Home
last modified time | relevance | path

Searched refs:challenge (Results 1 – 25 of 85) sorted by relevance

1234

/system/core/trusty/keymaster/keymint/
DTrustySecureClock.cpp28 ::ndk::ScopedAStatus TrustySecureClock::generateTimeStamp(int64_t challenge, in generateTimeStamp() argument
31 request.challenge = challenge; in generateTimeStamp()
36 token->challenge = response.token.challenge; in generateTimeStamp()
DTrustyRemotelyProvisionedComponentDevice.cpp109 const bytevec& endpointEncCertChain, const bytevec& challenge, DeviceInfo* deviceInfo, in generateCertificateRequest() argument
119 request.SetChallenge(challenge.data(), challenge.size()); in generateCertificateRequest()
133 const std::vector<MacedPublicKey>& keysToSign, const std::vector<uint8_t>& challenge, in generateCertificateRequestV2() argument
142 request.SetChallenge(challenge.data(), challenge.size()); in generateCertificateRequestV2()
/system/keymaster/ng/
DAndroidSecureClock.cpp41 ScopedAStatus AndroidSecureClock::generateTimeStamp(int64_t challenge, TimeStampToken* token) { in generateTimeStamp() argument
43 request.challenge = challenge; in generateTimeStamp()
49 token->challenge = response.token.challenge; in generateTimeStamp()
DAndroidRemotelyProvisionedComponentDevice.cpp120 const bytevec& challenge, DeviceInfo* deviceInfo, ProtectedData* protectedData, in generateCertificateRequest() argument
133 request.SetChallenge(challenge.data(), challenge.size()); in generateCertificateRequest()
147 const std::vector<MacedPublicKey>& keysToSign, const std::vector<uint8_t>& challenge, in generateCertificateRequestV2() argument
156 request.SetChallenge(challenge.data(), challenge.size()); in generateCertificateRequestV2()
DAndroidKeymaster41Device.cpp45 serializableToken.challenge = verificationToken.challenge; in deviceLocked()
/system/security/provisioner/
Drkp_factory_extraction_lib.cpp83 std::vector<uint8_t> challenge(kChallengeSize); in generateChallenge() local
85 ssize_t bytesRemaining = static_cast<ssize_t>(challenge.size()); in generateChallenge()
86 uint8_t* writePtr = challenge.data(); in generateChallenge()
101 return challenge; in generateChallenge()
106 const std::vector<uint8_t>& challenge, in composeCertificateRequestV1() argument
132 .add(challenge) in composeCertificateRequestV1()
152 const std::vector<uint8_t> challenge = generateChallenge(); in getCsrV1() local
154 /*test_mode=*/false, emptyKeys, eek, challenge, &verifiedDeviceInfo, &protectedData, in getCsrV1()
161 return composeCertificateRequestV1(protectedData, verifiedDeviceInfo, challenge, keysToSignMac, in getCsrV1()
184 const std::vector<uint8_t> challenge = generateChallenge(); in selfTestGetCsrV1() local
[all …]
Drkp_factory_extraction_lib_test.cpp123 const std::vector<uint8_t> challenge = generateChallenge(); in TEST() local
125 EXPECT_TRUE(wasInserted) << "Duplicate challenge: " << toBase64(challenge); in TEST()
160 std::vector<uint8_t> challenge; in TEST() local
177 SaveArg<3>(&challenge), // in TEST()
192 EXPECT_THAT(challenge, Property(&std::vector<uint8_t>::size, Eq(kChallengeSize))); in TEST()
210 EXPECT_THAT(actualChallenge, Pointee(Property(&Bstr::value, Eq(challenge)))); in TEST()
238 std::vector<uint8_t> challenge; in TEST() local
250 .WillOnce(DoAll(SaveArg<1>(&challenge), SetArgPointee<2>(kCsr), in TEST()
/system/security/keystore/tests/
Dverification_token_seralization_test.cpp33 token.challenge = 12345; in TEST()
