/aosp_15_r20/hardware/interfaces/gatekeeper/1.0/software/tests/ |
H A D | gatekeeper_test.cpp | 90 auto auth_token = response.auth_token.Data<hw_auth_token_t>(); in TEST() local 92 ASSERT_NE(nullptr, auth_token); in TEST() 93 ASSERT_EQ((uint32_t)HW_AUTH_PASSWORD, ntohl(auth_token->authenticator_type)); in TEST() 94 ASSERT_EQ((uint64_t)1, auth_token->challenge); in TEST() 95 ASSERT_NE(~((uint32_t)0), auth_token->timestamp); in TEST() 96 ASSERT_NE((uint64_t)0, auth_token->user_id); in TEST() 97 ASSERT_NE((uint64_t)0, auth_token->authenticator_id); in TEST() 114 auto auth_token = response.auth_token.Data<hw_auth_token_t>(); in TEST() local 115 ASSERT_NE(nullptr, auth_token); in TEST() 117 secure_id_t secure_id = auth_token->user_id; in TEST() [all …]
|
/aosp_15_r20/system/keymint/ta/src/ |
H A D | operation.rs | 167 auth_token: Option<HardwareAuthToken>, in begin_operation() 214 let auth_token = auth_token.ok_or_else(|| { in begin_operation() localVariable 218 auth_token, in begin_operation() 227 } else if let Some(auth_token) = auth_token { in begin_operation() 228 self.check_auth_token(auth_token, auth_info, None, None, None)?; in begin_operation() 434 auth_token: Option<HardwareAuthToken>, in op_update_aad() 437 self.with_authed_operation(op_handle, auth_token, timestamp_token, |op| { in op_update_aad() 452 auth_token: Option<HardwareAuthToken>, in op_update() 462 self.with_authed_operation(op_handle, auth_token, timestamp_token, |op| { in op_update() 517 auth_token: Option<HardwareAuthToken>, in op_finish() [all …]
|
/aosp_15_r20/external/cronet/net/http/ |
H A D | http_auth_handler_digest_unittest.cc | 712 std::string auth_token; in TEST() local 718 &auth_token)); in TEST() 722 auth_token); in TEST() 726 std::string auth_token; in TEST() local 732 &auth_token)); in TEST() 736 auth_token); in TEST() 740 std::string auth_token; in TEST() local 746 &auth_token)); in TEST() 750 auth_token); in TEST() 754 std::string auth_token; in TEST() local [all …]
|
H A D | http_auth_sspi_win_unittest.cc | 103 std::string auth_token; in TEST() local 106 nullptr, "HTTP/intranet.google.com", std::string(), &auth_token, in TEST() 139 std::string auth_token; in TEST() local 142 nullptr, "HTTP/intranet.google.com", std::string(), &auth_token, in TEST() 162 std::string auth_token; in TEST() local 165 nullptr, "HTTP/intranet.google.com", std::string(), &auth_token, in TEST() 184 std::string auth_token; in TEST() local 187 nullptr, "HTTP/intranet.google.com", std::string(), &auth_token, in TEST() 189 EXPECT_EQ("Negotiate ", auth_token.substr(0, 10)); in TEST() 192 ASSERT_TRUE(base::Base64Decode(auth_token.substr(10), &decoded_token)); in TEST() [all …]
|
H A D | http_auth_handler.h | 84 // |request|, |callback|, and |auth_token| must be non-nullptr. 88 // If |OK| is returned, |*auth_token| is filled in with an authentication 91 // If |ERR_IO_PENDING| is returned, |*auth_token| will be filled in 93 // |request|, |callback|, and |auth_token| must last until |callback| is 97 // token, and the value of |*auth_token| is unspecified. 101 std::string* auth_token); 205 std::string* auth_token) = 0;
|
H A D | http_auth_ntlm_mechanism.cc | 50 int SetAuthTokenFromBinaryToken(std::string* auth_token, in SetAuthTokenFromBinaryToken() argument 58 *auth_token = std::string("NTLM ") + encode_output; in SetAuthTokenFromBinaryToken() 117 std::string* auth_token, in GenerateAuthToken() argument 129 return SetAuthTokenFromBinaryToken(auth_token, in GenerateAuthToken() 159 return SetAuthTokenFromBinaryToken(auth_token, next_token); in GenerateAuthToken()
|
