Home
last modified time | relevance | path

Searched refs:authorizations (Results 1 – 4 of 4) sorted by relevance

/hardware/interfaces/keymaster/4.0/
DIKeymasterDevice.hal124 * caller-provided authorizations into two lists, those it enforces in hardware and those it does
126 * the KeyCharacteristics struct. The IKeymasterDevice must also add the following authorizations
334 * Verify authorizations for another IKeymasterDevice instance.
337 * to ask the TEE IKeymasterDevice to verify authorizations for a key hosted in StrongBox.
342 * authorizations it can and return those it validated in the VerificationToken. If it cannot
351 * @param parametersToVerify Set of authorizations to verify. The caller may provide an empty
388 * of a key in any way inconsistent with the authorizations specified at generation time. With
903 * the key authorizations. If the specified purpose does not match, begin() must return
967 * digest and padding, which means that the key authorizations need to contain the specified
1025 * Tag::MIN_MAC_LENGTH in the key authorizations. For MAC lengths greater than 128 or
[all …]
Dtypes.hal1275 * VerificationToken enables one Keymaster instance to validate authorizations for another. See
/hardware/interfaces/keymaster/3.0/
DIKeymasterDevice.hal40 * authorizations.
/hardware/interfaces/keymaster/4.0/vts/functional/
Dkeymaster_hidl_hal_test.cpp1548 auto authorizations = AuthorizationSetBuilder() in TEST_P() local
1556 ASSERT_EQ(ErrorCode::OK, GenerateKey(authorizations)); in TEST_P()