Home
last modified time | relevance | path

Searched refs:challenge (Results 1 – 25 of 28) sorted by relevance

12

/device/google/cuttlefish/guest/hals/identity/
DRemoteSecureHardwareProxy.cpp84 const vector<uint8_t>& challenge, const vector<uint8_t>& applicationId) { in createCredentialKey() argument
88 &ctx_, challenge.data(), challenge.size(), applicationId.data(), in createCredentialKey()
242 uint64_t challenge; in createAuthChallenge() local
243 if (!eicPresentationCreateAuthChallenge(&ctx_, &challenge)) { in createAuthChallenge()
246 return challenge; in createAuthChallenge()
270 uint64_t challenge, uint64_t secureUserId, uint64_t authenticatorId, in setAuthToken() argument
276 &ctx_, challenge, secureUserId, authenticatorId, in setAuthToken()
387 const string& docType, const vector<uint8_t>& challenge, in deleteCredential() argument
391 &ctx_, docType.c_str(), docType.size(), challenge.data(), in deleteCredential()
392 challenge.size(), includeChallenge, proofOfDeletionCborSize, in deleteCredential()
[all …]
DRemoteSecureHardwareProxy.h43 const vector<uint8_t>& challenge,
98 bool setAuthToken(uint64_t challenge, uint64_t secureUserId,
137 const string& docType, const vector<uint8_t>& challenge,
142 const vector<uint8_t>& challenge,
/device/generic/goldfish/fingerprint/
Dsession.cpp155 int64_t challenge; in generateChallenge() local
158 challenge = generateInt64(); in generateChallenge()
161 if (mChallenges.insert(challenge).second) { in generateChallenge()
162 SESSION_DEBUG("onChallengeGenerated(challenge=%" PRId64 ")", challenge); in generateChallenge()
163 mSessionCb->onChallengeGenerated(challenge); in generateChallenge()
169 ndk::ScopedAStatus Session::revokeChallenge(const int64_t challenge) { in revokeChallenge() argument
170 mChallenges.erase(challenge); in revokeChallenge()
171 SESSION_DEBUG("onChallengeRevoked(challenge=%" PRId64 ")", challenge); in revokeChallenge()
172 mSessionCb->onChallengeRevoked(challenge); in revokeChallenge()
350 if (!mChallenges.count(hat.challenge)) { in validateHat()
[all …]
/device/google/cuttlefish/guest/hals/identity/common/
DIdentityCredential.cpp91 const vector<uint8_t>& challenge, in deleteCredentialWithChallenge() argument
93 return deleteCredentialCommon(challenge, true, outProofOfDeletionSignature); in deleteCredentialWithChallenge()
97 const vector<uint8_t>& challenge, bool includeChallenge, in deleteCredentialCommon() argument
99 if (challenge.size() > 32) { in deleteCredentialCommon()
106 array = {"ProofOfDeletion", docType_, challenge, testCredential_}; in deleteCredentialCommon()
113 docType_, challenge, includeChallenge, proofOfDeletionCbor.size()); in deleteCredentialCommon()
134 const vector<uint8_t>& challenge, in proveOwnership() argument
136 if (challenge.size() > 32) { in proveOwnership()
142 array = {"ProofOfOwnership", docType_, challenge, testCredential_}; in proveOwnership()
147 docType_, testCredential_, challenge, proofOfOwnershipCbor.size()); in proveOwnership()
[all …]
DSecureHardwareProxy.h77 const vector<uint8_t>& challenge,
139 virtual bool setAuthToken(uint64_t challenge, uint64_t secureUserId,
179 const string& docType, const vector<uint8_t>& challenge,
184 const vector<uint8_t>& challenge, size_t proofOfOwnershipCborSize) = 0;
DIdentityCredential.h65 const vector<uint8_t>& challenge,
68 const vector<uint8_t>& challenge,
102 const vector<uint8_t>& challenge, bool includeChallenge,
/device/google/cuttlefish/guest/hals/keymint/remote/
Dremote_secure_clock.cpp38 ScopedAStatus RemoteSecureClock::generateTimeStamp(int64_t challenge, in generateTimeStamp() argument
41 request.challenge = challenge; in generateTimeStamp()
47 token->challenge = response.token.challenge; in generateTimeStamp()
Dremote_remotely_provisioned_component.cpp90 const std::vector<uint8_t>& challenge, DeviceInfo* deviceInfo, in generateCertificateRequest() argument
102 request.SetChallenge(challenge.data(), challenge.size()); in generateCertificateRequest()
