Home
last modified time | relevance | path

Searched refs:challenge (Results 1 – 25 of 257) sorted by relevance

1234567891011

/aosp12/frameworks/libs/service_entitlement/tests/src/com/android/libraries/entitlement/
H A DEapAkaHelperTest.java100 String challenge = "AQIAfBcBAAABBQAAXOZSkCjxysgE4" in getEapAkaChallengeResponse() local
105 String response = mEapAkaHelper.getEapAkaChallengeResponse(challenge); in getEapAkaChallengeResponse()
118 String challenge = "AQIAfBcBAAABBQAAXOZSkCjxysgE4" in getEapAkaChallengeResponse_getIccAuthenticationFailed() local
122 String response = mEapAkaHelper.getEapAkaChallengeResponse(challenge); in getEapAkaChallengeResponse_getIccAuthenticationFailed()
136 String challenge = "AQIAfBcBAAABBQAAXOZSkCjxysgE4" in getEapAkaResponse() local
141 EapAkaHelper.EapAkaResponse response = mEapAkaHelper.getEapAkaResponse(challenge); in getEapAkaResponse()
156 String challenge = "AQIAfBcBAAABBQAAXOZSkCjxysgE4" in getEapAkaResponse_synchronizationFailure() local
161 EapAkaHelper.EapAkaResponse response = mEapAkaHelper.getEapAkaResponse(challenge); in getEapAkaResponse_synchronizationFailure()
175 String challenge = "AQIAfBcBAAABBQAAXOZSkCjxysgE4" in getEapAkaResponse_getIccAuthenticationFailed() local
179 EapAkaHelper.EapAkaResponse response = mEapAkaHelper.getEapAkaResponse(challenge); in getEapAkaResponse_getIccAuthenticationFailed()
/aosp12/hardware/interfaces/identity/aidl/default/
H A DFakeSecureHardwareProxy.cpp79 const vector<uint8_t>& challenge, const vector<uint8_t>& applicationId) { in createCredentialKey() argument
82 if (!eicProvisioningCreateCredentialKey(&ctx_, challenge.data(), challenge.size(), in createCredentialKey()
206 uint64_t challenge; in createAuthChallenge() local
207 if (!eicPresentationCreateAuthChallenge(&ctx_, &challenge)) { in createAuthChallenge()
210 return challenge; in createAuthChallenge()
232 uint64_t challenge, uint64_t secureUserId, uint64_t authenticatorId, in setAuthToken() argument
236 return eicPresentationSetAuthToken(&ctx_, challenge, secureUserId, authenticatorId, in setAuthToken()
324 const string& docType, const vector<uint8_t>& challenge, bool includeChallenge, in deleteCredential() argument
327 if (!eicPresentationDeleteCredential(&ctx_, docType.c_str(), challenge.data(), challenge.size(), in deleteCredential()
336 const string& docType, bool testCredential, const vector<uint8_t>& challenge, in proveOwnership() argument
[all …]
/aosp12/system/security/provisioner/
H A Drkp_factory_extraction_tool.cpp53 std::vector<uint8_t> challenge(kChallengeSize); in generateChallenge() local
55 ssize_t bytesRemaining = static_cast<ssize_t>(challenge.size()); in generateChallenge()
56 uint8_t* writePtr = challenge.data(); in generateChallenge()
67 return challenge; in generateChallenge()
72 const std::vector<uint8_t>& challenge, in composeCertificateRequest() argument
85 .add(challenge) in composeCertificateRequest()
129 const std::vector<uint8_t> challenge = generateChallenge(); in getCsrForInstance() local
145 FLAGS_test_mode, emptyKeys, getEekChain(), challenge, &verifiedDeviceInfo, &protectedData, in getCsrForInstance()
153 composeCertificateRequest(protectedData, verifiedDeviceInfo, challenge, keysToSignMac); in getCsrForInstance()
/aosp12/system/core/trusty/keymaster/keymint/
