Home
last modified time | relevance | path

Searched full:auth_token (Results 1 – 25 of 370) sorted by relevance

12345678910>>...15

/aosp_15_r20/hardware/interfaces/gatekeeper/1.0/software/tests/
H A Dgatekeeper_test.cpp90 auto auth_token = response.auth_token.Data<hw_auth_token_t>(); in TEST() local
92 ASSERT_NE(nullptr, auth_token); in TEST()
93 ASSERT_EQ((uint32_t)HW_AUTH_PASSWORD, ntohl(auth_token->authenticator_type)); in TEST()
94 ASSERT_EQ((uint64_t)1, auth_token->challenge); in TEST()
95 ASSERT_NE(~((uint32_t)0), auth_token->timestamp); in TEST()
96 ASSERT_NE((uint64_t)0, auth_token->user_id); in TEST()
97 ASSERT_NE((uint64_t)0, auth_token->authenticator_id); in TEST()
114 auto auth_token = response.auth_token.Data<hw_auth_token_t>(); in TEST() local
115 ASSERT_NE(nullptr, auth_token); in TEST()
117 secure_id_t secure_id = auth_token->user_id; in TEST()
[all …]
/aosp_15_r20/system/keymint/ta/src/
H A Doperation.rs167 auth_token: Option<HardwareAuthToken>, in begin_operation()
214 let auth_token = auth_token.ok_or_else(|| { in begin_operation() localVariable
218 auth_token, in begin_operation()
227 } else if let Some(auth_token) = auth_token { in begin_operation()
228 self.check_auth_token(auth_token, auth_info, None, None, None)?; in begin_operation()
434 auth_token: Option<HardwareAuthToken>, in op_update_aad()
437 self.with_authed_operation(op_handle, auth_token, timestamp_token, |op| { in op_update_aad()
452 auth_token: Option<HardwareAuthToken>, in op_update()
462 self.with_authed_operation(op_handle, auth_token, timestamp_token, |op| { in op_update()
517 auth_token: Option<HardwareAuthToken>, in op_finish()
[all …]
/aosp_15_r20/external/cronet/net/http/
H A Dhttp_auth_handler_digest_unittest.cc712 std::string auth_token; in TEST() local
718 &auth_token)); in TEST()
722 auth_token); in TEST()
726 std::string auth_token; in TEST() local
732 &auth_token)); in TEST()
736 auth_token); in TEST()
740 std::string auth_token; in TEST() local
746 &auth_token)); in TEST()
750 auth_token); in TEST()
754 std::string auth_token; in TEST() local
[all …]
H A Dhttp_auth_sspi_win_unittest.cc103 std::string auth_token; in TEST() local
106 nullptr, "HTTP/intranet.google.com", std::string(), &auth_token, in TEST()
139 std::string auth_token; in TEST() local
142 nullptr, "HTTP/intranet.google.com", std::string(), &auth_token, in TEST()
162 std::string auth_token; in TEST() local
165 nullptr, "HTTP/intranet.google.com", std::string(), &auth_token, in TEST()
184 std::string auth_token; in TEST() local
187 nullptr, "HTTP/intranet.google.com", std::string(), &auth_token, in TEST()
189 EXPECT_EQ("Negotiate ", auth_token.substr(0, 10)); in TEST()
192 ASSERT_TRUE(base::Base64Decode(auth_token.substr(10), &decoded_token)); in TEST()
[all …]
H A Dhttp_auth_handler.h84 // |request|, |callback|, and |auth_token| must be non-nullptr.
88 // If |OK| is returned, |*auth_token| is filled in with an authentication
91 // If |ERR_IO_PENDING| is returned, |*auth_token| will be filled in
93 // |request|, |callback|, and |auth_token| must last until |callback| is
97 // token, and the value of |*auth_token| is unspecified.
