Home
last modified time | relevance | path

Searched refs:digest (Results 1 – 25 of 38) sorted by relevance

12

/hardware/libhardware/modules/sensors/dynamic_sensor/test/
DHidRawSensorTest.cpp140 for (const auto &digest : digestVector) { in test() local
141 LOG_I << "Sensor usage " << std::hex << digest.fullUsage << std::dec << LOG_ENDL; in test()
142 auto *s = new HidRawSensor(device, digest.fullUsage, digest.packets); in test()
144 LOG_V << "Usage " << std::hex << digest.fullUsage << std::dec << LOG_ENDL; in test()
147 LOG_V << "Sensor of usage " << std::hex << digest.fullUsage << std::dec in test()
/hardware/libhardware/modules/sensors/dynamic_sensor/
DHidRawSensorDevice.cpp62 for (const auto &digest : mDigestVector) { // for each usage - vec<ReportPacket> pair in HidRawSensorDevice() local
63 uint32_t usage = static_cast<uint32_t>(digest.fullUsage); in HidRawSensorDevice()
64 sp<HidRawSensor> s(new HidRawSensor(this, usage, digest.packets)); in HidRawSensorDevice()
66 for (const auto &packet : digest.packets) { in HidRawSensorDevice()
DHidRawSensor.cpp165 for (const auto &digest : pPacket->reports) { in HidRawSensor() local
166 if (digest.minRaw >= digest.maxRaw) { in HidRawSensor()
167 LOG_E << "Custome usage " << digest.usage << ", min must < max" << LOG_ENDL; in HidRawSensor()
171 if (!digest.isByteAligned() in HidRawSensor()
172 || (digest.bitSize != 8 && digest.bitSize != 16 && digest.bitSize != 32)) { in HidRawSensor()
173 LOG_E << "Custome usage " << std::hex << digest.usage << std::hex in HidRawSensor()
180 .minValue = digest.minRaw, in HidRawSensor()
181 .maxValue = digest.maxRaw, in HidRawSensor()
182 .byteOffset = digest.bitOffset / 8, in HidRawSensor()
183 .byteSize = digest.bitSize / 8, in HidRawSensor()
[all …]
DHidRawDevice.cpp58 for (auto const &digest : mDigestVector) { in HidRawDevice() local
59 for (auto const &packet : digest.packets) { in HidRawDevice()
/hardware/libhardware/modules/sensors/dynamic_sensor/HidUtils/
DHidParser.cpp161 digest(&digestVector, mTree, interestedUsage); in generateDigest()
165 void HidParser::digest(HidParser::DigestVector *digestVector, in digest() function in HidUtil::HidParser
206 ReportDigest digest = { in digest() local
210 digestVector->emplace_back(digest); in digest()
215 digest(digestVector, child, interestedUsage); in digest()
248 ReportItem digest = { in convertGroupToPacket() local
260 packet.reports.push_back(digest); in convertGroupToPacket()
261 packet.bitSize += digest.bitSize * digest.count; in convertGroupToPacket()
DHidParser.h75 static void digest(
/hardware/interfaces/keymaster/3.0/vts/functional/
Dopenssl_utils.h34 inline const EVP_MD* openssl_digest(android::hardware::keymaster::V3_0::Digest digest) { in openssl_digest() argument
35 switch (digest) { in openssl_digest()
Dkeymaster_hidl_hal_test.cpp140 return a.f.digest == b.f.digest; in operator ==()
775 string MacMessage(const string& message, Digest digest, size_t mac_length) { in MacMessage() argument
779 AuthorizationSetBuilder().Digest(digest).Authorization(TAG_MAC_LENGTH, mac_length)); in MacMessage()
782 void CheckHmacTestVector(const string& key, const string& message, Digest digest, in CheckHmacTestVector() argument
790 .Digest(digest), in CheckHmacTestVector()
792 string signature = MacMessage(message, digest, expected_mac.size() * 8); in CheckHmacTestVector()
793 EXPECT_EQ(expected_mac, signature) << "Test vector didn't match for digest " << (int)digest; in CheckHmacTestVector()
1273 for (auto digest : {Digest::MD5, Digest::SHA1, Digest::SHA_2_224, Digest::SHA_2_256, in TEST_F()
1280 .Digest(digest) in TEST_F()
1295 if (digest == Digest::SHA1 || digest == Digest::SHA_2_256) { in TEST_F()
[all …]
Dattestation_record.cpp64 ASN1_INTEGER_SET* digest; member
91 ASN1_EXP_SET_OF_OPT(KM_AUTH_LIST, digest, ASN1_INTEGER, TAG_DIGEST.maskedTag()),
233 copyAuthTag(record->digest, TAG_DIGEST, auth_list); in extract_auth_list()
Dkeymaster_tags.h220 MAKE_TAG_ENUM_VALUE_ACCESSOR(TAG_DIGEST, f.digest)
