Searched refs:deserialized (Results 1 - 2 of 2) sorted by relevance

/system/keymaster/tests/
H A Dandroid_keymaster_messages_test.cpp43 Message* deserialized = new Message(ver); local
45 EXPECT_TRUE(deserialized->Deserialize(&p, p + size));
47 return deserialized;
71 UniquePtr<EmptyKeymasterResponse> deserialized(round_trip(ver, msg, 5));
80 UniquePtr<EmptyKeymasterResponse> deserialized(round_trip(ver, msg, 4));
89 UniquePtr<SupportedByAlgorithmRequest> deserialized(round_trip(ver, req, 4));
90 EXPECT_EQ(KM_ALGORITHM_EC, deserialized->algorithm);
100 UniquePtr<SupportedByAlgorithmAndPurposeRequest> deserialized(round_trip(ver, req, 8));
101 EXPECT_EQ(KM_ALGORITHM_EC, deserialized->algorithm);
102 EXPECT_EQ(KM_PURPOSE_DECRYPT, deserialized
218 UniquePtr<BeginOperationResponse> deserialized; local
267 UniquePtr<UpdateOperationRequest> deserialized; local
293 UniquePtr<UpdateOperationResponse> deserialized; local
337 UniquePtr<FinishOperationRequest> deserialized; local
364 UniquePtr<FinishOperationResponse> deserialized; local
485 GetVersionRequest deserialized; local
504 GetVersionResponse deserialized; local
[all...]
H A Dauthorization_set_test.cpp167 AuthorizationSet deserialized(buf.get(), size);
169 EXPECT_EQ(AuthorizationSet::OK, deserialized.is_valid());
170 EXPECT_EQ(set, deserialized);
172 int pos = deserialized.find(TAG_APPLICATION_ID);
174 EXPECT_EQ(KM_TAG_APPLICATION_ID, deserialized[pos].tag);
175 EXPECT_EQ(6U, deserialized[pos].blob.data_length);
176 EXPECT_EQ(0, memcmp(deserialized[pos].blob.data, "my_app", 6));
195 AuthorizationSet deserialized; local
197 EXPECT_TRUE(deserialized.Deserialize(&p, p + size));
200 EXPECT_EQ(AuthorizationSet::OK, deserialized
[all...]

Completed in 65 milliseconds