Home
last modified time | relevance | path

Searched refs:secret (Results 1 – 24 of 24) sorted by relevance

/hardware/interfaces/security/secretkeeper/aidl/vts/
Dsecretkeeper_cli.rs192 fn store(&mut self, id: &Id, secret: &Secret) -> Result<()> { in store()
195 secret: secret.clone(), in store()
225 Ok(Some(Secret(get_response.secret.0))) in get()
284 let mut secret = Secret([0; 32]); in value_to_secret() localVariable
285 secret.0[0] = data.len() as u8; in value_to_secret()
286 secret.0[1..1 + data.len()].copy_from_slice(data); in value_to_secret()
288 let hex_secret = hex::encode(&secret.0); in value_to_secret()
289 (secret, format!("'{s}' (as {hex_secret})")) in value_to_secret()
291 (secret, format!("'{s}'")) in value_to_secret()
297 fn secret_to_value_display(secret: &Secret, show_hex: bool) -> String { in secret_to_value_display()
[all …]
Dsecretkeeper_test_client.rs198 fn store(&mut self, id: &Id, secret: &Secret) -> Result<(), Error> { in store()
203 StoreSecretRequest { id: id.clone(), secret: secret.clone(), sealing_policy }; in store()
234 Ok(Secret(get_response.secret.0)) in get_update_policy()
792 StoreSecretRequest { id: ID_EXAMPLE, secret: SECRET_EXAMPLE, sealing_policy }; in construct_secret_management_requests()
/hardware/interfaces/authsecret/1.0/
DIAuthSecret.hal27 * When the primary user is unlocked, this method is passed a secret to
32 * The first time this is called, the secret must be used to provision state
33 * that depends on the primary user's secret. The same secret must be passed
36 * Upon factory reset, any dependence on the secret must be removed as that
37 * secret is now lost and must never be derived again. A new secret must be
41 * The secret must be at least 16 bytes.
43 * @param secret blob derived from the primary user's credential.
45 oneway primaryUserCredential(vec<uint8_t> secret);
/hardware/interfaces/security/secretkeeper/aidl/android/hardware/security/secretkeeper/
DSecretManagement.cddl33 StoreSecretOpcode = 2 ; Store a secret
34 GetSecretOpcode = 3 ; Get the secret
39 ; Store a secret identified by the given ID, with access to the secret policed
43 secret : Secret,
49 ; Retrieve a secret identified by the given ID, policed according to the sealing
50 ; policy that was associated with the secret. If successful, optionally also
51 ; update the sealing policy for the secret.
54 ; Retrieving the value of a secret may optionally also update the sealing
55 ; policy associated with a secret.
59 SecretId = bstr .size 64 ; Unique identifier of the secret.
[all …]
/hardware/interfaces/gatekeeper/aidl/software/
Dservice.cpp34 auto secret = ndk::SharedRefBase::make<SoftSharedSecret>(); in main() local
36 auto status = AServiceManager_addService(secret->asBinder().get(), secret_instance.c_str()); in main()
39 ::gatekeeper::SoftGateKeeper implementation(*secret); in main()
/hardware/interfaces/authsecret/1.0/default/
DAuthSecret.cpp10 Return<void> AuthSecret::primaryUserCredential(const hidl_vec<uint8_t>& secret) { in primaryUserCredential() argument
11 (void)secret; in primaryUserCredential()
DAuthSecret.h24 Return<void> primaryUserCredential(const hidl_vec<uint8_t>& secret) override;
/hardware/nxp/keymint/KM200/
DJavacardSharedSecret.cpp66 std::vector<uint8_t>* secret) { in computeSharedSecret() argument
76 if (!cbor_.getBinaryArray(item, 1, *secret)) { in computeSharedSecret()
DJavacardSharedSecret.h26 std::vector<uint8_t>* secret) override;
/hardware/interfaces/authsecret/aidl/aidl_api/android.hardware.authsecret/1/android/hardware/authsecret/
DIAuthSecret.aidl37 oneway void setPrimaryUserCredential(in byte[] secret); in setPrimaryUserCredential() argument
/hardware/interfaces/authsecret/aidl/android/hardware/authsecret/
DIAuthSecret.aidl46 oneway void setPrimaryUserCredential(in byte[] secret); in setPrimaryUserCredential() argument
/hardware/interfaces/authsecret/aidl/aidl_api/android.hardware.authsecret/current/android/hardware/authsecret/
DIAuthSecret.aidl22 oneway void setPrimaryUserCredential(in byte[] secret); in setPrimaryUserCredential() argument
/hardware/nxp/keymint/KM300/
DJavacardSharedSecret.cpp73 std::vector<uint8_t>* secret) { in computeSharedSecret() argument
91 *secret = std::move(optSecret.value()); in computeSharedSecret()
DJavacardSharedSecret.h49 std::vector<uint8_t>* secret) override;
/hardware/interfaces/security/keymint/aidl/default/ta/
Drpc.rs138 let secret = self.derive_bytes_from_hbk(&BoringHmac, b"Device Key Seed", 32)?; in generate_dice_artifacts() localVariable
139 ec::import_raw_ed25519_key(&secret) in generate_dice_artifacts()
/hardware/interfaces/tests/extension/light/2.0/
Dtypes.hal56 * This is the secret sauce that will really make this extension shine.
/hardware/interfaces/confirmationui/1.0/
DIConfirmationResultCallback.hal56 * formattedMessage argument. The HMAC is keyed with a 256-bit secret
/hardware/interfaces/weaver/1.0/
DIWeaver.hal19 * Weaver provides secure storage of secret values that may only be read if the
/hardware/interfaces/keymaster/3.0/
Dtypes.hal93 * private/secret key operations, in seconds. Public
106 EXPORTABLE = TagType:BOOL | 602, /* If true, private/secret key can be exported, but only
/hardware/interfaces/security/
DREADME.md48 based on a pre-provisioned shared secret. This HAL can be implemented by any security component
/hardware/interfaces/keymaster/4.0/
DIKeymasterDevice.hal141 * unknown tags, must be cryptographically bound to the private/secret key material such that any
143 * impossible for the secure environment to obtain the private/secret key material. The recommended
146 * private/secret key material.
171 * derive a key that is used to encrypt the private/secret key material.
264 * ``K'' is a pre-established shared secret, set up during factory reset. The mechanism for
265 * establishing this shared secret is implementation-defined, but see below for a
302 * 7. T uses {K1_priv, K2_pub} with ECDH to compute session secret Q.
306 * 10. S uses {K2_priv, K1_pub} with ECDH to compute session secret Q.
Dtypes.hal88 * modulus. For AES keys it specifies the length of the secret key material. For 3DES keys it
622 * HBK is a unique hardware-bound secret known to the secure environment and never revealed
623 * by it. The secret must contain at least 128 bits of entropy and be unique to the
/hardware/interfaces/security/rkp/
DREADME.md24 unique device secret (UDS) as a root of trust for authenticated requests from
/hardware/interfaces/radio/1.0/
Dtypes.hal722 MIP_PROFILE_MN_HA_SS = 40, // HA shared secret
723 MIP_PROFILE_MN_AAA_SS = 41, // AAA shared secret