/system/core/trusty/keymaster/keymint/ |
D | TrustySecureClock.cpp | 28 ::ndk::ScopedAStatus TrustySecureClock::generateTimeStamp(int64_t challenge, in generateTimeStamp() argument 31 request.challenge = challenge; in generateTimeStamp() 36 token->challenge = response.token.challenge; in generateTimeStamp()
|
D | TrustyRemotelyProvisionedComponentDevice.cpp | 109 const bytevec& endpointEncCertChain, const bytevec& challenge, DeviceInfo* deviceInfo, in generateCertificateRequest() argument 119 request.SetChallenge(challenge.data(), challenge.size()); in generateCertificateRequest() 133 const std::vector<MacedPublicKey>& keysToSign, const std::vector<uint8_t>& challenge, in generateCertificateRequestV2() argument 142 request.SetChallenge(challenge.data(), challenge.size()); in generateCertificateRequestV2()
|
/system/keymaster/ng/ |
D | AndroidSecureClock.cpp | 41 ScopedAStatus AndroidSecureClock::generateTimeStamp(int64_t challenge, TimeStampToken* token) { in generateTimeStamp() argument 43 request.challenge = challenge; in generateTimeStamp() 49 token->challenge = response.token.challenge; in generateTimeStamp()
|
D | AndroidRemotelyProvisionedComponentDevice.cpp | 120 const bytevec& challenge, DeviceInfo* deviceInfo, ProtectedData* protectedData, in generateCertificateRequest() argument 133 request.SetChallenge(challenge.data(), challenge.size()); in generateCertificateRequest() 147 const std::vector<MacedPublicKey>& keysToSign, const std::vector<uint8_t>& challenge, in generateCertificateRequestV2() argument 156 request.SetChallenge(challenge.data(), challenge.size()); in generateCertificateRequestV2()
|
D | AndroidKeymaster41Device.cpp | 45 serializableToken.challenge = verificationToken.challenge; in deviceLocked()
|
/system/security/provisioner/ |
D | rkp_factory_extraction_lib.cpp | 83 std::vector<uint8_t> challenge(kChallengeSize); in generateChallenge() local 85 ssize_t bytesRemaining = static_cast<ssize_t>(challenge.size()); in generateChallenge() 86 uint8_t* writePtr = challenge.data(); in generateChallenge() 101 return challenge; in generateChallenge() 106 const std::vector<uint8_t>& challenge, in composeCertificateRequestV1() argument 132 .add(challenge) in composeCertificateRequestV1() 152 const std::vector<uint8_t> challenge = generateChallenge(); in getCsrV1() local 154 /*test_mode=*/false, emptyKeys, eek, challenge, &verifiedDeviceInfo, &protectedData, in getCsrV1() 161 return composeCertificateRequestV1(protectedData, verifiedDeviceInfo, challenge, keysToSignMac, in getCsrV1() 184 const std::vector<uint8_t> challenge = generateChallenge(); in selfTestGetCsrV1() local [all …]
|
D | rkp_factory_extraction_lib_test.cpp | 123 const std::vector<uint8_t> challenge = generateChallenge(); in TEST() local 125 EXPECT_TRUE(wasInserted) << "Duplicate challenge: " << toBase64(challenge); in TEST() 160 std::vector<uint8_t> challenge; in TEST() local 177 SaveArg<3>(&challenge), // in TEST() 192 EXPECT_THAT(challenge, Property(&std::vector<uint8_t>::size, Eq(kChallengeSize))); in TEST() 210 EXPECT_THAT(actualChallenge, Pointee(Property(&Bstr::value, Eq(challenge)))); in TEST() 238 std::vector<uint8_t> challenge; in TEST() local 250 .WillOnce(DoAll(SaveArg<1>(&challenge), SetArgPointee<2>(kCsr), in TEST()
|
/system/security/keystore/tests/ |
D | verification_token_seralization_test.cpp | 33 token.challenge = 12345; in TEST() 44 ASSERT_EQ(token.challenge, deserialized.value().challenge); in TEST() 53 token.challenge = 12345; in TEST() 61 ASSERT_EQ(token.challenge, deserialized.value().challenge); in TEST()
