/hardware/interfaces/keymaster/4.0/support/ |
D | keymaster_utils.cpp | 58 static_assert(1 /* version size */ + sizeof(token.challenge) + sizeof(token.userId) + in authToken2HidlVec() 68 pos = copy_bytes_to_iterator(token.challenge, pos); in authToken2HidlVec() 86 static_assert(1 /* version size */ + sizeof(token.challenge) + sizeof(token.userId) + in hidlVec2AuthToken() 96 pos = copy_bytes_from_iterator(&token.challenge, pos); in hidlVec2AuthToken()
|
/hardware/interfaces/gatekeeper/1.0/vts/functional/ |
D | VtsHalGatekeeperV1_0TargetTest.cpp | 49 uint64_t challenge; member 53 GatekeeperRequest() : uid(0), challenge(0) {} in GatekeeperRequest() 115 uid_, req.challenge, req.curPwdHandle, req.newPwd, in doVerify() 162 void checkVerify(GatekeeperResponse &rsp, uint64_t challenge, in checkVerify() argument 170 EXPECT_EQ(challenge, auth_token->challenge); in checkVerify() 186 hidl_vec<uint8_t> &passwordHandle, uint64_t challenge, in verifyPassword() argument 194 verifyReq.challenge = challenge; in verifyPassword() 196 checkVerify(verifyRsp, challenge, expectSuccess); in verifyPassword()
|
/hardware/interfaces/keymaster/4.0/vts/functional/ |
D | VerificationTokenTest.cpp | 91 EXPECT_EQ(1U, result1.token.challenge); in TEST_F() 105 EXPECT_EQ(2U, result2.token.challenge); in TEST_F()
|
D | keymaster_hidl_hal_test.cpp | 272 bool verify_attestation_record(const string& challenge, const string& app_id, in verify_attestation_record() argument 317 EXPECT_EQ(challenge.length(), att_challenge.size()); in verify_attestation_record() 318 EXPECT_EQ(0, memcmp(challenge.data(), att_challenge.data(), challenge.length())); in verify_attestation_record()
|
/hardware/libhardware/include/hardware/ |
D | hw_auth_token.h | 41 uint64_t challenge; member
|
D | gatekeeper.h | 141 int (*verify)(const struct gatekeeper_device *dev, uint32_t uid, uint64_t challenge,
|
/hardware/interfaces/gatekeeper/1.0/default/ |
D | Gatekeeper.cpp | 86 uint64_t challenge, in verify() argument 96 int ret = device->verify(device, uid, challenge, in verify()
|
/hardware/interfaces/confirmationui/support/include/android/hardware/confirmationui/1.0/generic/ |
D | GenericOperation.h | 133 auto hmac = HMacer::hmac256(testKey, "\0", bytes_cast(secureInputToken.challenge), in deliverSecureInputEvent() 141 switch (static_cast<TestModeCommands>(secureInputToken.challenge)) { in deliverSecureInputEvent()
|
/hardware/interfaces/biometrics/fingerprint/2.1/ |
D | IBiometricsFingerprint.hal | 40 * Pre-enroll only generates a challenge, a full hardwareAuthToken is 45 * @return 0 if function failed, a uint64_t of challenge otherwise. 74 * challenge. This must be called at the end of a multi-finger enrollment 97 * state. Unlike enrollDone() doesn't invalidate the preEnroll() challenge.
|
/hardware/interfaces/gatekeeper/1.0/ |
D | IGatekeeper.hal | 69 * @param challenge An optional challenge to authenticate against, or 0. 89 verify(uint32_t uid, uint64_t challenge,
|
/hardware/interfaces/radio/1.0/vts/functional/ |
D | radio_hidl_hal_ims.cpp | 169 std::string challenge = ""; in TEST_F() local 171 radio->requestIsimAuthentication(serial, challenge); in TEST_F()
|
/hardware/interfaces/confirmationui/support/test/ |
D | msg_formatting_test.cpp | 116 expected.challenge = 0xb1b2b3b4b5b6b7b8; in TEST()
|
/hardware/interfaces/confirmationui/1.0/vts/functional/ |
D | VtsHalConfirmationUIV1_0TargetTest.cpp | 98 auth_token.challenge = static_cast<uint64_t>(command); 113 toBytes(auth_token.challenge), //
|
/hardware/interfaces/confirmationui/support/include/android/hardware/confirmationui/support/ |
D | msg_formatting.h | 258 return sizeof hat->challenge + sizeof hat->userId + sizeof hat->authenticatorId + 280 pos = copyField(hat.challenge, pos); 301 pos = copyField(v.challenge, pos);
|
/hardware/interfaces/keymaster/3.0/ |
D | types.hal | 122 ATTESTATION_CHALLENGE = TagType:BYTES | 708, /** Used to provide challenge in attestation */ 409 uint64_t challenge; 414 uint8_t[32] hmac; // HMAC is computed over 0 || challenge || user_id ||
|
/hardware/interfaces/confirmationui/1.0/ |
D | types.hal | 83 * If the test key produces a matching HMAC, the implementation evaluates the challenge field
|
/hardware/interfaces/keymaster/4.0/ |
D | types.hal | 360 * challenge field. Otherwise the IKeymasterDevice must returrn 635 * Tag::ATTESTATION_CHALLENGE is used to deliver a "challenge" value to the attestKey() method, 641 ATTESTATION_CHALLENGE = TagType:BYTES | 708, /* Used to provide challenge in attestation */ 1194 * challenge is a value that's used to enable authentication tokens to authorize specific 1195 * events. The primary use case for challenge is to authorize an IKeymasterDevice cryptographic 1198 uint64_t challenge; 1234 * H, 0 || challenge || user_id || authenticator_id || authenticator_type || timestamp) 1237 * are represented as unsigned values, the full width of the type. The challenge, userId and 1282 uint64_t challenge; 1306 * "Auth Verification" || challenge || timestamp || securityLevel || parametersVerified) [all …]
|
D | IKeymasterDevice.hal | 1125 * o The challenge field in the auth token must contain the operationHandle 1230 * o The challenge field in the auth token must contain the operationHandle
|
/hardware/interfaces/radio/1.0/ |
D | IRadio.hal | 1152 * challenge/response algorithm for IMS authentication 1155 * @param challenge challenge string in Base64 format 1159 oneway requestIsimAuthentication(int32_t serial, string challenge); 1392 * Returns the response of SIM Authentication through Radio challenge request. 1397 * @param authData the challenge string in Base64 format, see 3GPP TS 31.102 7.1.2
|
D | IRadioResponse.hal | 2009 * @param response response string of the challenge/response algo for ISIM auth in base64 format
|
/hardware/interfaces/radio/1.2/default/ |
D | Radio.h | 188 Return<void> requestIsimAuthentication(int32_t serial, const hidl_string& challenge) override;
|
/hardware/interfaces/keymaster/3.0/vts/functional/ |
D | keymaster_hidl_hal_test.cpp | 975 bool verify_attestation_record(const string& challenge, const string& app_id, in verify_attestation_record() argument 1033 EXPECT_EQ(challenge.length(), att_challenge.size()); in verify_attestation_record() 1034 EXPECT_EQ(0, memcmp(challenge.data(), att_challenge.data(), challenge.length())); in verify_attestation_record()
|