Right now, the "generate-and-store" flow does not allow for context for an arbitrary secret to be set by the calling application during generation.
If we allow for this, then the user has secure storage that covers both the generated secret and the intended context for which that secret was generated.
Right now, the "generate-and-store" flow does not allow for context for an arbitrary secret to be set by the calling application during generation.
If we allow for this, then the user has secure storage that covers both the generated secret and the intended context for which that secret was generated.