/aosp12/hardware/interfaces/identity/aidl/vts/ |
H A D | UserAuthTests.cpp | 232 credential_->setVerificationToken(verificationToken); in retrieveData() 281 VerificationToken verificationToken; in mintTokens() local 291 verificationToken.challenge = authChallenge_; in mintTokens() 292 verificationToken.timestamp.milliSeconds = epochMilliseconds; in mintTokens() 293 verificationToken.securityLevel = in mintTokens() 295 verificationToken.mac.clear(); in mintTokens() 296 return make_pair(authToken, verificationToken); in mintTokens() 304 retrieveData(authToken, verificationToken, true /* expectSuccess */, in TEST_P() 318 retrieveData(authToken, verificationToken, true /* expectSuccess */, in TEST_P() 331 retrieveData(authToken, verificationToken, true /* expectSuccess */, in TEST_P() [all …]
|
H A D | ReaderAuthTests.cpp | 327 VerificationToken verificationToken; in retrieveData() local 334 verificationToken.challenge = 0; in retrieveData() 335 verificationToken.timestamp.milliSeconds = 0; in retrieveData() 337 verificationToken.mac.clear(); in retrieveData() 339 c->setVerificationToken(verificationToken); in retrieveData() 570 VerificationToken verificationToken; in TEST_P() local 577 verificationToken.challenge = 0; in TEST_P() 578 verificationToken.timestamp.milliSeconds = 0; in TEST_P() 579 verificationToken.securityLevel = in TEST_P() 581 verificationToken.mac.clear(); in TEST_P() [all …]
|
H A D | EndToEndTests.cpp | 162 VerificationToken verificationToken; in TEST_P() local 169 verificationToken.challenge = 0; in TEST_P() 170 verificationToken.timestamp.milliSeconds = 0; in TEST_P() 171 verificationToken.securityLevel = ::android::hardware::keymaster::SecurityLevel::SOFTWARE; in TEST_P() 172 verificationToken.mac.clear(); in TEST_P() 414 credential->setVerificationToken(verificationToken); in TEST_P()
|
/aosp12/system/keymaster/ng/ |
H A D | AndroidKeymaster41Device.cpp | 43 const VerificationToken& verificationToken) { in deviceLocked() argument 45 serializableToken.challenge = verificationToken.challenge; in deviceLocked() 46 serializableToken.timestamp = verificationToken.timestamp; in deviceLocked() 48 hidlKeyParams2Km(verificationToken.parametersVerified)); in deviceLocked() 50 static_cast<keymaster_security_level_t>(verificationToken.securityLevel); in deviceLocked() 52 KeymasterBlob(verificationToken.mac.data(), verificationToken.mac.size()); in deviceLocked()
|
/aosp12/hardware/interfaces/keymaster/4.1/support/include/keymasterV4_1/ |
H A D | Keymaster4.h | 135 const VerificationToken& verificationToken, update_cb _hidl_cb) override { in update() argument 136 return km4_0_dev_->update(operationHandle, inParams, input, authToken, verificationToken, in update() 143 const VerificationToken& verificationToken, finish_cb _hidl_cb) override { in finish() argument 145 verificationToken, _hidl_cb); in finish() 157 const VerificationToken& verificationToken) override { in deviceLocked() argument 158 if (km4_1_dev_) return km4_1_dev_->deviceLocked(passwordOnly, verificationToken); in deviceLocked()
|
H A D | Keymaster3.h | 106 const VerificationToken& verificationToken, update_cb _hidl_cb) override; 110 const VerificationToken& verificationToken, finish_cb _hidl_cb) override;
|
/aosp12/system/keymaster/ng/include/ |
H A D | AndroidKeymaster41Device.h | 159 const VerificationToken& verificationToken, in update() argument 161 return super::update(operationHandle, inParams, input, authToken, verificationToken, in update() 168 const VerificationToken& verificationToken, in finish() argument 171 verificationToken, _hidl_cb); in finish()
|
