Home
last modified time | relevance | path

Searched refs:challenge (Results 1 – 22 of 22) sorted by relevance

/hardware/interfaces/keymaster/4.0/support/
Dkeymaster_utils.cpp58 static_assert(1 /* version size */ + sizeof(token.challenge) + sizeof(token.userId) + in authToken2HidlVec()
68 pos = copy_bytes_to_iterator(token.challenge, pos); in authToken2HidlVec()
86 static_assert(1 /* version size */ + sizeof(token.challenge) + sizeof(token.userId) + in hidlVec2AuthToken()
96 pos = copy_bytes_from_iterator(&token.challenge, pos); in hidlVec2AuthToken()
/hardware/interfaces/gatekeeper/1.0/vts/functional/
DVtsHalGatekeeperV1_0TargetTest.cpp49 uint64_t challenge; member
53 GatekeeperRequest() : uid(0), challenge(0) {} in GatekeeperRequest()
115 uid_, req.challenge, req.curPwdHandle, req.newPwd, in doVerify()
162 void checkVerify(GatekeeperResponse &rsp, uint64_t challenge, in checkVerify() argument
170 EXPECT_EQ(challenge, auth_token->challenge); in checkVerify()
186 hidl_vec<uint8_t> &passwordHandle, uint64_t challenge, in verifyPassword() argument
194 verifyReq.challenge = challenge; in verifyPassword()
196 checkVerify(verifyRsp, challenge, expectSuccess); in verifyPassword()
/hardware/interfaces/keymaster/4.0/vts/functional/
DVerificationTokenTest.cpp91 EXPECT_EQ(1U, result1.token.challenge); in TEST_F()
105 EXPECT_EQ(2U, result2.token.challenge); in TEST_F()
Dkeymaster_hidl_hal_test.cpp272 bool verify_attestation_record(const string& challenge, const string& app_id, in verify_attestation_record() argument
317 EXPECT_EQ(challenge.length(), att_challenge.size()); in verify_attestation_record()
318 EXPECT_EQ(0, memcmp(challenge.data(), att_challenge.data(), challenge.length())); in verify_attestation_record()
/hardware/libhardware/include/hardware/
Dhw_auth_token.h41 uint64_t challenge; member
Dgatekeeper.h141 int (*verify)(const struct gatekeeper_device *dev, uint32_t uid, uint64_t challenge,
/hardware/interfaces/gatekeeper/1.0/default/
DGatekeeper.cpp86 uint64_t challenge, in verify() argument
96 int ret = device->verify(device, uid, challenge, in verify()
/hardware/interfaces/confirmationui/support/include/android/hardware/confirmationui/1.0/generic/
DGenericOperation.h133 auto hmac = HMacer::hmac256(testKey, "\0", bytes_cast(secureInputToken.challenge), in deliverSecureInputEvent()
141 switch (static_cast<TestModeCommands>(secureInputToken.challenge)) { in deliverSecureInputEvent()
/hardware/interfaces/biometrics/fingerprint/2.1/
DIBiometricsFingerprint.hal40 * Pre-enroll only generates a challenge, a full hardwareAuthToken is
45 * @return 0 if function failed, a uint64_t of challenge otherwise.
74 * challenge. This must be called at the end of a multi-finger enrollment
97 * state. Unlike enrollDone() doesn't invalidate the preEnroll() challenge.
/hardware/interfaces/gatekeeper/1.0/
DIGatekeeper.hal69 * @param challenge An optional challenge to authenticate against, or 0.
89 verify(uint32_t uid, uint64_t challenge,
/hardware/interfaces/radio/1.0/vts/functional/
Dradio_hidl_hal_ims.cpp169 std::string challenge = ""; in TEST_F() local
171 radio->requestIsimAuthentication(serial, challenge); in TEST_F()
/hardware/interfaces/confirmationui/support/test/
Dmsg_formatting_test.cpp116 expected.challenge = 0xb1b2b3b4b5b6b7b8; in TEST()
/hardware/interfaces/confirmationui/1.0/vts/functional/
DVtsHalConfirmationUIV1_0TargetTest.cpp98 auth_token.challenge = static_cast<uint64_t>(command);
113 toBytes(auth_token.challenge), //
/hardware/interfaces/confirmationui/support/include/android/hardware/confirmationui/support/
Dmsg_formatting.h258 return sizeof hat->challenge + sizeof hat->userId + sizeof hat->authenticatorId +
280 pos = copyField(hat.challenge, pos);
301 pos = copyField(v.challenge, pos);
/hardware/interfaces/keymaster/3.0/
Dtypes.hal122 ATTESTATION_CHALLENGE = TagType:BYTES | 708, /** Used to provide challenge in attestation */
409 uint64_t challenge;
414 uint8_t[32] hmac; // HMAC is computed over 0 || challenge || user_id ||
/hardware/interfaces/confirmationui/1.0/
Dtypes.hal83 * If the test key produces a matching HMAC, the implementation evaluates the challenge field
/hardware/interfaces/keymaster/4.0/
Dtypes.hal360 * challenge field. Otherwise the IKeymasterDevice must returrn
635 * Tag::ATTESTATION_CHALLENGE is used to deliver a "challenge" value to the attestKey() method,
641 ATTESTATION_CHALLENGE = TagType:BYTES | 708, /* Used to provide challenge in attestation */
1194 * challenge is a value that's used to enable authentication tokens to authorize specific
1195 * events. The primary use case for challenge is to authorize an IKeymasterDevice cryptographic
1198 uint64_t challenge;
1234 * H, 0 || challenge || user_id || authenticator_id || authenticator_type || timestamp)
1237 * are represented as unsigned values, the full width of the type. The challenge, userId and
1282 uint64_t challenge;
1306 * "Auth Verification" || challenge || timestamp || securityLevel || parametersVerified)
[all …]
DIKeymasterDevice.hal1125 * o The challenge field in the auth token must contain the operationHandle
1230 * o The challenge field in the auth token must contain the operationHandle
/hardware/interfaces/radio/1.0/
DIRadio.hal1152 * challenge/response algorithm for IMS authentication
1155 * @param challenge challenge string in Base64 format
1159 oneway requestIsimAuthentication(int32_t serial, string challenge);
1392 * Returns the response of SIM Authentication through Radio challenge request.
1397 * @param authData the challenge string in Base64 format, see 3GPP TS 31.102 7.1.2
DIRadioResponse.hal2009 * @param response response string of the challenge/response algo for ISIM auth in base64 format
/hardware/interfaces/radio/1.2/default/
DRadio.h188 Return<void> requestIsimAuthentication(int32_t serial, const hidl_string& challenge) override;
/hardware/interfaces/keymaster/3.0/vts/functional/
Dkeymaster_hidl_hal_test.cpp975 bool verify_attestation_record(const string& challenge, const string& app_id, in verify_attestation_record() argument
1033 EXPECT_EQ(challenge.length(), att_challenge.size()); in verify_attestation_record()
1034 EXPECT_EQ(0, memcmp(challenge.data(), att_challenge.data(), challenge.length())); in verify_attestation_record()