H A D | http_auth_handler_mock.cc | 80 std::string* auth_token) { in GenerateAuthTokenImpl() argument 88 auth_token_ = auth_token; in GenerateAuthTokenImpl() 96 *auth_token = "auth_token"; in GenerateAuthTokenImpl() 131 *auth_token_ = "auth_token"; in OnGenerateAuthToken()
|
/aosp_15_r20/system/keymaster/android_keymaster/ |
H A D | keymaster_enforcement.cpp | 287 const hw_auth_token_t* auth_token; in AuthorizeBegin() local 289 if (!GetAndValidateAuthToken(operation_params, &auth_token, &token_auth_type)) { in AuthorizeBegin() 293 uint64_t token_timestamp_millis = ntoh(auth_token->timestamp); in AuthorizeBegin() 453 const hw_auth_token_t** auth_token, in GetAndValidateAuthToken() argument 461 if (auth_token_blob.data_length != sizeof(**auth_token)) { in GetAndValidateAuthToken() 467 *auth_token = reinterpret_cast<const hw_auth_token_t*>(auth_token_blob.data); in GetAndValidateAuthToken() 468 if ((*auth_token)->version != HW_AUTH_TOKEN_VERSION) { in GetAndValidateAuthToken() 470 (*auth_token)->version, HW_AUTH_TOKEN_VERSION); in GetAndValidateAuthToken() 474 if (!ValidateTokenSignature(**auth_token)) { in GetAndValidateAuthToken() 479 *token_auth_type = ntoh((*auth_token)->authenticator_type); in GetAndValidateAuthToken() [all …]
|
/aosp_15_r20/system/core/trusty/keymaster/4.0/ |
H A D | TrustyKeymaster4Device.cpp | 88 * injectAuthToken translates a KM4 authToken into a legacy AUTH_TOKEN tag 107 p.tag = static_cast<Tag>(Tag3::AUTH_TOKEN); in injectAuthToken() 110 hw_auth_token_t* auth_token = reinterpret_cast<hw_auth_token_t*>(p.blob.data()); in injectAuthToken() local 111 auth_token->version = 0; in injectAuthToken() 112 auth_token->challenge = authToken.challenge; in injectAuthToken() 113 auth_token->user_id = authToken.userId; in injectAuthToken() 114 auth_token->authenticator_id = authToken.authenticatorId; in injectAuthToken() 115 auth_token->authenticator_type = in injectAuthToken() 117 auth_token->timestamp = htobe64(authToken.timestamp); in injectAuthToken() 118 static_assert(mac_len == sizeof(auth_token->hmac)); in injectAuthToken() [all …]
|
/aosp_15_r20/hardware/interfaces/gatekeeper/1.0/vts/functional/ |
H A D | VtsHalGatekeeperV1_0TargetTest.cpp | 59 const hw_auth_token_t *auth_token = in toAuthToken() local 63 EXPECT_NE(nullptr, auth_token); in toAuthToken() 66 if (auth_token != nullptr && auth_token_size >= sizeof(*auth_token)) { in toAuthToken() 68 uint32_t auth_type = ntohl(auth_token->authenticator_type); in toAuthToken() 69 uint64_t auth_tstamp = ntohq(auth_token->timestamp); in toAuthToken() 73 EXPECT_EQ(HW_AUTH_TOKEN_VERSION, auth_token->version); in toAuthToken() 74 // EXPECT_NE(UINT64_C(0), auth_token->authenticator_id); in toAuthToken() 75 ALOGI("Authenticator ID: %016" PRIX64, auth_token->authenticator_id); in toAuthToken() 76 EXPECT_NE(UINT32_C(0), auth_token->user_id); in toAuthToken() 78 return auth_token; in toAuthToken() [all …]
|
/aosp_15_r20/system/security/keystore2/src/ |
H A D | authorization.rs | 109 fn add_auth_token(&self, auth_token: &HardwareAuthToken) -> Result<()> { in add_auth_token() 116 auth_token.challenge, in add_auth_token() 117 auth_token.userId, in add_auth_token() 118 auth_token.authenticatorId, in add_auth_token() 119 auth_token.authenticatorType.0, in add_auth_token() 120 auth_token.timestamp.milliSeconds, in add_auth_token() 123 ENFORCEMENTS.add_auth_token(auth_token.clone()); in add_auth_token() 209 let (auth_token, ts_token) = in get_auth_tokens_for_credstore() 211 Ok(AuthorizationTokens { authToken: auth_token, timestampToken: ts_token }) in get_auth_tokens_for_credstore() 244 fn addAuthToken(&self, auth_token: &HardwareAuthToken) -> BinderResult<()> { in addAuthToken() [all …]
