Home
last modified time | relevance | path

Searched refs:support (Results 1 – 25 of 638) sorted by relevance

12345678910>>...26

/hardware/interfaces/identity/support/tests/
DIdentityCredentialSupportTest.cpp38 EXPECT_EQ("", support::encodeHex(vector<uint8_t>({}))); in TEST()
39 EXPECT_EQ("01", support::encodeHex(vector<uint8_t>({1}))); in TEST()
41 support::encodeHex( in TEST()
43 EXPECT_EQ("0102ffe060", support::encodeHex(vector<uint8_t>({1, 2, 255, 224, 96}))); in TEST()
47 EXPECT_EQ(vector<uint8_t>({}), support::decodeHex("")); in TEST()
48 EXPECT_EQ(vector<uint8_t>({1}), support::decodeHex("01")); in TEST()
51 support::decodeHex("000102030405060708090a0b0c0d0e0f10")); in TEST()
53 EXPECT_FALSE(support::decodeHex("0g")); in TEST()
54 EXPECT_FALSE(support::decodeHex("0")); in TEST()
55 EXPECT_FALSE(support::decodeHex("012")); in TEST()
[all …]
/hardware/interfaces/tv/tuner/1.0/vts/functional/
DVtsHalTvTunerV1_0TestConfigurations.h153 if ((!live.hasFrontendConnection || !scan.hasFrontendConnection) && !playback.support) { in validateConnections()
158 if (record.support && !record.hasFrontendConnection && in validateConnections()
164 if (descrambling.support && !descrambling.hasFrontendConnection && in validateConnections()
175 feIsValid &= record.support && record.hasFrontendConnection in validateConnections()
178 feIsValid &= (descrambling.support && descrambling.hasFrontendConnection) in validateConnections()
181 feIsValid &= lnbLive.support ? frontendMap.find(lnbLive.frontendId) != frontendMap.end() : true; in validateConnections()
183 lnbRecord.support ? frontendMap.find(lnbRecord.frontendId) != frontendMap.end() : true; in validateConnections()
193 dvrIsValid &= playback.support ? dvrMap.find(playback.dvrId) != dvrMap.end() : true; in validateConnections()
194 if (record.support) { in validateConnections()
204 if (descrambling.support) { in validateConnections()
[all …]
/hardware/interfaces/keymaster/4.0/support/fuzzer/
Dkeymaster4_utils_fuzzer.cpp25 using android::hardware::keymaster::V4_0::support::deserializeVerificationToken;
26 using android::hardware::keymaster::V4_0::support::serializeVerificationToken;
46 support::getOsVersion(); in invokeKeyMasterUtils()
47 support::getOsPatchlevel(); in invokeKeyMasterUtils()
72 support::blob2hidlVec(dataVector.data(), dataVector.size()); in invokeKeyMasterUtils()
73 support::blob2hidlVec(dataVector); in invokeKeyMasterUtils()
74 HardwareAuthToken authToken = support::hidlVec2AuthToken(dataVector); in invokeKeyMasterUtils()
75 hidl_vec<uint8_t> volatile hidlVector = support::authToken2HidlVec(authToken); in invokeKeyMasterUtils()
79 support::blob2hidlVec(str); in invokeKeyMasterUtils()
/hardware/interfaces/confirmationui/1.0/default/
DPlatformSpecifics.cpp39 support::NullOr<support::hmac_t> HMacImplementation::hmac256( in hmac256()
40 const support::auth_token_key_t& key, std::initializer_list<support::ByteBufferProxy> buffers) { in hmac256()
51 support::hmac_t result; in hmac256()
DPlatformSpecifics.h51 static support::NullOr<support::hmac_t> hmac256(
52 const support::auth_token_key_t& key,
53 std::initializer_list<support::ByteBufferProxy> buffers);
/hardware/interfaces/keymaster/4.1/support/include/keymasterV4_1/
Dkeymaster_utils.h21 namespace android::hardware::keymaster::V4_1::support {
23 using V4_0::support::blob2hidlVec;
24 using V4_0::support::hidlVec2AuthToken;
/hardware/google/gfxstream/host/
DCMakeLists.txt189 aemu-host-common-testing-support
