Home
last modified time | relevance | path

Searched refs:verificationToken (Results 1 – 19 of 19) sorted by relevance

/aosp12/hardware/interfaces/identity/aidl/vts/
H A DUserAuthTests.cpp232 credential_->setVerificationToken(verificationToken); in retrieveData()
281 VerificationToken verificationToken; in mintTokens() local
291 verificationToken.challenge = authChallenge_; in mintTokens()
292 verificationToken.timestamp.milliSeconds = epochMilliseconds; in mintTokens()
293 verificationToken.securityLevel = in mintTokens()
295 verificationToken.mac.clear(); in mintTokens()
296 return make_pair(authToken, verificationToken); in mintTokens()
304 retrieveData(authToken, verificationToken, true /* expectSuccess */, in TEST_P()
318 retrieveData(authToken, verificationToken, true /* expectSuccess */, in TEST_P()
331 retrieveData(authToken, verificationToken, true /* expectSuccess */, in TEST_P()
[all …]
H A DReaderAuthTests.cpp327 VerificationToken verificationToken; in retrieveData() local
334 verificationToken.challenge = 0; in retrieveData()
335 verificationToken.timestamp.milliSeconds = 0; in retrieveData()
337 verificationToken.mac.clear(); in retrieveData()
339 c->setVerificationToken(verificationToken); in retrieveData()
570 VerificationToken verificationToken; in TEST_P() local
577 verificationToken.challenge = 0; in TEST_P()
578 verificationToken.timestamp.milliSeconds = 0; in TEST_P()
579 verificationToken.securityLevel = in TEST_P()
581 verificationToken.mac.clear(); in TEST_P()
[all …]
H A DEndToEndTests.cpp162 VerificationToken verificationToken; in TEST_P() local
169 verificationToken.challenge = 0; in TEST_P()
170 verificationToken.timestamp.milliSeconds = 0; in TEST_P()
171 verificationToken.securityLevel = ::android::hardware::keymaster::SecurityLevel::SOFTWARE; in TEST_P()
172 verificationToken.mac.clear(); in TEST_P()
414 credential->setVerificationToken(verificationToken); in TEST_P()
/aosp12/system/keymaster/ng/
H A DAndroidKeymaster41Device.cpp43 const VerificationToken& verificationToken) { in deviceLocked() argument
45 serializableToken.challenge = verificationToken.challenge; in deviceLocked()
46 serializableToken.timestamp = verificationToken.timestamp; in deviceLocked()
48 hidlKeyParams2Km(verificationToken.parametersVerified)); in deviceLocked()
50 static_cast<keymaster_security_level_t>(verificationToken.securityLevel); in deviceLocked()
52 KeymasterBlob(verificationToken.mac.data(), verificationToken.mac.size()); in deviceLocked()
/aosp12/hardware/interfaces/keymaster/4.1/support/include/keymasterV4_1/
H A DKeymaster4.h135 const VerificationToken& verificationToken, update_cb _hidl_cb) override { in update() argument
136 return km4_0_dev_->update(operationHandle, inParams, input, authToken, verificationToken, in update()
143 const VerificationToken& verificationToken, finish_cb _hidl_cb) override { in finish() argument
145 verificationToken, _hidl_cb); in finish()
157 const VerificationToken& verificationToken) override { in deviceLocked() argument
158 if (km4_1_dev_) return km4_1_dev_->deviceLocked(passwordOnly, verificationToken); in deviceLocked()
H A DKeymaster3.h106 const VerificationToken& verificationToken, update_cb _hidl_cb) override;
110 const VerificationToken& verificationToken, finish_cb _hidl_cb) override;
/aosp12/system/keymaster/ng/include/
H A DAndroidKeymaster41Device.h159 const VerificationToken& verificationToken, in update() argument
161 return super::update(operationHandle, inParams, input, authToken, verificationToken, in update()
168 const VerificationToken& verificationToken, in finish() argument
171 verificationToken, _hidl_cb); in finish()
H A DAndroidKeymaster4Device.h97 const VerificationToken& verificationToken, update_cb _hidl_cb) override;
101 const VerificationToken& verificationToken, finish_cb _hidl_cb) override;
/aosp12/hardware/interfaces/keymaster/4.1/
H A DIKeymasterDevice.hal61 * @param verificationToken is used by StrongBox implementations of IKeymasterDevice. It
65 * the timestamp in the verificationToken, the device is still considered to be locked.
69 * verificationToken (zero values and empty vectors) and should use their own clock as the
72 … deviceLocked(bool passwordOnly, VerificationToken verificationToken) generates (ErrorCode error);
/aosp12/system/core/trusty/keymaster/include/trusty_keymaster/
H A DTrustyKeymaster4Device.h91 const VerificationToken& verificationToken, update_cb _hidl_cb) override;
95 const VerificationToken& verificationToken, finish_cb _hidl_cb) override;
/aosp12/hardware/interfaces/identity/aidl/aidl_api/android.hardware.identity/2/android/hardware/identity/
H A DIIdentityCredential.aidl31 void setVerificationToken(in android.hardware.keymaster.VerificationToken verificationToken); in setVerificationToken() argument
/aosp12/hardware/interfaces/identity/aidl/aidl_api/android.hardware.identity/3/android/hardware/identity/
H A DIIdentityCredential.aidl50 void setVerificationToken(in android.hardware.keymaster.VerificationToken verificationToken); in setVerificationToken() argument
/aosp12/hardware/interfaces/identity/aidl/aidl_api/android.hardware.identity/current/android/hardware/identity/
H A DIIdentityCredential.aidl49 void setVerificationToken(in android.hardware.keymaster.VerificationToken verificationToken); in setVerificationToken() argument
/aosp12/hardware/interfaces/identity/aidl/android/hardware/identity/
H A DIIdentityCredential.aidl402 void setVerificationToken(in VerificationToken verificationToken); in setVerificationToken() argument
/aosp12/system/core/trusty/keymaster/4.0/
H A DTrustyKeymaster4Device.cpp540 const VerificationToken& verificationToken, in update() argument
542 (void)verificationToken; in update()
581 const VerificationToken& verificationToken, in finish() argument
583 (void)verificationToken; in finish()
/aosp12/hardware/interfaces/identity/aidl/default/common/
H A DIdentityCredential.h73 ndk::ScopedAStatus setVerificationToken(const VerificationToken& verificationToken) override;
H A DIdentityCredential.cpp210 const VerificationToken& verificationToken) { in setVerificationToken() argument
211 verificationToken_ = verificationToken; in setVerificationToken()
/aosp12/system/security/keystore2/src/km_compat/
H A Dkm_compat.cpp748 V4_0_VerificationToken verificationToken = convertTimestampTokenToLegacy(optTimeStampToken); in updateAad() local
753 verificationToken, in updateAad()
784 V4_0_VerificationToken verificationToken = convertTimestampTokenToLegacy(optTimeStampToken); in update() local
795 {input.begin() + inputPos, input.end()}, authToken, verificationToken, in update()
834 V4_0_VerificationToken verificationToken = convertTimestampTokenToLegacy(in_timeStampToken); in finish() local
843 mOperationHandle, inParams, input, signature, authToken, verificationToken, in finish()
/aosp12/hardware/interfaces/keymaster/4.0/
H A DIKeymasterDevice.hal1177 * @param verificationToken Verification token, used to prove that another IKeymasterDevice HAL
1195 HardwareAuthToken authToken, VerificationToken verificationToken)
1297 * @param verificationToken Verification token, used to prove that another IKeymasterDevice HAL
1306 vec<uint8_t> signature, HardwareAuthToken authToken, VerificationToken verificationToken)