101 std::string* auth_token);
205 std::string* auth_token) = 0;
H A Dhttp_auth_ntlm_mechanism.cc50 int SetAuthTokenFromBinaryToken(std::string* auth_token, in SetAuthTokenFromBinaryToken() argument
58 *auth_token = std::string("NTLM ") + encode_output; in SetAuthTokenFromBinaryToken()
117 std::string* auth_token, in GenerateAuthToken() argument
129 return SetAuthTokenFromBinaryToken(auth_token, in GenerateAuthToken()
159 return SetAuthTokenFromBinaryToken(auth_token, next_token); in GenerateAuthToken()
H A Dhttp_auth_handler_mock.cc80 std::string* auth_token) { in GenerateAuthTokenImpl() argument
88 auth_token_ = auth_token; in GenerateAuthTokenImpl()
96 *auth_token = "auth_token"; in GenerateAuthTokenImpl()
131 *auth_token_ = "auth_token"; in OnGenerateAuthToken()
/aosp_15_r20/system/keymaster/android_keymaster/
H A Dkeymaster_enforcement.cpp287 const hw_auth_token_t* auth_token; in AuthorizeBegin() local
289 if (!GetAndValidateAuthToken(operation_params, &auth_token, &token_auth_type)) { in AuthorizeBegin()
293 uint64_t token_timestamp_millis = ntoh(auth_token->timestamp); in AuthorizeBegin()
453 const hw_auth_token_t** auth_token, in GetAndValidateAuthToken() argument
461 if (auth_token_blob.data_length != sizeof(**auth_token)) { in GetAndValidateAuthToken()
467 *auth_token = reinterpret_cast<const hw_auth_token_t*>(auth_token_blob.data); in GetAndValidateAuthToken()
468 if ((*auth_token)->version != HW_AUTH_TOKEN_VERSION) { in GetAndValidateAuthToken()
470 (*auth_token)->version, HW_AUTH_TOKEN_VERSION); in GetAndValidateAuthToken()
474 if (!ValidateTokenSignature(**auth_token)) { in GetAndValidateAuthToken()
479 *token_auth_type = ntoh((*auth_token)->authenticator_type); in GetAndValidateAuthToken()
[all …]
/aosp_15_r20/system/core/trusty/keymaster/4.0/
H A DTrustyKeymaster4Device.cpp88 * injectAuthToken translates a KM4 authToken into a legacy AUTH_TOKEN tag
107 p.tag = static_cast<Tag>(Tag3::AUTH_TOKEN); in injectAuthToken()
110 hw_auth_token_t* auth_token = reinterpret_cast<hw_auth_token_t*>(p.blob.data()); in injectAuthToken() local
111 auth_token->version = 0; in injectAuthToken()
112 auth_token->challenge = authToken.challenge; in injectAuthToken()
113 auth_token->user_id = authToken.userId; in injectAuthToken()
114 auth_token->authenticator_id = authToken.authenticatorId; in injectAuthToken()
115 auth_token->authenticator_type = in injectAuthToken()
117 auth_token->timestamp = htobe64(authToken.timestamp); in injectAuthToken()
118 static_assert(mac_len == sizeof(auth_token->hmac)); in injectAuthToken()
[all …]
/aosp_15_r20/hardware/interfaces/gatekeeper/1.0/vts/functional/
H A DVtsHalGatekeeperV1_0TargetTest.cpp59 const hw_auth_token_t *auth_token = in toAuthToken() local
63 EXPECT_NE(nullptr, auth_token); in toAuthToken()
66 if (auth_token != nullptr && auth_token_size >= sizeof(*auth_token)) { in toAuthToken()
68 uint32_t auth_type = ntohl(auth_token->authenticator_type); in toAuthToken()
69 uint64_t auth_tstamp = ntohq(auth_token->timestamp); in toAuthToken()
73 EXPECT_EQ(HW_AUTH_TOKEN_VERSION, auth_token->version); in toAuthToken()
74 // EXPECT_NE(UINT64_C(0), auth_token->authenticator_id); in toAuthToken()
75 ALOGI("Authenticator ID: %016" PRIX64, auth_token->authenticator_id); in toAuthToken()
76 EXPECT_NE(UINT32_C(0), auth_token->user_id); in toAuthToken()
78 return auth_token; in toAuthToken()
[all …]
/aosp_15_r20/system/security/keystore2/src/
H A Dauthorization.rs109 fn add_auth_token(&self, auth_token: &HardwareAuthToken) -> Result<()> { in add_auth_token()
116 auth_token.challenge, in add_auth_token()
117 auth_token.userId, in add_auth_token()
118 auth_token.authenticatorId, in add_auth_token()
