/aosp14/frameworks/base/packages/SystemUI/src/com/android/systemui/biometrics/domain/interactor/ |
H A D | PromptCredentialInteractor.kt | 66 biometricPromptRepository.challenge, 69 ) { promptInfo, challenge, userId, kind -> 70 if (promptInfo == null || userId == null || challenge == null) { 79 operationInfo = operationInfo(challenge) 85 operationInfo = operationInfo(challenge), 92 operationInfo = operationInfo(challenge) 105 private fun operationInfo(challenge: Long): BiometricOperationInfo = 106 BiometricOperationInfo(gatekeeperChallenge = challenge) 117 challenge: Long, 122 challenge,
|
H A D | PromptSelectorInteractor.kt | 77 challenge: Long, 86 challenge: Long, 105 promptRepository.challenge, 108 ) { promptInfo, challenge, userId, kind -> 109 if (promptInfo == null || userId == null || challenge == null) { 118 operationInfo = BiometricOperationInfo(gatekeeperChallenge = challenge), 154 challenge: Long, 160 gatekeeperChallenge = challenge, 169 challenge: Long, 174 gatekeeperChallenge = challenge,
|
/aosp14/system/core/trusty/keymaster/keymint/ |
H A D | TrustySecureClock.cpp | 28 ::ndk::ScopedAStatus TrustySecureClock::generateTimeStamp(int64_t challenge, in generateTimeStamp() argument 31 request.challenge = challenge; in generateTimeStamp() 36 token->challenge = response.token.challenge; in generateTimeStamp()
|
H A D | TrustyRemotelyProvisionedComponentDevice.cpp | 109 const bytevec& endpointEncCertChain, const bytevec& challenge, DeviceInfo* deviceInfo, in generateCertificateRequest() argument 119 request.SetChallenge(challenge.data(), challenge.size()); in generateCertificateRequest() 133 const std::vector<MacedPublicKey>& keysToSign, const std::vector<uint8_t>& challenge, in generateCertificateRequestV2() argument 142 request.SetChallenge(challenge.data(), challenge.size()); in generateCertificateRequestV2()
|
H A D | TrustyKeyMintDevice.cpp | 285 result->challenge = response.op_handle; in begin() 295 request.token.challenge = timestampToken->challenge; in deviceLocked() 328 ScopedAStatus TrustyKeyMintDevice::getRootOfTrust(const array<uint8_t, 16>& challenge, in getRootOfTrust() argument 334 {challenge.begin(), challenge.end()}); in getRootOfTrust()
|
/aosp14/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/ |
H A D | FakeGateKeeperService.java | 61 public long challenge; field in FakeGateKeeperService.AuthToken 64 public AuthToken(long challenge, long sid) { in AuthToken() argument 65 this.challenge = challenge; in AuthToken() 74 challenge = buffer.getLong(); in AuthToken() 81 buffer.putLong(challenge); in toBytes() 124 public GateKeeperResponse verifyChallenge(int uid, long challenge, in verifyChallenge() argument 136 AuthToken token = new AuthToken(challenge, handle.sid); in verifyChallenge()
|
/aosp14/frameworks/base/services/core/java/com/android/server/biometrics/sensors/face/aidl/ |
H A D | FaceRevokeChallengeClient.java | 45 long challenge) { in FaceRevokeChallengeClient() argument 47 mChallenge = challenge; in FaceRevokeChallengeClient() 60 void onChallengeRevoked(int sensorId, int userId, long challenge) { in onChallengeRevoked() argument 61 final boolean success = challenge == mChallenge; in onChallengeRevoked()
|
H A D | TestHal.java | 76 public void revokeChallenge(long challenge) throws RemoteException { in createSession() argument 77 Slog.w(TAG, "revokeChallenge: " + challenge); in createSession() 78 cb.onChallengeRevoked(challenge); in createSession()