|
/aosp_15_r20/system/gatekeeper/ |
H A D | gatekeeper_messages.cpp | 199 VerifyResponse::VerifyResponse(uint32_t user_id, SizedBuffer auth_token) { in VerifyResponse() argument 201 this->auth_token = move(auth_token); in VerifyResponse() 209 void VerifyResponse::SetVerificationToken(SizedBuffer auth_token) { in SetVerificationToken() argument 210 this->auth_token = move(auth_token); in SetVerificationToken() 214 return serialized_buffer_size(auth_token) + sizeof(request_reenroll); in nonErrorSerializedSize() 218 append_to_buffer(&buffer, auth_token); in nonErrorSerialize() 224 auth_token = {}; in nonErrorDeserialize() 226 gatekeeper_error_t err = read_from_buffer(&payload, end, &auth_token); in nonErrorDeserialize()
|
H A D | gatekeeper.cpp | 161 SizedBuffer auth_token; in Verify() local 162 response->error = MintAuthToken(&auth_token, timestamp, in Verify() 167 response->SetVerificationToken(move(auth_token)); in Verify() 253 gatekeeper_error_t GateKeeper::MintAuthToken(SizedBuffer *auth_token, in MintAuthToken() argument 256 if (auth_token == nullptr) return ERROR_INVALID; in MintAuthToken() 291 *auth_token = { token_buffer, sizeof(hw_auth_token_t) }; in MintAuthToken()
|
/aosp_15_r20/hardware/interfaces/confirmationui/1.0/vts/functional/ |
H A D | VtsHalConfirmationUIV1_0TargetTest.cpp | 101 HardwareAuthToken auth_token; local 102 auth_token.challenge = static_cast<uint64_t>(command); 103 auth_token.userId = 0; 104 auth_token.authenticatorId = 0; 105 auth_token.authenticatorType = HardwareAuthenticatorType::NONE; 106 auth_token.timestamp = timestamp; 116 auth_token.mac = testHMAC("\0", 117 toBytes(auth_token.challenge), // 118 toBytes(auth_token.userId), // 119 toBytes(auth_token.authenticatorId), // [all …]
|
/aosp_15_r20/hardware/interfaces/confirmationui/aidl/vts/functional/ |
H A D | VtsHalConfirmationUITargetTest.cpp | 105 HardwareAuthToken auth_token; local 106 auth_token.challenge = static_cast<uint64_t>(command); 107 auth_token.userId = 0; 108 auth_token.authenticatorId = 0; 109 auth_token.authenticatorType = HardwareAuthenticatorType::NONE; 110 auth_token.timestamp = {static_cast<int64_t>(timestamp)}; 120 auth_token.mac = testHMAC("\0", 121 toBytes(auth_token.challenge), // 122 toBytes(auth_token.userId), // 123 toBytes(auth_token.authenticatorId), // [all …]
|
/aosp_15_r20/system/keymint/hal/src/ |
H A D | keymint.rs | 43 /// - 1: array wrapper (0x81) [auth_token] 213 auth_token: match authToken { in begin() 388 auth_token: match authToken { in updateAad() 415 auth_token: match authToken { in update() 443 let auth_token = match authToken { in finish() localVariable 457 auth_token: auth_token.clone(), in finish() 471 auth_token, in finish() 480 auth_token, in finish()
|
/aosp_15_r20/hardware/interfaces/gatekeeper/1.0/software/ |
H A D | SoftGateKeeperDevice.cpp | 93 hidl_vec<uint8_t> auth_token( in verify() local 94 response.auth_token.Data<uint8_t>(), in verify() 95 response.auth_token.Data<uint8_t>() + response.auth_token.size()); in verify() 99 response.retry_timeout, auth_token}); in verify()
|
/aosp_15_r20/external/cronet/net/android/ |
H A D | http_auth_negotiate_android.cc | 98 std::string* auth_token, in GenerateAuthTokenAndroid() argument 100 return GenerateAuthToken(credentials, spn, channel_bindings, auth_token, in GenerateAuthTokenAndroid() 108 std::string* auth_token, in GenerateAuthToken() argument 116 DCHECK(auth_token); in GenerateAuthToken() 120 auth_token_ = auth_token; in GenerateAuthToken()
