/system/core/trusty/keymaster/keymint/ |
D | TrustySecureClock.cpp | 28 ::ndk::ScopedAStatus TrustySecureClock::generateTimeStamp(int64_t challenge, in generateTimeStamp() argument 31 request.challenge = challenge; in generateTimeStamp() 36 token->challenge = response.token.challenge; in generateTimeStamp()
|
D | TrustyRemotelyProvisionedComponentDevice.cpp | 97 const bytevec& endpointEncCertChain, const bytevec& challenge, DeviceInfo* deviceInfo, in generateCertificateRequest() argument 107 request.SetChallenge(challenge.data(), challenge.size()); in generateCertificateRequest()
|
/system/keymaster/ng/ |
D | AndroidSecureClock.cpp | 41 ScopedAStatus AndroidSecureClock::generateTimeStamp(int64_t challenge, TimeStampToken* token) { in generateTimeStamp() argument 43 request.challenge = challenge; in generateTimeStamp() 49 token->challenge = response.token.challenge; in generateTimeStamp()
|
D | AndroidKeymaster41Device.cpp | 45 serializableToken.challenge = verificationToken.challenge; in deviceLocked()
|
D | AndroidRemotelyProvisionedComponentDevice.cpp | 109 const bytevec& challenge, DeviceInfo* deviceInfo, ProtectedData* protectedData, in generateCertificateRequest() argument 119 request.SetChallenge(challenge.data(), challenge.size()); in generateCertificateRequest()
|
/system/security/keystore/tests/ |
D | verification_token_seralization_test.cpp | 33 token.challenge = 12345; in TEST() 44 ASSERT_EQ(token.challenge, deserialized.value().challenge); in TEST() 53 token.challenge = 12345; in TEST() 61 ASSERT_EQ(token.challenge, deserialized.value().challenge); in TEST()
|
/system/security/provisioner/ |
D | rkp_factory_extraction_tool.cpp | 53 std::vector<uint8_t> challenge(kChallengeSize); in generateChallenge() local 55 ssize_t bytesRemaining = static_cast<ssize_t>(challenge.size()); in generateChallenge() 56 uint8_t* writePtr = challenge.data(); in generateChallenge() 67 return challenge; in generateChallenge() 72 const std::vector<uint8_t>& challenge, in composeCertificateRequest() argument 85 .add(challenge) in composeCertificateRequest() 129 const std::vector<uint8_t> challenge = generateChallenge(); in getCsrForInstance() local 145 FLAGS_test_mode, emptyKeys, getEekChain(), challenge, &verifiedDeviceInfo, &protectedData, in getCsrForInstance() 153 composeCertificateRequest(protectedData, verifiedDeviceInfo, challenge, keysToSignMac); in getCsrForInstance()
|
/system/gatekeeper/ |
D | gatekeeper_messages.cpp | 161 VerifyRequest::VerifyRequest(uint32_t user_id, uint64_t challenge, in VerifyRequest() argument 164 this->challenge = challenge; in VerifyRequest() 170 return sizeof(challenge) + serialized_buffer_size(password_handle) in nonErrorSerializedSize() 175 memcpy(buffer, &challenge, sizeof(challenge)); in nonErrorSerialize() 176 buffer += sizeof(challenge); in nonErrorSerialize() 187 if (!fitsBuffer(payload, end, sizeof(challenge))) return ERROR_INVALID; in nonErrorDeserialize() 189 memcpy(&challenge, payload, sizeof(challenge)); in nonErrorDeserialize() 190 payload += sizeof(challenge); in nonErrorDeserialize()
|
D | gatekeeper.cpp | 150 user_id, authenticator_id, request.challenge); in Verify() 242 uint64_t challenge) { in MintAuthToken() argument 248 token.challenge = challenge; in MintAuthToken() 255 sizeof(token.challenge) + in MintAuthToken()
|
/system/security/keystore2/src/ |
D | enforcements.rs | 184 map.remove_entry(&hat.challenge) in add_auth_token() 192 pub fn add_receiver(&self, challenge: i64, recv: TokenReceiver) { in add_receiver() 195 map.insert(challenge, recv); in add_receiver() 221 fn get_timestamp_token(challenge: i64) -> Result<TimeStampToken, Error> { in get_timestamp_token() 229 map_binder_status(dev.generateTimeStamp(challenge)) in get_timestamp_token() 232 fn timestamp_token_request(challenge: i64, sender: Sender<Result<TimeStampToken, Error>>) { in timestamp_token_request() 233 if let Err(e) = sender.send(get_timestamp_token(challenge)) { in timestamp_token_request() 248 pub fn finalize_create_authorization(&mut self, challenge: i64) -> Option<OperationChallenge> { in finalize_create_authorization() 253 ENFORCEMENTS.register_op_auth_receiver(challenge, token_receiver); in finalize_create_authorization() 256 Some(OperationChallenge { challenge }) in finalize_create_authorization() [all …]
|
D | authorization.rs | 212 challenge: i64, in get_auth_tokens_for_credstore() 222 if challenge == 0 { in get_auth_tokens_for_credstore() 228 ENFORCEMENTS.get_auth_tokens(challenge, secure_user_id, auth_token_max_age_millis)?; in get_auth_tokens_for_credstore() 265 challenge: i64, in getAuthTokensForCredStore() 272 challenge, in getAuthTokensForCredStore()
