Home
last modified time | relevance | path

Searched refs:verify (Results 1 – 25 of 29) sorted by relevance

12

/hardware/interfaces/broadcastradio/common/tests/
DProgramIdentifier_test.cpp27 auto verify = [](std::string name, uint64_t nameId) { in TEST() local
32 verify("", 0); in TEST()
33 verify("Abc", 0x434241); in TEST()
34 verify("Some Station 1", 0x54415453454d4f53); in TEST()
35 verify("Station1", 0x314e4f4954415453); in TEST()
36 verify("!@#$%^&*()_+", 0); in TEST()
37 verify("-=[]{};':\"0", 0x30); in TEST()
/hardware/interfaces/gatekeeper/1.0/
DIGatekeeper.hal27 * currentPassword. Valid currentPassword must verify() against
37 * it MUST verify against current_password_handle if the latter is not-empty
46 * verify. On error, this buffer must be empty.
74 * user wishes to verify against. Must be non-empty.
89 verify(uint32_t uid, uint64_t challenge,
/hardware/interfaces/gatekeeper/1.0/default/
DGatekeeper.cpp85 Return<void> Gatekeeper::verify(uint32_t uid, in verify() function in android::hardware::gatekeeper::V1_0::implementation::Gatekeeper
96 int ret = device->verify(device, uid, challenge, in verify()
DGatekeeper.h52 Return<void> verify(uint32_t uid,
/hardware/google/av/hooks/
Dpre-commit4 if git rev-parse --verify HEAD >/dev/null 2>&1
/hardware/libhardware/include/hardware/
Dgatekeeper.h141 int (*verify)(const struct gatekeeper_device *dev, uint32_t uid, uint64_t challenge, member
/hardware/invensense/6515/libsensors_iio/software/simple_apps/devnode_parser/
Diio_utils.h435 inline int _write_sysfs_int(char *filename, char *basedir, int val, int verify) in _write_sysfs_int() argument
457 if (verify) { in _write_sysfs_int()
490 int _write_sysfs_string(char *filename, char *basedir, char *val, int verify) in _write_sysfs_string() argument
510 if (verify) { in _write_sysfs_string()
/hardware/invensense/6515/libsensors_iio/software/simple_apps/mpu_iio/
Diio_utils.h435 inline int _write_sysfs_int(char *filename, char *basedir, int val, int verify) in _write_sysfs_int() argument
457 if (verify) { in _write_sysfs_int()
490 int _write_sysfs_string(char *filename, char *basedir, char *val, int verify) in _write_sysfs_string() argument
510 if (verify) { in _write_sysfs_string()
/hardware/invensense/6515/libsensors_iio/software/simple_apps/stress_iio/
Diio_utils.h434 inline int _write_sysfs_int(char *filename, char *basedir, int val, int verify) in _write_sysfs_int() argument
455 if (verify) { in _write_sysfs_int()
517 int _write_sysfs_string(char *filename, char *basedir, char *val, int verify) in _write_sysfs_string() argument
535 if (verify) { in _write_sysfs_string()
/hardware/interfaces/drm/1.0/default/
DDrmPlugin.cpp299 Return<void> DrmPlugin::verify(const hidl_vec<uint8_t>& sessionId, in verify() function in android::hardware::drm::V1_0::implementation::DrmPlugin
304 status_t status = mLegacyPlugin->verify(toVector(sessionId), in verify()
DDrmPlugin.h121 Return<void> verify(const hidl_vec<uint8_t>& sessionId,
/hardware/interfaces/media/bufferpool/1.0/
DREADME.md31 registered the receiver via an FMQ message, The buffer pool must verify the
DIAccessor.hal47 * pool must verify the receiver with the transaction ID. In order to
/hardware/interfaces/media/bufferpool/2.0/
DREADME.md31 registered the receiver via an FMQ message, The buffer pool must verify the
DIAccessor.hal48 * pool must verify the receiver with the transaction ID. In order to
/hardware/interfaces/neuralnetworks/1.0/
DIPreparedModel.hal30 * execute must verify the inputs to the function are correct. If there is
DIDevice.hal70 * prepareModel function must verify the inputs to the prepareModel function
/hardware/interfaces/neuralnetworks/1.2/
DIPreparedModel.hal35 * execute_1_2 must verify the inputs to the function are correct. If there is
86 * executeSynchronously must verify the inputs to the function are
/hardware/qcom/msm8998/json-c/
DRELEASE_CHECKLIST.txt77 Logout of Amazon S3, and verify that the files are visible.
/hardware/interfaces/biometrics/face/1.0/
DIBiometricsFace.hal76 * can be used to verify/perform a secure transaction.
145 * is invoked (see @param HAT). The driver must verify the HAT before
/hardware/broadcom/wlan/bcmdhd/dhdutil/
Ddhdu.c1551 dhd_load_file_bytes(void *dhd, cmd_t *cmd, FILE *fp, int fsize, int start, uint blk_sz, bool verify) in dhd_load_file_bytes() argument
1604 if (verify == TRUE) { in dhd_load_file_bytes()
1705 bool verify = FALSE; in dhd_download()
1770 verify = TRUE; in dhd_download()
1878 if ((ret = dhd_load_file_bytes(dhd, cmd, fp, fsize, start, memblock_sz, verify))) { in dhd_download()
/hardware/interfaces/neuralnetworks/1.1/
DIDevice.hal75 * prepareModel function must verify the inputs to the prepareModel function
/hardware/interfaces/drm/1.0/
DIDrmPlugin.hal364 * encrypt, decrypt, sign verify operations on operator-provided
461 * @param signature the signature to verify
465 * if the HAL is in a state where the verify operation cannot be
470 verify(SessionId sessionId, vec<uint8_t> keyId, vec<uint8_t> message,
/hardware/interfaces/gatekeeper/1.0/vts/functional/
DVtsHalGatekeeperV1_0TargetTest.cpp114 auto ret = gatekeeper_->verify( in doVerify()
/hardware/interfaces/keymaster/4.0/
DIKeymasterDevice.hal174 * Verified Boot to verify the signature on the boot image and from the the lock state of the
217 * must be a TEE Keymaster as well. The HMAC key used to MAC and verify authentication tokens
239 * there must be a TEE IKeymasterDevice as well. The HMAC key used to MAC and verify
321 * @return sharingCheck A 32-byte value used to verify that all IKeymasterDevice instances have
337 * to ask the TEE IKeymasterDevice to verify authorizations for a key hosted in StrongBox.
343 * verify any, the parametersVerified field of the VerificationToken must be empty. Keystore
351 * @param parametersToVerify Set of authorizations to verify. The caller may provide an empty
357 * a StrongBox. If the IKeymasterDevice cannot verify one or more elements of

12