119 auth_token.authenticatorType.0, in add_auth_token()
120 auth_token.timestamp.milliSeconds, in add_auth_token()
123 ENFORCEMENTS.add_auth_token(auth_token.clone()); in add_auth_token()
209 let (auth_token, ts_token) = in get_auth_tokens_for_credstore()
211 Ok(AuthorizationTokens { authToken: auth_token, timestampToken: ts_token }) in get_auth_tokens_for_credstore()
244 fn addAuthToken(&self, auth_token: &HardwareAuthToken) -> BinderResult<()> { in addAuthToken()
[all …]
/aosp_15_r20/system/gatekeeper/
H A Dgatekeeper_messages.cpp199 VerifyResponse::VerifyResponse(uint32_t user_id, SizedBuffer auth_token) { in VerifyResponse() argument
201 this->auth_token = move(auth_token); in VerifyResponse()
209 void VerifyResponse::SetVerificationToken(SizedBuffer auth_token) { in SetVerificationToken() argument
210 this->auth_token = move(auth_token); in SetVerificationToken()
214 return serialized_buffer_size(auth_token) + sizeof(request_reenroll); in nonErrorSerializedSize()
218 append_to_buffer(&buffer, auth_token); in nonErrorSerialize()
224 auth_token = {}; in nonErrorDeserialize()
226 gatekeeper_error_t err = read_from_buffer(&payload, end, &auth_token); in nonErrorDeserialize()
H A Dgatekeeper.cpp161 SizedBuffer auth_token; in Verify() local
162 response->error = MintAuthToken(&auth_token, timestamp, in Verify()
167 response->SetVerificationToken(move(auth_token)); in Verify()
253 gatekeeper_error_t GateKeeper::MintAuthToken(SizedBuffer *auth_token, in MintAuthToken() argument
256 if (auth_token == nullptr) return ERROR_INVALID; in MintAuthToken()
291 *auth_token = { token_buffer, sizeof(hw_auth_token_t) }; in MintAuthToken()
/aosp_15_r20/hardware/interfaces/confirmationui/1.0/vts/functional/
H A DVtsHalConfirmationUIV1_0TargetTest.cpp101 HardwareAuthToken auth_token; local
102 auth_token.challenge = static_cast<uint64_t>(command);
103 auth_token.userId = 0;
104 auth_token.authenticatorId = 0;
105 auth_token.authenticatorType = HardwareAuthenticatorType::NONE;
106 auth_token.timestamp = timestamp;
116 auth_token.mac = testHMAC("\0",
117 toBytes(auth_token.challenge), //
118 toBytes(auth_token.userId), //
119 toBytes(auth_token.authenticatorId), //
[all …]
/aosp_15_r20/hardware/interfaces/confirmationui/aidl/vts/functional/
H A DVtsHalConfirmationUITargetTest.cpp105 HardwareAuthToken auth_token; local
106 auth_token.challenge = static_cast<uint64_t>(command);
107 auth_token.userId = 0;
108 auth_token.authenticatorId = 0;
109 auth_token.authenticatorType = HardwareAuthenticatorType::NONE;
110 auth_token.timestamp = {static_cast<int64_t>(timestamp)};
120 auth_token.mac = testHMAC("\0",
121 toBytes(auth_token.challenge), //
122 toBytes(auth_token.userId), //
123 toBytes(auth_token.authenticatorId), //
[all …]
/aosp_15_r20/system/keymint/hal/src/
H A Dkeymint.rs43 /// - 1: array wrapper (0x81) [auth_token]
213 auth_token: match authToken { in begin()
388 auth_token: match authToken { in updateAad()
415 auth_token: match authToken { in update()
443 let auth_token = match authToken { in finish() localVariable
457 auth_token: auth_token.clone(), in finish()
471 auth_token, in finish()
480 auth_token, in finish()
/aosp_15_r20/hardware/interfaces/gatekeeper/1.0/software/
H A DSoftGateKeeperDevice.cpp93 hidl_vec<uint8_t> auth_token( in verify() local
94 response.auth_token.Data<uint8_t>(), in verify()
95 response.auth_token.Data<uint8_t>() + response.auth_token.size()); in verify()
99 response.retry_timeout, auth_token}); in verify()
/aosp_15_r20/external/cronet/net/android/
H A Dhttp_auth_negotiate_android.cc98 std::string* auth_token, in GenerateAuthTokenAndroid() argument
100 return GenerateAuthToken(credentials, spn, channel_bindings, auth_token, in GenerateAuthTokenAndroid()
