/aosp12/frameworks/libs/service_entitlement/tests/src/com/android/libraries/entitlement/ |
H A D | EapAkaHelperTest.java | 100 String challenge = "AQIAfBcBAAABBQAAXOZSkCjxysgE4" in getEapAkaChallengeResponse() local 105 String response = mEapAkaHelper.getEapAkaChallengeResponse(challenge); in getEapAkaChallengeResponse() 118 String challenge = "AQIAfBcBAAABBQAAXOZSkCjxysgE4" in getEapAkaChallengeResponse_getIccAuthenticationFailed() local 122 String response = mEapAkaHelper.getEapAkaChallengeResponse(challenge); in getEapAkaChallengeResponse_getIccAuthenticationFailed() 136 String challenge = "AQIAfBcBAAABBQAAXOZSkCjxysgE4" in getEapAkaResponse() local 141 EapAkaHelper.EapAkaResponse response = mEapAkaHelper.getEapAkaResponse(challenge); in getEapAkaResponse() 156 String challenge = "AQIAfBcBAAABBQAAXOZSkCjxysgE4" in getEapAkaResponse_synchronizationFailure() local 161 EapAkaHelper.EapAkaResponse response = mEapAkaHelper.getEapAkaResponse(challenge); in getEapAkaResponse_synchronizationFailure() 175 String challenge = "AQIAfBcBAAABBQAAXOZSkCjxysgE4" in getEapAkaResponse_getIccAuthenticationFailed() local 179 EapAkaHelper.EapAkaResponse response = mEapAkaHelper.getEapAkaResponse(challenge); in getEapAkaResponse_getIccAuthenticationFailed()
|
/aosp12/hardware/interfaces/identity/aidl/default/ |
H A D | FakeSecureHardwareProxy.cpp | 79 const vector<uint8_t>& challenge, const vector<uint8_t>& applicationId) { in createCredentialKey() argument 82 if (!eicProvisioningCreateCredentialKey(&ctx_, challenge.data(), challenge.size(), in createCredentialKey() 206 uint64_t challenge; in createAuthChallenge() local 207 if (!eicPresentationCreateAuthChallenge(&ctx_, &challenge)) { in createAuthChallenge() 210 return challenge; in createAuthChallenge() 232 uint64_t challenge, uint64_t secureUserId, uint64_t authenticatorId, in setAuthToken() argument 236 return eicPresentationSetAuthToken(&ctx_, challenge, secureUserId, authenticatorId, in setAuthToken() 324 const string& docType, const vector<uint8_t>& challenge, bool includeChallenge, in deleteCredential() argument 327 if (!eicPresentationDeleteCredential(&ctx_, docType.c_str(), challenge.data(), challenge.size(), in deleteCredential() 336 const string& docType, bool testCredential, const vector<uint8_t>& challenge, in proveOwnership() argument [all …]
|
/aosp12/system/security/provisioner/ |
H A D | rkp_factory_extraction_tool.cpp | 53 std::vector<uint8_t> challenge(kChallengeSize); in generateChallenge() local 55 ssize_t bytesRemaining = static_cast<ssize_t>(challenge.size()); in generateChallenge() 56 uint8_t* writePtr = challenge.data(); in generateChallenge() 67 return challenge; in generateChallenge() 72 const std::vector<uint8_t>& challenge, in composeCertificateRequest() argument 85 .add(challenge) in composeCertificateRequest() 129 const std::vector<uint8_t> challenge = generateChallenge(); in getCsrForInstance() local 145 FLAGS_test_mode, emptyKeys, getEekChain(), challenge, &verifiedDeviceInfo, &protectedData, in getCsrForInstance() 153 composeCertificateRequest(protectedData, verifiedDeviceInfo, challenge, keysToSignMac); in getCsrForInstance()
|
/aosp12/system/core/trusty/keymaster/keymint/ |
