Home
last modified time | relevance | path

Searched refs:support (Results 1 – 25 of 321) sorted by relevance

12345678910>>...13

/hardware/interfaces/identity/support/tests/
DIdentityCredentialSupportTest.cpp38 EXPECT_EQ("", support::encodeHex(vector<uint8_t>({}))); in TEST()
39 EXPECT_EQ("01", support::encodeHex(vector<uint8_t>({1}))); in TEST()
41 support::encodeHex( in TEST()
43 EXPECT_EQ("0102ffe060", support::encodeHex(vector<uint8_t>({1, 2, 255, 224, 96}))); in TEST()
47 EXPECT_EQ(vector<uint8_t>({}), support::decodeHex("")); in TEST()
48 EXPECT_EQ(vector<uint8_t>({1}), support::decodeHex("01")); in TEST()
51 support::decodeHex("000102030405060708090a0b0c0d0e0f10")); in TEST()
53 EXPECT_FALSE(support::decodeHex("0g")); in TEST()
54 EXPECT_FALSE(support::decodeHex("0")); in TEST()
55 EXPECT_FALSE(support::decodeHex("012")); in TEST()
[all …]
/hardware/interfaces/keymaster/4.0/support/fuzzer/
Dkeymaster4_utils_fuzzer.cpp25 using android::hardware::keymaster::V4_0::support::deserializeVerificationToken;
26 using android::hardware::keymaster::V4_0::support::serializeVerificationToken;
46 support::getOsVersion(); in invokeKeyMasterUtils()
47 support::getOsPatchlevel(); in invokeKeyMasterUtils()
67 support::blob2hidlVec(dataVector.data(), dataVector.size()); in invokeKeyMasterUtils()
69 support::blob2hidlVec(dataVector); in invokeKeyMasterUtils()
72 support::blob2hidlVec(str); in invokeKeyMasterUtils()
74 HardwareAuthToken authToken = support::hidlVec2AuthToken(dataVector); in invokeKeyMasterUtils()
75 hidl_vec<uint8_t> volatile hidlVector = support::authToken2HidlVec(authToken); in invokeKeyMasterUtils()
/hardware/interfaces/tv/tuner/1.0/vts/functional/
DVtsHalTvTunerV1_0TestConfigurations.h153 if ((!live.hasFrontendConnection || !scan.hasFrontendConnection) && !playback.support) { in validateConnections()
158 if (record.support && !record.hasFrontendConnection && in validateConnections()
164 if (descrambling.support && !descrambling.hasFrontendConnection && in validateConnections()
175 feIsValid &= record.support && record.hasFrontendConnection in validateConnections()
178 feIsValid &= (descrambling.support && descrambling.hasFrontendConnection) in validateConnections()
181 feIsValid &= lnbLive.support ? frontendMap.find(lnbLive.frontendId) != frontendMap.end() : true; in validateConnections()
183 lnbRecord.support ? frontendMap.find(lnbRecord.frontendId) != frontendMap.end() : true; in validateConnections()
193 dvrIsValid &= playback.support ? dvrMap.find(playback.dvrId) != dvrMap.end() : true; in validateConnections()
194 if (record.support) { in validateConnections()
204 if (descrambling.support) { in validateConnections()
[all …]
/hardware/interfaces/confirmationui/1.0/default/
DPlatformSpecifics.cpp39 support::NullOr<support::hmac_t> HMacImplementation::hmac256( in hmac256()
40 const support::auth_token_key_t& key, std::initializer_list<support::ByteBufferProxy> buffers) { in hmac256()
51 support::hmac_t result; in hmac256()
DPlatformSpecifics.h51 static support::NullOr<support::hmac_t> hmac256(
52 const support::auth_token_key_t& key,
53 std::initializer_list<support::ByteBufferProxy> buffers);
/hardware/interfaces/keymaster/4.1/support/include/keymasterV4_1/
Dkeymaster_utils.h21 namespace android::hardware::keymaster::V4_1::support {
23 using V4_0::support::blob2hidlVec;
24 using V4_0::support::hidlVec2AuthToken;
/hardware/google/aemu/CMake/
Daemu_base_testing_support.pc.in5 Name: @PROJECT_NAME@ base testing support
6 Description: @CMAKE_PROJECT_DESCRIPTION@ (for testing support)
9 Libs: -L${libdir} -laemu-base-testing-support
Daemu_host_common_testing_support.pc.in5 Name: @PROJECT_NAME@ host common testing support
6 Description: @CMAKE_PROJECT_DESCRIPTION@ (for testing support)
9 Libs: -L${libdir} -laemu-host-common-testing-support
/hardware/interfaces/identity/aidl/vts/
DEndToEndTests.cpp103 vector<uint8_t> hardwareBoundKey = support::getTestHardwareBoundKey(); in extractFromTestCredentialData()
107 support::decryptAes128Gcm(hardwareBoundKey, encryptedCredentialKeys, docTypeVec); in extractFromTestCredentialData()
232 support::coseSignGetPayload(proofOfProvisioningSignature); in TEST_P()