336 inline const char* stringify(Digest digest) {
337 switch (digest) {
/hardware/interfaces/keymaster/4.0/support/include/keymasterV4_0/
Dopenssl_utils.h40 inline const EVP_MD* openssl_digest(android::hardware::keymaster::V4_0::Digest digest) { in openssl_digest() argument
41 switch (digest) { in openssl_digest()
Dkeymaster_tags.h219 MAKE_TAG_ENUM_VALUE_ACCESSOR(TAG_DIGEST, f.digest)
421 return a.f.digest == b.f.digest;
/hardware/interfaces/keymaster/4.0/vts/functional/
Dkeymaster_hidl_hal_test.cpp722 Digest digest; in TEST_F() local
724 digest = Digest::SHA_2_256; in TEST_F()
726 digest = Digest::SHA_2_512; in TEST_F()
731 GenerateKey(AuthorizationSetBuilder().EcdsaSigningKey(curve).Digest(digest))) in TEST_F()
745 for (auto digest : ValidDigests(false /* withNone */, true /* withMD5 */)) { in TEST_F() local
751 GenerateKey(AuthorizationSetBuilder().HmacKey(key_size).Digest(digest).Authorization( in TEST_F()
1277 for (auto digest : ValidDigests(false /* withNone */, false /* withMD5 */)) { in TEST_F() local
1281 .Digest(digest)); in TEST_F()
1283 << " and digest " << digest; in TEST_F()
1287 if (digest == Digest::NONE) message.resize(key_size / 8); in TEST_F()
[all …]
DKeymasterHidlTest.cpp464 string KeymasterHidlTest::MacMessage(const string& message, Digest digest, size_t mac_length) { in MacMessage() argument
468 AuthorizationSetBuilder().Digest(digest).Authorization(TAG_MAC_LENGTH, mac_length)); in MacMessage()
471 void KeymasterHidlTest::CheckHmacTestVector(const string& key, const string& message, Digest digest, in CheckHmacTestVector() argument
479 .Digest(digest), in CheckHmacTestVector()
481 string signature = MacMessage(message, digest, expected_mac.size() * 8); in CheckHmacTestVector()
484 << message.size() << " and digest " << digest; in CheckHmacTestVector()
DKeymasterHidlTest.h177 string MacMessage(const string& message, Digest digest, size_t mac_length);
179 void CheckHmacTestVector(const string& key, const string& message, Digest digest,
/hardware/qcom/msm8996/original-kernel-headers/linux/
Dqcedev.h214 uint8_t digest[QCEDEV_MAX_SHA_DIGEST]; member
/hardware/qcom/msm8x09/kernel-headers/linux/
Dqcedev.h126 uint8_t digest[QCEDEV_MAX_SHA_DIGEST]; member
/hardware/interfaces/keymaster/4.0/support/
Dkey_param_output.cpp60 return os << param.f.digest; in operator <<()
Dattestation_record.cpp70 ASN1_INTEGER_SET* digest; member
101 ASN1_EXP_SET_OF_OPT(KM_AUTH_LIST, digest, ASN1_INTEGER, TAG_DIGEST.maskedTag()),
247 copyAuthTag(record->digest, TAG_DIGEST, auth_list); in extract_auth_list()
/hardware/qcom/msm8x09/original-kernel-headers/linux/
Dqcedev.h214 uint8_t digest[QCEDEV_MAX_SHA_DIGEST]; member
/hardware/qcom/msm8996/kernel-headers/linux/
Dqcedev.h126 uint8_t digest[QCEDEV_MAX_SHA_DIGEST]; member
/hardware/interfaces/keymaster/4.0/
DIKeymasterDevice.hal76 * 384 and SHA-2 512 digest modes for RSA signing. STRONGBOX IKeymasterDevices must support
85 * 384 and SHA-2 512 digest modes. STRONGBOX IKeymasterDevices must support SHA-2 256.
435 * o Tag::DIGEST specifies digest algorithms that may be used with the new key. TEE
551 * purpose KEY_WRAP, padding mode RSA_OAEP, and digest SHA_2_256, returning the
723 * digest [5] EXPLICIT SET OF INTEGER OPTIONAL,
961 * RSA signing and verification operations need a digest, as do RSA encryption and decryption
963 * digest in inParams. If unspecified or specified more than once, begin() must return
967 * digest and padding, which means that the key authorizations need to contain the specified
970 * and KeyPurpose::VERIFY) are permitted with unauthorized digest or padding modes.
982 * verifying, Digest::NONE is specified for the digest. No digest is necessary for unpadded
[all …]
/hardware/qcom/msm8x84/original-kernel-headers/linux/
Dqseecom.h159 char digest[SHA256_DIGEST_LENGTH]; /* in */ member
/hardware/qcom/msm8x84/kernel-headers/linux/
Dqseecom.h120 char digest[SHA256_DIGEST_LENGTH]; member
/hardware/qcom/msm8994/original-kernel-headers/linux/
Dqseecom.h161 char digest[SHA256_DIGEST_LENGTH]; /* in */ member

12