Home
last modified time | relevance | path

Searched refs:challenge (Results 1 – 25 of 60) sorted by relevance

123

/system/core/trusty/keymaster/keymint/
DTrustySecureClock.cpp28 ::ndk::ScopedAStatus TrustySecureClock::generateTimeStamp(int64_t challenge, in generateTimeStamp() argument
31 request.challenge = challenge; in generateTimeStamp()
36 token->challenge = response.token.challenge; in generateTimeStamp()
DTrustyRemotelyProvisionedComponentDevice.cpp97 const bytevec& endpointEncCertChain, const bytevec& challenge, DeviceInfo* deviceInfo, in generateCertificateRequest() argument
107 request.SetChallenge(challenge.data(), challenge.size()); in generateCertificateRequest()
/system/keymaster/ng/
DAndroidSecureClock.cpp41 ScopedAStatus AndroidSecureClock::generateTimeStamp(int64_t challenge, TimeStampToken* token) { in generateTimeStamp() argument
43 request.challenge = challenge; in generateTimeStamp()
49 token->challenge = response.token.challenge; in generateTimeStamp()
DAndroidKeymaster41Device.cpp45 serializableToken.challenge = verificationToken.challenge; in deviceLocked()
DAndroidRemotelyProvisionedComponentDevice.cpp109 const bytevec& challenge, DeviceInfo* deviceInfo, ProtectedData* protectedData, in generateCertificateRequest() argument
119 request.SetChallenge(challenge.data(), challenge.size()); in generateCertificateRequest()
/system/security/keystore/tests/
Dverification_token_seralization_test.cpp33 token.challenge = 12345; in TEST()
44 ASSERT_EQ(token.challenge, deserialized.value().challenge); in TEST()
53 token.challenge = 12345; in TEST()
61 ASSERT_EQ(token.challenge, deserialized.value().challenge); in TEST()
/system/security/provisioner/
Drkp_factory_extraction_tool.cpp53 std::vector<uint8_t> challenge(kChallengeSize); in generateChallenge() local
55 ssize_t bytesRemaining = static_cast<ssize_t>(challenge.size()); in generateChallenge()
56 uint8_t* writePtr = challenge.data(); in generateChallenge()
67 return challenge; in generateChallenge()
72 const std::vector<uint8_t>& challenge, in composeCertificateRequest() argument
85 .add(challenge) in composeCertificateRequest()
129 const std::vector<uint8_t> challenge = generateChallenge(); in getCsrForInstance() local
145 FLAGS_test_mode, emptyKeys, getEekChain(), challenge, &verifiedDeviceInfo, &protectedData, in getCsrForInstance()
153 composeCertificateRequest(protectedData, verifiedDeviceInfo, challenge, keysToSignMac); in getCsrForInstance()
/system/gatekeeper/
Dgatekeeper_messages.cpp161 VerifyRequest::VerifyRequest(uint32_t user_id, uint64_t challenge, in VerifyRequest() argument
164 this->challenge = challenge; in VerifyRequest()
170 return sizeof(challenge) + serialized_buffer_size(password_handle) in nonErrorSerializedSize()
175 memcpy(buffer, &challenge, sizeof(challenge)); in nonErrorSerialize()
176 buffer += sizeof(challenge); in nonErrorSerialize()
187 if (!fitsBuffer(payload, end, sizeof(challenge))) return ERROR_INVALID; in nonErrorDeserialize()
189 memcpy(&challenge, payload, sizeof(challenge)); in nonErrorDeserialize()
190 payload += sizeof(challenge); in nonErrorDeserialize()
Dgatekeeper.cpp150 user_id, authenticator_id, request.challenge); in Verify()
242 uint64_t challenge) { in MintAuthToken() argument
248 token.challenge = challenge; in MintAuthToken()
255 sizeof(token.challenge) + in MintAuthToken()
/system/security/keystore2/src/
Denforcements.rs184 map.remove_entry(&hat.challenge) in add_auth_token()
192 pub fn add_receiver(&self, challenge: i64, recv: TokenReceiver) { in add_receiver()
195 map.insert(challenge, recv); in add_receiver()
221 fn get_timestamp_token(challenge: i64) -> Result<TimeStampToken, Error> { in get_timestamp_token()
229 map_binder_status(dev.generateTimeStamp(challenge)) in get_timestamp_token()
232 fn timestamp_token_request(challenge: i64, sender: Sender<Result<TimeStampToken, Error>>) { in timestamp_token_request()
233 if let Err(e) = sender.send(get_timestamp_token(challenge)) { in timestamp_token_request()
248 pub fn finalize_create_authorization(&mut self, challenge: i64) -> Option<OperationChallenge> { in finalize_create_authorization()
253 ENFORCEMENTS.register_op_auth_receiver(challenge, token_receiver); in finalize_create_authorization()
256 Some(OperationChallenge { challenge }) in finalize_create_authorization()
[all …]
Dauthorization.rs212 challenge: i64, in get_auth_tokens_for_credstore()
222 if challenge == 0 { in get_auth_tokens_for_credstore()
