Loading nfc/1.0/default/Nfc.cpp +1 −1 Original line number Diff line number Diff line Loading @@ -38,7 +38,7 @@ Nfc::Nfc(nfc_nci_device_t* device) : mDevice(device) {} ::android::hardware::Return<NfcStatus> Nfc::coreInitialized(const hidl_vec<uint8_t>& data) { hidl_vec<uint8_t> copy = data; if (mDevice == nullptr) { if (mDevice == nullptr || copy.size() == 0) { return NfcStatus::FAILED; } int ret = mDevice->core_initialized(mDevice, ©[0]); Loading security/keymint/aidl/aidl_api/android.hardware.security.keymint/current/android/hardware/security/keymint/IKeyMintDevice.aidl +1 −0 Original line number Diff line number Diff line Loading @@ -48,5 +48,6 @@ interface IKeyMintDevice { void deviceLocked(in boolean passwordOnly, in @nullable android.hardware.security.secureclock.TimeStampToken timestampToken); void earlyBootEnded(); byte[] convertStorageKeyToEphemeral(in byte[] storageKeyBlob); android.hardware.security.keymint.KeyCharacteristics[] getKeyCharacteristics(in byte[] keyBlob, in byte[] appId, in byte[] appData); const int AUTH_TOKEN_MAC_LENGTH = 32; } security/keymint/aidl/android/hardware/security/keymint/BeginResult.aidl +4 −1 Original line number Diff line number Diff line Loading @@ -25,7 +25,10 @@ import android.hardware.security.keymint.KeyParameter; */ @VintfStability parcelable BeginResult { /* This is the challenge used in verifyAuthorization. It must be a nonce. */ /** * This is the challenge used to verify authorization of an operation. * See IKeyMintOperation.aidl entrypoints updateAad() and update(). */ long challenge; /** Loading Loading
nfc/1.0/default/Nfc.cpp +1 −1 Original line number Diff line number Diff line Loading @@ -38,7 +38,7 @@ Nfc::Nfc(nfc_nci_device_t* device) : mDevice(device) {} ::android::hardware::Return<NfcStatus> Nfc::coreInitialized(const hidl_vec<uint8_t>& data) { hidl_vec<uint8_t> copy = data; if (mDevice == nullptr) { if (mDevice == nullptr || copy.size() == 0) { return NfcStatus::FAILED; } int ret = mDevice->core_initialized(mDevice, ©[0]); Loading
security/keymint/aidl/aidl_api/android.hardware.security.keymint/current/android/hardware/security/keymint/IKeyMintDevice.aidl +1 −0 Original line number Diff line number Diff line Loading @@ -48,5 +48,6 @@ interface IKeyMintDevice { void deviceLocked(in boolean passwordOnly, in @nullable android.hardware.security.secureclock.TimeStampToken timestampToken); void earlyBootEnded(); byte[] convertStorageKeyToEphemeral(in byte[] storageKeyBlob); android.hardware.security.keymint.KeyCharacteristics[] getKeyCharacteristics(in byte[] keyBlob, in byte[] appId, in byte[] appData); const int AUTH_TOKEN_MAC_LENGTH = 32; }
security/keymint/aidl/android/hardware/security/keymint/BeginResult.aidl +4 −1 Original line number Diff line number Diff line Loading @@ -25,7 +25,10 @@ import android.hardware.security.keymint.KeyParameter; */ @VintfStability parcelable BeginResult { /* This is the challenge used in verifyAuthorization. It must be a nonce. */ /** * This is the challenge used to verify authorization of an operation. * See IKeyMintOperation.aidl entrypoints updateAad() and update(). */ long challenge; /** Loading