/hardware/interfaces/identity/support/tests/ |
D | IdentityCredentialSupportTest.cpp | 38 EXPECT_EQ("", support::encodeHex(vector<uint8_t>({}))); in TEST() 39 EXPECT_EQ("01", support::encodeHex(vector<uint8_t>({1}))); in TEST() 41 support::encodeHex( in TEST() 43 EXPECT_EQ("0102ffe060", support::encodeHex(vector<uint8_t>({1, 2, 255, 224, 96}))); in TEST() 47 EXPECT_EQ(vector<uint8_t>({}), support::decodeHex("")); in TEST() 48 EXPECT_EQ(vector<uint8_t>({1}), support::decodeHex("01")); in TEST() 51 support::decodeHex("000102030405060708090a0b0c0d0e0f10")); in TEST() 53 EXPECT_FALSE(support::decodeHex("0g")); in TEST() 54 EXPECT_FALSE(support::decodeHex("0")); in TEST() 55 EXPECT_FALSE(support::decodeHex("012")); in TEST() [all …]
|
/hardware/interfaces/tv/tuner/1.0/vts/functional/ |
D | VtsHalTvTunerV1_0TestConfigurations.h | 153 if ((!live.hasFrontendConnection || !scan.hasFrontendConnection) && !playback.support) { in validateConnections() 158 if (record.support && !record.hasFrontendConnection && in validateConnections() 164 if (descrambling.support && !descrambling.hasFrontendConnection && in validateConnections() 175 feIsValid &= record.support && record.hasFrontendConnection in validateConnections() 178 feIsValid &= (descrambling.support && descrambling.hasFrontendConnection) in validateConnections() 181 feIsValid &= lnbLive.support ? frontendMap.find(lnbLive.frontendId) != frontendMap.end() : true; in validateConnections() 183 lnbRecord.support ? frontendMap.find(lnbRecord.frontendId) != frontendMap.end() : true; in validateConnections() 193 dvrIsValid &= playback.support ? dvrMap.find(playback.dvrId) != dvrMap.end() : true; in validateConnections() 194 if (record.support) { in validateConnections() 204 if (descrambling.support) { in validateConnections() [all …]
|
/hardware/interfaces/keymaster/4.0/support/fuzzer/ |
D | keymaster4_utils_fuzzer.cpp | 25 using android::hardware::keymaster::V4_0::support::deserializeVerificationToken; 26 using android::hardware::keymaster::V4_0::support::serializeVerificationToken; 46 support::getOsVersion(); in invokeKeyMasterUtils() 47 support::getOsPatchlevel(); in invokeKeyMasterUtils() 72 support::blob2hidlVec(dataVector.data(), dataVector.size()); in invokeKeyMasterUtils() 73 support::blob2hidlVec(dataVector); in invokeKeyMasterUtils() 74 HardwareAuthToken authToken = support::hidlVec2AuthToken(dataVector); in invokeKeyMasterUtils() 75 hidl_vec<uint8_t> volatile hidlVector = support::authToken2HidlVec(authToken); in invokeKeyMasterUtils() 79 support::blob2hidlVec(str); in invokeKeyMasterUtils()
|
/hardware/interfaces/confirmationui/1.0/default/ |
D | PlatformSpecifics.cpp | 39 support::NullOr<support::hmac_t> HMacImplementation::hmac256( in hmac256() 40 const support::auth_token_key_t& key, std::initializer_list<support::ByteBufferProxy> buffers) { in hmac256() 51 support::hmac_t result; in hmac256()
|
D | PlatformSpecifics.h | 51 static support::NullOr<support::hmac_t> hmac256( 52 const support::auth_token_key_t& key, 53 std::initializer_list<support::ByteBufferProxy> buffers);
|
/hardware/interfaces/keymaster/4.1/support/include/keymasterV4_1/ |
D | keymaster_utils.h | 21 namespace android::hardware::keymaster::V4_1::support { 23 using V4_0::support::blob2hidlVec; 24 using V4_0::support::hidlVec2AuthToken;
|
/hardware/google/gfxstream/host/ |
