Searched refs:challenge (Results 1 - 20 of 20) sorted by relevance

/hardware/libhardware/include/hardware/
H A Dhw_auth_token.h41 uint64_t challenge; member in struct:__anon1353
H A Dgatekeeper.h111 * - challenge: An optional challenge to authenticate against, or 0. Used when a separate
141 int (*verify)(const struct gatekeeper_device *dev, uint32_t uid, uint64_t challenge,
/hardware/interfaces/gatekeeper/1.0/
H A DIGatekeeper.hal69 * @param challenge An optional challenge to authenticate against, or 0.
89 verify(uint32_t uid, uint64_t challenge,
/hardware/interfaces/keymaster/4.0/support/
H A Dkeymaster_utils.cpp58 static_assert(1 /* version size */ + sizeof(token.challenge) + sizeof(token.userId) +
68 pos = copy_bytes_to_iterator(token.challenge, pos);
86 static_assert(1 /* version size */ + sizeof(token.challenge) + sizeof(token.userId) +
96 pos = copy_bytes_from_iterator(&token.challenge, pos);
/hardware/interfaces/gatekeeper/1.0/vts/functional/
H A DVtsHalGatekeeperV1_0TargetTest.cpp49 uint64_t challenge; member in struct:GatekeeperRequest
53 GatekeeperRequest() : uid(0), challenge(0) {}
115 uid_, req.challenge, req.curPwdHandle, req.newPwd,
162 void checkVerify(GatekeeperResponse &rsp, uint64_t challenge, argument
170 EXPECT_EQ(challenge, auth_token->challenge);
186 hidl_vec<uint8_t> &passwordHandle, uint64_t challenge,
194 verifyReq.challenge = challenge;
196 checkVerify(verifyRsp, challenge, expectSucces
185 verifyPassword(hidl_vec<uint8_t> &password, hidl_vec<uint8_t> &passwordHandle, uint64_t challenge, GatekeeperResponse &verifyRsp, bool expectSuccess) argument
[all...]
/hardware/interfaces/keymaster/4.0/vts/functional/
H A DVerificationTokenTest.cpp91 EXPECT_EQ(1U, result1.token.challenge);
105 EXPECT_EQ(2U, result2.token.challenge);
H A Dkeymaster_hidl_hal_test.cpp272 bool verify_attestation_record(const string& challenge, const string& app_id, argument
317 EXPECT_EQ(challenge.length(), att_challenge.size());
318 EXPECT_EQ(0, memcmp(challenge.data(), att_challenge.data(), challenge.length()));
3822 .Authorization(TAG_ATTESTATION_CHALLENGE, HidlBuf("challenge"))
3827 EXPECT_TRUE(verify_attestation_record("challenge", "foo", //
3849 HidlBuf("challenge")),
3868 .Authorization(TAG_ATTESTATION_CHALLENGE, HidlBuf("challenge"))
3874 EXPECT_TRUE(verify_attestation_record("challenge", "foo", //
3895 HidlBuf("challenge")),
[all...]
/hardware/interfaces/gatekeeper/1.0/default/
H A DGatekeeper.h53 uint64_t challenge,
H A DGatekeeper.cpp86 uint64_t challenge,
96 int ret = device->verify(device, uid, challenge,
85 verify(uint32_t uid, uint64_t challenge, const hidl_vec<uint8_t>& enrolledPasswordHandle, const hidl_vec<uint8_t>& providedPassword, verify_cb cb) argument
/hardware/interfaces/keymaster/4.0/
H A Dtypes.hal360 * challenge field. Otherwise the IKeymasterDevice must returrn
635 * Tag::ATTESTATION_CHALLENGE is used to deliver a "challenge" value to the attestKey() method,
641 ATTESTATION_CHALLENGE = TagType:BYTES | 708, /* Used to provide challenge in attestation */
1194 * challenge is a value that's used to enable authentication tokens to authorize specific
1195 * events. The primary use case for challenge is to authorize an IKeymasterDevice cryptographic
1198 uint64_t challenge;
1234 * H, 0 || challenge || user_id || authenticator_id || authenticator_type || timestamp)
1237 * are represented as unsigned values, the full width of the type. The challenge, userId and
1282 uint64_t challenge;
1306 * "Auth Verification" || challenge || timestam
[all...]
/hardware/interfaces/confirmationui/support/include/android/hardware/confirmationui/1.0/generic/
H A DGenericOperation.h133 auto hmac = HMacer::hmac256(testKey, "\0", bytes_cast(secureInputToken.challenge),
141 switch (static_cast<TestModeCommands>(secureInputToken.challenge)) {
/hardware/interfaces/radio/1.0/vts/functional/
H A Dradio_hidl_hal_ims.cpp169 std::string challenge = ""; local
171 radio->requestIsimAuthentication(serial, challenge);
/hardware/interfaces/confirmationui/support/test/
H A Dmsg_formatting_test.cpp116 expected.challenge = 0xb1b2b3b4b5b6b7b8;
/hardware/interfaces/confirmationui/support/include/android/hardware/confirmationui/support/
H A Dmsg_formatting.h258 return sizeof hat->challenge + sizeof hat->userId + sizeof hat->authenticatorId +
280 pos = copyField(hat.challenge, pos);
301 pos = copyField(v.challenge, pos);
/hardware/interfaces/confirmationui/1.0/vts/functional/
H A DVtsHalConfirmationUIV1_0TargetTest.cpp98 auth_token.challenge = static_cast<uint64_t>(command);
106 // challenge (8 bytes)
113 toBytes(auth_token.challenge), //
/hardware/interfaces/keymaster/3.0/
H A Dtypes.hal122 ATTESTATION_CHALLENGE = TagType:BYTES | 708, /** Used to provide challenge in attestation */
409 uint64_t challenge;
414 uint8_t[32] hmac; // HMAC is computed over 0 || challenge || user_id ||
/hardware/interfaces/radio/1.0/
H A DIRadio.hal1152 * challenge/response algorithm for IMS authentication
1155 * @param challenge challenge string in Base64 format
1159 oneway requestIsimAuthentication(int32_t serial, string challenge);
1392 * Returns the response of SIM Authentication through Radio challenge request.
1397 * @param authData the challenge string in Base64 format, see 3GPP TS 31.102 7.1.2
/hardware/interfaces/radio/1.2/default/
H A DRadio.h188 Return<void> requestIsimAuthentication(int32_t serial, const hidl_string& challenge) override;
/hardware/interfaces/keymaster/3.0/vts/functional/
H A Dkeymaster_hidl_hal_test.cpp975 bool verify_attestation_record(const string& challenge, const string& app_id, argument
1033 EXPECT_EQ(challenge.length(), att_challenge.size());
1034 EXPECT_EQ(0, memcmp(challenge.data(), att_challenge.data(), challenge.length()));
3957 .Authorization(TAG_ATTESTATION_CHALLENGE, HidlBuf("challenge"))
3963 verify_attestation_record("challenge", "foo", //
3986 TAG_ATTESTATION_CHALLENGE, HidlBuf("challenge")),
4005 .Authorization(TAG_ATTESTATION_CHALLENGE, HidlBuf("challenge"))
4012 verify_attestation_record("challenge", "foo", //
4034 TAG_ATTESTATION_CHALLENGE, HidlBuf("challenge")),
[all...]
/hardware/ril/libril/
H A Dril_service.cpp371 const ::android::hardware::hidl_string& challenge);
1950 Return<void> RadioImpl::requestIsimAuthentication(int32_t serial, const hidl_string& challenge) { argument
1955 challenge.c_str());

Completed in 373 milliseconds