H A D | TrustySecureClock.cpp | 28 ::ndk::ScopedAStatus TrustySecureClock::generateTimeStamp(int64_t challenge, in generateTimeStamp() argument 31 request.challenge = challenge; in generateTimeStamp() 36 token->challenge = response.token.challenge; in generateTimeStamp()
|
/aosp12/frameworks/base/obex/javax/obex/ |
H A D | ObexSession.java | 81 byte[] challenge = ObexHelper.getTagValue((byte)0x00, header.mAuthChall); in handleAuthChall() 169 byte[] digest = new byte[challenge.length + password.length + 1]; in handleAuthChall() 170 System.arraycopy(challenge, 0, digest, 0, challenge.length); in handleAuthChall() 172 digest[challenge.length] = (byte)0x3A; in handleAuthChall() 173 System.arraycopy(password, 0, digest, challenge.length + 1, password.length); in handleAuthChall() 184 System.arraycopy(challenge, 0, header.mAuthResp, 20, 16); in handleAuthChall()
|
/aosp12/system/keymaster/ng/ |
H A D | AndroidSecureClock.cpp | 41 ScopedAStatus AndroidSecureClock::generateTimeStamp(int64_t challenge, TimeStampToken* token) { in generateTimeStamp() argument 43 request.challenge = challenge; in generateTimeStamp() 49 token->challenge = response.token.challenge; in generateTimeStamp()
|
/aosp12/hardware/interfaces/identity/aidl/vts/ |
H A D | VtsAttestationTests.cpp | 69 string challenge = "NotSoRandomChallenge1NotSoRandomChallenge1NotSoRandomChallenge1"; in TEST_P() local 70 vector<uint8_t> attestationChallenge(challenge.begin(), challenge.end()); in TEST_P() 92 string challenge = "c"; in TEST_P() local 93 vector<uint8_t> attestationChallenge(challenge.begin(), challenge.end()); in TEST_P()
|
/aosp12/system/security/keystore/tests/ |
H A D | verification_token_seralization_test.cpp | 33 token.challenge = 12345; in TEST() 44 ASSERT_EQ(token.challenge, deserialized.value().challenge); in TEST() 53 token.challenge = 12345; in TEST() 61 ASSERT_EQ(token.challenge, deserialized.value().challenge); in TEST()
|
/aosp12/system/gatekeeper/ |
H A D | gatekeeper_messages.cpp | 161 VerifyRequest::VerifyRequest(uint32_t user_id, uint64_t challenge, in VerifyRequest() argument 164 this->challenge = challenge; in VerifyRequest() 170 return sizeof(challenge) + serialized_buffer_size(password_handle) in nonErrorSerializedSize() 175 memcpy(buffer, &challenge, sizeof(challenge)); in nonErrorSerialize() 176 buffer += sizeof(challenge); in nonErrorSerialize() 187 if (!fitsBuffer(payload, end, sizeof(challenge))) return ERROR_INVALID; in nonErrorDeserialize() 189 memcpy(&challenge, payload, sizeof(challenge)); in nonErrorDeserialize() 190 payload += sizeof(challenge); in nonErrorDeserialize()
|
/aosp12/packages/apps/Settings/src/com/android/settings/biometrics/ |
H A D | MultiBiometricEnrollHelper.java | 70 faceManager.generateChallenge(mUserId, (sensorId, userId, challenge) -> { in launchFaceEnroll() 72 mGkPwHandle, mUserId, challenge); in launchFaceEnroll() 76 faceIntent.putExtra(BiometricEnrollBase.EXTRA_KEY_CHALLENGE, challenge); in launchFaceEnroll() 99 fingerprintManager.generateChallenge(mUserId, ((sensorId, userId, challenge) -> { in launchFingerprintEnroll() 101 mGkPwHandle, mUserId, challenge); in launchFingerprintEnroll() 105 intent.putExtra(BiometricEnrollBase.EXTRA_KEY_CHALLENGE, challenge); in launchFingerprintEnroll()
|
/aosp12/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/ |