|
H A D | FaceGenerateChallengeClient.java | 58 void onChallengeGenerated(int sensorId, int userId, long challenge) { in onChallengeGenerated() argument 66 listener.onChallengeGenerated(sensorId, userId, challenge); in onChallengeGenerated()
|
/aosp14/frameworks/base/services/core/java/com/android/server/biometrics/sensors/fingerprint/aidl/ |
H A D | FingerprintRevokeChallengeClient.java | 45 long challenge) { in FingerprintRevokeChallengeClient() argument 47 mChallenge = challenge; in FingerprintRevokeChallengeClient() 60 void onChallengeRevoked(int sensorId, int userId, long challenge) { in onChallengeRevoked() argument 61 final boolean success = challenge == mChallenge; in onChallengeRevoked()
|
H A D | FingerprintGenerateChallengeClient.java | 59 void onChallengeGenerated(int sensorId, int userId, long challenge) { in onChallengeGenerated() argument 67 listener.onChallengeGenerated(sensorId, userId, challenge); in onChallengeGenerated()
|
H A D | TestHal.java | 75 public void revokeChallenge(long challenge) throws RemoteException { in createSession() argument 76 Slog.w(TAG, "revokeChallenge: " + challenge); in createSession() 77 cb.onChallengeRevoked(challenge); in createSession()
|
/aosp14/frameworks/base/services/core/java/com/android/server/security/rkp/ |
H A D | RemoteProvisioningShellCommand.java | 148 byte[] challenge = {}; in csr() 153 challenge = Base64.getDecoder().decode(getNextArgRequired()); in csr() 173 /*testMode=*/false, emptyKeys, eek, challenge, deviceInfo, protectedData); in csr() 175 deviceInfo, challenge, protectedData, keysToSignMac); in csr() 178 csrBytes = binder.generateCertificateRequestV2(emptyKeys, challenge); in csr() 199 private byte[] composeCertificateRequestV1(DeviceInfo deviceInfo, byte[] challenge, in composeCertificateRequestV1() argument 215 .add(new ByteString(challenge)) in composeCertificateRequestV1()
|
/aosp14/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/recoverablekeystore/ |
H A D | KeySyncUtilsTest.java | 280 byte[] challenge = randomBytes(32); in encryptRecoveryClaim_encryptsLockScreenAndKeyClaimant() 286 challenge, in encryptRecoveryClaim_encryptsLockScreenAndKeyClaimant() 327 byte[] challenge = randomBytes(32); in encryptRecoveryClaim_cannotBeDecryptedWithoutCorrectSecretKey() 333 challenge, in encryptRecoveryClaim_cannotBeDecryptedWithoutCorrectSecretKey() 342 RECOVERY_CLAIM_HEADER, vaultParams, challenge), in encryptRecoveryClaim_cannotBeDecryptedWithoutCorrectSecretKey() 354 byte[] challenge = randomBytes(32); in encryptRecoveryClaim_cannotBeDecryptedWithoutCorrectVaultParams() 359 challenge, in encryptRecoveryClaim_cannotBeDecryptedWithoutCorrectVaultParams() 368 RECOVERY_CLAIM_HEADER, randomBytes(100), challenge), in encryptRecoveryClaim_cannotBeDecryptedWithoutCorrectVaultParams() 380 byte[] challenge = randomBytes(32); in encryptRecoveryClaim_cannotBeDecryptedWithoutCorrectHeader() 386 challenge, in encryptRecoveryClaim_cannotBeDecryptedWithoutCorrectHeader() [all …]
|
/aosp14/frameworks/base/keystore/java/android/security/ |
H A D | KeyStoreSecurityLevel.java | 86 Long challenge = null; in createOperation() local 88 challenge = createOperationResponse.operationChallenge.challenge; in createOperation() 96 challenge, in createOperation()
|
H A D | KeyStoreOperation.java | 40 Long challenge, in KeyStoreOperation() argument 45 this.mChallenge = challenge; in KeyStoreOperation()