|
/system/keymint/hal/src/ |
D | rpc.rs | 76 challenge: &[u8], in generateCertificateRequest() 85 challenge: challenge.to_vec(), in generateCertificateRequest() 94 challenge: &[u8], in generateCertificateRequestV2() 99 challenge: challenge.to_vec(), in generateCertificateRequestV2()
|
D | secureclock.rs | 53 fn generateTimeStamp(&self, challenge: i64) -> binder::Result<TimeStampToken> { in generateTimeStamp() 55 self.execute(GenerateTimeStampRequest { challenge })?; in generateTimeStamp()
|
/system/gatekeeper/ |
D | gatekeeper_messages.cpp | 161 VerifyRequest::VerifyRequest(uint32_t user_id, uint64_t challenge, in VerifyRequest() argument 164 this->challenge = challenge; in VerifyRequest() 170 return sizeof(challenge) + serialized_buffer_size(password_handle) in nonErrorSerializedSize() 175 memcpy(buffer, &challenge, sizeof(challenge)); in nonErrorSerialize() 176 buffer += sizeof(challenge); in nonErrorSerialize() 187 if (!fitsBuffer(payload, end, sizeof(challenge))) return ERROR_INVALID; in nonErrorDeserialize() 189 memcpy(&challenge, payload, sizeof(challenge)); in nonErrorDeserialize() 190 payload += sizeof(challenge); in nonErrorDeserialize()
|
/system/keymint/ta/src/ |
D | clock.rs | 23 pub(crate) fn generate_timestamp(&self, challenge: i64) -> Result<TimeStampToken, Error> { in generate_timestamp() 26 TimeStampToken { challenge, timestamp: clock.now().into(), mac: Vec::new() }; in generate_timestamp() 45 result.extend_from_slice(&token.challenge.to_be_bytes()[..]); in timestamp_token_mac_input()
|
/system/keymaster/tests/ |
D | keymaster_enforcement_test.cpp | 586 token.challenge = 99; in TEST_F() 602 op_params, token.challenge, false /* is_begin_operation */)); in TEST_F() 609 token.challenge = 99; in TEST_F() 627 op_params, token.challenge, false /* is_begin_operation */)); in TEST_F() 631 op_params, token.challenge, false /* is_begin_operation */)); in TEST_F() 638 token.challenge = 99; in TEST_F() 654 op_params, token.challenge + 1 /* doesn't match token */, in TEST_F() 662 token.challenge = 99; in TEST_F() 678 op_params, token.challenge, false /* is_begin_operation */)); in TEST_F() 682 op_params, token.challenge, false /* is_begin_operation */)); in TEST_F() [all …]
|
/system/security/keystore2/src/ |
D | enforcements.rs | 189 map.remove_entry(&hat.challenge) in add_auth_token() 197 pub fn add_receiver(&self, challenge: i64, recv: TokenReceiver) { in add_receiver() 200 map.insert(challenge, recv); in add_receiver() 226 fn get_timestamp_token(challenge: i64) -> Result<TimeStampToken, Error> { in get_timestamp_token() 231 map_binder_status(dev.generateTimeStamp(challenge)) in get_timestamp_token() 234 fn timestamp_token_request(challenge: i64, sender: Sender<Result<TimeStampToken, Error>>) { in timestamp_token_request() 235 if let Err(e) = sender.send(get_timestamp_token(challenge)) { in timestamp_token_request() 247 pub fn finalize_create_authorization(&mut self, challenge: i64) -> Option<OperationChallenge> { in finalize_create_authorization() 252 ENFORCEMENTS.register_op_auth_receiver(challenge, token_receiver); in finalize_create_authorization() 255 Some(OperationChallenge { challenge }) in finalize_create_authorization() [all …]
|
