Home
last modified time | relevance | path

Searched refs:secret (Results 1 – 10 of 10) sorted by relevance

/hardware/interfaces/authsecret/1.0/
DIAuthSecret.hal27 * When the primary user is unlocked, this method is passed a secret to
32 * The first time this is called, the secret must be used to provision state
33 * that depends on the primary user's secret. The same secret must be passed
36 * Upon factory reset, any dependence on the secret must be removed as that
37 * secret is now lost and must never be derived again. A new secret must be
41 * The secret must be at least 16 bytes.
43 * @param secret blob derived from the primary user's credential.
45 oneway primaryUserCredential(vec<uint8_t> secret);
/hardware/interfaces/authsecret/1.0/default/
DAuthSecret.cpp10 Return<void> AuthSecret::primaryUserCredential(const hidl_vec<uint8_t>& secret) { in primaryUserCredential() argument
11 (void)secret; in primaryUserCredential()
DAuthSecret.h24 Return<void> primaryUserCredential(const hidl_vec<uint8_t>& secret) override;
/hardware/interfaces/tests/extension/light/2.0/
Dtypes.hal56 * This is the secret sauce that will really make this extension shine.
/hardware/interfaces/confirmationui/1.0/
DIConfirmationResultCallback.hal56 * formattedMessage argument. The HMAC is keyed with a 256-bit secret
/hardware/interfaces/weaver/1.0/
DIWeaver.hal19 * Weaver provides secure storage of secret values that may only be read if the
/hardware/interfaces/keymaster/3.0/
Dtypes.hal93 * private/secret key operations, in seconds. Public
106 EXPORTABLE = TagType:BOOL | 602, /* If true, private/secret key can be exported, but only
/hardware/interfaces/keymaster/4.0/
DIKeymasterDevice.hal141 * unknown tags, must be cryptographically bound to the private/secret key material such that any
143 * impossible for the secure environment to obtain the private/secret key material. The recommended
146 * private/secret key material.
171 * derive a key that is used to encrypt the private/secret key material.
264 * ``K'' is a pre-established shared secret, set up during factory reset. The mechanism for
265 * establishing this shared secret is implementation-defined, but see below for a
302 * 7. T uses {K1_priv, K2_pub} with ECDH to compute session secret Q.
306 * 10. S uses {K2_priv, K1_pub} with ECDH to compute session secret Q.
Dtypes.hal88 * modulus. For AES keys it specifies the length of the secret key material. For 3DES keys it
622 * HBK is a unique hardware-bound secret known to the secure environment and never revealed
623 * by it. The secret must contain at least 128 bits of entropy and be unique to the
/hardware/interfaces/radio/1.0/
Dtypes.hal718 MIP_PROFILE_MN_HA_SS = 40, // HA shared secret
719 MIP_PROFILE_MN_AAA_SS = 41, // AAA shared secret