283 optional<vector<uint8_t>> credentialPubKey = support::certificateChainGetTopMostKey( in TEST_P()
286 EXPECT_TRUE(support::coseCheckEcDsaSignature(proofOfProvisioningSignature, in TEST_P()
301 support::ecPrivateKeyToKeyPair(exCredentialPrivKey); in TEST_P()
304 support::ecKeyPairGetPublicKey(exCredentialKeyPair.value()); in TEST_P()
312 ASSERT_EQ(exSha256Pop, support::sha256(proofOfProvisioning.value())); in TEST_P()
325 optional<vector<uint8_t>> readerEphemeralKeyPair = support::createEcKeyPair(); in TEST_P()
328 support::ecKeyPairGetPublicKey(readerEphemeralKeyPair.value()); in TEST_P()
[all …]
DAuthenticationKeyTests.cpp90 support::certificateChainGetTopMostKey(certChain[0].encodedCertificate); in TEST_P()
119 support::coseSignGetPayload(proofOfProvisioningSignature); in TEST_P()
144 EXPECT_TRUE(support::coseCheckEcDsaSignature(proofOfProvisioningSignature, in TEST_P()
160 support::certificateChainGetTopMostKey(signingKeyCertificate.encodedCertificate); in TEST_P()
172 optional<vector<uint8_t>> proofOfBinding = support::certificateGetExtension( in TEST_P()
185 EXPECT_EQ(popSha256Item->value(), support::sha256(proofOfProvisioning.value())); in TEST_P()
DTestCredentialTests.cpp86 support::certificateChainGetTopMostKey(certChain[0].encodedCertificate); in TEST_P()
115 support::coseSignGetPayload(proofOfProvisioningSignature); in TEST_P()
140 EXPECT_TRUE(support::coseCheckEcDsaSignature(proofOfProvisioningSignature, in TEST_P()
157 vector<uint8_t> hardwareBoundKey = support::getTestHardwareBoundKey(); in TEST_P()
162 support::decryptAes128Gcm(hardwareBoundKey, encryptedCredentialKeys, docTypeVec); in TEST_P()
186 support::decryptAes128Gcm(storageKey, encryptedData, additionalData); in TEST_P()
194 ASSERT_EQ(popSha256, support::sha256(proofOfProvisioning.value())); in TEST_P()
DDeleteCredentialTests.cpp88 support::certificateChainGetTopMostKey(certChain[0].encodedCertificate); in provisionData()
127 support::coseSignGetPayload(proofOfDeletionSignature); in TEST_P()
131 EXPECT_TRUE(support::coseCheckEcDsaSignature(proofOfDeletionSignature, {}, // Additional data in TEST_P()
156 support::coseSignGetPayload(proofOfDeletionSignature); in TEST_P()
166 EXPECT_TRUE(support::coseCheckEcDsaSignature(proofOfDeletionSignature, {}, // Additional data in TEST_P()
DReaderAuthTests.cpp116 optional<vector<uint8_t>> keyPKCS8 = support::createEcKeyPair(); in generateReaderKey()
117 optional<vector<uint8_t>> publicKey = support::ecKeyPairGetPublicKey(keyPKCS8.value()); in generateReaderKey()
118 optional<vector<uint8_t>> privateKey = support::ecKeyPairGetPrivateKey(keyPKCS8.value()); in generateReaderKey()
126 optional<vector<uint8_t>> cert = support::ecPublicKeyGenerateCertificate( in generateReaderCert()
249 optional<vector<uint8_t>> readerEKeyPair = support::createEcKeyPair(); in retrieveData()
251 support::ecKeyPairGetPublicKey(readerEKeyPair.value()); in retrieveData()
256 optional<vector<uint8_t>> ePublicKey = support::ecKeyPairGetPublicKey(eKeyPair); in retrieveData()
259 auto [getXYSuccess, ephX, ephY] = support::ecPublicKeyGetXandY(ePublicKey.value()); in retrieveData()
302 support::coseSignEcDsa(readerPrivateKey, // private key for reader in retrieveData()
305 support::certificateChainJoin(readerCertChain)); in retrieveData()
[all …]
DUpdateCredentialTests.cpp88 support::certificateChainGetTopMostKey(certChain[0].encodedCertificate); in provisionData()
115 support::coseSignGetPayload(proofOfProvisioningSignature); in provisionData()
140 EXPECT_TRUE(support::coseCheckEcDsaSignature(proofOfProvisioningSignature, in provisionData()
196 support::coseSignGetPayload(proofOfProvisioningSignature); in TEST_P()
221 EXPECT_TRUE(support::coseCheckEcDsaSignature(proofOfProvisioningSignature, in TEST_P()
/hardware/interfaces/sensors/common/default/2.X/multihal/tests/fake_subhal/
DREADME2 provided for sensors HAL 2.0 to support multi-HAL 2.0. It should be used as a
6 This sub-HAL implementation has two macros that can be used to configure support
8 support for continuous sensors like accel, and gyro whereas the other
9 "SUPPORT_ON_CHANGE_SENSORS" enables support for on change sensors like the
11 but more targets could be added to support both in one sub-HAL or none at all,