D | authorization.rs | 116 auth_token.challenge, in add_auth_token() 203 challenge: i64, in get_auth_tokens_for_credstore() 213 if challenge == 0 { in get_auth_tokens_for_credstore() 219 ENFORCEMENTS.get_auth_tokens(challenge, secure_user_id, auth_token_max_age_millis)?; in get_auth_tokens_for_credstore() 286 challenge: i64, in getAuthTokensForCredStore() 291 self.get_auth_tokens_for_credstore(challenge, secure_user_id, auth_token_max_age_millis) in getAuthTokensForCredStore()
|
/system/security/identity/ |
D | Credential.cpp | 169 int64_t challenge; in ensureChallenge() local 172 Status status = halSessionBinder_->getAuthChallenge(&challenge); in ensureChallenge() 178 Status status = halBinder_->createAuthChallenge(&challenge); in ensureChallenge() 184 if (challenge == 0) { in ensureChallenge() 189 selectedChallenge_ = challenge; in ensureChallenge() 195 bool getTokensFromKeystore2(uint64_t challenge, uint64_t secureUserId, in getTokensFromKeystore2() argument 205 auto result = authzService->getAuthTokensForCredStore(challenge, secureUserId, in getTokensFromKeystore2() 211 aidlAuthToken.challenge = keymintAuthToken.challenge; in getTokensFromKeystore2() 222 aidlVerificationToken.challenge = timestampToken.challenge; in getTokensFromKeystore2() 366 aidlAuthToken.challenge = 0; in getEntries() [all …]
|
D | WritableCredential.h | 55 Status getCredentialKeyCertificateChain(const vector<uint8_t>& challenge, 81 Status ensureAttestationCertificateExists(const vector<uint8_t>& challenge);
|
/system/keymaster/ng/include/ |
D | AndroidRemotelyProvisionedComponentDevice.h | 45 const std::vector<uint8_t>& challenge, 50 const std::vector<uint8_t>& challenge,
|
/system/security/identity/binder/android/security/identity/ |
D | ICredential.aidl | 45 byte[] deleteWithChallenge(in byte[] challenge); in deleteWithChallenge() argument 47 byte[] proveOwnership(in byte[] challenge); in proveOwnership() argument
|
/system/core/trusty/keymaster/include/trusty_keymaster/ |
D | TrustyRemotelyProvisionedComponentDevice.h | 45 const std::vector<uint8_t>& challenge, 50 const std::vector<uint8_t>& challenge,
|
/system/keymaster/include/keymaster/ |
D | android_keymaster_messages.h | 421 KeymasterBlob challenge; member 450 KeymasterBlob challenge; member 938 challenge = other.challenge; in HardwareAuthToken() 950 uint64_t challenge{}; 961 challenge = other.challenge; in VerificationToken() 972 uint64_t challenge{}; 984 return sizeof(challenge) + parameters_to_verify.SerializedSize() + in SerializedSize() 989 buf = append_uint64_to_buf(buf, end, challenge); in Serialize() 995 return (copy_uint64_from_buf(buf_ptr, end, &challenge) && in Deserialize() 1000 uint64_t challenge{}; [all …]
|
/system/keymaster/km_openssl/ |
D | soft_keymaster_enforcement.cpp | 197 response.token.challenge = request.challenge; in VerifyAuthorization() 202 toBlob(response.token.challenge), in VerifyAuthorization() 217 toBlob(token->challenge), in GenerateTimestampToken()
|
/system/core/trusty/gatekeeper/ |
D | trusty_gatekeeper.cpp | 66 aidlToken->challenge = authToken->challenge; in sizedBuffer2AidlHWToken() 115 int32_t uid, int64_t challenge, const std::vector<uint8_t>& enrolledPasswordHandle, in verify() argument 125 VerifyRequest request(uid, challenge, vec2sized_buffer(enrolledPasswordHandle), in verify()
|
/system/hardware/interfaces/keystore2/aidl/android/system/keystore2/ |
D | OperationChallenge.aidl | 27 long challenge;
|
/system/hardware/interfaces/keystore2/aidl/aidl_api/android.system.keystore2/3/android/system/keystore2/ |
D | OperationChallenge.aidl | 38 long challenge;
|