Home
last modified time | relevance | path

Searched refs:auth (Results 1 – 17 of 17) sorted by relevance

/hardware/google/pixel-sepolicy/fingerprint-extension/system_ext/private/
Dproperty_contexts10 ctl.start$fingerprint-extension-bug-auth u:object_r:pixel_fingerprint_prop:s0
11 ctl.stop$fingerprint-extension-bug-auth u:object_r:pixel_fingerprint_prop:s0
/hardware/interfaces/biometrics/face/aidl/default/
Dface.sysprop179 # whether support lockout based on the failed auth attempts (default: false)
188 # whether support timed_lockout based on the failed auth attempts (default: false)
197 # temperory lockout threshold in number of consecutive failed auth attempts
215 # permanently lockout threshold in number of consecutive failed auth attempts
/hardware/google/gfxstream/host/apigen-codec-common/X11/extensions/
Dsecurity.h44 void XSecurityFreeXauth(Xauth *auth);
/hardware/interfaces/keymaster/4.1/
DIKeymasterDevice.hal53 * on a per-user basis. Because auth tokens do not contain an Android user ID, it's not
63 * device-lock time, for future comparison against auth tokens when operations using
64 * UNLOCKED_DEVICE_REQUIRED keys are attempted. Unless the auth token timestamp is newer than
/hardware/interfaces/biometrics/fingerprint/aidl/default/
Dfingerprint.sysprop266 # whether support lockout based on the failed auth attempts (default: false)
275 # temporarily lockout threshold in number of consecutive failed auth attempts (default: 5)
293 # permanently lockout threshold in number of consecutive failed auth attempts (default: 20)
/hardware/interfaces/confirmationui/1.0/
Dtypes.hal81 * To that end, the caller passes an auth token that has an HMAC keyed with the test key
84 * of the auth token against the values defined in TestModeCommand.
/hardware/interfaces/security/authgraph/aidl/android/hardware/security/authgraph/
DArc.cddl52 ; indicates whether an auth key issued from a biometric TA is
59 -4770554 : bstr, ; "challenge" - is added to an arc that encrypts an auth key from a
/hardware/interfaces/wifi/supplicant/1.3/
DISupplicantStaNetwork.hal256 * Set auth alg mask for the network.
270 * Get the auth alg mask set for the network.
/hardware/interfaces/keymaster/4.0/
DIKeymasterDevice.hal930 * method must receive a non-empty HardwareAuthToken in the authToken argument. For the auth
938 * o The key must have a Tag::USER_AUTH_TYPE that matches the auth type in the token.
940 * o The timestamp in the auth token plus the value of the Tag::AUTH_TIMEOUT must be less than
1113 * receive a non-empty and valid HardwareAuthToken. For the auth token to be valid, all of the
1121 * o The key must have a Tag::USER_AUTH_TYPE that matches the auth type in the token.
1123 * o The challenge field in the auth token must contain the operationHandle
1128 * The caller must provide the auth token on every call to update() and finish().
1219 * authToken. For the auth token to be valid, all of the following has to be true:
1226 * o The key must have a Tag::USER_AUTH_TYPE that matches the auth type in the token.
1228 * o The challenge field in the auth token must contain the operationHandle
[all …]
Dtypes.hal356 * If Tag::AUTH_TIMEOUT is not present, then the key is an "auth-per-operation" key. In this
451 * except perhaps as implied by an auth token. This means that Keymaster must be able to check
1189 * more details. It is up to the caller to determine which of the generated auth tokens is
1245 * that this auth token is empty.
1286 * checked against auth tokens generated by the same secure environment, which avoids needing to
/hardware/interfaces/security/
DREADME.md35 authentication result (a *hardware auth token*) is signed with a per-boot shared HMAC key known only
/hardware/google/gfxstream/guest/mesa/include/drm-uapi/
Ddrm.h232 int auth; /**< Is client authenticated? */ member
/hardware/interfaces/wifi/supplicant/1.0/
DISupplicantStaNetwork.hal220 * Set auth alg mask for the network.
642 * Get the auth alg mask set for the network.
/hardware/interfaces/automotive/remoteaccess/test_grpc_server/
DREADME.md274 * `auth auth_token` where auth_token must match the contents of the
/hardware/interfaces/radio/1.0/
Dtypes.hal715 MIP_PROFILE_AAA_AUTH = 33, // AAA auth
716 MIP_PROFILE_HA_AUTH = 34, // HA auth
DIRadioResponse.hal2011 * @param response response string of the challenge/response algo for ISIM auth in base64 format
/hardware/broadcom/wlan/bcmdhd/dhdutil/include/
Dwlioctl.h3959 int32 auth; /* Open Vs Closed */ member