/device/google/cuttlefish/guest/hals/identity/ |
D | RemoteSecureHardwareProxy.cpp | 84 const vector<uint8_t>& challenge, const vector<uint8_t>& applicationId) { in createCredentialKey() argument 88 &ctx_, challenge.data(), challenge.size(), applicationId.data(), in createCredentialKey() 242 uint64_t challenge; in createAuthChallenge() local 243 if (!eicPresentationCreateAuthChallenge(&ctx_, &challenge)) { in createAuthChallenge() 246 return challenge; in createAuthChallenge() 270 uint64_t challenge, uint64_t secureUserId, uint64_t authenticatorId, in setAuthToken() argument 276 &ctx_, challenge, secureUserId, authenticatorId, in setAuthToken() 387 const string& docType, const vector<uint8_t>& challenge, in deleteCredential() argument 391 &ctx_, docType.c_str(), docType.size(), challenge.data(), in deleteCredential() 392 challenge.size(), includeChallenge, proofOfDeletionCborSize, in deleteCredential() [all …]
|
D | RemoteSecureHardwareProxy.h | 43 const vector<uint8_t>& challenge, 98 bool setAuthToken(uint64_t challenge, uint64_t secureUserId, 137 const string& docType, const vector<uint8_t>& challenge, 142 const vector<uint8_t>& challenge,
|
/device/generic/goldfish/fingerprint/ |
D | session.cpp | 155 int64_t challenge; in generateChallenge() local 158 challenge = generateInt64(); in generateChallenge() 161 if (mChallenges.insert(challenge).second) { in generateChallenge() 162 SESSION_DEBUG("onChallengeGenerated(challenge=%" PRId64 ")", challenge); in generateChallenge() 163 mSessionCb->onChallengeGenerated(challenge); in generateChallenge() 169 ndk::ScopedAStatus Session::revokeChallenge(const int64_t challenge) { in revokeChallenge() argument 170 mChallenges.erase(challenge); in revokeChallenge() 171 SESSION_DEBUG("onChallengeRevoked(challenge=%" PRId64 ")", challenge); in revokeChallenge() 172 mSessionCb->onChallengeRevoked(challenge); in revokeChallenge() 350 if (!mChallenges.count(hat.challenge)) { in validateHat() [all …]
|
/device/google/cuttlefish/guest/hals/identity/common/ |
D | IdentityCredential.cpp | 91 const vector<uint8_t>& challenge, in deleteCredentialWithChallenge() argument 93 return deleteCredentialCommon(challenge, true, outProofOfDeletionSignature); in deleteCredentialWithChallenge() 97 const vector<uint8_t>& challenge, bool includeChallenge, in deleteCredentialCommon() argument 99 if (challenge.size() > 32) { in deleteCredentialCommon() 106 array = {"ProofOfDeletion", docType_, challenge, testCredential_}; in deleteCredentialCommon() 113 docType_, challenge, includeChallenge, proofOfDeletionCbor.size()); in deleteCredentialCommon() 134 const vector<uint8_t>& challenge, in proveOwnership() argument 136 if (challenge.size() > 32) { in proveOwnership() 142 array = {"ProofOfOwnership", docType_, challenge, testCredential_}; in proveOwnership() 147 docType_, testCredential_, challenge, proofOfOwnershipCbor.size()); in proveOwnership() [all …]
|
D | SecureHardwareProxy.h | 77 const vector<uint8_t>& challenge, 139 virtual bool setAuthToken(uint64_t challenge, uint64_t secureUserId, 179 const string& docType, const vector<uint8_t>& challenge, 184 const vector<uint8_t>& challenge, size_t proofOfOwnershipCborSize) = 0;
|
D | IdentityCredential.h | 65 const vector<uint8_t>& challenge, 68 const vector<uint8_t>& challenge, 102 const vector<uint8_t>& challenge, bool includeChallenge,
|
/device/google/cuttlefish/guest/hals/keymint/remote/ |
D | remote_secure_clock.cpp | 38 ScopedAStatus RemoteSecureClock::generateTimeStamp(int64_t challenge, in generateTimeStamp() argument 41 request.challenge = challenge; in generateTimeStamp() 47 token->challenge = response.token.challenge; in generateTimeStamp()
|
D | remote_remotely_provisioned_component.cpp | 90 const std::vector<uint8_t>& challenge, DeviceInfo* deviceInfo, in generateCertificateRequest() argument 102 request.SetChallenge(challenge.data(), challenge.size()); in generateCertificateRequest() 118 const std::vector<uint8_t>& challenge, std::vector<uint8_t>* csr) { in generateCertificateRequestV2() argument 129 request.SetChallenge(challenge.data(), challenge.size()); in generateCertificateRequestV2()