H A DTrustySecureClock.cpp28 ::ndk::ScopedAStatus TrustySecureClock::generateTimeStamp(int64_t challenge, in generateTimeStamp() argument
31 request.challenge = challenge; in generateTimeStamp()
36 token->challenge = response.token.challenge; in generateTimeStamp()
/aosp12/frameworks/base/obex/javax/obex/
H A DObexSession.java81 byte[] challenge = ObexHelper.getTagValue((byte)0x00, header.mAuthChall); in handleAuthChall()
169 byte[] digest = new byte[challenge.length + password.length + 1]; in handleAuthChall()
170 System.arraycopy(challenge, 0, digest, 0, challenge.length); in handleAuthChall()
172 digest[challenge.length] = (byte)0x3A; in handleAuthChall()
173 System.arraycopy(password, 0, digest, challenge.length + 1, password.length); in handleAuthChall()
184 System.arraycopy(challenge, 0, header.mAuthResp, 20, 16); in handleAuthChall()
/aosp12/system/keymaster/ng/
H A DAndroidSecureClock.cpp41 ScopedAStatus AndroidSecureClock::generateTimeStamp(int64_t challenge, TimeStampToken* token) { in generateTimeStamp() argument
43 request.challenge = challenge; in generateTimeStamp()
49 token->challenge = response.token.challenge; in generateTimeStamp()
/aosp12/hardware/interfaces/identity/aidl/vts/
H A DVtsAttestationTests.cpp69 string challenge = "NotSoRandomChallenge1NotSoRandomChallenge1NotSoRandomChallenge1"; in TEST_P() local
70 vector<uint8_t> attestationChallenge(challenge.begin(), challenge.end()); in TEST_P()
92 string challenge = "c"; in TEST_P() local
93 vector<uint8_t> attestationChallenge(challenge.begin(), challenge.end()); in TEST_P()
/aosp12/system/security/keystore/tests/
H A Dverification_token_seralization_test.cpp33 token.challenge = 12345; in TEST()
44 ASSERT_EQ(token.challenge, deserialized.value().challenge); in TEST()
53 token.challenge = 12345; in TEST()
61 ASSERT_EQ(token.challenge, deserialized.value().challenge); in TEST()
/aosp12/system/gatekeeper/
H A Dgatekeeper_messages.cpp161 VerifyRequest::VerifyRequest(uint32_t user_id, uint64_t challenge, in VerifyRequest() argument
164 this->challenge = challenge; in VerifyRequest()
170 return sizeof(challenge) + serialized_buffer_size(password_handle) in nonErrorSerializedSize()
175 memcpy(buffer, &challenge, sizeof(challenge)); in nonErrorSerialize()
176 buffer += sizeof(challenge); in nonErrorSerialize()
187 if (!fitsBuffer(payload, end, sizeof(challenge))) return ERROR_INVALID; in nonErrorDeserialize()
189 memcpy(&challenge, payload, sizeof(challenge)); in nonErrorDeserialize()
190 payload += sizeof(challenge); in nonErrorDeserialize()
/aosp12/packages/apps/Settings/src/com/android/settings/biometrics/
H A DMultiBiometricEnrollHelper.java70 faceManager.generateChallenge(mUserId, (sensorId, userId, challenge) -> { in launchFaceEnroll()
72 mGkPwHandle, mUserId, challenge); in launchFaceEnroll()
76 faceIntent.putExtra(BiometricEnrollBase.EXTRA_KEY_CHALLENGE, challenge); in launchFaceEnroll()
99 fingerprintManager.generateChallenge(mUserId, ((sensorId, userId, challenge) -> { in launchFingerprintEnroll()
101 mGkPwHandle, mUserId, challenge); in launchFingerprintEnroll()
105 intent.putExtra(BiometricEnrollBase.EXTRA_KEY_CHALLENGE, challenge); in launchFingerprintEnroll()
/aosp12/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/