/hardware/interfaces/tv/tuner/aidl/vts/functional/
DVtsHalTvTunerTestConfigurations.h436 mRecord.support = true; in generateRecordCombinations()
554 mLnbDescrambling.support = true; in generateLnbDescramblingCombinations()
701 timeFilter.support = true; in determineTimeFilter()
708 playback.support = true; in determineDvrPlayback()
716 lnbLive.support = true; in determineLnbLive()
724 lnbRecord.support = true; in determineLnbRecord()
754 descrambling.support = true; in determineDescrambling()
770 record.support = true; in determineDvrRecord()
779 lnbDescrambling.support = true; in determineLnbDescrambling()
808 if (record.support && !record.hasFrontendConnection && in validateConnections()
[all …]
/hardware/interfaces/identity/aidl/default/
DEicOpsImpl.cc122 optional<vector<uint8_t>> bytes = ::android::hardware::identity::support::getRandom(numBytes); in eicOpsRandom()
177 android::hardware::identity::support::encryptAes128Gcm(cppKey, cppNonce, cppData, in eicOpsEncryptAes128Gcm()
213 android::hardware::identity::support::decryptAes128Gcm(keyVec, encryptedDataVec, in eicOpsDecryptAes128Gcm()
233 optional<vector<uint8_t>> keyPair = android::hardware::identity::support::createEcKeyPair(); in eicOpsCreateEcKey()
239 android::hardware::identity::support::ecKeyPairGetPrivateKey(keyPair.value()); in eicOpsCreateEcKey()
251 android::hardware::identity::support::ecKeyPairGetPublicKey(keyPair.value()); in eicOpsCreateEcKey()
286 android::hardware::identity::support::createEcKeyPairWithAttestationKey( in eicOpsCreateCredentialKey()
297 android::hardware::identity::support::createEcKeyPairAndAttestation( in eicOpsCreateCredentialKey()
304 flatChain = android::hardware::identity::support::certificateChainJoin(ret->second); in eicOpsCreateCredentialKey()
317 android::hardware::identity::support::ecKeyPairGetPrivateKey(keyPair); in eicOpsCreateCredentialKey()
[all …]
DAndroid.bp46 "android.hardware.identity-support-lib",
78 "android.hardware.identity-support-lib",
112 "android.hardware.identity-support-lib",
156 "android.hardware.identity-support-lib",
/hardware/interfaces/confirmationui/support/test/
Dmsg_formatting_test.cpp27 using android::hardware::confirmationui::support::Message;
28 using android::hardware::confirmationui::support::WriteStream;
29 using android::hardware::confirmationui::support::ReadStream;
30 using android::hardware::confirmationui::support::PromptUserConfirmationMsg;
31 using android::hardware::confirmationui::support::write;
/hardware/interfaces/identity/support/
DAndroid.bp26 name: "android.hardware.identity-support-lib",
51 name: "android.hardware.identity-support-lib-test",
56 "android.hardware.identity-support-lib",
/hardware/interfaces/confirmationui/support/
DAndroid.bp27 name: "android.hardware.confirmationui-support-lib",
43 name: "android.hardware.confirmationui-support-lib-tests",
51 "android.hardware.confirmationui-support-lib",
/hardware/interfaces/camera/device/3.6/
Dtypes.hal57 * For devices that do not support HAL buffer management, this must be
60 * For devices that support HAL buffer management, this could be any stream
119 * For devices that does not support the OFFLINE_PROCESSING capability, this
122 * For backward compatible camera devices that support the
128 * For depth only camera devices that support the OFFLINE_PROCESSING
131 * All other streams are up to camera HAL to advertise support or not,
132 * though it is not recommended to list support for streams with
/hardware/google/aemu/host-common/
DCMakeLists.txt103 aemu-host-common-testing-support
110 aemu-host-common-testing-support
114 aemu-host-common-testing-support
144 aemu-host-common-testing-support
/hardware/interfaces/tv/hdmi/
DREADME.md6 the CEC and the eARC implementation. Therefore, devices that implement CEC need to support the HDMI
7 Connection HAL and the CEC HAL. Devices that implement eARC need to support the HDMI Connection HAL
/hardware/interfaces/camera/provider/2.7/
DICameraProvider.hal25 * Adds support for the isConcurrentStreamCombinationSupported() with
36 * configurations that need to be queried for support.
42 * The camera provider does not support stream combination query.

12345678910>>...13