Home
last modified time | relevance | path

Searched refs:auth (Results 1 – 7 of 7) sorted by relevance

/hardware/interfaces/confirmationui/1.0/
Dtypes.hal81 * To that end, the caller passes an auth token that has an HMAC keyed with the test key
84 * of the auth token against the values defined in TestModeCommand.
/hardware/interfaces/keymaster/4.0/
DIKeymasterDevice.hal930 * method must receive a non-empty HardwareAuthToken in the authToken argument. For the auth
938 * o The key must have a Tag::USER_AUTH_TYPE that matches the auth type in the token.
940 * o The timestamp in the auth token plus the value of the Tag::AUTH_TIMEOUT must be less than
1115 * receive a non-empty and valid HardwareAuthToken. For the auth token to be valid, all of the
1123 * o The key must have a Tag::USER_AUTH_TYPE that matches the auth type in the token.
1125 * o The challenge field in the auth token must contain the operationHandle
1130 * The caller must provide the auth token on every call to update() and finish().
1221 * authToken. For the auth token to be valid, all of the following has to be true:
1228 * o The key must have a Tag::USER_AUTH_TYPE that matches the auth type in the token.
1230 * o The challenge field in the auth token must contain the operationHandle
[all …]
Dtypes.hal356 * If Tag::AUTH_TIMEOUT is not present, then the key is an "auth-per-operation" key. In this
451 * except perhaps as implied by an auth token. This means that Keymaster must be able to check
1189 * more details. It is up to the caller to determine which of the generated auth tokens is
1245 * that this auth token is empty.
1286 * checked against auth tokens generated by the same secure environment, which avoids needing to
/hardware/interfaces/wifi/supplicant/1.0/
DISupplicantStaNetwork.hal220 * Set auth alg mask for the network.
642 * Get the auth alg mask set for the network.
/hardware/interfaces/radio/1.0/
Dtypes.hal711 MIP_PROFILE_AAA_AUTH = 33, // AAA auth
712 MIP_PROFILE_HA_AUTH = 34, // HA auth
DIRadioResponse.hal2011 * @param response response string of the challenge/response algo for ISIM auth in base64 format
/hardware/broadcom/wlan/bcmdhd/dhdutil/include/
Dwlioctl.h3959 int32 auth; /* Open Vs Closed */ member