|
/system/keymaster/tests/ |
D | keymaster_enforcement_test.cpp | 586 token.challenge = 99; in TEST_F() 602 op_params, token.challenge, false /* is_begin_operation */)); in TEST_F() 609 token.challenge = 99; in TEST_F() 627 op_params, token.challenge, false /* is_begin_operation */)); in TEST_F() 631 op_params, token.challenge, false /* is_begin_operation */)); in TEST_F() 638 token.challenge = 99; in TEST_F() 654 op_params, token.challenge + 1 /* doesn't match token */, in TEST_F() 662 token.challenge = 99; in TEST_F() 678 op_params, token.challenge, false /* is_begin_operation */)); in TEST_F() 682 op_params, token.challenge, false /* is_begin_operation */)); in TEST_F() [all …]
|
/system/security/identity/ |
D | Credential.cpp | 150 int64_t challenge; in ensureChallenge() local 151 Status status = halBinder_->createAuthChallenge(&challenge); in ensureChallenge() 156 if (challenge == 0) { in ensureChallenge() 161 selectedChallenge_ = challenge; in ensureChallenge() 167 bool getTokensFromKeystore2(uint64_t challenge, uint64_t secureUserId, in getTokensFromKeystore2() argument 177 auto result = authzService->getAuthTokensForCredStore(challenge, secureUserId, in getTokensFromKeystore2() 183 aidlAuthToken.challenge = keymintAuthToken.challenge; in getTokensFromKeystore2() 194 aidlVerificationToken.challenge = timestampToken.challenge; in getTokensFromKeystore2() 315 aidlAuthToken.challenge = 0; in getEntries() 322 aidlVerificationToken.challenge = 0; in getEntries() [all …]
|
D | WritableCredential.h | 54 Status getCredentialKeyCertificateChain(const vector<uint8_t>& challenge, 79 Status ensureAttestationCertificateExists(const vector<uint8_t>& challenge);
|
/system/security/identity/binder/android/security/identity/ |
D | ICredential.aidl | 45 byte[] deleteWithChallenge(in byte[] challenge); in deleteWithChallenge() argument 47 byte[] proveOwnership(in byte[] challenge); in proveOwnership() argument
|
D | IWritableCredential.aidl | 26 byte[] getCredentialKeyCertificateChain(in byte[] challenge); in getCredentialKeyCertificateChain() argument
|
/system/security/keystore/include/keystore/ |
D | keystore_hidl_support.h | 92 static_assert(1 /* version size */ + sizeof(token.challenge) + sizeof(token.userId) + in authToken2HidlVec() 102 pos = copy_bytes_to_iterator(token.challenge, pos); in authToken2HidlVec() 124 static_assert(1 /* version size */ + sizeof(token.challenge) + sizeof(token.userId) + in hidlVec2Km3AuthToken() 134 pos = copy_bytes_from_iterator(&token.challenge, pos); in hidlVec2Km3AuthToken()
|
/system/hardware/interfaces/keystore2/aidl/aidl_api/android.system.keystore2/current/android/system/keystore2/ |
D | OperationChallenge.aidl | 38 long challenge;
|
/system/hardware/interfaces/keystore2/aidl/android/system/keystore2/ |
D | OperationChallenge.aidl | 27 long challenge;
|
/system/hardware/interfaces/keystore2/aidl/aidl_api/android.system.keystore2/1/android/system/keystore2/ |
D | OperationChallenge.aidl | 38 long challenge;
|
/system/keymaster/km_openssl/ |
D | soft_keymaster_enforcement.cpp | 185 response.token.challenge = request.challenge; in VerifyAuthorization() 190 toBlob(response.token.challenge), in VerifyAuthorization() 205 toBlob(token->challenge), in GenerateTimestampToken()
|
/system/keymaster/include/keymaster/ |
D | android_keymaster_messages.h | 408 KeymasterBlob challenge; member 891 challenge = other.challenge; in HardwareAuthToken() 903 uint64_t challenge{}; 914 challenge = other.challenge; in VerificationToken() 925 uint64_t challenge{}; 937 return sizeof(challenge) + parameters_to_verify.SerializedSize() + in SerializedSize() 942 buf = append_uint64_to_buf(buf, end, challenge); in Serialize() 948 return (copy_uint64_from_buf(buf_ptr, end, &challenge) && in Deserialize() 953 uint64_t challenge{}; 1051 challenge = other.challenge; in TimestampToken() [all …]
|
/system/security/provisioner/binder/android/security/provisioner/ |
D | IProvisionerService.aidl | 26 in byte[] challenge) = 0; in getCertificateRequest() argument
|
/system/gatekeeper/include/gatekeeper/ |
D | gatekeeper_messages.h | 170 uint64_t challenge, 173 VerifyRequest() : challenge(0) {} in VerifyRequest() 179 uint64_t challenge; member
|
/system/core/trusty/keymaster/include/trusty_keymaster/ |
D | TrustySecureClock.h | 32 ::ndk::ScopedAStatus generateTimeStamp(int64_t challenge, TimeStampToken* token) override;
|