Searched refs:secret (Results 1 – 10 of 10) sorted by relevance
/hardware/interfaces/authsecret/1.0/ |
D | IAuthSecret.hal | 27 * When the primary user is unlocked, this method is passed a secret to 32 * The first time this is called, the secret must be used to provision state 33 * that depends on the primary user's secret. The same secret must be passed 36 * Upon factory reset, any dependence on the secret must be removed as that 37 * secret is now lost and must never be derived again. A new secret must be 41 * The secret must be at least 16 bytes. 43 * @param secret blob derived from the primary user's credential. 45 oneway primaryUserCredential(vec<uint8_t> secret);
|
/hardware/interfaces/authsecret/1.0/default/ |
D | AuthSecret.cpp | 10 Return<void> AuthSecret::primaryUserCredential(const hidl_vec<uint8_t>& secret) { in primaryUserCredential() argument 11 (void)secret; in primaryUserCredential()
|
D | AuthSecret.h | 24 Return<void> primaryUserCredential(const hidl_vec<uint8_t>& secret) override;
|
/hardware/interfaces/tests/extension/light/2.0/ |
D | types.hal | 56 * This is the secret sauce that will really make this extension shine.
|
/hardware/interfaces/confirmationui/1.0/ |
D | IConfirmationResultCallback.hal | 56 * formattedMessage argument. The HMAC is keyed with a 256-bit secret
|
/hardware/interfaces/weaver/1.0/ |
D | IWeaver.hal | 19 * Weaver provides secure storage of secret values that may only be read if the
|
/hardware/interfaces/keymaster/3.0/ |
D | types.hal | 93 * private/secret key operations, in seconds. Public 106 EXPORTABLE = TagType:BOOL | 602, /* If true, private/secret key can be exported, but only
|
/hardware/interfaces/keymaster/4.0/ |
D | IKeymasterDevice.hal | 141 * unknown tags, must be cryptographically bound to the private/secret key material such that any 143 * impossible for the secure environment to obtain the private/secret key material. The recommended 146 * private/secret key material. 171 * derive a key that is used to encrypt the private/secret key material. 264 * ``K'' is a pre-established shared secret, set up during factory reset. The mechanism for 265 * establishing this shared secret is implementation-defined, but see below for a 302 * 7. T uses {K1_priv, K2_pub} with ECDH to compute session secret Q. 306 * 10. S uses {K2_priv, K1_pub} with ECDH to compute session secret Q.
|
D | types.hal | 88 * modulus. For AES keys it specifies the length of the secret key material. For 3DES keys it 622 * HBK is a unique hardware-bound secret known to the secure environment and never revealed 623 * by it. The secret must contain at least 128 bits of entropy and be unique to the
|
/hardware/interfaces/radio/1.0/ |
D | types.hal | 718 MIP_PROFILE_MN_HA_SS = 40, // HA shared secret 719 MIP_PROFILE_MN_AAA_SS = 41, // AAA shared secret
|