H A D | FakeGateKeeperService.java | 61 public long challenge; field in FakeGateKeeperService.AuthToken 64 public AuthToken(long challenge, long sid) { in AuthToken() argument 65 this.challenge = challenge; in AuthToken() 74 challenge = buffer.getLong(); in AuthToken() 81 buffer.putLong(challenge); in toBytes() 124 public GateKeeperResponse verifyChallenge(int uid, long challenge, in verifyChallenge() argument 136 AuthToken token = new AuthToken(challenge, handle.sid); in verifyChallenge()
|
/aosp12/system/security/keystore2/src/ |
H A D | enforcements.rs | 184 map.remove_entry(&hat.challenge) in add_auth_token() 192 pub fn add_receiver(&self, challenge: i64, recv: TokenReceiver) { in add_receiver() 195 map.insert(challenge, recv); in add_receiver() 229 map_binder_status(dev.generateTimeStamp(challenge)) in get_timestamp_token() 233 if let Err(e) = sender.send(get_timestamp_token(challenge)) { in timestamp_token_request() 256 Some(OperationChallenge { challenge }) in finalize_create_authorization() 266 Some(OperationChallenge { challenge }) in finalize_create_authorization() 760 self.op_auth_map.add_receiver(challenge, recv); in register_op_auth_receiver() 811 challenge: i64, in get_auth_tokens() 819 (challenge == hat.challenge()) && hat.satisfies(&sids, auth_type) in get_auth_tokens() [all …]
|
/aosp12/system/keymaster/tests/ |
H A D | keymaster_enforcement_test.cpp | 586 token.challenge = 99; in TEST_F() 609 token.challenge = 99; in TEST_F() 638 token.challenge = 99; in TEST_F() 662 token.challenge = 99; in TEST_F() 689 token.challenge = 99; in TEST_F() 718 token.challenge = 99; in TEST_F() 747 token.challenge = 99; in TEST_F() 770 token.challenge = 99; in TEST_F() 823 token.challenge = 99; in TEST_F() 848 token.challenge = 99; in TEST_F() [all …]
|
/aosp12/packages/modules/IPsec/src/java/com/android/internal/net/eap/message/mschapv2/ |
H A D | EapMsChapV2TypeData.java | 108 public final byte[] challenge = new byte[VALUE_SIZE]; field in EapMsChapV2TypeData.EapMsChapV2ChallengeRequest 121 buffer.get(challenge); in EapMsChapV2ChallengeRequest() 134 int msChapV2Id, int msLength, byte[] challenge, byte[] name) in EapMsChapV2ChallengeRequest() argument 138 if (challenge.length != VALUE_SIZE) { in EapMsChapV2ChallengeRequest() 142 System.arraycopy(challenge, 0, this.challenge, 0, VALUE_SIZE); in EapMsChapV2ChallengeRequest() 317 public final byte[] challenge; field in EapMsChapV2TypeData.EapMsChapV2FailureRequest 347 this.challenge = hexStringToByteArray(mappings.get(CHALLENGE_LABEL)); in EapMsChapV2FailureRequest() 352 if (challenge.length != CHALLENGE_LENGTH) { in EapMsChapV2FailureRequest() 363 byte[] challenge, in EapMsChapV2FailureRequest() argument 371 this.challenge = challenge; in EapMsChapV2FailureRequest() [all …]
|
/aosp12/frameworks/base/services/core/java/com/android/server/biometrics/sensors/fingerprint/aidl/ |
H A D | FingerprintRevokeChallengeClient.java | 40 int userId, @NonNull String owner, int sensorId, long challenge) { in FingerprintRevokeChallengeClient() argument 42 mChallenge = challenge; in FingerprintRevokeChallengeClient() 55 void onChallengeRevoked(int sensorId, int userId, long challenge) { in onChallengeRevoked() argument 56 final boolean success = challenge == mChallenge; in onChallengeRevoked()
|
/aosp12/frameworks/base/services/core/java/com/android/server/biometrics/sensors/face/aidl/ |
