/hardware/interfaces/broadcastradio/common/tests/ |
D | ProgramIdentifier_test.cpp | 27 auto verify = [](std::string name, uint64_t nameId) { in TEST() local 32 verify("", 0); in TEST() 33 verify("Abc", 0x434241); in TEST() 34 verify("Some Station 1", 0x54415453454d4f53); in TEST() 35 verify("Station1", 0x314e4f4954415453); in TEST() 36 verify("!@#$%^&*()_+", 0); in TEST() 37 verify("-=[]{};':\"0", 0x30); in TEST()
|
/hardware/interfaces/gatekeeper/1.0/ |
D | IGatekeeper.hal | 27 * currentPassword. Valid currentPassword must verify() against 37 * it MUST verify against current_password_handle if the latter is not-empty 46 * verify. On error, this buffer must be empty. 74 * user wishes to verify against. Must be non-empty. 89 verify(uint32_t uid, uint64_t challenge,
|
/hardware/interfaces/gatekeeper/1.0/default/ |
D | Gatekeeper.cpp | 85 Return<void> Gatekeeper::verify(uint32_t uid, in verify() function in android::hardware::gatekeeper::V1_0::implementation::Gatekeeper 96 int ret = device->verify(device, uid, challenge, in verify()
|
D | Gatekeeper.h | 52 Return<void> verify(uint32_t uid,
|
/hardware/google/av/hooks/ |
D | pre-commit | 4 if git rev-parse --verify HEAD >/dev/null 2>&1
|
/hardware/libhardware/include/hardware/ |
D | gatekeeper.h | 141 int (*verify)(const struct gatekeeper_device *dev, uint32_t uid, uint64_t challenge, member
|
/hardware/invensense/6515/libsensors_iio/software/simple_apps/devnode_parser/ |
D | iio_utils.h | 435 inline int _write_sysfs_int(char *filename, char *basedir, int val, int verify) in _write_sysfs_int() argument 457 if (verify) { in _write_sysfs_int() 490 int _write_sysfs_string(char *filename, char *basedir, char *val, int verify) in _write_sysfs_string() argument 510 if (verify) { in _write_sysfs_string()
|
/hardware/invensense/6515/libsensors_iio/software/simple_apps/mpu_iio/ |
D | iio_utils.h | 435 inline int _write_sysfs_int(char *filename, char *basedir, int val, int verify) in _write_sysfs_int() argument 457 if (verify) { in _write_sysfs_int() 490 int _write_sysfs_string(char *filename, char *basedir, char *val, int verify) in _write_sysfs_string() argument 510 if (verify) { in _write_sysfs_string()
|
/hardware/invensense/6515/libsensors_iio/software/simple_apps/stress_iio/ |
D | iio_utils.h | 434 inline int _write_sysfs_int(char *filename, char *basedir, int val, int verify) in _write_sysfs_int() argument 455 if (verify) { in _write_sysfs_int() 517 int _write_sysfs_string(char *filename, char *basedir, char *val, int verify) in _write_sysfs_string() argument 535 if (verify) { in _write_sysfs_string()
|
/hardware/interfaces/drm/1.0/default/ |
D | DrmPlugin.cpp | 299 Return<void> DrmPlugin::verify(const hidl_vec<uint8_t>& sessionId, in verify() function in android::hardware::drm::V1_0::implementation::DrmPlugin 304 status_t status = mLegacyPlugin->verify(toVector(sessionId), in verify()
|
D | DrmPlugin.h | 121 Return<void> verify(const hidl_vec<uint8_t>& sessionId,
|
/hardware/interfaces/media/bufferpool/1.0/ |
D | README.md | 31 registered the receiver via an FMQ message, The buffer pool must verify the
|
D | IAccessor.hal | 47 * pool must verify the receiver with the transaction ID. In order to
|
/hardware/interfaces/media/bufferpool/2.0/ |
D | README.md | 31 registered the receiver via an FMQ message, The buffer pool must verify the
|
D | IAccessor.hal | 48 * pool must verify the receiver with the transaction ID. In order to
|
/hardware/interfaces/neuralnetworks/1.0/ |
D | IPreparedModel.hal | 30 * execute must verify the inputs to the function are correct. If there is
|
D | IDevice.hal | 70 * prepareModel function must verify the inputs to the prepareModel function
|
/hardware/interfaces/neuralnetworks/1.2/ |
D | IPreparedModel.hal | 35 * execute_1_2 must verify the inputs to the function are correct. If there is 86 * executeSynchronously must verify the inputs to the function are
|
/hardware/qcom/msm8998/json-c/ |
D | RELEASE_CHECKLIST.txt | 77 Logout of Amazon S3, and verify that the files are visible.
|
/hardware/interfaces/biometrics/face/1.0/ |
D | IBiometricsFace.hal | 76 * can be used to verify/perform a secure transaction. 145 * is invoked (see @param HAT). The driver must verify the HAT before
|
/hardware/broadcom/wlan/bcmdhd/dhdutil/ |
D | dhdu.c | 1551 dhd_load_file_bytes(void *dhd, cmd_t *cmd, FILE *fp, int fsize, int start, uint blk_sz, bool verify) in dhd_load_file_bytes() argument 1604 if (verify == TRUE) { in dhd_load_file_bytes() 1705 bool verify = FALSE; in dhd_download() 1770 verify = TRUE; in dhd_download() 1878 if ((ret = dhd_load_file_bytes(dhd, cmd, fp, fsize, start, memblock_sz, verify))) { in dhd_download()
|
/hardware/interfaces/neuralnetworks/1.1/ |
D | IDevice.hal | 75 * prepareModel function must verify the inputs to the prepareModel function
|
/hardware/interfaces/drm/1.0/ |
D | IDrmPlugin.hal | 364 * encrypt, decrypt, sign verify operations on operator-provided 461 * @param signature the signature to verify 465 * if the HAL is in a state where the verify operation cannot be 470 verify(SessionId sessionId, vec<uint8_t> keyId, vec<uint8_t> message,
|
/hardware/interfaces/gatekeeper/1.0/vts/functional/ |
D | VtsHalGatekeeperV1_0TargetTest.cpp | 114 auto ret = gatekeeper_->verify( in doVerify()
|
/hardware/interfaces/keymaster/4.0/ |
D | IKeymasterDevice.hal | 174 * Verified Boot to verify the signature on the boot image and from the the lock state of the 217 * must be a TEE Keymaster as well. The HMAC key used to MAC and verify authentication tokens 239 * there must be a TEE IKeymasterDevice as well. The HMAC key used to MAC and verify 321 * @return sharingCheck A 32-byte value used to verify that all IKeymasterDevice instances have 337 * to ask the TEE IKeymasterDevice to verify authorizations for a key hosted in StrongBox. 343 * verify any, the parametersVerified field of the VerificationToken must be empty. Keystore 351 * @param parametersToVerify Set of authorizations to verify. The caller may provide an empty 357 * a StrongBox. If the IKeymasterDevice cannot verify one or more elements of
|