/hardware/interfaces/identity/support/tests/ |
D | IdentityCredentialSupportTest.cpp | 38 EXPECT_EQ("", support::encodeHex(vector<uint8_t>({}))); in TEST() 39 EXPECT_EQ("01", support::encodeHex(vector<uint8_t>({1}))); in TEST() 41 support::encodeHex( in TEST() 43 EXPECT_EQ("0102ffe060", support::encodeHex(vector<uint8_t>({1, 2, 255, 224, 96}))); in TEST() 47 EXPECT_EQ(vector<uint8_t>({}), support::decodeHex("")); in TEST() 48 EXPECT_EQ(vector<uint8_t>({1}), support::decodeHex("01")); in TEST() 51 support::decodeHex("000102030405060708090a0b0c0d0e0f10")); in TEST() 53 EXPECT_FALSE(support::decodeHex("0g")); in TEST() 54 EXPECT_FALSE(support::decodeHex("0")); in TEST() 55 EXPECT_FALSE(support::decodeHex("012")); in TEST() [all …]
|
/hardware/interfaces/keymaster/4.0/support/fuzzer/ |
D | keymaster4_utils_fuzzer.cpp | 25 using android::hardware::keymaster::V4_0::support::deserializeVerificationToken; 26 using android::hardware::keymaster::V4_0::support::serializeVerificationToken; 46 support::getOsVersion(); in invokeKeyMasterUtils() 47 support::getOsPatchlevel(); in invokeKeyMasterUtils() 67 support::blob2hidlVec(dataVector.data(), dataVector.size()); in invokeKeyMasterUtils() 69 support::blob2hidlVec(dataVector); in invokeKeyMasterUtils() 72 support::blob2hidlVec(str); in invokeKeyMasterUtils() 74 HardwareAuthToken authToken = support::hidlVec2AuthToken(dataVector); in invokeKeyMasterUtils() 75 hidl_vec<uint8_t> volatile hidlVector = support::authToken2HidlVec(authToken); in invokeKeyMasterUtils()
|
/hardware/interfaces/tv/tuner/1.0/vts/functional/ |
D | VtsHalTvTunerV1_0TestConfigurations.h | 153 if ((!live.hasFrontendConnection || !scan.hasFrontendConnection) && !playback.support) { in validateConnections() 158 if (record.support && !record.hasFrontendConnection && in validateConnections() 164 if (descrambling.support && !descrambling.hasFrontendConnection && in validateConnections() 175 feIsValid &= record.support && record.hasFrontendConnection in validateConnections() 178 feIsValid &= (descrambling.support && descrambling.hasFrontendConnection) in validateConnections() 181 feIsValid &= lnbLive.support ? frontendMap.find(lnbLive.frontendId) != frontendMap.end() : true; in validateConnections() 183 lnbRecord.support ? frontendMap.find(lnbRecord.frontendId) != frontendMap.end() : true; in validateConnections() 193 dvrIsValid &= playback.support ? dvrMap.find(playback.dvrId) != dvrMap.end() : true; in validateConnections() 194 if (record.support) { in validateConnections() 204 if (descrambling.support) { in validateConnections() [all …]
|
/hardware/interfaces/confirmationui/1.0/default/ |
D | PlatformSpecifics.cpp | 39 support::NullOr<support::hmac_t> HMacImplementation::hmac256( in hmac256() 40 const support::auth_token_key_t& key, std::initializer_list<support::ByteBufferProxy> buffers) { in hmac256() 51 support::hmac_t result; in hmac256()
|
D | PlatformSpecifics.h | 51 static support::NullOr<support::hmac_t> hmac256( 52 const support::auth_token_key_t& key, 53 std::initializer_list<support::ByteBufferProxy> buffers);
|
/hardware/interfaces/keymaster/4.1/support/include/keymasterV4_1/ |
D | keymaster_utils.h | 21 namespace android::hardware::keymaster::V4_1::support { 23 using V4_0::support::blob2hidlVec; 24 using V4_0::support::hidlVec2AuthToken;
|
/hardware/google/aemu/CMake/ |
D | aemu_base_testing_support.pc.in | 5 Name: @PROJECT_NAME@ base testing support 6 Description: @CMAKE_PROJECT_DESCRIPTION@ (for testing support) 9 Libs: -L${libdir} -laemu-base-testing-support
|
D | aemu_host_common_testing_support.pc.in | 5 Name: @PROJECT_NAME@ host common testing support 6 Description: @CMAKE_PROJECT_DESCRIPTION@ (for testing support) 9 Libs: -L${libdir} -laemu-host-common-testing-support
|
/hardware/interfaces/identity/aidl/vts/ |
