Home
last modified time | relevance | path

Searched refs:auth (Results 1 – 8 of 8) sorted by relevance

/hardware/interfaces/keymaster/4.1/
DIKeymasterDevice.hal52 * on a per-user basis. Because auth tokens do not contain an Android user ID, it's not
62 * device-lock time, for future comparison against auth tokens when operations using
63 * UNLOCKED_DEVICE_REQUIRED keys are attempted. Unless the auth token timestamp is newer than
/hardware/interfaces/confirmationui/1.0/
Dtypes.hal81 * To that end, the caller passes an auth token that has an HMAC keyed with the test key
84 * of the auth token against the values defined in TestModeCommand.
/hardware/interfaces/keymaster/4.0/
DIKeymasterDevice.hal930 * method must receive a non-empty HardwareAuthToken in the authToken argument. For the auth
938 * o The key must have a Tag::USER_AUTH_TYPE that matches the auth type in the token.
940 * o The timestamp in the auth token plus the value of the Tag::AUTH_TIMEOUT must be less than
1113 * receive a non-empty and valid HardwareAuthToken. For the auth token to be valid, all of the
1121 * o The key must have a Tag::USER_AUTH_TYPE that matches the auth type in the token.
1123 * o The challenge field in the auth token must contain the operationHandle
1128 * The caller must provide the auth token on every call to update() and finish().
1219 * authToken. For the auth token to be valid, all of the following has to be true:
1226 * o The key must have a Tag::USER_AUTH_TYPE that matches the auth type in the token.
1228 * o The challenge field in the auth token must contain the operationHandle
[all …]
Dtypes.hal356 * If Tag::AUTH_TIMEOUT is not present, then the key is an "auth-per-operation" key. In this
451 * except perhaps as implied by an auth token. This means that Keymaster must be able to check
1189 * more details. It is up to the caller to determine which of the generated auth tokens is
1245 * that this auth token is empty.
1286 * checked against auth tokens generated by the same secure environment, which avoids needing to
/hardware/interfaces/wifi/supplicant/1.0/
DISupplicantStaNetwork.hal220 * Set auth alg mask for the network.
642 * Get the auth alg mask set for the network.
/hardware/interfaces/radio/1.0/
Dtypes.hal711 MIP_PROFILE_AAA_AUTH = 33, // AAA auth
712 MIP_PROFILE_HA_AUTH = 34, // HA auth
DIRadioResponse.hal2011 * @param response response string of the challenge/response algo for ISIM auth in base64 format
/hardware/broadcom/wlan/bcmdhd/dhdutil/include/
Dwlioctl.h3959 int32 auth; /* Open Vs Closed */ member