196 # Common testing support library################################################
199 stream-server-testing-support
209 stream-server-testing-support
219 stream-server-testing-support
221 aemu-host-common-testing-support
222 aemu-base-testing-support
250 stream-server-testing-support
251 aemu-host-common-testing-support
252 aemu-base-testing-support
[all …]
/hardware/interfaces/identity/aidl/vts/
DEndToEndTests.cpp103 vector<uint8_t> hardwareBoundKey = support::getTestHardwareBoundKey(); in extractFromTestCredentialData()
107 support::decryptAes128Gcm(hardwareBoundKey, encryptedCredentialKeys, docTypeVec); in extractFromTestCredentialData()
232 support::coseSignGetPayload(proofOfProvisioningSignature); in TEST_P()
283 optional<vector<uint8_t>> credentialPubKey = support::certificateChainGetTopMostKey( in TEST_P()
286 EXPECT_TRUE(support::coseCheckEcDsaSignature(proofOfProvisioningSignature, in TEST_P()
301 support::ecPrivateKeyToKeyPair(exCredentialPrivKey); in TEST_P()
304 support::ecKeyPairGetPublicKey(exCredentialKeyPair.value()); in TEST_P()
312 ASSERT_EQ(exSha256Pop, support::sha256(proofOfProvisioning.value())); in TEST_P()
325 optional<vector<uint8_t>> readerEphemeralKeyPair = support::createEcKeyPair(); in TEST_P()
328 support::ecKeyPairGetPublicKey(readerEphemeralKeyPair.value()); in TEST_P()
[all …]
DTestCredentialTests.cpp86 support::certificateChainGetTopMostKey(certChain[0].encodedCertificate); in TEST_P()
115 support::coseSignGetPayload(proofOfProvisioningSignature); in TEST_P()
140 EXPECT_TRUE(support::coseCheckEcDsaSignature(proofOfProvisioningSignature, in TEST_P()
157 vector<uint8_t> hardwareBoundKey = support::getTestHardwareBoundKey(); in TEST_P()
162 support::decryptAes128Gcm(hardwareBoundKey, encryptedCredentialKeys, docTypeVec); in TEST_P()
186 support::decryptAes128Gcm(storageKey, encryptedData, additionalData); in TEST_P()
194 ASSERT_EQ(popSha256, support::sha256(proofOfProvisioning.value())); in TEST_P()
DAuthenticationKeyTests.cpp90 support::certificateChainGetTopMostKey(certChain[0].encodedCertificate); in TEST_P()
119 support::coseSignGetPayload(proofOfProvisioningSignature); in TEST_P()
144 EXPECT_TRUE(support::coseCheckEcDsaSignature(proofOfProvisioningSignature, in TEST_P()
160 support::certificateChainGetTopMostKey(signingKeyCertificate.encodedCertificate); in TEST_P()
172 optional<vector<uint8_t>> proofOfBinding = support::certificateGetExtension( in TEST_P()
185 EXPECT_EQ(popSha256Item->value(), support::sha256(proofOfProvisioning.value())); in TEST_P()
DDeleteCredentialTests.cpp88 support::certificateChainGetTopMostKey(certChain[0].encodedCertificate); in provisionData()
127 support::coseSignGetPayload(proofOfDeletionSignature); in TEST_P()
131 EXPECT_TRUE(support::coseCheckEcDsaSignature(proofOfDeletionSignature, {}, // Additional data in TEST_P()
156 support::coseSignGetPayload(proofOfDeletionSignature); in TEST_P()
166 EXPECT_TRUE(support::coseCheckEcDsaSignature(proofOfDeletionSignature, {}, // Additional data in TEST_P()
DReaderAuthTests.cpp116 optional<vector<uint8_t>> keyPKCS8 = support::createEcKeyPair(); in generateReaderKey()
117 optional<vector<uint8_t>> publicKey = support::ecKeyPairGetPublicKey(keyPKCS8.value()); in generateReaderKey()
118 optional<vector<uint8_t>> privateKey = support::ecKeyPairGetPrivateKey(keyPKCS8.value()); in generateReaderKey()
126 optional<vector<uint8_t>> cert = support::ecPublicKeyGenerateCertificate( in generateReaderCert()
