Lines Matching refs:authorizations
124 * caller-provided authorizations into two lists, those it enforces in hardware and those it does
126 * the KeyCharacteristics struct. The IKeymasterDevice must also add the following authorizations
334 * Verify authorizations for another IKeymasterDevice instance.
337 * to ask the TEE IKeymasterDevice to verify authorizations for a key hosted in StrongBox.
342 * authorizations it can and return those it validated in the VerificationToken. If it cannot
351 * @param parametersToVerify Set of authorizations to verify. The caller may provide an empty
388 * of a key in any way inconsistent with the authorizations specified at generation time. With
903 * the key authorizations. If the specified purpose does not match, begin() must return
967 * digest and padding, which means that the key authorizations need to contain the specified
1025 * Tag::MIN_MAC_LENGTH in the key authorizations. For MAC lengths greater than 128 or
1038 * authorizations contain Tag::CALLER_NONCE, then the caller may provide an IV/nonce with
1047 * Tag::MIN_MAC_LENGTH in the key authorizations. For MAC lengths greater than the digest