H A DFakeGateKeeperService.java61 public long challenge; field in FakeGateKeeperService.AuthToken
64 public AuthToken(long challenge, long sid) { in AuthToken() argument
65 this.challenge = challenge; in AuthToken()
74 challenge = buffer.getLong(); in AuthToken()
81 buffer.putLong(challenge); in toBytes()
124 public GateKeeperResponse verifyChallenge(int uid, long challenge, in verifyChallenge() argument
136 AuthToken token = new AuthToken(challenge, handle.sid); in verifyChallenge()
/aosp12/system/security/keystore2/src/
H A Denforcements.rs184 map.remove_entry(&hat.challenge) in add_auth_token()
192 pub fn add_receiver(&self, challenge: i64, recv: TokenReceiver) { in add_receiver()
195 map.insert(challenge, recv); in add_receiver()
229 map_binder_status(dev.generateTimeStamp(challenge)) in get_timestamp_token()
233 if let Err(e) = sender.send(get_timestamp_token(challenge)) { in timestamp_token_request()
256 Some(OperationChallenge { challenge }) in finalize_create_authorization()
266 Some(OperationChallenge { challenge }) in finalize_create_authorization()
760 self.op_auth_map.add_receiver(challenge, recv); in register_op_auth_receiver()
811 challenge: i64, in get_auth_tokens()
819 (challenge == hat.challenge()) && hat.satisfies(&sids, auth_type) in get_auth_tokens()
[all …]
/aosp12/system/keymaster/tests/
H A Dkeymaster_enforcement_test.cpp586 token.challenge = 99; in TEST_F()
609 token.challenge = 99; in TEST_F()
638 token.challenge = 99; in TEST_F()
662 token.challenge = 99; in TEST_F()
689 token.challenge = 99; in TEST_F()
718 token.challenge = 99; in TEST_F()
747 token.challenge = 99; in TEST_F()
770 token.challenge = 99; in TEST_F()
823 token.challenge = 99; in TEST_F()
848 token.challenge = 99; in TEST_F()
[all …]
/aosp12/packages/modules/IPsec/src/java/com/android/internal/net/eap/message/mschapv2/
H A DEapMsChapV2TypeData.java108 public final byte[] challenge = new byte[VALUE_SIZE]; field in EapMsChapV2TypeData.EapMsChapV2ChallengeRequest
121 buffer.get(challenge); in EapMsChapV2ChallengeRequest()
134 int msChapV2Id, int msLength, byte[] challenge, byte[] name) in EapMsChapV2ChallengeRequest() argument
138 if (challenge.length != VALUE_SIZE) { in EapMsChapV2ChallengeRequest()
142 System.arraycopy(challenge, 0, this.challenge, 0, VALUE_SIZE); in EapMsChapV2ChallengeRequest()
317 public final byte[] challenge; field in EapMsChapV2TypeData.EapMsChapV2FailureRequest
347 this.challenge = hexStringToByteArray(mappings.get(CHALLENGE_LABEL)); in EapMsChapV2FailureRequest()
352 if (challenge.length != CHALLENGE_LENGTH) { in EapMsChapV2FailureRequest()
363 byte[] challenge, in EapMsChapV2FailureRequest() argument
371 this.challenge = challenge; in EapMsChapV2FailureRequest()
[all …]
/aosp12/frameworks/base/services/core/java/com/android/server/biometrics/sensors/fingerprint/aidl/
H A DFingerprintRevokeChallengeClient.java40 int userId, @NonNull String owner, int sensorId, long challenge) { in FingerprintRevokeChallengeClient() argument
42 mChallenge = challenge; in FingerprintRevokeChallengeClient()
55 void onChallengeRevoked(int sensorId, int userId, long challenge) { in onChallengeRevoked() argument
56 final boolean success = challenge == mChallenge; in onChallengeRevoked()
/aosp12/frameworks/base/services/core/java/com/android/server/biometrics/sensors/face/aidl/