249 optional<vector<uint8_t>> readerEKeyPair = support::createEcKeyPair(); in retrieveData()
251 support::ecKeyPairGetPublicKey(readerEKeyPair.value()); in retrieveData()
256 optional<vector<uint8_t>> ePublicKey = support::ecKeyPairGetPublicKey(eKeyPair); in retrieveData()
259 auto [getXYSuccess, ephX, ephY] = support::ecPublicKeyGetXandY(ePublicKey.value()); in retrieveData()
302 support::coseSignEcDsa(readerPrivateKey, // private key for reader in retrieveData()
305 support::certificateChainJoin(readerCertChain)); in retrieveData()
[all …]
/hardware/interfaces/tv/tuner/aidl/vts/functional/
DVtsHalTvTunerTestConfigurations.h434 mRecord.support = true; in generateRecordCombinations()
552 mLnbDescrambling.support = true; in generateLnbDescramblingCombinations()
700 timeFilter.support = true; in determineTimeFilter()
707 playback.support = true; in determineDvrPlayback()
715 lnbLive.support = true; in determineLnbLive()
723 lnbRecord.support = true; in determineLnbRecord()
764 descrambling.support = true; in determineDescrambling()
780 record.support = true; in determineDvrRecord()
789 lnbDescrambling.support = true; in determineLnbDescrambling()
818 if (record.support && !record.hasFrontendConnection && in validateConnections()
[all …]
/hardware/google/aemu/CMake/
Daemu_base_testing_support.pc.in5 Name: @PROJECT_NAME@ base testing support
6 Description: @CMAKE_PROJECT_DESCRIPTION@ (for testing support)
9 Libs: -L${libdir} -laemu-base-testing-support
Daemu_host_common_testing_support.pc.in5 Name: @PROJECT_NAME@ host common testing support
6 Description: @CMAKE_PROJECT_DESCRIPTION@ (for testing support)
9 Libs: -L${libdir} -laemu-host-common-testing-support
/hardware/interfaces/identity/support/
DAndroid.bp26 name: "android.hardware.identity-support-lib-deps",
44 name: "android.hardware.identity-support-lib",
47 "android.hardware.identity-support-lib-deps",
58 name: "android.hardware.identity-support-lib-test",
63 "android.hardware.identity-support-lib-deps",
72 "android.hardware.identity-support-lib",
/hardware/interfaces/identity/aidl/default/
DEicOpsImpl.cc122 optional<vector<uint8_t>> bytes = ::android::hardware::identity::support::getRandom(numBytes); in eicOpsRandom()
177 android::hardware::identity::support::encryptAes128Gcm(cppKey, cppNonce, cppData, in eicOpsEncryptAes128Gcm()
213 android::hardware::identity::support::decryptAes128Gcm(keyVec, encryptedDataVec, in eicOpsDecryptAes128Gcm()
233 optional<vector<uint8_t>> keyPair = android::hardware::identity::support::createEcKeyPair(); in eicOpsCreateEcKey()
239 android::hardware::identity::support::ecKeyPairGetPrivateKey(keyPair.value()); in eicOpsCreateEcKey()
251 android::hardware::identity::support::ecKeyPairGetPublicKey(keyPair.value()); in eicOpsCreateEcKey()
286 android::hardware::identity::support::createEcKeyPairWithAttestationKey( in eicOpsCreateCredentialKey()
297 android::hardware::identity::support::createEcKeyPairAndAttestation( in eicOpsCreateCredentialKey()
304 flatChain = android::hardware::identity::support::certificateChainJoin(ret->second); in eicOpsCreateCredentialKey()
317 android::hardware::identity::support::ecKeyPairGetPrivateKey(keyPair); in eicOpsCreateCredentialKey()
[all …]
/hardware/interfaces/sensors/common/default/2.X/multihal/tests/fake_subhal/
DREADME2 provided for sensors HAL 2.0 to support multi-HAL 2.0. It should be used as a
6 This sub-HAL implementation has two macros that can be used to configure support
