Lines Matching refs:val

251     uint32_t val;
252 memcpy(&val, buf, sizeof(val));
253 return val;
257 uint32_t val;
258 memcpy(&val, buf, sizeof(val));
259 val += delta;
260 memcpy(buf, &val, sizeof(val));
429 uint32_t val;
430 EXPECT_TRUE(set.GetTagValue(TAG_USER_ID, &val));
431 EXPECT_EQ(7U, val);
434 EXPECT_FALSE(set.GetTagValue(TAG_KEY_SIZE, &val));
449 uint64_t val;
450 EXPECT_TRUE(set1.GetTagValue(TAG_RSA_PUBLIC_EXPONENT, &val));
451 EXPECT_EQ(3U, val);
454 EXPECT_FALSE(set2.GetTagValue(TAG_RSA_PUBLIC_EXPONENT, &val));
471 uint64_t val;
472 EXPECT_TRUE(set1.GetTagValue(TAG_USER_SECURE_ID, 0, &val));
473 EXPECT_EQ(8338U, val);
474 EXPECT_TRUE(set1.GetTagValue(TAG_USER_SECURE_ID, 1, &val));
475 EXPECT_EQ(4334U, val);
478 EXPECT_FALSE(set2.GetTagValue(TAG_USER_SECURE_ID, &val));
491 keymaster_algorithm_t val;
492 EXPECT_TRUE(set.GetTagValue(TAG_ALGORITHM, &val));
493 EXPECT_EQ(KM_ALGORITHM_RSA, val);
510 keymaster_purpose_t val;
511 EXPECT_TRUE(set.GetTagValue(TAG_PURPOSE, 0, &val));
512 EXPECT_EQ(KM_PURPOSE_SIGN, val);
513 EXPECT_TRUE(set.GetTagValue(TAG_PURPOSE, 1, &val));
514 EXPECT_EQ(KM_PURPOSE_VERIFY, val);
517 EXPECT_FALSE(set.GetTagValue(TAG_PURPOSE, 2, &val));
531 uint64_t val;
532 EXPECT_TRUE(set.GetTagValue(TAG_ACTIVE_DATETIME, &val));
533 EXPECT_EQ(10U, val);
536 EXPECT_FALSE(set.GetTagValue(TAG_USAGE_EXPIRE_DATETIME, &val));
549 keymaster_blob_t val;
550 EXPECT_TRUE(set.GetTagValue(TAG_APPLICATION_ID, &val));
551 EXPECT_EQ(6U, val.data_length);
552 EXPECT_EQ(0, memcmp(val.data, "my_app", 6));
555 EXPECT_FALSE(set.GetTagValue(TAG_APPLICATION_DATA, &val));