/hardware/libhardware/modules/sensors/dynamic_sensor/test/ |
D | HidRawSensorTest.cpp | 140 for (const auto &digest : digestVector) { in test() local 141 LOG_I << "Sensor usage " << std::hex << digest.fullUsage << std::dec << LOG_ENDL; in test() 142 auto *s = new HidRawSensor(device, digest.fullUsage, digest.packets); in test() 144 LOG_V << "Usage " << std::hex << digest.fullUsage << std::dec << LOG_ENDL; in test() 147 LOG_V << "Sensor of usage " << std::hex << digest.fullUsage << std::dec in test()
|
/hardware/libhardware/modules/sensors/dynamic_sensor/ |
D | HidRawSensorDevice.cpp | 62 for (const auto &digest : mDigestVector) { // for each usage - vec<ReportPacket> pair in HidRawSensorDevice() local 63 uint32_t usage = static_cast<uint32_t>(digest.fullUsage); in HidRawSensorDevice() 64 sp<HidRawSensor> s(new HidRawSensor(this, usage, digest.packets)); in HidRawSensorDevice() 66 for (const auto &packet : digest.packets) { in HidRawSensorDevice()
|
D | HidRawSensor.cpp | 165 for (const auto &digest : pPacket->reports) { in HidRawSensor() local 166 if (digest.minRaw >= digest.maxRaw) { in HidRawSensor() 167 LOG_E << "Custome usage " << digest.usage << ", min must < max" << LOG_ENDL; in HidRawSensor() 171 if (!digest.isByteAligned() in HidRawSensor() 172 || (digest.bitSize != 8 && digest.bitSize != 16 && digest.bitSize != 32)) { in HidRawSensor() 173 LOG_E << "Custome usage " << std::hex << digest.usage << std::hex in HidRawSensor() 180 .minValue = digest.minRaw, in HidRawSensor() 181 .maxValue = digest.maxRaw, in HidRawSensor() 182 .byteOffset = digest.bitOffset / 8, in HidRawSensor() 183 .byteSize = digest.bitSize / 8, in HidRawSensor() [all …]
|
D | HidRawDevice.cpp | 58 for (auto const &digest : mDigestVector) { in HidRawDevice() local 59 for (auto const &packet : digest.packets) { in HidRawDevice()
|
/hardware/libhardware/modules/sensors/dynamic_sensor/HidUtils/ |
D | HidParser.cpp | 161 digest(&digestVector, mTree, interestedUsage); in generateDigest() 165 void HidParser::digest(HidParser::DigestVector *digestVector, in digest() function in HidUtil::HidParser 206 ReportDigest digest = { in digest() local 210 digestVector->emplace_back(digest); in digest() 215 digest(digestVector, child, interestedUsage); in digest() 248 ReportItem digest = { in convertGroupToPacket() local 260 packet.reports.push_back(digest); in convertGroupToPacket() 261 packet.bitSize += digest.bitSize * digest.count; in convertGroupToPacket()
|
D | HidParser.h | 75 static void digest(
|
/hardware/interfaces/keymaster/3.0/vts/functional/ |
D | openssl_utils.h | 34 inline const EVP_MD* openssl_digest(android::hardware::keymaster::V3_0::Digest digest) { in openssl_digest() argument 35 switch (digest) { in openssl_digest()
|
D | keymaster_hidl_hal_test.cpp | 140 return a.f.digest == b.f.digest; in operator ==() 775 string MacMessage(const string& message, Digest digest, size_t mac_length) { in MacMessage() argument 779 AuthorizationSetBuilder().Digest(digest).Authorization(TAG_MAC_LENGTH, mac_length)); in MacMessage() 782 void CheckHmacTestVector(const string& key, const string& message, Digest digest, in CheckHmacTestVector() argument 790 .Digest(digest), in CheckHmacTestVector() 792 string signature = MacMessage(message, digest, expected_mac.size() * 8); in CheckHmacTestVector() 793 EXPECT_EQ(expected_mac, signature) << "Test vector didn't match for digest " << (int)digest; in CheckHmacTestVector() 1273 for (auto digest : {Digest::MD5, Digest::SHA1, Digest::SHA_2_224, Digest::SHA_2_256, in TEST_F() 1280 .Digest(digest) in TEST_F() 1295 if (digest == Digest::SHA1 || digest == Digest::SHA_2_256) { in TEST_F() [all …]
|
D | attestation_record.cpp | 64 ASN1_INTEGER_SET* digest; member 91 ASN1_EXP_SET_OF_OPT(KM_AUTH_LIST, digest, ASN1_INTEGER, TAG_DIGEST.maskedTag()), 233 copyAuthTag(record->digest, TAG_DIGEST, auth_list); in extract_auth_list()
|
D | keymaster_tags.h | 220 MAKE_TAG_ENUM_VALUE_ACCESSOR(TAG_DIGEST, f.digest) 336 inline const char* stringify(Digest digest) { 337 switch (digest) {
|