8 support for continuous sensors like accel, and gyro whereas the other
9 "SUPPORT_ON_CHANGE_SENSORS" enables support for on change sensors like the
11 but more targets could be added to support both in one sub-HAL or none at all,
/hardware/google/gfxstream/
Dmeson_options.txt12 description : 'window systems to support. If this is set to `auto`, all ' +
44 description : 'enable support for dri3'
88 description : 'Enable HUD block/NIC I/O HUD status support',
184 'binary support.',
222 # support msm and virtio. This is a temporary situation with virtio support
223 # for turnip and kgsl support for gallium planned/in-progress.
245 description : 'Build with on-disk shader cache support.',
306 description : 'Build support for OpenGL ES 1.x'
313 description : 'Build support for OpenGL ES 2.x and 3.x'
320 description : 'Build support for desktop OpenGL'
[all …]
/hardware/google/gfxstream/codegen/vulkan/vulkan-docs-next/appendices/
DVK_KHR_wayland_surface.adoc36 code:wl_surface, as well as a query to determine support for rendering to a
48 support presentation to any slink:VkSurfaceKHR for surfaces on the display.
55 to support the ename:VK_PRESENT_MODE_MAILBOX_KHR present mode?
58 Wayland is an inherently mailbox window system and mailbox support is
62 deadlock and requiring all Wayland applications to be able to support
63 implementations which only support ename:VK_PRESENT_MODE_FIFO_KHR would be
89 ** Added the requirement that implementations support
DVK_NV_ray_tracing_motion_blur.adoc14 - This extension provides API support for
22 Ray tracing support in the API provides an efficient mechanism to intersect
23 rays against static geometry, but rendering algorithms often want to support
25 This extension adds a set of mechanisms to support fast tracing of moving
29 * Flags to enable motion support in an acceleration structure
DVK_NV_shader_subgroup_partitioned.adoc14 - This extension provides API support for
21 This extension enables support for a new class of
31 This extension requires Vulkan 1.1, for general subgroup support.
Dversions.adoc59 If the `apiext:VK_EXT_4444_formats` extension is not supported, support for
95 supported, support for all formats defined by it are optional in Vulkan 1.3.
104 support for all formats defined by it are optional in Vulkan 1.3.
113 required support for:
119 which indicates support for accessing memory in shaders as storage
123 pname:vulkanMemoryModelDeviceScope>> features, which indicate support
172 If the `apiext:VK_KHR_8bit_storage` extension is not supported, support for
182 support for the entry points flink:vkCmdDrawIndirectCount and
191 supported, support for the elink:VkSamplerAddressMode
200 support for the <<features-descriptorIndexing, pname:descriptorIndexing>>
[all …]
/hardware/interfaces/confirmationui/support/test/
Dmsg_formatting_test.cpp27 using android::hardware::confirmationui::support::Message;
28 using android::hardware::confirmationui::support::WriteStream;
29 using android::hardware::confirmationui::support::ReadStream;
30 using android::hardware::confirmationui::support::PromptUserConfirmationMsg;
31 using android::hardware::confirmationui::support::write;
/hardware/google/gfxstream/host/vulkan/emulated_textures/
DREADME.md3 This directory contains code related to providing emulated support for compressed texture formats.
5 For example, support for ASTC and ETC2 texture formats is the norm on mobile GPUs but is non-existe…

12345678910>>...26