Searched refs:auth (Results 1 – 7 of 7) sorted by relevance
81 * To that end, the caller passes an auth token that has an HMAC keyed with the test key84 * of the auth token against the values defined in TestModeCommand.
930 * method must receive a non-empty HardwareAuthToken in the authToken argument. For the auth938 * o The key must have a Tag::USER_AUTH_TYPE that matches the auth type in the token.940 * o The timestamp in the auth token plus the value of the Tag::AUTH_TIMEOUT must be less than1115 * receive a non-empty and valid HardwareAuthToken. For the auth token to be valid, all of the1123 * o The key must have a Tag::USER_AUTH_TYPE that matches the auth type in the token.1125 * o The challenge field in the auth token must contain the operationHandle1130 * The caller must provide the auth token on every call to update() and finish().1221 * authToken. For the auth token to be valid, all of the following has to be true:1228 * o The key must have a Tag::USER_AUTH_TYPE that matches the auth type in the token.1230 * o The challenge field in the auth token must contain the operationHandle[all …]
356 * If Tag::AUTH_TIMEOUT is not present, then the key is an "auth-per-operation" key. In this451 * except perhaps as implied by an auth token. This means that Keymaster must be able to check1189 * more details. It is up to the caller to determine which of the generated auth tokens is1245 * that this auth token is empty.1286 * checked against auth tokens generated by the same secure environment, which avoids needing to
220 * Set auth alg mask for the network.642 * Get the auth alg mask set for the network.
711 MIP_PROFILE_AAA_AUTH = 33, // AAA auth712 MIP_PROFILE_HA_AUTH = 34, // HA auth
2011 * @param response response string of the challenge/response algo for ISIM auth in base64 format
3959 int32 auth; /* Open Vs Closed */ member