Searched refs:auth (Results 1 – 17 of 17) sorted by relevance
/hardware/google/pixel-sepolicy/fingerprint-extension/system_ext/private/ |
D | property_contexts | 10 ctl.start$fingerprint-extension-bug-auth u:object_r:pixel_fingerprint_prop:s0 11 ctl.stop$fingerprint-extension-bug-auth u:object_r:pixel_fingerprint_prop:s0
|
/hardware/interfaces/biometrics/face/aidl/default/ |
D | face.sysprop | 179 # whether support lockout based on the failed auth attempts (default: false) 188 # whether support timed_lockout based on the failed auth attempts (default: false) 197 # temperory lockout threshold in number of consecutive failed auth attempts 215 # permanently lockout threshold in number of consecutive failed auth attempts
|
/hardware/google/gfxstream/host/apigen-codec-common/X11/extensions/ |
D | security.h | 44 void XSecurityFreeXauth(Xauth *auth);
|
/hardware/interfaces/keymaster/4.1/ |
D | IKeymasterDevice.hal | 53 * on a per-user basis. Because auth tokens do not contain an Android user ID, it's not 63 * device-lock time, for future comparison against auth tokens when operations using 64 * UNLOCKED_DEVICE_REQUIRED keys are attempted. Unless the auth token timestamp is newer than
|
/hardware/interfaces/biometrics/fingerprint/aidl/default/ |
D | fingerprint.sysprop | 266 # whether support lockout based on the failed auth attempts (default: false) 275 # temporarily lockout threshold in number of consecutive failed auth attempts (default: 5) 293 # permanently lockout threshold in number of consecutive failed auth attempts (default: 20)
|
/hardware/interfaces/confirmationui/1.0/ |
D | types.hal | 81 * To that end, the caller passes an auth token that has an HMAC keyed with the test key 84 * of the auth token against the values defined in TestModeCommand.
|
/hardware/interfaces/security/authgraph/aidl/android/hardware/security/authgraph/ |
D | Arc.cddl | 52 ; indicates whether an auth key issued from a biometric TA is 59 -4770554 : bstr, ; "challenge" - is added to an arc that encrypts an auth key from a
|
/hardware/interfaces/wifi/supplicant/1.3/ |
D | ISupplicantStaNetwork.hal | 256 * Set auth alg mask for the network. 270 * Get the auth alg mask set for the network.
|
/hardware/interfaces/keymaster/4.0/ |
D | IKeymasterDevice.hal | 930 * method must receive a non-empty HardwareAuthToken in the authToken argument. For the auth 938 * o The key must have a Tag::USER_AUTH_TYPE that matches the auth type in the token. 940 * o The timestamp in the auth token plus the value of the Tag::AUTH_TIMEOUT must be less than 1113 * receive a non-empty and valid HardwareAuthToken. For the auth token to be valid, all of the 1121 * o The key must have a Tag::USER_AUTH_TYPE that matches the auth type in the token. 1123 * o The challenge field in the auth token must contain the operationHandle 1128 * The caller must provide the auth token on every call to update() and finish(). 1219 * authToken. For the auth token to be valid, all of the following has to be true: 1226 * o The key must have a Tag::USER_AUTH_TYPE that matches the auth type in the token. 1228 * o The challenge field in the auth token must contain the operationHandle [all …]
|
D | types.hal | 356 * If Tag::AUTH_TIMEOUT is not present, then the key is an "auth-per-operation" key. In this 451 * except perhaps as implied by an auth token. This means that Keymaster must be able to check 1189 * more details. It is up to the caller to determine which of the generated auth tokens is 1245 * that this auth token is empty. 1286 * checked against auth tokens generated by the same secure environment, which avoids needing to
|
/hardware/interfaces/security/ |
D | README.md | 35 authentication result (a *hardware auth token*) is signed with a per-boot shared HMAC key known only
|
/hardware/google/gfxstream/guest/mesa/include/drm-uapi/ |
D | drm.h | 232 int auth; /**< Is client authenticated? */ member
|
/hardware/interfaces/wifi/supplicant/1.0/ |
D | ISupplicantStaNetwork.hal | 220 * Set auth alg mask for the network. 642 * Get the auth alg mask set for the network.
|
/hardware/interfaces/automotive/remoteaccess/test_grpc_server/ |
D | README.md | 274 * `auth auth_token` where auth_token must match the contents of the
|
/hardware/interfaces/radio/1.0/ |
D | types.hal | 715 MIP_PROFILE_AAA_AUTH = 33, // AAA auth 716 MIP_PROFILE_HA_AUTH = 34, // HA auth
|
D | IRadioResponse.hal | 2011 * @param response response string of the challenge/response algo for ISIM auth in base64 format
|
/hardware/broadcom/wlan/bcmdhd/dhdutil/include/ |
D | wlioctl.h | 3959 int32 auth; /* Open Vs Closed */ member
|