|
/aosp_15_r20/prebuilts/vndk/v33/x86_64/include/hardware/libhardware/include/hardware/ |
D | gatekeeper.h | 103 * On success, writes the address of a verification token to auth_token, 125 * - auth_token: on success, a buffer containing the authentication token 126 * resulting from this verification is assigned to *auth_token. The caller 129 * token assigned to *auth_token will be assigned to *auth_token_length 144 uint8_t **auth_token, uint32_t *auth_token_length, bool *request_reenroll);
|
/aosp_15_r20/prebuilts/vndk/v34/arm/include/hardware/libhardware/include/hardware/ |
D | gatekeeper.h | 103 * On success, writes the address of a verification token to auth_token, 125 * - auth_token: on success, a buffer containing the authentication token 126 * resulting from this verification is assigned to *auth_token. The caller 129 * token assigned to *auth_token will be assigned to *auth_token_length 144 uint8_t **auth_token, uint32_t *auth_token_length, bool *request_reenroll);
|
/aosp_15_r20/prebuilts/vndk/v30/x86/include/hardware/libhardware/include/hardware/ |
D | gatekeeper.h | 103 * On success, writes the address of a verification token to auth_token, 125 * - auth_token: on success, a buffer containing the authentication token 126 * resulting from this verification is assigned to *auth_token. The caller 129 * token assigned to *auth_token will be assigned to *auth_token_length 144 uint8_t **auth_token, uint32_t *auth_token_length, bool *request_reenroll);
|
/aosp_15_r20/external/exoplayer/tree_8e57d3715f9092d5ec54ebe2e538f34bfcc34479/extensions/ima/src/test/java/com/google/android/exoplayer2/ext/ima/ |
H A D | ImaServerSideAdInsertionUriBuilderTest.java | 43 private static final String AUTH_TOKEN = "testAuthToken"; field in ImaServerSideAdInsertionUriBuilderTest 61 builder.setAuthToken(AUTH_TOKEN); in build_live_correctUriParsing() 73 assertThat(streamRequest.getAuthToken()).isEqualTo(AUTH_TOKEN); in build_live_correctUriParsing() 97 builder.setAuthToken(AUTH_TOKEN); in build_vod_correctUriParsing() 110 assertThat(streamRequest.getAuthToken()).isEqualTo(AUTH_TOKEN); in build_vod_correctUriParsing()
|
/aosp_15_r20/prebuilts/vndk/v31/x86_64/include/hardware/libhardware/include/hardware/ |
D | gatekeeper.h | 103 * On success, writes the address of a verification token to auth_token, 125 * - auth_token: on success, a buffer containing the authentication token 126 * resulting from this verification is assigned to *auth_token. The caller 129 * token assigned to *auth_token will be assigned to *auth_token_length 144 uint8_t **auth_token, uint32_t *auth_token_length, bool *request_reenroll);
|
/aosp_15_r20/prebuilts/vndk/v34/x86/include/hardware/libhardware/include/hardware/ |
D | gatekeeper.h | 103 * On success, writes the address of a verification token to auth_token, 125 * - auth_token: on success, a buffer containing the authentication token 126 * resulting from this verification is assigned to *auth_token. The caller 129 * token assigned to *auth_token will be assigned to *auth_token_length 144 uint8_t **auth_token, uint32_t *auth_token_length, bool *request_reenroll);
|
/aosp_15_r20/hardware/libhardware/include/hardware/ |
H A D | gatekeeper.h | 103 * On success, writes the address of a verification token to auth_token, 125 * - auth_token: on success, a buffer containing the authentication token 126 * resulting from this verification is assigned to *auth_token. The caller 129 * token assigned to *auth_token will be assigned to *auth_token_length 144 uint8_t **auth_token, uint32_t *auth_token_length, bool *request_reenroll);
|