|
/aosp14/frameworks/base/services/tests/servicestests/src/com/android/server/biometrics/sensors/face/hidl/ |
H A D | FaceGenerateChallengeClientTest.java | 78 final OptionalUint64 challenge = new OptionalUint64(); in setup() local 79 challenge.value = CHALLENGE; in setup() 80 when(mIBiometricsFace.generateChallenge(anyInt())).thenReturn(challenge); in setup()
|
/aosp14/system/core/trusty/keymaster/include/trusty_keymaster/ |
H A D | TrustyRemotelyProvisionedComponentDevice.h | 45 const std::vector<uint8_t>& challenge, 50 const std::vector<uint8_t>& challenge,
|
/aosp14/frameworks/base/services/core/java/com/android/server/locksettings/ |
H A D | BiometricDeferredQueue.java | 103 public void onGenerateChallengeResult(int sensorId, int userId, long challenge) { in onGenerateChallengeResult() argument 114 challenge); in onGenerateChallengeResult() 121 faceManager.revokeChallenge(sensorId, userId, challenge); in onGenerateChallengeResult() 292 @NonNull UserAuthInfo userAuthInfo, long challenge) { in requestHatFromGatekeeperPassword() argument 294 getGatekeeperService(), userAuthInfo.gatekeeperPassword, challenge, in requestHatFromGatekeeperPassword()
|
/aosp14/system/core/trusty/gatekeeper/ |
H A D | trusty_gatekeeper.cpp | 66 aidlToken->challenge = authToken->challenge; in sizedBuffer2AidlHWToken() 115 int32_t uid, int64_t challenge, const std::vector<uint8_t>& enrolledPasswordHandle, in verify() argument 125 VerifyRequest request(uid, challenge, vec2sized_buffer(enrolledPasswordHandle), in verify()
|
/aosp14/frameworks/base/services/core/java/com/android/server/biometrics/sensors/ |
H A D | ClientMonitorCallbackConverter.java | 137 public void onChallengeGenerated(int sensorId, int userId, long challenge) in onChallengeGenerated() argument 140 mFaceServiceReceiver.onChallengeGenerated(sensorId, userId, challenge); in onChallengeGenerated() 142 mFingerprintServiceReceiver.onChallengeGenerated(sensorId, userId, challenge); in onChallengeGenerated()
|
/aosp14/frameworks/base/services/core/java/com/android/server/biometrics/sensors/fingerprint/hidl/ |
H A D | FingerprintGenerateChallengeClient.java | 55 final long challenge = getFreshDaemon().preEnroll(); in startHalOperation() local 57 getListener().onChallengeGenerated(getSensorId(), getTargetUserId(), challenge); in startHalOperation() local
|
/aosp14/frameworks/base/services/tests/servicestests/src/com/android/server/biometrics/ |
H A D | HardwareAuthTokenUtilsTest.java | 57 hardwareAuthToken.challenge = testChallenge; in testHardwareAuthTokenLoopBack() 73 assertEquals(testChallenge, hardwareAuthToken2.challenge); in testHardwareAuthTokenLoopBack()
|
/aosp14/frameworks/base/tests/AttestationVerificationTest/src/android/security/attestationverification/ |
H A D | SystemAttestationVerificationTest.kt | 175 inner class TestSelfTrustedAttestation(val alias: String, val challenge: String) { 182 val challengeByteArray = challenge.encodeToByteArray() 189 private fun generateAndStoreKey(alias: String, challenge: ByteArray) { 199 setAttestationChallenge(challenge)
|
/aosp14/frameworks/base/identity/java/android/security/identity/ |
H A D | IdentityCredential.java | 467 public @NonNull byte[] proveOwnership(@NonNull byte[] challenge) { in proveOwnership() argument 499 public @NonNull byte[] delete(@NonNull byte[] challenge) { in delete() argument
|