H A DFaceRevokeChallengeClient.java40 int userId, @NonNull String owner, int sensorId, long challenge) { in FaceRevokeChallengeClient() argument
42 mChallenge = challenge; in FaceRevokeChallengeClient()
55 void onChallengeRevoked(int sensorId, int userId, long challenge) { in onChallengeRevoked() argument
56 final boolean success = challenge == mChallenge; in onChallengeRevoked()
/aosp12/hardware/interfaces/keymaster/4.1/vts/functional/
H A DDeviceUniqueAttestationTest.cpp160 void check_attestation_record(AttestationRecord attestation, const HidlBuf& challenge, in check_attestation_record() argument
168 EXPECT_EQ(challenge, attestation.attestation_challenge); in check_attestation_record()
267 HidlBuf challenge("challenge"); in TEST_P() local
289 attestation, challenge, in TEST_P()
314 HidlBuf challenge("challenge"); in TEST_P() local
336 attestation, challenge, in TEST_P()
373 HidlBuf challenge("challenge"); in TEST_P() local
378 .Authorization(TAG_ATTESTATION_CHALLENGE, challenge) in TEST_P()
405 attestation, challenge, in TEST_P()
437 HidlBuf challenge("challenge"); in TEST_P() local
[all …]
/aosp12/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/recoverablekeystore/
H A DKeySyncUtilsTest.java288 byte[] challenge = randomBytes(32); in encryptRecoveryClaim_encryptsLockScreenAndKeyClaimant()
294 challenge, in encryptRecoveryClaim_encryptsLockScreenAndKeyClaimant()
335 byte[] challenge = randomBytes(32); in encryptRecoveryClaim_cannotBeDecryptedWithoutCorrectSecretKey()
341 challenge, in encryptRecoveryClaim_cannotBeDecryptedWithoutCorrectSecretKey()
350 RECOVERY_CLAIM_HEADER, vaultParams, challenge), in encryptRecoveryClaim_cannotBeDecryptedWithoutCorrectSecretKey()
362 byte[] challenge = randomBytes(32); in encryptRecoveryClaim_cannotBeDecryptedWithoutCorrectVaultParams()
367 challenge, in encryptRecoveryClaim_cannotBeDecryptedWithoutCorrectVaultParams()
376 RECOVERY_CLAIM_HEADER, randomBytes(100), challenge), in encryptRecoveryClaim_cannotBeDecryptedWithoutCorrectVaultParams()
388 byte[] challenge = randomBytes(32); in encryptRecoveryClaim_cannotBeDecryptedWithoutCorrectHeader()
394 challenge, in encryptRecoveryClaim_cannotBeDecryptedWithoutCorrectHeader()
[all …]
/aosp12/hardware/interfaces/biometrics/fingerprint/aidl/default/include/
H A DFakeFingerprintEngine.h31 auto challenge = dist(mRandom); in generateChallengeImpl() local
32 cb->onChallengeGenerated(challenge); in generateChallengeImpl()
35 void revokeChallengeImpl(ISessionCallback* cb, int64_t challenge) { in revokeChallengeImpl() argument
37 cb->onChallengeRevoked(challenge); in revokeChallengeImpl()
/aosp12/system/security/identity/
H A DCredential.cpp150 int64_t challenge; in ensureChallenge() local
151 Status status = halBinder_->createAuthChallenge(&challenge); in ensureChallenge()
156 if (challenge == 0) { in ensureChallenge()
161 selectedChallenge_ = challenge; in ensureChallenge()
167 bool getTokensFromKeystore2(uint64_t challenge, uint64_t secureUserId, in getTokensFromKeystore2() argument
177 auto result = authzService->getAuthTokensForCredStore(challenge, secureUserId, in getTokensFromKeystore2()
183 aidlAuthToken.challenge = keymintAuthToken.challenge; in getTokensFromKeystore2()
194 aidlVerificationToken.challenge = timestampToken.challenge; in getTokensFromKeystore2()