D | CMakeLists.txt | 189 aemu-host-common-testing-support 196 # Common testing support library################################################ 199 stream-server-testing-support 209 stream-server-testing-support 219 stream-server-testing-support 221 aemu-host-common-testing-support 222 aemu-base-testing-support 250 stream-server-testing-support 251 aemu-host-common-testing-support 252 aemu-base-testing-support [all …]
|
/hardware/interfaces/identity/aidl/vts/ |
D | EndToEndTests.cpp | 103 vector<uint8_t> hardwareBoundKey = support::getTestHardwareBoundKey(); in extractFromTestCredentialData() 107 support::decryptAes128Gcm(hardwareBoundKey, encryptedCredentialKeys, docTypeVec); in extractFromTestCredentialData() 232 support::coseSignGetPayload(proofOfProvisioningSignature); in TEST_P() 283 optional<vector<uint8_t>> credentialPubKey = support::certificateChainGetTopMostKey( in TEST_P() 286 EXPECT_TRUE(support::coseCheckEcDsaSignature(proofOfProvisioningSignature, in TEST_P() 301 support::ecPrivateKeyToKeyPair(exCredentialPrivKey); in TEST_P() 304 support::ecKeyPairGetPublicKey(exCredentialKeyPair.value()); in TEST_P() 312 ASSERT_EQ(exSha256Pop, support::sha256(proofOfProvisioning.value())); in TEST_P() 325 optional<vector<uint8_t>> readerEphemeralKeyPair = support::createEcKeyPair(); in TEST_P() 328 support::ecKeyPairGetPublicKey(readerEphemeralKeyPair.value()); in TEST_P() [all …]
|
D | TestCredentialTests.cpp | 86 support::certificateChainGetTopMostKey(certChain[0].encodedCertificate); in TEST_P() 115 support::coseSignGetPayload(proofOfProvisioningSignature); in TEST_P() 140 EXPECT_TRUE(support::coseCheckEcDsaSignature(proofOfProvisioningSignature, in TEST_P() 157 vector<uint8_t> hardwareBoundKey = support::getTestHardwareBoundKey(); in TEST_P() 162 support::decryptAes128Gcm(hardwareBoundKey, encryptedCredentialKeys, docTypeVec); in TEST_P() 186 support::decryptAes128Gcm(storageKey, encryptedData, additionalData); in TEST_P() 194 ASSERT_EQ(popSha256, support::sha256(proofOfProvisioning.value())); in TEST_P()
|
D | AuthenticationKeyTests.cpp | 90 support::certificateChainGetTopMostKey(certChain[0].encodedCertificate); in TEST_P() 119 support::coseSignGetPayload(proofOfProvisioningSignature); in TEST_P() 144 EXPECT_TRUE(support::coseCheckEcDsaSignature(proofOfProvisioningSignature, in TEST_P() 160 support::certificateChainGetTopMostKey(signingKeyCertificate.encodedCertificate); in TEST_P() 172 optional<vector<uint8_t>> proofOfBinding = support::certificateGetExtension( in TEST_P() 185 EXPECT_EQ(popSha256Item->value(), support::sha256(proofOfProvisioning.value())); in TEST_P()
|
D | DeleteCredentialTests.cpp | 88 support::certificateChainGetTopMostKey(certChain[0].encodedCertificate); in provisionData() 127 support::coseSignGetPayload(proofOfDeletionSignature); in TEST_P() 131 EXPECT_TRUE(support::coseCheckEcDsaSignature(proofOfDeletionSignature, {}, // Additional data in TEST_P() 156 support::coseSignGetPayload(proofOfDeletionSignature); in TEST_P() 166 EXPECT_TRUE(support::coseCheckEcDsaSignature(proofOfDeletionSignature, {}, // Additional data in TEST_P()
|
D | ReaderAuthTests.cpp | 116 optional<vector<uint8_t>> keyPKCS8 = support::createEcKeyPair(); in generateReaderKey() 117 optional<vector<uint8_t>> publicKey = support::ecKeyPairGetPublicKey(keyPKCS8.value()); in generateReaderKey() 118 optional<vector<uint8_t>> privateKey = support::ecKeyPairGetPrivateKey(keyPKCS8.value()); in generateReaderKey() 126 optional<vector<uint8_t>> cert = support::ecPublicKeyGenerateCertificate( in generateReaderCert() 249 optional<vector<uint8_t>> readerEKeyPair = support::createEcKeyPair(); in retrieveData() 251 support::ecKeyPairGetPublicKey(readerEKeyPair.value()); in retrieveData() 256 optional<vector<uint8_t>> ePublicKey = support::ecKeyPairGetPublicKey(eKeyPair); in retrieveData() 259 auto [getXYSuccess, ephX, ephY] = support::ecPublicKeyGetXandY(ePublicKey.value()); in retrieveData() 302 support::coseSignEcDsa(readerPrivateKey, // private key for reader in retrieveData() 305 support::certificateChainJoin(readerCertChain)); in retrieveData() [all …]