H A D | AndroidKeymaster4Device.h | 97 const VerificationToken& verificationToken, update_cb _hidl_cb) override; 101 const VerificationToken& verificationToken, finish_cb _hidl_cb) override;
|
/aosp12/hardware/interfaces/keymaster/4.1/ |
H A D | IKeymasterDevice.hal | 61 * @param verificationToken is used by StrongBox implementations of IKeymasterDevice. It 65 * the timestamp in the verificationToken, the device is still considered to be locked. 69 * verificationToken (zero values and empty vectors) and should use their own clock as the 72 … deviceLocked(bool passwordOnly, VerificationToken verificationToken) generates (ErrorCode error);
|
/aosp12/system/core/trusty/keymaster/include/trusty_keymaster/ |
H A D | TrustyKeymaster4Device.h | 91 const VerificationToken& verificationToken, update_cb _hidl_cb) override; 95 const VerificationToken& verificationToken, finish_cb _hidl_cb) override;
|
/aosp12/hardware/interfaces/identity/aidl/aidl_api/android.hardware.identity/2/android/hardware/identity/ |
H A D | IIdentityCredential.aidl | 31 void setVerificationToken(in android.hardware.keymaster.VerificationToken verificationToken); in setVerificationToken() argument
|
/aosp12/hardware/interfaces/identity/aidl/aidl_api/android.hardware.identity/3/android/hardware/identity/ |
H A D | IIdentityCredential.aidl | 50 void setVerificationToken(in android.hardware.keymaster.VerificationToken verificationToken); in setVerificationToken() argument
|
/aosp12/hardware/interfaces/identity/aidl/aidl_api/android.hardware.identity/current/android/hardware/identity/ |
H A D | IIdentityCredential.aidl | 49 void setVerificationToken(in android.hardware.keymaster.VerificationToken verificationToken); in setVerificationToken() argument
|
/aosp12/hardware/interfaces/identity/aidl/android/hardware/identity/ |
H A D | IIdentityCredential.aidl | 402 void setVerificationToken(in VerificationToken verificationToken); in setVerificationToken() argument
|
/aosp12/system/core/trusty/keymaster/4.0/ |
H A D | TrustyKeymaster4Device.cpp | 540 const VerificationToken& verificationToken, in update() argument 542 (void)verificationToken; in update() 581 const VerificationToken& verificationToken, in finish() argument 583 (void)verificationToken; in finish()
|
/aosp12/hardware/interfaces/identity/aidl/default/common/ |
H A D | IdentityCredential.h | 73 ndk::ScopedAStatus setVerificationToken(const VerificationToken& verificationToken) override;
|
H A D | IdentityCredential.cpp | 210 const VerificationToken& verificationToken) { in setVerificationToken() argument 211 verificationToken_ = verificationToken; in setVerificationToken()
|
/aosp12/system/security/keystore2/src/km_compat/ |
H A D | km_compat.cpp | 748 V4_0_VerificationToken verificationToken = convertTimestampTokenToLegacy(optTimeStampToken); in updateAad() local 753 verificationToken, in updateAad() 784 V4_0_VerificationToken verificationToken = convertTimestampTokenToLegacy(optTimeStampToken); in update() local 795 {input.begin() + inputPos, input.end()}, authToken, verificationToken, in update() 834 V4_0_VerificationToken verificationToken = convertTimestampTokenToLegacy(in_timeStampToken); in finish() local 843 mOperationHandle, inParams, input, signature, authToken, verificationToken, in finish()
|
/aosp12/hardware/interfaces/keymaster/4.0/ |
H A D | IKeymasterDevice.hal | 1177 * @param verificationToken Verification token, used to prove that another IKeymasterDevice HAL 1195 HardwareAuthToken authToken, VerificationToken verificationToken) 1297 * @param verificationToken Verification token, used to prove that another IKeymasterDevice HAL 1306 vec<uint8_t> signature, HardwareAuthToken authToken, VerificationToken verificationToken)
|