D | EndToEndTests.cpp | 103 vector<uint8_t> hardwareBoundKey = support::getTestHardwareBoundKey(); in extractFromTestCredentialData() 107 support::decryptAes128Gcm(hardwareBoundKey, encryptedCredentialKeys, docTypeVec); in extractFromTestCredentialData() 232 support::coseSignGetPayload(proofOfProvisioningSignature); in TEST_P() 283 optional<vector<uint8_t>> credentialPubKey = support::certificateChainGetTopMostKey( in TEST_P() 286 EXPECT_TRUE(support::coseCheckEcDsaSignature(proofOfProvisioningSignature, in TEST_P() 301 support::ecPrivateKeyToKeyPair(exCredentialPrivKey); in TEST_P() 304 support::ecKeyPairGetPublicKey(exCredentialKeyPair.value()); in TEST_P() 312 ASSERT_EQ(exSha256Pop, support::sha256(proofOfProvisioning.value())); in TEST_P() 325 optional<vector<uint8_t>> readerEphemeralKeyPair = support::createEcKeyPair(); in TEST_P() 328 support::ecKeyPairGetPublicKey(readerEphemeralKeyPair.value()); in TEST_P() [all …]
|
D | AuthenticationKeyTests.cpp | 90 support::certificateChainGetTopMostKey(certChain[0].encodedCertificate); in TEST_P() 119 support::coseSignGetPayload(proofOfProvisioningSignature); in TEST_P() 144 EXPECT_TRUE(support::coseCheckEcDsaSignature(proofOfProvisioningSignature, in TEST_P() 160 support::certificateChainGetTopMostKey(signingKeyCertificate.encodedCertificate); in TEST_P() 172 optional<vector<uint8_t>> proofOfBinding = support::certificateGetExtension( in TEST_P() 185 EXPECT_EQ(popSha256Item->value(), support::sha256(proofOfProvisioning.value())); in TEST_P()
|
D | TestCredentialTests.cpp | 86 support::certificateChainGetTopMostKey(certChain[0].encodedCertificate); in TEST_P() 115 support::coseSignGetPayload(proofOfProvisioningSignature); in TEST_P() 140 EXPECT_TRUE(support::coseCheckEcDsaSignature(proofOfProvisioningSignature, in TEST_P() 157 vector<uint8_t> hardwareBoundKey = support::getTestHardwareBoundKey(); in TEST_P() 162 support::decryptAes128Gcm(hardwareBoundKey, encryptedCredentialKeys, docTypeVec); in TEST_P() 186 support::decryptAes128Gcm(storageKey, encryptedData, additionalData); in TEST_P() 194 ASSERT_EQ(popSha256, support::sha256(proofOfProvisioning.value())); in TEST_P()
|
D | DeleteCredentialTests.cpp | 88 support::certificateChainGetTopMostKey(certChain[0].encodedCertificate); in provisionData() 127 support::coseSignGetPayload(proofOfDeletionSignature); in TEST_P() 131 EXPECT_TRUE(support::coseCheckEcDsaSignature(proofOfDeletionSignature, {}, // Additional data in TEST_P() 156 support::coseSignGetPayload(proofOfDeletionSignature); in TEST_P() 166 EXPECT_TRUE(support::coseCheckEcDsaSignature(proofOfDeletionSignature, {}, // Additional data in TEST_P()
|
D | ReaderAuthTests.cpp | 116 optional<vector<uint8_t>> keyPKCS8 = support::createEcKeyPair(); in generateReaderKey() 117 optional<vector<uint8_t>> publicKey = support::ecKeyPairGetPublicKey(keyPKCS8.value()); in generateReaderKey() 118 optional<vector<uint8_t>> privateKey = support::ecKeyPairGetPrivateKey(keyPKCS8.value()); in generateReaderKey() 126 optional<vector<uint8_t>> cert = support::ecPublicKeyGenerateCertificate( in generateReaderCert() 249 optional<vector<uint8_t>> readerEKeyPair = support::createEcKeyPair(); in retrieveData() 251 support::ecKeyPairGetPublicKey(readerEKeyPair.value()); in retrieveData() 256 optional<vector<uint8_t>> ePublicKey = support::ecKeyPairGetPublicKey(eKeyPair); in retrieveData() 259 auto [getXYSuccess, ephX, ephY] = support::ecPublicKeyGetXandY(ePublicKey.value()); in retrieveData() 302 support::coseSignEcDsa(readerPrivateKey, // private key for reader in retrieveData() 305 support::certificateChainJoin(readerCertChain)); in retrieveData() [all …]
|
D | UpdateCredentialTests.cpp | 88 support::certificateChainGetTopMostKey(certChain[0].encodedCertificate); in provisionData() 115 support::coseSignGetPayload(proofOfProvisioningSignature); in provisionData() 140 EXPECT_TRUE(support::coseCheckEcDsaSignature(proofOfProvisioningSignature, in provisionData() 196 support::coseSignGetPayload(proofOfProvisioningSignature); in TEST_P() 221 EXPECT_TRUE(support::coseCheckEcDsaSignature(proofOfProvisioningSignature, in TEST_P()
|
/hardware/interfaces/sensors/common/default/2.X/multihal/tests/fake_subhal/ |
D | README | 2 provided for sensors HAL 2.0 to support multi-HAL 2.0. It should be used as a 6 This sub-HAL implementation has two macros that can be used to configure support 8 support for continuous sensors like accel, and gyro whereas the other 9 "SUPPORT_ON_CHANGE_SENSORS" enables support for on change sensors like the 11 but more targets could be added to support both in one sub-HAL or none at all,
|
/hardware/interfaces/tv/tuner/aidl/vts/functional/ |