|
/hardware/interfaces/tv/tuner/aidl/vts/functional/ |
D | VtsHalTvTunerTestConfigurations.h | 434 mRecord.support = true; in generateRecordCombinations() 552 mLnbDescrambling.support = true; in generateLnbDescramblingCombinations() 700 timeFilter.support = true; in determineTimeFilter() 707 playback.support = true; in determineDvrPlayback() 715 lnbLive.support = true; in determineLnbLive() 723 lnbRecord.support = true; in determineLnbRecord() 764 descrambling.support = true; in determineDescrambling() 780 record.support = true; in determineDvrRecord() 789 lnbDescrambling.support = true; in determineLnbDescrambling() 818 if (record.support && !record.hasFrontendConnection && in validateConnections() [all …]
|
/hardware/google/aemu/CMake/ |
D | aemu_base_testing_support.pc.in | 5 Name: @PROJECT_NAME@ base testing support 6 Description: @CMAKE_PROJECT_DESCRIPTION@ (for testing support) 9 Libs: -L${libdir} -laemu-base-testing-support
|
D | aemu_host_common_testing_support.pc.in | 5 Name: @PROJECT_NAME@ host common testing support 6 Description: @CMAKE_PROJECT_DESCRIPTION@ (for testing support) 9 Libs: -L${libdir} -laemu-host-common-testing-support
|
/hardware/interfaces/identity/support/ |
D | Android.bp | 26 name: "android.hardware.identity-support-lib-deps", 44 name: "android.hardware.identity-support-lib", 47 "android.hardware.identity-support-lib-deps", 58 name: "android.hardware.identity-support-lib-test", 63 "android.hardware.identity-support-lib-deps", 72 "android.hardware.identity-support-lib",
|
/hardware/interfaces/identity/aidl/default/ |
D | EicOpsImpl.cc | 122 optional<vector<uint8_t>> bytes = ::android::hardware::identity::support::getRandom(numBytes); in eicOpsRandom() 177 android::hardware::identity::support::encryptAes128Gcm(cppKey, cppNonce, cppData, in eicOpsEncryptAes128Gcm() 213 android::hardware::identity::support::decryptAes128Gcm(keyVec, encryptedDataVec, in eicOpsDecryptAes128Gcm() 233 optional<vector<uint8_t>> keyPair = android::hardware::identity::support::createEcKeyPair(); in eicOpsCreateEcKey() 239 android::hardware::identity::support::ecKeyPairGetPrivateKey(keyPair.value()); in eicOpsCreateEcKey() 251 android::hardware::identity::support::ecKeyPairGetPublicKey(keyPair.value()); in eicOpsCreateEcKey() 286 android::hardware::identity::support::createEcKeyPairWithAttestationKey( in eicOpsCreateCredentialKey() 297 android::hardware::identity::support::createEcKeyPairAndAttestation( in eicOpsCreateCredentialKey() 304 flatChain = android::hardware::identity::support::certificateChainJoin(ret->second); in eicOpsCreateCredentialKey() 317 android::hardware::identity::support::ecKeyPairGetPrivateKey(keyPair); in eicOpsCreateCredentialKey() [all …]
|
/hardware/interfaces/sensors/common/default/2.X/multihal/tests/fake_subhal/ |