/hardware/interfaces/keymaster/4.0/support/include/keymasterV4_0/ |
D | openssl_utils.h | 40 inline const EVP_MD* openssl_digest(android::hardware::keymaster::V4_0::Digest digest) { in openssl_digest() argument 41 switch (digest) { in openssl_digest()
|
D | keymaster_tags.h | 219 MAKE_TAG_ENUM_VALUE_ACCESSOR(TAG_DIGEST, f.digest) 421 return a.f.digest == b.f.digest;
|
/hardware/interfaces/keymaster/4.0/vts/functional/ |
D | keymaster_hidl_hal_test.cpp | 722 Digest digest; in TEST_F() local 724 digest = Digest::SHA_2_256; in TEST_F() 726 digest = Digest::SHA_2_512; in TEST_F() 731 GenerateKey(AuthorizationSetBuilder().EcdsaSigningKey(curve).Digest(digest))) in TEST_F() 745 for (auto digest : ValidDigests(false /* withNone */, true /* withMD5 */)) { in TEST_F() local 751 GenerateKey(AuthorizationSetBuilder().HmacKey(key_size).Digest(digest).Authorization( in TEST_F() 1277 for (auto digest : ValidDigests(false /* withNone */, false /* withMD5 */)) { in TEST_F() local 1281 .Digest(digest)); in TEST_F() 1283 << " and digest " << digest; in TEST_F() 1287 if (digest == Digest::NONE) message.resize(key_size / 8); in TEST_F() [all …]
|
D | KeymasterHidlTest.cpp | 464 string KeymasterHidlTest::MacMessage(const string& message, Digest digest, size_t mac_length) { in MacMessage() argument 468 AuthorizationSetBuilder().Digest(digest).Authorization(TAG_MAC_LENGTH, mac_length)); in MacMessage() 471 void KeymasterHidlTest::CheckHmacTestVector(const string& key, const string& message, Digest digest, in CheckHmacTestVector() argument 479 .Digest(digest), in CheckHmacTestVector() 481 string signature = MacMessage(message, digest, expected_mac.size() * 8); in CheckHmacTestVector() 484 << message.size() << " and digest " << digest; in CheckHmacTestVector()
|
D | KeymasterHidlTest.h | 177 string MacMessage(const string& message, Digest digest, size_t mac_length); 179 void CheckHmacTestVector(const string& key, const string& message, Digest digest,
|
/hardware/qcom/msm8996/original-kernel-headers/linux/ |
D | qcedev.h | 214 uint8_t digest[QCEDEV_MAX_SHA_DIGEST]; member
|
/hardware/qcom/msm8x09/kernel-headers/linux/ |
D | qcedev.h | 126 uint8_t digest[QCEDEV_MAX_SHA_DIGEST]; member
|
/hardware/interfaces/keymaster/4.0/support/ |
D | key_param_output.cpp | 60 return os << param.f.digest; in operator <<()
|
D | attestation_record.cpp | 70 ASN1_INTEGER_SET* digest; member 101 ASN1_EXP_SET_OF_OPT(KM_AUTH_LIST, digest, ASN1_INTEGER, TAG_DIGEST.maskedTag()), 247 copyAuthTag(record->digest, TAG_DIGEST, auth_list); in extract_auth_list()
|
/hardware/qcom/msm8x09/original-kernel-headers/linux/ |
D | qcedev.h | 214 uint8_t digest[QCEDEV_MAX_SHA_DIGEST]; member
|
/hardware/qcom/msm8996/kernel-headers/linux/ |
D | qcedev.h | 126 uint8_t digest[QCEDEV_MAX_SHA_DIGEST]; member
|
/hardware/interfaces/keymaster/4.0/ |
D | IKeymasterDevice.hal | 76 * 384 and SHA-2 512 digest modes for RSA signing. STRONGBOX IKeymasterDevices must support 85 * 384 and SHA-2 512 digest modes. STRONGBOX IKeymasterDevices must support SHA-2 256. 435 * o Tag::DIGEST specifies digest algorithms that may be used with the new key. TEE 551 * purpose KEY_WRAP, padding mode RSA_OAEP, and digest SHA_2_256, returning the 723 * digest [5] EXPLICIT SET OF INTEGER OPTIONAL, 961 * RSA signing and verification operations need a digest, as do RSA encryption and decryption 963 * digest in inParams. If unspecified or specified more than once, begin() must return 967 * digest and padding, which means that the key authorizations need to contain the specified 970 * and KeyPurpose::VERIFY) are permitted with unauthorized digest or padding modes. 982 * verifying, Digest::NONE is specified for the digest. No digest is necessary for unpadded [all …]
|
/hardware/qcom/msm8x84/original-kernel-headers/linux/ |
D | qseecom.h | 159 char digest[SHA256_DIGEST_LENGTH]; /* in */ member
|
/hardware/qcom/msm8x84/kernel-headers/linux/ |
D | qseecom.h | 120 char digest[SHA256_DIGEST_LENGTH]; member
|
/hardware/qcom/msm8994/original-kernel-headers/linux/ |
D | qseecom.h | 161 char digest[SHA256_DIGEST_LENGTH]; /* in */ member
|