HomeSort by relevance Sort by last modified time
    Searched refs:KM_BYTES (Results 1 - 6 of 6) sorted by null

  /system/keymaster/include/keymaster/
keymaster_tags.h 89 template <> struct TagValueType<KM_BYTES> { typedef keymaster_blob_t value_type; };
174 DEFINE_KEYMASTER_TAG(KM_BYTES, TAG_APPLICATION_ID);
175 DEFINE_KEYMASTER_TAG(KM_BYTES, TAG_APPLICATION_DATA);
178 DEFINE_KEYMASTER_TAG(KM_BYTES, TAG_ROOT_OF_TRUST);
179 DEFINE_KEYMASTER_TAG(KM_BYTES, TAG_ADDITIONAL_DATA);
230 inline keymaster_key_param_t Authorization(TypedTag<KM_BYTES, Tag> tag, const void* bytes,
236 inline keymaster_key_param_t Authorization(TypedTag<KM_BYTES, Tag> tag,
keymaster_defs.h 43 KM_BYTES = 9 << 28,
114 KM_TAG_APPLICATION_ID = KM_BYTES | 601, /* ID of authorized application. Disallowed if
121 KM_TAG_APPLICATION_DATA = KM_BYTES | 700, /* Data provided by authorized application. */
125 KM_TAG_ROOT_OF_TRUST = KM_BYTES | 704, /* Root of trust ID. Empty array means usable by all
129 KM_TAG_ADDITIONAL_DATA = KM_BYTES | 1000, /* Used to provide additional data for AEAD modes. */
277 keymaster_blob_t blob; /* KM_BIGNUM and KM_BYTES*/
432 // assert(keymaster_tag_get_type(tag) == KM_BYTES || keymaster_tag_get_type(tag) == KM_BIGNUM);
463 case KM_BYTES:
authorization_set.h 174 bool GetTagValue(TypedTag<KM_BYTES, Tag> tag, keymaster_blob_t* val) const {
222 bool push_back(TypedTag<KM_BYTES, Tag> tag, const void* bytes, size_t bytes_len) {
  /system/keymaster/
google_keymaster_test_utils.cpp 49 case KM_BYTES:
79 case KM_BYTES:
authorization_set.cpp 29 return (keymaster_tag_get_type(tag) == KM_BYTES || keymaster_tag_get_type(tag) == KM_BIGNUM);
163 case KM_BYTES: {
238 case KM_BYTES:
269 case KM_BYTES:
306 case KM_BYTES: {
google_keymaster_test_utils.h 82 bool contains(const AuthorizationSet& set, TypedTag<KM_BYTES, Tag> tag, const std::string& val) {

Completed in 33 milliseconds