize() 876 buf = append_uint64_to_buf(buf, end, challenge); in Serialize() 882 return (copy_uint64_from_buf(buf_ptr, end, &challenge) && in Deserialize() 887 uint64_t challenge{};
|
/system/keymaster/android_keymaster/ |
D | android_keymaster_messages.cpp | 692 return sizeof(challenge) + sizeof(user_id) + sizeof(authenticator_id) + in SerializedSize() 697 buf = append_uint64_to_buf(buf, end, challenge); in Serialize() 706 return copy_uint64_from_buf(buf_ptr, end, &challenge) && in Deserialize() 715 return sizeof(challenge) + sizeof(timestamp) + parameters_verified.SerializedSize() + in SerializedSize() 720 buf = append_uint64_to_buf(buf, end, challenge); in Serialize() 728 return copy_uint64_from_buf(buf_ptr, end, &challenge) && in Deserialize()
|
D | keymaster_enforcement.cpp | 497 if (auth_timeout_index == -1 && op_handle && op_handle != auth_token->challenge) { in AuthTokenMatches() 498 LOG_E("Auth token has the challenge %llu, need %llu", auth_token->challenge, op_handle); in AuthTokenMatches()
|