315 aidlAuthToken.challenge = 0; in getEntries()
322 aidlVerificationToken.challenge = 0; in getEntries()
[all …]
/aosp12/frameworks/libs/service_entitlement/java/com/android/libraries/entitlement/
H A DEapAkaHelper.java83 public String getEapAkaChallengeResponse(String challenge) { in getEapAkaChallengeResponse() argument
84 EapAkaResponse eapAkaResponse = getEapAkaResponse(challenge); in getEapAkaChallengeResponse()
98 public EapAkaResponse getEapAkaResponse(String challenge) { in getEapAkaResponse() argument
100 EapAkaChallenge eapAkaChallenge = EapAkaChallenge.parseEapAkaChallenge(challenge); in getEapAkaResponse()
/aosp12/hardware/interfaces/gatekeeper/1.0/vts/functional/
H A DVtsHalGatekeeperV1_0TargetTest.cpp49 uint64_t challenge; member
53 GatekeeperRequest() : uid(0), challenge(0) {} in GatekeeperRequest()
101 uid_, req.challenge, req.curPwdHandle, req.newPwd, in doVerify()
148 void checkVerify(GatekeeperResponse &rsp, uint64_t challenge, in checkVerify() argument
156 EXPECT_EQ(challenge, auth_token->challenge); in checkVerify()
172 hidl_vec<uint8_t> &passwordHandle, uint64_t challenge, in verifyPassword() argument
180 verifyReq.challenge = challenge; in verifyPassword()
182 checkVerify(verifyRsp, challenge, expectSuccess); in verifyPassword()
/aosp12/packages/apps/RemoteProvisioner/src/com/android/remoteprovisioner/
H A DProvisioner.java63 public static int provisionCerts(int numKeys, int secLevel, byte[] geekChain, byte[] challenge, in provisionCerts() argument
74 challenge, protectedData, deviceInfo, binder); in provisionCerts()
82 challenge, in provisionCerts()
90 certificateRequest, challenge); in provisionCerts()
/aosp12/hardware/interfaces/identity/aidl/default/common/
H A DIdentityCredential.cpp90 return deleteCredentialCommon(challenge, true, outProofOfDeletionSignature); in deleteCredentialWithChallenge()
94 const vector<uint8_t>& challenge, bool includeChallenge, in deleteCredentialCommon() argument
96 if (challenge.size() > 32) { in deleteCredentialCommon()
103 array = {"ProofOfDeletion", docType_, challenge, testCredential_}; in deleteCredentialCommon()
110 docType_, challenge, includeChallenge, proofOfDeletionCbor.size()); in deleteCredentialCommon()
131 if (challenge.size() > 32) { in proveOwnership()
137 array = {"ProofOfOwnership", docType_, challenge, testCredential_}; in proveOwnership()
194 optional<uint64_t> challenge = hwProxy_->createAuthChallenge(); in createAuthChallenge() local
195 if (!challenge) { in createAuthChallenge()
199 *outChallenge = challenge.value(); in createAuthChallenge()
[all …]
/aosp12/frameworks/libs/service_entitlement/tests/src/com/android/libraries/entitlement/eapaka/
H A DEapAkaResponseTest.java98 EapAkaChallenge challenge = EapAkaChallenge.parseEapAkaChallenge(EAP_AKA_CHALLENGE_REQUEST); in generateEapAkaChallengeResponse_authSuccess() local
109 EapAkaResponse.respondToEapAkaChallenge(mContext, SUB_ID, challenge); in generateEapAkaChallengeResponse_authSuccess()
116 EapAkaChallenge challenge = EapAkaChallenge.parseEapAkaChallenge(EAP_AKA_CHALLENGE_REQUEST); in generateEapAkaChallengeResponse_syncFailure() local
127 EapAkaResponse.respondToEapAkaChallenge(mContext, SUB_ID, challenge); in generateEapAkaChallengeResponse_syncFailure()

1234567891011