44 ASSERT_EQ(token.challenge, deserialized.value().challenge); in TEST()
53 token.challenge = 12345; in TEST()
61 ASSERT_EQ(token.challenge, deserialized.value().challenge); in TEST()
/system/keymint/hal/src/
Drpc.rs76 challenge: &[u8], in generateCertificateRequest()
85 challenge: challenge.to_vec(), in generateCertificateRequest()
94 challenge: &[u8], in generateCertificateRequestV2()
99 challenge: challenge.to_vec(), in generateCertificateRequestV2()
Dsecureclock.rs53 fn generateTimeStamp(&self, challenge: i64) -> binder::Result<TimeStampToken> { in generateTimeStamp()
55 self.execute(GenerateTimeStampRequest { challenge })?; in generateTimeStamp()
/system/gatekeeper/
Dgatekeeper_messages.cpp161 VerifyRequest::VerifyRequest(uint32_t user_id, uint64_t challenge, in VerifyRequest() argument
164 this->challenge = challenge; in VerifyRequest()
170 return sizeof(challenge) + serialized_buffer_size(password_handle) in nonErrorSerializedSize()
175 memcpy(buffer, &challenge, sizeof(challenge)); in nonErrorSerialize()
176 buffer += sizeof(challenge); in nonErrorSerialize()
187 if (!fitsBuffer(payload, end, sizeof(challenge))) return ERROR_INVALID; in nonErrorDeserialize()
189 memcpy(&challenge, payload, sizeof(challenge)); in nonErrorDeserialize()
190 payload += sizeof(challenge); in nonErrorDeserialize()
/system/keymint/ta/src/
Dclock.rs23 pub(crate) fn generate_timestamp(&self, challenge: i64) -> Result<TimeStampToken, Error> { in generate_timestamp()
26 TimeStampToken { challenge, timestamp: clock.now().into(), mac: Vec::new() }; in generate_timestamp()
45 result.extend_from_slice(&token.challenge.to_be_bytes()[..]); in timestamp_token_mac_input()
/system/keymaster/tests/
Dkeymaster_enforcement_test.cpp586 token.challenge = 99; in TEST_F()
602 op_params, token.challenge, false /* is_begin_operation */)); in TEST_F()
609 token.challenge = 99; in TEST_F()
627 op_params, token.challenge, false /* is_begin_operation */)); in TEST_F()
631 op_params, token.challenge, false /* is_begin_operation */)); in TEST_F()
638 token.challenge = 99; in TEST_F()
654 op_params, token.challenge + 1 /* doesn't match token */, in TEST_F()
662 token.challenge = 99; in TEST_F()
678 op_params, token.challenge, false /* is_begin_operation */)); in TEST_F()
682 op_params, token.challenge, false /* is_begin_operation */)); in TEST_F()
[all …]
/system/security/keystore2/src/
Denforcements.rs189 map.remove_entry(&hat.challenge) in add_auth_token()
197 pub fn add_receiver(&self, challenge: i64, recv: TokenReceiver) { in add_receiver()
200 map.insert(challenge, recv); in add_receiver()
226 fn get_timestamp_token(challenge: i64) -> Result<TimeStampToken, Error> { in get_timestamp_token()
231 map_binder_status(dev.generateTimeStamp(challenge)) in get_timestamp_token()
234 fn timestamp_token_request(challenge: i64, sender: Sender<Result<TimeStampToken, Error>>) { in timestamp_token_request()
235 if let Err(e) = sender.send(get_timestamp_token(challenge)) { in timestamp_token_request()
247 pub fn finalize_create_authorization(&mut self, challenge: i64) -> Option<OperationChallenge> { in finalize_create_authorization()
252 ENFORCEMENTS.register_op_auth_receiver(challenge, token_receiver); in finalize_create_authorization()
255 Some(OperationChallenge { challenge }) in finalize_create_authorization()
[all …]
Dauthorization.rs116 auth_token.challenge, in add_auth_token()