H A D | FaceRevokeChallengeClient.java | 40 int userId, @NonNull String owner, int sensorId, long challenge) { in FaceRevokeChallengeClient() argument 42 mChallenge = challenge; in FaceRevokeChallengeClient() 55 void onChallengeRevoked(int sensorId, int userId, long challenge) { in onChallengeRevoked() argument 56 final boolean success = challenge == mChallenge; in onChallengeRevoked()
|
/aosp12/hardware/interfaces/keymaster/4.1/vts/functional/ |
H A D | DeviceUniqueAttestationTest.cpp | 160 void check_attestation_record(AttestationRecord attestation, const HidlBuf& challenge, in check_attestation_record() argument 168 EXPECT_EQ(challenge, attestation.attestation_challenge); in check_attestation_record() 267 HidlBuf challenge("challenge"); in TEST_P() local 289 attestation, challenge, in TEST_P() 314 HidlBuf challenge("challenge"); in TEST_P() local 336 attestation, challenge, in TEST_P() 373 HidlBuf challenge("challenge"); in TEST_P() local 378 .Authorization(TAG_ATTESTATION_CHALLENGE, challenge) in TEST_P() 405 attestation, challenge, in TEST_P() 437 HidlBuf challenge("challenge"); in TEST_P() local [all …]
|
/aosp12/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/recoverablekeystore/ |
H A D | KeySyncUtilsTest.java | 288 byte[] challenge = randomBytes(32); in encryptRecoveryClaim_encryptsLockScreenAndKeyClaimant() 294 challenge, in encryptRecoveryClaim_encryptsLockScreenAndKeyClaimant() 335 byte[] challenge = randomBytes(32); in encryptRecoveryClaim_cannotBeDecryptedWithoutCorrectSecretKey() 341 challenge, in encryptRecoveryClaim_cannotBeDecryptedWithoutCorrectSecretKey() 350 RECOVERY_CLAIM_HEADER, vaultParams, challenge), in encryptRecoveryClaim_cannotBeDecryptedWithoutCorrectSecretKey() 362 byte[] challenge = randomBytes(32); in encryptRecoveryClaim_cannotBeDecryptedWithoutCorrectVaultParams() 367 challenge, in encryptRecoveryClaim_cannotBeDecryptedWithoutCorrectVaultParams() 376 RECOVERY_CLAIM_HEADER, randomBytes(100), challenge), in encryptRecoveryClaim_cannotBeDecryptedWithoutCorrectVaultParams() 388 byte[] challenge = randomBytes(32); in encryptRecoveryClaim_cannotBeDecryptedWithoutCorrectHeader() 394 challenge, in encryptRecoveryClaim_cannotBeDecryptedWithoutCorrectHeader() [all …]
|
/aosp12/hardware/interfaces/biometrics/fingerprint/aidl/default/include/ |
H A D | FakeFingerprintEngine.h | 31 auto challenge = dist(mRandom); in generateChallengeImpl() local 32 cb->onChallengeGenerated(challenge); in generateChallengeImpl() 35 void revokeChallengeImpl(ISessionCallback* cb, int64_t challenge) { in revokeChallengeImpl() argument 37 cb->onChallengeRevoked(challenge); in revokeChallengeImpl()
|
/aosp12/system/security/identity/ |
H A D | Credential.cpp | 150 int64_t challenge; in ensureChallenge() local 151 Status status = halBinder_->createAuthChallenge(&challenge); in ensureChallenge() 156 if (challenge == 0) { in ensureChallenge() 161 selectedChallenge_ = challenge; in ensureChallenge() 167 bool getTokensFromKeystore2(uint64_t challenge, uint64_t secureUserId, in getTokensFromKeystore2() argument 177 auto result = authzService->getAuthTokensForCredStore(challenge, secureUserId, in getTokensFromKeystore2() 183 aidlAuthToken.challenge = keymintAuthToken.challenge; in getTokensFromKeystore2() 194 aidlVerificationToken.challenge = timestampToken.challenge; in getTokensFromKeystore2() 315 aidlAuthToken.challenge = 0; in getEntries() 322 aidlVerificationToken.challenge = 0; in getEntries() [all …]