D | VtsHalTvTunerTestConfigurations.h | 436 mRecord.support = true; in generateRecordCombinations() 554 mLnbDescrambling.support = true; in generateLnbDescramblingCombinations() 701 timeFilter.support = true; in determineTimeFilter() 708 playback.support = true; in determineDvrPlayback() 716 lnbLive.support = true; in determineLnbLive() 724 lnbRecord.support = true; in determineLnbRecord() 754 descrambling.support = true; in determineDescrambling() 770 record.support = true; in determineDvrRecord() 779 lnbDescrambling.support = true; in determineLnbDescrambling() 808 if (record.support && !record.hasFrontendConnection && in validateConnections() [all …]
|
/hardware/interfaces/identity/aidl/default/ |
D | EicOpsImpl.cc | 122 optional<vector<uint8_t>> bytes = ::android::hardware::identity::support::getRandom(numBytes); in eicOpsRandom() 177 android::hardware::identity::support::encryptAes128Gcm(cppKey, cppNonce, cppData, in eicOpsEncryptAes128Gcm() 213 android::hardware::identity::support::decryptAes128Gcm(keyVec, encryptedDataVec, in eicOpsDecryptAes128Gcm() 233 optional<vector<uint8_t>> keyPair = android::hardware::identity::support::createEcKeyPair(); in eicOpsCreateEcKey() 239 android::hardware::identity::support::ecKeyPairGetPrivateKey(keyPair.value()); in eicOpsCreateEcKey() 251 android::hardware::identity::support::ecKeyPairGetPublicKey(keyPair.value()); in eicOpsCreateEcKey() 286 android::hardware::identity::support::createEcKeyPairWithAttestationKey( in eicOpsCreateCredentialKey() 297 android::hardware::identity::support::createEcKeyPairAndAttestation( in eicOpsCreateCredentialKey() 304 flatChain = android::hardware::identity::support::certificateChainJoin(ret->second); in eicOpsCreateCredentialKey() 317 android::hardware::identity::support::ecKeyPairGetPrivateKey(keyPair); in eicOpsCreateCredentialKey() [all …]
|
D | Android.bp | 46 "android.hardware.identity-support-lib", 78 "android.hardware.identity-support-lib", 112 "android.hardware.identity-support-lib", 156 "android.hardware.identity-support-lib",
|
/hardware/interfaces/confirmationui/support/test/ |
D | msg_formatting_test.cpp | 27 using android::hardware::confirmationui::support::Message; 28 using android::hardware::confirmationui::support::WriteStream; 29 using android::hardware::confirmationui::support::ReadStream; 30 using android::hardware::confirmationui::support::PromptUserConfirmationMsg; 31 using android::hardware::confirmationui::support::write;
|
/hardware/interfaces/identity/support/ |
D | Android.bp | 26 name: "android.hardware.identity-support-lib", 51 name: "android.hardware.identity-support-lib-test", 56 "android.hardware.identity-support-lib",
|
/hardware/interfaces/confirmationui/support/ |
D | Android.bp | 27 name: "android.hardware.confirmationui-support-lib", 43 name: "android.hardware.confirmationui-support-lib-tests", 51 "android.hardware.confirmationui-support-lib",
|
/hardware/interfaces/camera/device/3.6/ |
D | types.hal | 57 * For devices that do not support HAL buffer management, this must be 60 * For devices that support HAL buffer management, this could be any stream 119 * For devices that does not support the OFFLINE_PROCESSING capability, this 122 * For backward compatible camera devices that support the 128 * For depth only camera devices that support the OFFLINE_PROCESSING 131 * All other streams are up to camera HAL to advertise support or not, 132 * though it is not recommended to list support for streams with
|
/hardware/google/aemu/host-common/ |
D | CMakeLists.txt | 103 aemu-host-common-testing-support 110 aemu-host-common-testing-support 114 aemu-host-common-testing-support 144 aemu-host-common-testing-support
|
/hardware/interfaces/tv/hdmi/ |
D | README.md | 6 the CEC and the eARC implementation. Therefore, devices that implement CEC need to support the HDMI 7 Connection HAL and the CEC HAL. Devices that implement eARC need to support the HDMI Connection HAL
|
/hardware/interfaces/camera/provider/2.7/ |
D | ICameraProvider.hal | 25 * Adds support for the isConcurrentStreamCombinationSupported() with 36 * configurations that need to be queried for support. 42 * The camera provider does not support stream combination query.
|