D | README | 2 provided for sensors HAL 2.0 to support multi-HAL 2.0. It should be used as a 6 This sub-HAL implementation has two macros that can be used to configure support 8 support for continuous sensors like accel, and gyro whereas the other 9 "SUPPORT_ON_CHANGE_SENSORS" enables support for on change sensors like the 11 but more targets could be added to support both in one sub-HAL or none at all,
|
/hardware/google/gfxstream/ |
D | meson_options.txt | 12 description : 'window systems to support. If this is set to `auto`, all ' + 44 description : 'enable support for dri3' 88 description : 'Enable HUD block/NIC I/O HUD status support', 184 'binary support.', 222 # support msm and virtio. This is a temporary situation with virtio support 223 # for turnip and kgsl support for gallium planned/in-progress. 245 description : 'Build with on-disk shader cache support.', 306 description : 'Build support for OpenGL ES 1.x' 313 description : 'Build support for OpenGL ES 2.x and 3.x' 320 description : 'Build support for desktop OpenGL' [all …]
|
/hardware/google/gfxstream/codegen/vulkan/vulkan-docs-next/appendices/ |
D | VK_KHR_wayland_surface.adoc | 36 code:wl_surface, as well as a query to determine support for rendering to a 48 support presentation to any slink:VkSurfaceKHR for surfaces on the display. 55 to support the ename:VK_PRESENT_MODE_MAILBOX_KHR present mode? 58 Wayland is an inherently mailbox window system and mailbox support is 62 deadlock and requiring all Wayland applications to be able to support 63 implementations which only support ename:VK_PRESENT_MODE_FIFO_KHR would be 89 ** Added the requirement that implementations support
|
D | VK_NV_ray_tracing_motion_blur.adoc | 14 - This extension provides API support for 22 Ray tracing support in the API provides an efficient mechanism to intersect 23 rays against static geometry, but rendering algorithms often want to support 25 This extension adds a set of mechanisms to support fast tracing of moving 29 * Flags to enable motion support in an acceleration structure
|
D | VK_NV_shader_subgroup_partitioned.adoc | 14 - This extension provides API support for 21 This extension enables support for a new class of 31 This extension requires Vulkan 1.1, for general subgroup support.
|
D | versions.adoc | 59 If the `apiext:VK_EXT_4444_formats` extension is not supported, support for 95 supported, support for all formats defined by it are optional in Vulkan 1.3. 104 support for all formats defined by it are optional in Vulkan 1.3. 113 required support for: 119 which indicates support for accessing memory in shaders as storage 123 pname:vulkanMemoryModelDeviceScope>> features, which indicate support 172 If the `apiext:VK_KHR_8bit_storage` extension is not supported, support for 182 support for the entry points flink:vkCmdDrawIndirectCount and 191 supported, support for the elink:VkSamplerAddressMode 200 support for the <<features-descriptorIndexing, pname:descriptorIndexing>> [all …]
|
/hardware/interfaces/confirmationui/support/test/ |
D | msg_formatting_test.cpp | 27 using android::hardware::confirmationui::support::Message; 28 using android::hardware::confirmationui::support::WriteStream; 29 using android::hardware::confirmationui::support::ReadStream; 30 using android::hardware::confirmationui::support::PromptUserConfirmationMsg; 31 using android::hardware::confirmationui::support::write;
|
/hardware/google/gfxstream/host/vulkan/emulated_textures/ |
D | README.md | 3 This directory contains code related to providing emulated support for compressed texture formats. 5 For example, support for ASTC and ETC2 texture formats is the norm on mobile GPUs but is non-existe…
|