HomeSort by relevance Sort by last modified time
    Searched refs:KM_INT (Results 1 - 6 of 6) sorted by null

  /system/keymaster/include/keymaster/
keymaster_tags.h 85 template <> struct TagValueType<KM_INT> { typedef uint32_t value_type; };
155 DEFINE_KEYMASTER_TAG(KM_INT, TAG_KEY_SIZE);
156 DEFINE_KEYMASTER_TAG(KM_INT, TAG_MAC_LENGTH);
157 DEFINE_KEYMASTER_TAG(KM_INT, TAG_CHUNK_LENGTH);
165 DEFINE_KEYMASTER_TAG(KM_INT, TAG_MIN_SECONDS_BETWEEN_OPS);
168 DEFINE_KEYMASTER_TAG(KM_INT, TAG_USER_ID);
171 DEFINE_KEYMASTER_TAG(KM_INT, TAG_AUTH_TIMEOUT);
172 DEFINE_KEYMASTER_TAG(KM_INT, TAG_RESCOPE_AUTH_TIMEOUT);
210 inline keymaster_key_param_t Authorization(TypedTag<KM_INT, Tag> tag, uint32_t value) {
keymaster_defs.h 37 KM_INT = 3 << 28,
56 KM_TAG_KEY_SIZE = KM_INT | 3, /* Key size in bits. */
59 KM_TAG_MAC_LENGTH = KM_INT | 6, /* MAC length in bits. */
61 KM_TAG_CHUNK_LENGTH = KM_INT | 8, /* AEAD mode minimum decryption chunk size, in bytes. */
87 KM_TAG_MIN_SECONDS_BETWEEN_OPS = KM_INT | 403, /* Minimum elapsed time between
94 KM_TAG_USER_ID = KM_INT | 501, /* ID of authorized user. Disallowed if KM_TAG_ALL_USERS is
101 KM_TAG_AUTH_TIMEOUT = KM_INT | 504, /* Required freshness of user authentication for
107 KM_TAG_RESCOPE_AUTH_TIMEOUT = KM_INT | 505, /* Required freshness of user authentication for key
274 uint32_t integer; /* KM_INT and KM_INT_REP */
413 // assert(keymaster_tag_get_type(tag) == KM_INT || keymaster_tag_get_type(tag) == KM_INT_REP)
    [all...]
authorization_set.h 117 inline bool GetTagValue(TypedTag<KM_INT, T> tag, uint32_t* val) const {
  /system/keymaster/
google_keymaster_test_utils.cpp 28 case KM_INT:
67 case KM_INT:
authorization_set.cpp 153 case KM_INT:
228 case KM_INT:
253 case KM_INT:
289 case KM_INT:
google_keymaster_test_utils.h 61 bool contains(const AuthorizationSet& set, TypedTag<KM_INT, Tag> tag, uint32_t val) {

Completed in 33 milliseconds