add slicing config changed api to be sent
by modem whenever there is a slice config change
Test: build, vts tracked using bug 214043323
Bug: 194332512
Change-Id: I86e8ab8ac5aa782b099434f1a04ce314631b7f4e
Some GRF targets launched with S release do not support getBarringInfo()
API.
Check "ro.board.first_api_level" also to return from the test-case
when the response is REQUEST_NOT_SUPPORTED.
Bug: 212384410
Change-Id: I890f54f80ff3aca3dcb2c51f20db087d453c2927
The Key{Mint,Master} spec previously said that RSA-PSS mode should use
SHA-1 for the MGF1 digest, separately from whatever Tag::DIGEST gets
specified as the main digest.
However, both the reference implementation and the VTS/CTS tests
use BoringSSL's defaults, which is to re-use the main digest as the MGF1
digest if none is separately specified.
Given that this behaviour is embedded in many implementations over
several years (and given that there isn't a security implication),
change the spec to match this behaviour. Also update the VTS test
code to make this clear/obvious.
Test: VtsAidlKeyMintTargetTest, VtsHalKeymasterV4_0TargetTest
Bug: 210424594
Merged-In: I4303f28d094ef4d4b9dc931d6728b1fa040de20d
Change-Id: I4303f28d094ef4d4b9dc931d6728b1fa040de20d
Bug: 214298597
Test: Run VTS tests on an AOSP build (since AOSP
is still using the HIDL interface).
Change-Id: I4bd005b5c96570694477a4b45fa5cc790c45be8f
defs.h is a useful reference, but not the main
definition for the bitmap values in the interface.
Bug: 210904141
Test: N/A since only comments were updated
Change-Id: Ib721d6ea0182db50f05ddab10096583481f85413
- Add CURVE_25519 as a supported curve for EC operations.
- Add a helper that checks whether the HAL is of a version that is
expected to support curve 25519, and skip relevant tests if not.
- Ed25519 support
- Update KeyMintAidlTestBase::LocalVerifyMessage to cope with a public
key of type EVP_PKEY_ED25519.
- Add a test key pair generated with openssl command line.
- Key generation test
- Key import test for raw format
- Key import test for PKCS#8 format
- Key import failures tests
- Signature test
- Check that purposes cannot be combined (Ed25519 != X25519)
- Check that Ed25519 key can be attested to
- Implicitly check that an Ed25519 key can be used for attestation
(as it is in ValidCurves())
- Force Digest::NONE for Ed25519 throughout.
- X25519 support
- Add a test key pair generated with openssl command line.
- Key generation test
- Key import test for raw format
- Key import test for PKCS#8 format
- Key import failures tests
- Key agreement test, including...
- Refactoring of existing key agreement test for re-use
- Update key agreement checks to cope with a public key of type
EVP_PLEY_X25519.
- Key agreement test using imported key
- Check that purposes cannot be combined (Ed25519 != X25519)
Bug: 194358913
Test: VtsAidlKeyMintTargetTest
Change-Id: Ifa0f95fdfba4387843c8e821c2ca977da0488fa6
Having the adapter retrieve the uid is redundant because the implementor
is already able to get the uid directly themselves with
IPCThreadState::self()->getCallingUid().
Bug: N/A
Test: mma
Change-Id: Ifeffea053cb92556be1aae8b17a94fafa1ac98e0
This change adds the following adapters:
* nn::IDevice -> BnDevice
* nn::IPreparedModel -> BnPreparedModel
* nn::IBurst -> BnBurst
* nn::IBuffer -> BnBuffer
Bug: N/A
Test: mma
Test: locally created a binderized service with this adapter code,
which passed VtsHalNeuralnetworksTargetTest
Change-Id: I966f65a1e4d75284c050b77f3f40c515e4970130
Bug: 212653303
Bug: 212652735
Bug: 212652340
Test: Run VTS tests on an AOSP build (since AOSP
is still using the HIDL interface).
Change-Id: I442efb35c4c68a1337cacc952c3fdb338ef2615d
Currently just source metadata is passed through the new aidl.
Test: m android.hardware.bluetooth.audio-update-api
Bug: 203490261
Bug: 150670922
Change-Id: I76a44bb8c5cb0b6c16845aca36ba93517ecd07b4
Merged-In: I76a44bb8c5cb0b6c16845aca36ba93517ecd07b4