|
/aosp12/frameworks/libs/service_entitlement/java/com/android/libraries/entitlement/ |
H A D | EapAkaHelper.java | 83 public String getEapAkaChallengeResponse(String challenge) { in getEapAkaChallengeResponse() argument 84 EapAkaResponse eapAkaResponse = getEapAkaResponse(challenge); in getEapAkaChallengeResponse() 98 public EapAkaResponse getEapAkaResponse(String challenge) { in getEapAkaResponse() argument 100 EapAkaChallenge eapAkaChallenge = EapAkaChallenge.parseEapAkaChallenge(challenge); in getEapAkaResponse()
|
/aosp12/hardware/interfaces/gatekeeper/1.0/vts/functional/ |
H A D | VtsHalGatekeeperV1_0TargetTest.cpp | 49 uint64_t challenge; member 53 GatekeeperRequest() : uid(0), challenge(0) {} in GatekeeperRequest() 101 uid_, req.challenge, req.curPwdHandle, req.newPwd, in doVerify() 148 void checkVerify(GatekeeperResponse &rsp, uint64_t challenge, in checkVerify() argument 156 EXPECT_EQ(challenge, auth_token->challenge); in checkVerify() 172 hidl_vec<uint8_t> &passwordHandle, uint64_t challenge, in verifyPassword() argument 180 verifyReq.challenge = challenge; in verifyPassword() 182 checkVerify(verifyRsp, challenge, expectSuccess); in verifyPassword()
|
/aosp12/packages/apps/RemoteProvisioner/src/com/android/remoteprovisioner/ |
H A D | Provisioner.java | 63 public static int provisionCerts(int numKeys, int secLevel, byte[] geekChain, byte[] challenge, in provisionCerts() argument 74 challenge, protectedData, deviceInfo, binder); in provisionCerts() 82 challenge, in provisionCerts() 90 certificateRequest, challenge); in provisionCerts()
|
/aosp12/hardware/interfaces/identity/aidl/default/common/ |
H A D | IdentityCredential.cpp | 90 return deleteCredentialCommon(challenge, true, outProofOfDeletionSignature); in deleteCredentialWithChallenge() 94 const vector<uint8_t>& challenge, bool includeChallenge, in deleteCredentialCommon() argument 96 if (challenge.size() > 32) { in deleteCredentialCommon() 103 array = {"ProofOfDeletion", docType_, challenge, testCredential_}; in deleteCredentialCommon() 110 docType_, challenge, includeChallenge, proofOfDeletionCbor.size()); in deleteCredentialCommon() 131 if (challenge.size() > 32) { in proveOwnership() 137 array = {"ProofOfOwnership", docType_, challenge, testCredential_}; in proveOwnership() 194 optional<uint64_t> challenge = hwProxy_->createAuthChallenge(); in createAuthChallenge() local 195 if (!challenge) { in createAuthChallenge() 199 *outChallenge = challenge.value(); in createAuthChallenge() [all …]
|
/aosp12/frameworks/libs/service_entitlement/tests/src/com/android/libraries/entitlement/eapaka/ |
H A D | EapAkaResponseTest.java | 98 EapAkaChallenge challenge = EapAkaChallenge.parseEapAkaChallenge(EAP_AKA_CHALLENGE_REQUEST); in generateEapAkaChallengeResponse_authSuccess() local 109 EapAkaResponse.respondToEapAkaChallenge(mContext, SUB_ID, challenge); in generateEapAkaChallengeResponse_authSuccess() 116 EapAkaChallenge challenge = EapAkaChallenge.parseEapAkaChallenge(EAP_AKA_CHALLENGE_REQUEST); in generateEapAkaChallengeResponse_syncFailure() local 127 EapAkaResponse.respondToEapAkaChallenge(mContext, SUB_ID, challenge); in generateEapAkaChallengeResponse_syncFailure()
|