Searched defs:challenge (Results 1 - 8 of 8) sorted by relevance

/system/core/gatekeeperd/
H A DSoftGateKeeperDevice.cpp72 uint64_t challenge, const uint8_t *enrolled_password_handle,
88 VerifyRequest request(uid, challenge, &password_handle_buffer, &provided_password_buffer);
71 verify(uint32_t uid, uint64_t challenge, const uint8_t *enrolled_password_handle, uint32_t enrolled_password_handle_length, const uint8_t *provided_password, uint32_t provided_password_length, uint8_t **auth_token, uint32_t *auth_token_length, bool *request_reenroll) argument
H A DIGateKeeperService.cpp110 uint64_t challenge = data.readInt64(); local
125 int ret = verifyChallenge(uid, challenge, (uint8_t *) currentPasswordHandle,
H A Dgatekeeperd.cpp197 virtual int verifyChallenge(uint32_t uid, uint64_t challenge, argument
219 ret = device->verify(device, uid, challenge,
226 ret = soft_dev.verify(uid, challenge,
237 ret = soft_device->verify(uid, challenge,
/system/gatekeeper/include/gatekeeper/
H A Dgatekeeper_messages.h140 uint64_t challenge,
150 uint64_t challenge; member in struct:gatekeeper::VerifyRequest
/system/core/trusty/gatekeeper/
H A Dtrusty_gatekeeper.cpp123 int TrustyGateKeeperDevice::Verify(uint32_t uid, uint64_t challenge, argument
137 VerifyRequest request(uid, challenge, &password_handle_buffer, &provided_password_buffer);
216 uint64_t challenge, const uint8_t *enrolled_password_handle,
226 return convert_device(dev)->Verify(uid, challenge, enrolled_password_handle,
215 verify(const struct gatekeeper_device *dev, uint32_t uid, uint64_t challenge, const uint8_t *enrolled_password_handle, uint32_t enrolled_password_handle_length, const uint8_t *provided_password, uint32_t provided_password_length, uint8_t **auth_token, uint32_t *auth_token_length, bool *request_reenroll) argument
/system/gatekeeper/
H A Dgatekeeper.cpp153 user_id, authenticator_id, request.challenge);
219 uint64_t challenge) {
226 token->challenge = challenge;
217 MintAuthToken(UniquePtr<uint8_t> *auth_token, uint32_t *length, uint64_t timestamp, secure_id_t user_id, secure_id_t authenticator_id, uint64_t challenge) argument
H A Dgatekeeper_messages.cpp134 VerifyRequest::VerifyRequest(uint32_t user_id, uint64_t challenge, argument
137 this->challenge = challenge;
161 return sizeof(challenge) + serialized_buffer_size(password_handle)
166 memcpy(buffer, &challenge, sizeof(challenge));
167 buffer += sizeof(challenge);
184 memcpy(&challenge, payload, sizeof(challenge));
185 payload += sizeof(challenge);
[all...]
/system/keymaster/
H A Dandroid_keymaster_test.cpp3544 static bool verify_attestation_record(const string& challenge, argument
3580 EXPECT_EQ(challenge.length(), att_challenge.data_length);
3581 EXPECT_EQ(0, memcmp(challenge.data(), att_challenge.data, challenge.length()));
3617 EXPECT_EQ(KM_ERROR_OK, AttestKey("challenge", &cert_chain));
3633 "challenge", sw_enforced(), hw_enforced(), expected_keymaster_version,
3655 EXPECT_EQ(KM_ERROR_OK, AttestKey("challenge", &cert_chain));
3659 "challenge", sw_enforced(), hw_enforced(), expected_keymaster_version,

Completed in 3588 milliseconds