/hardware/interfaces/security/secretkeeper/aidl/vts/ |
D | secretkeeper_cli.rs | 192 fn store(&mut self, id: &Id, secret: &Secret) -> Result<()> { in store() 195 secret: secret.clone(), in store() 225 Ok(Some(Secret(get_response.secret.0))) in get() 284 let mut secret = Secret([0; 32]); in value_to_secret() localVariable 285 secret.0[0] = data.len() as u8; in value_to_secret() 286 secret.0[1..1 + data.len()].copy_from_slice(data); in value_to_secret() 288 let hex_secret = hex::encode(&secret.0); in value_to_secret() 289 (secret, format!("'{s}' (as {hex_secret})")) in value_to_secret() 291 (secret, format!("'{s}'")) in value_to_secret() 297 fn secret_to_value_display(secret: &Secret, show_hex: bool) -> String { in secret_to_value_display() [all …]
|
D | secretkeeper_test_client.rs | 198 fn store(&mut self, id: &Id, secret: &Secret) -> Result<(), Error> { in store() 203 StoreSecretRequest { id: id.clone(), secret: secret.clone(), sealing_policy }; in store() 234 Ok(Secret(get_response.secret.0)) in get_update_policy() 792 StoreSecretRequest { id: ID_EXAMPLE, secret: SECRET_EXAMPLE, sealing_policy }; in construct_secret_management_requests()
|
/hardware/interfaces/authsecret/1.0/ |
D | IAuthSecret.hal | 27 * When the primary user is unlocked, this method is passed a secret to 32 * The first time this is called, the secret must be used to provision state 33 * that depends on the primary user's secret. The same secret must be passed 36 * Upon factory reset, any dependence on the secret must be removed as that 37 * secret is now lost and must never be derived again. A new secret must be 41 * The secret must be at least 16 bytes. 43 * @param secret blob derived from the primary user's credential. 45 oneway primaryUserCredential(vec<uint8_t> secret);
|
/hardware/interfaces/security/secretkeeper/aidl/android/hardware/security/secretkeeper/ |
D | SecretManagement.cddl | 33 StoreSecretOpcode = 2 ; Store a secret 34 GetSecretOpcode = 3 ; Get the secret 39 ; Store a secret identified by the given ID, with access to the secret policed 43 secret : Secret, 49 ; Retrieve a secret identified by the given ID, policed according to the sealing 50 ; policy that was associated with the secret. If successful, optionally also 51 ; update the sealing policy for the secret. 54 ; Retrieving the value of a secret may optionally also update the sealing 55 ; policy associated with a secret. 59 SecretId = bstr .size 64 ; Unique identifier of the secret. [all …]
|
/hardware/interfaces/gatekeeper/aidl/software/ |
D | service.cpp | 34 auto secret = ndk::SharedRefBase::make<SoftSharedSecret>(); in main() local 36 auto status = AServiceManager_addService(secret->asBinder().get(), secret_instance.c_str()); in main() 39 ::gatekeeper::SoftGateKeeper implementation(*secret); in main()
|
/hardware/interfaces/authsecret/1.0/default/ |
D | AuthSecret.cpp | 10 Return<void> AuthSecret::primaryUserCredential(const hidl_vec<uint8_t>& secret) { in primaryUserCredential() argument 11 (void)secret; in primaryUserCredential()
|
D | AuthSecret.h | 24 Return<void> primaryUserCredential(const hidl_vec<uint8_t>& secret) override;
|
/hardware/nxp/keymint/KM200/ |
D | JavacardSharedSecret.cpp | 66 std::vector<uint8_t>* secret) { in computeSharedSecret() argument 76 if (!cbor_.getBinaryArray(item, 1, *secret)) { in computeSharedSecret()
|
D | JavacardSharedSecret.h | 26 std::vector<uint8_t>* secret) override;
|
/hardware/interfaces/authsecret/aidl/aidl_api/android.hardware.authsecret/1/android/hardware/authsecret/ |
D | IAuthSecret.aidl | 37 oneway void setPrimaryUserCredential(in byte[] secret); in setPrimaryUserCredential() argument
|
/hardware/interfaces/authsecret/aidl/android/hardware/authsecret/ |
D | IAuthSecret.aidl | 46 oneway void setPrimaryUserCredential(in byte[] secret); in setPrimaryUserCredential() argument
|
/hardware/interfaces/authsecret/aidl/aidl_api/android.hardware.authsecret/current/android/hardware/authsecret/ |
D | IAuthSecret.aidl | 22 oneway void setPrimaryUserCredential(in byte[] secret); in setPrimaryUserCredential() argument
|
/hardware/nxp/keymint/KM300/ |
D | JavacardSharedSecret.cpp | 73 std::vector<uint8_t>* secret) { in computeSharedSecret() argument 91 *secret = std::move(optSecret.value()); in computeSharedSecret()
|
D | JavacardSharedSecret.h | 49 std::vector<uint8_t>* secret) override;
|
/hardware/interfaces/security/keymint/aidl/default/ta/ |
D | rpc.rs | 138 let secret = self.derive_bytes_from_hbk(&BoringHmac, b"Device Key Seed", 32)?; in generate_dice_artifacts() localVariable 139 ec::import_raw_ed25519_key(&secret) in generate_dice_artifacts()
|
/hardware/interfaces/tests/extension/light/2.0/ |
D | types.hal | 56 * This is the secret sauce that will really make this extension shine.
|
/hardware/interfaces/confirmationui/1.0/ |
D | IConfirmationResultCallback.hal | 56 * formattedMessage argument. The HMAC is keyed with a 256-bit secret
|
/hardware/interfaces/weaver/1.0/ |
D | IWeaver.hal | 19 * Weaver provides secure storage of secret values that may only be read if the
|
/hardware/interfaces/keymaster/3.0/ |
D | types.hal | 93 * private/secret key operations, in seconds. Public 106 EXPORTABLE = TagType:BOOL | 602, /* If true, private/secret key can be exported, but only
|
/hardware/interfaces/security/ |
D | README.md | 48 based on a pre-provisioned shared secret. This HAL can be implemented by any security component
|
/hardware/interfaces/keymaster/4.0/ |
D | IKeymasterDevice.hal | 141 * unknown tags, must be cryptographically bound to the private/secret key material such that any 143 * impossible for the secure environment to obtain the private/secret key material. The recommended 146 * private/secret key material. 171 * derive a key that is used to encrypt the private/secret key material. 264 * ``K'' is a pre-established shared secret, set up during factory reset. The mechanism for 265 * establishing this shared secret is implementation-defined, but see below for a 302 * 7. T uses {K1_priv, K2_pub} with ECDH to compute session secret Q. 306 * 10. S uses {K2_priv, K1_pub} with ECDH to compute session secret Q.
|
D | types.hal | 88 * modulus. For AES keys it specifies the length of the secret key material. For 3DES keys it 622 * HBK is a unique hardware-bound secret known to the secure environment and never revealed 623 * by it. The secret must contain at least 128 bits of entropy and be unique to the
|
/hardware/interfaces/security/rkp/ |
D | README.md | 24 unique device secret (UDS) as a root of trust for authenticated requests from
|
/hardware/interfaces/radio/1.0/ |
D | types.hal | 722 MIP_PROFILE_MN_HA_SS = 40, // HA shared secret 723 MIP_PROFILE_MN_AAA_SS = 41, // AAA shared secret
|