|
D | remote_keymint_device.cpp | 393 result->challenge = response.op_handle; in begin() 405 request.token.challenge = timestampToken->challenge; in deviceLocked() 453 const std::array<uint8_t, 16>& challenge, in getRootOfTrust() argument 459 {challenge.begin(), challenge.end()}); in getRootOfTrust()
|
D | remote_remotely_provisioned_component.h | 46 const std::vector<uint8_t>& challenge, DeviceInfo* deviceInfo, 52 const std::vector<uint8_t>& challenge,
|
D | remote_keymint_device.h | 86 std::array<uint8_t, 16>* challenge) override; 87 ScopedAStatus getRootOfTrust(const std::array<uint8_t, 16>& challenge,
|
D | remote_secure_clock.h | 37 ScopedAStatus generateTimeStamp(int64_t challenge,
|
/device/google/cuttlefish/host/commands/secure_env/ |
D | tpm_keymaster_enforcement.cpp | 158 sizeof(token.version) + sizeof(token.challenge) + sizeof(token.user_id) + in ValidateTokenSignature() 242 uint64_t challenge; in VerifyAuthorization() member 248 response.token.challenge = request.challenge; in VerifyAuthorization() 253 .challenge = response.token.challenge, in VerifyAuthorization()
|
D | tpm_remote_provisioning_context.cpp | 234 const std::vector<uint8_t>& challenge, cppbor::Array keysToSign) const { in BuildCsr() argument 243 cppbor::Array().add(challenge).add(cppbor::Bstr(csrPayload.encode())); in BuildCsr()
|
D | tpm_remote_provisioning_context.h | 46 const std::vector<uint8_t>& challenge,
|
/device/google/cuttlefish/guest/hals/identity/libeic/ |
D | EicPresentation.c | 360 EicPresentation* ctx, uint64_t challenge, uint64_t secureUserId, in eicPresentationSetAuthToken() argument 382 challenge, secureUserId, authenticatorId, hardwareAuthenticatorType, in eicPresentationSetAuthToken() 388 ctx->authTokenChallenge = challenge; in eicPresentationSetAuthToken() 801 const uint8_t* challenge, size_t challengeSize, bool includeChallenge, in eicPresentationDeleteCredential() argument 844 eicCborAppendByteString(&cbor, challenge, challengeSize); in eicPresentationDeleteCredential() 861 bool testCredential, const uint8_t* challenge, size_t challengeSize, in eicPresentationProveOwnership() argument 904 eicCborAppendByteString(&cbor, challenge, challengeSize); in eicPresentationProveOwnership()
|
D | EicPresentation.h | 128 EicPresentation* ctx, uint64_t challenge, uint64_t secureUserId, 246 const uint8_t* challenge, size_t challengeSize, bool includeChallenge, 256 bool testCredential, const uint8_t* challenge, size_t challengeSize,
|
D | EicOps.h | 204 const uint8_t* challenge, size_t challengeSize, 306 uint64_t challenge, uint64_t secureUserId, uint64_t authenticatorId,
|
D | EicProvisioning.c | 109 EicProvisioning* ctx, const uint8_t* challenge, size_t challengeSize, in eicProvisioningCreateCredentialKey() argument 117 if (!eicOpsCreateCredentialKey(ctx->credentialPrivateKey, challenge, in eicProvisioningCreateCredentialKey()
|
D | EicOpsImpl.cc | 254 const uint8_t* challenge, size_t challengeSize, in eicOpsCreateCredentialKey() argument 259 memcpy(challengeVec.data(), challenge, challengeSize); in eicOpsCreateCredentialKey()
|
D | EicProvisioning.h | 69 EicProvisioning* ctx, const uint8_t* challenge, size_t challengeSize,
|
/device/google/cuttlefish/guest/hals/gatekeeper/remote/ |
D | remote_gatekeeper.cpp | 56 aidlToken->challenge = authToken->challenge; in sizedBuffer2AidlHWToken() 118 int32_t uid, int64_t challenge, const std::vector<uint8_t>& enrolledPasswordHandle, in verify() argument 137 VerifyRequest request(uid, challenge, vec2sized_buffer(enrolledPasswordHandle), in verify()
|
D | remote_gatekeeper.h | 71 int32_t uid, int64_t challenge,
|
/device/google/coral-kernel/sm8150/original-kernel-headers/linux/ |
D | faceauth_shared.h | 255 uint64_t challenge; member
|
/device/google/coral-kernel/sm8150/kernel-headers/linux/ |
D | faceauth_shared.h | 171 uint64_t challenge; member
|