108 std::string* auth_token, in GenerateAuthToken() argument
116 DCHECK(auth_token); in GenerateAuthToken()
120 auth_token_ = auth_token; in GenerateAuthToken()
/aosp_15_r20/prebuilts/vndk/v33/x86_64/include/hardware/libhardware/include/hardware/
Dgatekeeper.h103 * On success, writes the address of a verification token to auth_token,
125 * - auth_token: on success, a buffer containing the authentication token
126 * resulting from this verification is assigned to *auth_token. The caller
129 * token assigned to *auth_token will be assigned to *auth_token_length
144 uint8_t **auth_token, uint32_t *auth_token_length, bool *request_reenroll);
/aosp_15_r20/prebuilts/vndk/v34/arm/include/hardware/libhardware/include/hardware/
Dgatekeeper.h103 * On success, writes the address of a verification token to auth_token,
125 * - auth_token: on success, a buffer containing the authentication token
126 * resulting from this verification is assigned to *auth_token. The caller
129 * token assigned to *auth_token will be assigned to *auth_token_length
144 uint8_t **auth_token, uint32_t *auth_token_length, bool *request_reenroll);
/aosp_15_r20/prebuilts/vndk/v30/x86/include/hardware/libhardware/include/hardware/
Dgatekeeper.h103 * On success, writes the address of a verification token to auth_token,
125 * - auth_token: on success, a buffer containing the authentication token
126 * resulting from this verification is assigned to *auth_token. The caller
129 * token assigned to *auth_token will be assigned to *auth_token_length
144 uint8_t **auth_token, uint32_t *auth_token_length, bool *request_reenroll);
/aosp_15_r20/external/exoplayer/tree_8e57d3715f9092d5ec54ebe2e538f34bfcc34479/extensions/ima/src/test/java/com/google/android/exoplayer2/ext/ima/
H A DImaServerSideAdInsertionUriBuilderTest.java43 private static final String AUTH_TOKEN = "testAuthToken"; field in ImaServerSideAdInsertionUriBuilderTest
61 builder.setAuthToken(AUTH_TOKEN); in build_live_correctUriParsing()
73 assertThat(streamRequest.getAuthToken()).isEqualTo(AUTH_TOKEN); in build_live_correctUriParsing()
97 builder.setAuthToken(AUTH_TOKEN); in build_vod_correctUriParsing()
110 assertThat(streamRequest.getAuthToken()).isEqualTo(AUTH_TOKEN); in build_vod_correctUriParsing()
/aosp_15_r20/prebuilts/vndk/v31/x86_64/include/hardware/libhardware/include/hardware/
Dgatekeeper.h103 * On success, writes the address of a verification token to auth_token,
125 * - auth_token: on success, a buffer containing the authentication token
126 * resulting from this verification is assigned to *auth_token. The caller
129 * token assigned to *auth_token will be assigned to *auth_token_length
144 uint8_t **auth_token, uint32_t *auth_token_length, bool *request_reenroll);
/aosp_15_r20/prebuilts/vndk/v34/x86/include/hardware/libhardware/include/hardware/
Dgatekeeper.h103 * On success, writes the address of a verification token to auth_token,
125 * - auth_token: on success, a buffer containing the authentication token
126 * resulting from this verification is assigned to *auth_token. The caller
129 * token assigned to *auth_token will be assigned to *auth_token_length
144 uint8_t **auth_token, uint32_t *auth_token_length, bool *request_reenroll);
/aosp_15_r20/hardware/libhardware/include/hardware/
H A Dgatekeeper.h103 * On success, writes the address of a verification token to auth_token,
125 * - auth_token: on success, a buffer containing the authentication token
126 * resulting from this verification is assigned to *auth_token. The caller
129 * token assigned to *auth_token will be assigned to *auth_token_length
144 uint8_t **auth_token, uint32_t *auth_token_length, bool *request_reenroll);

12345678910>>...15