228 ENFORCEMENTS.get_auth_tokens(challenge, secure_user_id, auth_token_max_age_millis)?; in get_auth_tokens_for_credstore()
265 challenge: i64, in getAuthTokensForCredStore()
272 challenge, in getAuthTokensForCredStore()
/system/keymaster/tests/
Dkeymaster_enforcement_test.cpp586 token.challenge = 99; in TEST_F()
602 op_params, token.challenge, false /* is_begin_operation */)); in TEST_F()
609 token.challenge = 99; in TEST_F()
627 op_params, token.challenge, false /* is_begin_operation */)); in TEST_F()
631 op_params, token.challenge, false /* is_begin_operation */)); in TEST_F()
638 token.challenge = 99; in TEST_F()
654 op_params, token.challenge + 1 /* doesn't match token */, in TEST_F()
662 token.challenge = 99; in TEST_F()
678 op_params, token.challenge, false /* is_begin_operation */)); in TEST_F()
682 op_params, token.challenge, false /* is_begin_operation */)); in TEST_F()
[all …]
/system/security/identity/
DCredential.cpp150 int64_t challenge; in ensureChallenge() local
151 Status status = halBinder_->createAuthChallenge(&challenge); in ensureChallenge()
156 if (challenge == 0) { in ensureChallenge()
161 selectedChallenge_ = challenge; in ensureChallenge()
167 bool getTokensFromKeystore2(uint64_t challenge, uint64_t secureUserId, in getTokensFromKeystore2() argument
177 auto result = authzService->getAuthTokensForCredStore(challenge, secureUserId, in getTokensFromKeystore2()
183 aidlAuthToken.challenge = keymintAuthToken.challenge; in getTokensFromKeystore2()
194 aidlVerificationToken.challenge = timestampToken.challenge; in getTokensFromKeystore2()
315 aidlAuthToken.challenge = 0; in getEntries()
322 aidlVerificationToken.challenge = 0; in getEntries()
[all …]
DWritableCredential.h54 Status getCredentialKeyCertificateChain(const vector<uint8_t>& challenge,
79 Status ensureAttestationCertificateExists(const vector<uint8_t>& challenge);
/system/security/identity/binder/android/security/identity/
DICredential.aidl45 byte[] deleteWithChallenge(in byte[] challenge); in deleteWithChallenge() argument
47 byte[] proveOwnership(in byte[] challenge); in proveOwnership() argument
DIWritableCredential.aidl26 byte[] getCredentialKeyCertificateChain(in byte[] challenge); in getCredentialKeyCertificateChain() argument
/system/security/keystore/include/keystore/
Dkeystore_hidl_support.h92 static_assert(1 /* version size */ + sizeof(token.challenge) + sizeof(token.userId) + in authToken2HidlVec()
102 pos = copy_bytes_to_iterator(token.challenge, pos); in authToken2HidlVec()
124 static_assert(1 /* version size */ + sizeof(token.challenge) + sizeof(token.userId) + in hidlVec2Km3AuthToken()
134 pos = copy_bytes_from_iterator(&token.challenge, pos); in hidlVec2Km3AuthToken()
/system/hardware/interfaces/keystore2/aidl/aidl_api/android.system.keystore2/current/android/system/keystore2/
DOperationChallenge.aidl38 long challenge;
/system/hardware/interfaces/keystore2/aidl/android/system/keystore2/
DOperationChallenge.aidl27 long challenge;
/system/hardware/interfaces/keystore2/aidl/aidl_api/android.system.keystore2/1/android/system/keystore2/
DOperationChallenge.aidl38 long challenge;
/system/keymaster/km_openssl/
Dsoft_keymaster_enforcement.cpp185 response.token.challenge = request.challenge; in VerifyAuthorization()
190 toBlob(response.token.challenge), in VerifyAuthorization()
205 toBlob(token->challenge), in GenerateTimestampToken()
/system/keymaster/include/keymaster/
Dandroid_keymaster_messages.h408 KeymasterBlob challenge; member
891 challenge = other.challenge; in HardwareAuthToken()
903 uint64_t challenge{};
914 challenge = other.challenge; in VerificationToken()
925 uint64_t challenge{};
937 return sizeof(challenge) + parameters_to_verify.SerializedSize() + in SerializedSize()
942 buf = append_uint64_to_buf(buf, end, challenge); in Serialize()
948 return (copy_uint64_from_buf(buf_ptr, end, &challenge) && in Deserialize()
953 uint64_t challenge{};
1051 challenge = other.challenge; in TimestampToken()
[all …]
/system/security/provisioner/binder/android/security/provisioner/
DIProvisionerService.aidl26 in byte[] challenge) = 0; in getCertificateRequest() argument
/system/gatekeeper/include/gatekeeper/
Dgatekeeper_messages.h170 uint64_t challenge,
173 VerifyRequest() : challenge(0) {} in VerifyRequest()
179 uint64_t challenge; member
/system/core/trusty/keymaster/include/trusty_keymaster/
DTrustySecureClock.h32 ::ndk::ScopedAStatus generateTimeStamp(int64_t challenge, TimeStampToken* token) override;

123