118 const std::vector<uint8_t>& challenge, std::vector<uint8_t>* csr) { in generateCertificateRequestV2() argument
129 request.SetChallenge(challenge.data(), challenge.size()); in generateCertificateRequestV2()
Dremote_keymint_device.cpp393 result->challenge = response.op_handle; in begin()
405 request.token.challenge = timestampToken->challenge; in deviceLocked()
453 const std::array<uint8_t, 16>& challenge, in getRootOfTrust() argument
459 {challenge.begin(), challenge.end()}); in getRootOfTrust()
Dremote_remotely_provisioned_component.h46 const std::vector<uint8_t>& challenge, DeviceInfo* deviceInfo,
52 const std::vector<uint8_t>& challenge,
Dremote_keymint_device.h86 std::array<uint8_t, 16>* challenge) override;
87 ScopedAStatus getRootOfTrust(const std::array<uint8_t, 16>& challenge,
Dremote_secure_clock.h37 ScopedAStatus generateTimeStamp(int64_t challenge,
/device/google/cuttlefish/host/commands/secure_env/
Dtpm_keymaster_enforcement.cpp158 sizeof(token.version) + sizeof(token.challenge) + sizeof(token.user_id) + in ValidateTokenSignature()
242 uint64_t challenge; in VerifyAuthorization() member
248 response.token.challenge = request.challenge; in VerifyAuthorization()
253 .challenge = response.token.challenge, in VerifyAuthorization()
Dtpm_remote_provisioning_context.cpp234 const std::vector<uint8_t>& challenge, cppbor::Array keysToSign) const { in BuildCsr() argument
243 cppbor::Array().add(challenge).add(cppbor::Bstr(csrPayload.encode())); in BuildCsr()
Dtpm_remote_provisioning_context.h46 const std::vector<uint8_t>& challenge,
/device/google/cuttlefish/guest/hals/identity/libeic/
DEicPresentation.c360 EicPresentation* ctx, uint64_t challenge, uint64_t secureUserId, in eicPresentationSetAuthToken() argument
382 challenge, secureUserId, authenticatorId, hardwareAuthenticatorType, in eicPresentationSetAuthToken()
388 ctx->authTokenChallenge = challenge; in eicPresentationSetAuthToken()
801 const uint8_t* challenge, size_t challengeSize, bool includeChallenge, in eicPresentationDeleteCredential() argument
844 eicCborAppendByteString(&cbor, challenge, challengeSize); in eicPresentationDeleteCredential()
861 bool testCredential, const uint8_t* challenge, size_t challengeSize, in eicPresentationProveOwnership() argument
904 eicCborAppendByteString(&cbor, challenge, challengeSize); in eicPresentationProveOwnership()
DEicPresentation.h128 EicPresentation* ctx, uint64_t challenge, uint64_t secureUserId,
246 const uint8_t* challenge, size_t challengeSize, bool includeChallenge,
256 bool testCredential, const uint8_t* challenge, size_t challengeSize,
DEicOps.h204 const uint8_t* challenge, size_t challengeSize,
306 uint64_t challenge, uint64_t secureUserId, uint64_t authenticatorId,
DEicProvisioning.c109 EicProvisioning* ctx, const uint8_t* challenge, size_t challengeSize, in eicProvisioningCreateCredentialKey() argument
117 if (!eicOpsCreateCredentialKey(ctx->credentialPrivateKey, challenge, in eicProvisioningCreateCredentialKey()
DEicOpsImpl.cc254 const uint8_t* challenge, size_t challengeSize, in eicOpsCreateCredentialKey() argument
259 memcpy(challengeVec.data(), challenge, challengeSize); in eicOpsCreateCredentialKey()
DEicProvisioning.h69 EicProvisioning* ctx, const uint8_t* challenge, size_t challengeSize,
/device/google/cuttlefish/guest/hals/gatekeeper/remote/
Dremote_gatekeeper.cpp56 aidlToken->challenge = authToken->challenge; in sizedBuffer2AidlHWToken()
118 int32_t uid, int64_t challenge, const std::vector<uint8_t>& enrolledPasswordHandle, in verify() argument
137 VerifyRequest request(uid, challenge, vec2sized_buffer(enrolledPasswordHandle), in verify()
Dremote_gatekeeper.h71 int32_t uid, int64_t challenge,
/device/google/coral-kernel/sm8150/original-kernel-headers/linux/
Dfaceauth_shared.h255 uint64_t challenge; member
/device/google/coral-kernel/sm8150/kernel-headers/linux/
Dfaceauth_shared.h171 uint64_t challenge; member

12