| /system/security/provisioner/ |
| D | rkp_factory_extraction_lib.cpp | 62 std::vector<uint8_t> challenge(kChallengeSize); in generateChallenge() local 86 const std::vector<uint8_t>& challenge, in composeCertificateRequestV1() 132 const std::vector<uint8_t> challenge = generateChallenge(); in getCsrV1() local 165 const std::vector<uint8_t> challenge = generateChallenge(); in selfTestGetCsrV1() local 212 const std::vector<uint8_t> challenge = generateChallenge(); in getCsrV3() local
|
| D | rkp_factory_extraction_lib_test.cpp | 219 const std::vector<uint8_t> challenge = generateChallenge(); in TEST() local 256 std::vector<uint8_t> challenge; in TEST() local 335 std::vector<uint8_t> challenge; in TEST() local 370 std::vector<uint8_t> challenge; in TEST() local 394 std::vector<uint8_t> challenge; in TEST() local
|
| /system/security/identity/binder/android/security/identity/ |
| D | IWritableCredential.aidl | 26 byte[] getCredentialKeyCertificateChain(in byte[] challenge); in getCredentialKeyCertificateChain()
|
| D | ICredential.aidl | 45 byte[] deleteWithChallenge(in byte[] challenge); in deleteWithChallenge() 47 byte[] proveOwnership(in byte[] challenge); in proveOwnership()
|
| /system/core/trusty/keymaster/keymint/ |
| D | TrustySecureClock.cpp | 28 ::ndk::ScopedAStatus TrustySecureClock::generateTimeStamp(int64_t challenge, in generateTimeStamp()
|
| D | TrustyRemotelyProvisionedComponentDevice.cpp | 109 const bytevec& endpointEncCertChain, const bytevec& challenge, DeviceInfo* deviceInfo, in generateCertificateRequest() 133 const std::vector<MacedPublicKey>& keysToSign, const std::vector<uint8_t>& challenge, in generateCertificateRequestV2()
|
| /system/keymint/wire/src/ |
| D | secureclock.rs | 29 pub challenge: i64, field
|
| D | types.rs | 97 pub challenge: i64, field 221 pub challenge: [u8; 16], field 311 pub challenge: Vec<u8>, field 322 pub challenge: Vec<u8>, field 348 pub challenge: i64, field
|
| /system/keymaster/ng/ |
| D | AndroidRemotelyProvisionedComponentDevice.cpp | 120 const bytevec& challenge, DeviceInfo* deviceInfo, ProtectedData* protectedData, in generateCertificateRequest() 147 const std::vector<MacedPublicKey>& keysToSign, const std::vector<uint8_t>& challenge, in generateCertificateRequestV2()
|
| D | AndroidSecureClock.cpp | 41 ScopedAStatus AndroidSecureClock::generateTimeStamp(int64_t challenge, TimeStampToken* token) { in generateTimeStamp()
|
| /system/see/authmgr/authmgr-common/src/ |
| D | signed_connection_request.rs | 114 challenge: Challenge, field 159 let challenge: Challenge = match connection_req_cbor_array.remove(0) { in from_cbor_value() localVariable 293 let mut challenge = [0u8; 32]; in test_sign_verify_connection_request() localVariable
|
| /system/security/identity/ |
| D | WritableCredential.cpp | 54 Status WritableCredential::ensureAttestationCertificateExists(const vector<uint8_t>& challenge) { in ensureAttestationCertificateExists() 85 Status WritableCredential::getCredentialKeyCertificateChain(const vector<uint8_t>& challenge, in getCredentialKeyCertificateChain()
|
| D | Credential.cpp | 169 int64_t challenge; in ensureChallenge() local 195 bool getTokensFromKeystore2(uint64_t challenge, uint64_t secureUserId, in getTokensFromKeystore2() 611 Status Credential::deleteWithChallenge(const vector<uint8_t>& challenge, in deleteWithChallenge() 644 Status Credential::proveOwnership(const vector<uint8_t>& challenge, vector<uint8_t>* _aidl_return) { in proveOwnership()
|
| /system/core/gatekeeperd/binder/android/service/gatekeeper/ |
| D | IGateKeeperService.aidl | 66 GateKeeperResponse verifyChallenge(int userId, long challenge, in byte[] enrolledPasswordHandle, in verifyChallenge()
|
| /system/security/keystore2/aidl/android/security/authorization/ |
| D | IKeystoreAuthorization.aidl | 168 AuthorizationTokens getAuthTokensForCredStore(in long challenge, in long secureUserId, in getAuthTokensForCredStore()
|
| /system/keymint/hal/src/hal/ |
| D | tests.rs | 26 challenge: i64, field
|
| /system/security/keystore2/src/ |
| D | shared_secret_negotiation.rs | 295 let challenge = match strongbox.getRootOfTrustChallenge() { in transfer_root_of_trust() localVariable
|
| /system/core/trusty/gatekeeper/ |
| D | trusty_gatekeeper.cpp | 115 int32_t uid, int64_t challenge, const std::vector<uint8_t>& enrolledPasswordHandle, in verify()
|
| /system/keymaster/contexts/ |
| D | pure_soft_remote_provisioning_context.cpp | 208 PureSoftRemoteProvisioningContext::BuildCsr(const std::vector<uint8_t>& challenge, in BuildCsr()
|
| /system/security/keystore2/tests/ |
| D | user_auth.rs | 558 let challenge = child_handle.recv_or_die().0.expect("no challenge"); in test_auth_bound_per_op_with_gk() localVariable 721 let challenge = child_handle.recv_or_die().0.expect("no challenge"); in test_auth_bound_per_op_with_gk_failure() localVariable
|
| /system/gatekeeper/ |
| D | gatekeeper.cpp | 255 uint64_t challenge) { in MintAuthToken()
|
| D | gatekeeper_messages.cpp | 161 VerifyRequest::VerifyRequest(uint32_t user_id, uint64_t challenge, in VerifyRequest()
|
| /system/keymaster/ng/include/ |
| D | AndroidKeymaster41Device.h | 86 Return<void> verifyAuthorization(uint64_t challenge, in verifyAuthorization()
|
| /system/see/authmgr/authmgr-be/src/ |
| D | tests.rs | 226 let challenge: Challenge = authmgr_be in test_auth_mgr_protocol_succeeds_single_pvm() localVariable
|
| /system/gatekeeper/include/gatekeeper/ |
| D | gatekeeper_messages.h | 181 uint64_t challenge; member
|