203 challenge: i64, in get_auth_tokens_for_credstore()
213 if challenge == 0 { in get_auth_tokens_for_credstore()
219 ENFORCEMENTS.get_auth_tokens(challenge, secure_user_id, auth_token_max_age_millis)?; in get_auth_tokens_for_credstore()
286 challenge: i64, in getAuthTokensForCredStore()
291 self.get_auth_tokens_for_credstore(challenge, secure_user_id, auth_token_max_age_millis) in getAuthTokensForCredStore()
/system/security/identity/
DCredential.cpp169 int64_t challenge; in ensureChallenge() local
172 Status status = halSessionBinder_->getAuthChallenge(&challenge); in ensureChallenge()
178 Status status = halBinder_->createAuthChallenge(&challenge); in ensureChallenge()
184 if (challenge == 0) { in ensureChallenge()
189 selectedChallenge_ = challenge; in ensureChallenge()
195 bool getTokensFromKeystore2(uint64_t challenge, uint64_t secureUserId, in getTokensFromKeystore2() argument
205 auto result = authzService->getAuthTokensForCredStore(challenge, secureUserId, in getTokensFromKeystore2()
211 aidlAuthToken.challenge = keymintAuthToken.challenge; in getTokensFromKeystore2()
222 aidlVerificationToken.challenge = timestampToken.challenge; in getTokensFromKeystore2()
366 aidlAuthToken.challenge = 0; in getEntries()
[all …]
DWritableCredential.h55 Status getCredentialKeyCertificateChain(const vector<uint8_t>& challenge,
81 Status ensureAttestationCertificateExists(const vector<uint8_t>& challenge);
/system/keymaster/ng/include/
DAndroidRemotelyProvisionedComponentDevice.h45 const std::vector<uint8_t>& challenge,
50 const std::vector<uint8_t>& challenge,
/system/security/identity/binder/android/security/identity/
DICredential.aidl45 byte[] deleteWithChallenge(in byte[] challenge); in deleteWithChallenge() argument
47 byte[] proveOwnership(in byte[] challenge); in proveOwnership() argument
/system/core/trusty/keymaster/include/trusty_keymaster/
DTrustyRemotelyProvisionedComponentDevice.h45 const std::vector<uint8_t>& challenge,
50 const std::vector<uint8_t>& challenge,
/system/keymaster/include/keymaster/
Dandroid_keymaster_messages.h421 KeymasterBlob challenge; member
450 KeymasterBlob challenge; member
938 challenge = other.challenge; in HardwareAuthToken()
950 uint64_t challenge{};
961 challenge = other.challenge; in VerificationToken()
972 uint64_t challenge{};
984 return sizeof(challenge) + parameters_to_verify.SerializedSize() + in SerializedSize()
989 buf = append_uint64_to_buf(buf, end, challenge); in Serialize()
995 return (copy_uint64_from_buf(buf_ptr, end, &challenge) && in Deserialize()
1000 uint64_t challenge{};
[all …]
/system/keymaster/km_openssl/
Dsoft_keymaster_enforcement.cpp197 response.token.challenge = request.challenge; in VerifyAuthorization()
202 toBlob(response.token.challenge), in VerifyAuthorization()
217 toBlob(token->challenge), in GenerateTimestampToken()
/system/core/trusty/gatekeeper/
Dtrusty_gatekeeper.cpp66 aidlToken->challenge = authToken->challenge; in sizedBuffer2AidlHWToken()
115 int32_t uid, int64_t challenge, const std::vector<uint8_t>& enrolledPasswordHandle, in verify() argument
125 VerifyRequest request(uid, challenge, vec2sized_buffer(enrolledPasswordHandle), in verify()
/system/hardware/interfaces/keystore2/aidl/android/system/keystore2/
DOperationChallenge.aidl27 long challenge;
/system/hardware/interfaces/keystore2/aidl/aidl_api/android.system.keystore2/3/android/system/keystore2/
DOperationChallenge.aidl38 long challenge;

1234