/system/bt/service/test/ |
D | settings_unittest.cc | 48 EXPECT_TRUE(base::CommandLine::Init(arraysize(argv), argv)); in TEST_F() 49 EXPECT_TRUE(settings_.Init()); in TEST_F() 55 EXPECT_TRUE(base::CommandLine::Init(arraysize(argv), argv)); in TEST_F() 56 EXPECT_FALSE(settings_.Init()); in TEST_F() 61 EXPECT_TRUE(base::CommandLine::Init(arraysize(argv), argv)); in TEST_F() 62 EXPECT_FALSE(settings_.Init()); in TEST_F() 67 EXPECT_TRUE(base::CommandLine::Init(arraysize(argv), argv)); in TEST_F() 68 EXPECT_FALSE(settings_.Init()); in TEST_F() 74 EXPECT_TRUE(base::CommandLine::Init(arraysize(argv), argv)); in TEST_F() 75 EXPECT_FALSE(settings_.Init()); in TEST_F() [all …]
|
/system/keymaster/tests/ |
D | kdf_test.cpp | 35 ASSERT_TRUE(kdf.Init(KM_DIGEST_SHA1, key, 128, salt, 128)); in TEST() 36 ASSERT_TRUE(kdf.Init(KM_DIGEST_SHA_2_256, key, 128, salt, 128)); in TEST() 37 ASSERT_TRUE(kdf.Init(KM_DIGEST_SHA1, key, 128, nullptr, 0)); in TEST() 38 ASSERT_FALSE(kdf.Init(KM_DIGEST_MD5, key, 128, salt, 128)); in TEST() 39 ASSERT_FALSE(kdf.Init(KM_DIGEST_SHA1, nullptr, 0, salt, 128)); in TEST() 40 ASSERT_FALSE(kdf.Init(KM_DIGEST_SHA1, nullptr, 128, salt, 128)); in TEST() 41 ASSERT_FALSE(kdf.Init(KM_DIGEST_SHA1, key, 0, salt, 128)); in TEST()
|
/system/update_engine/update_manager/ |
D | state_factory.cc | 79 if (!(config_provider->Init() && device_policy_provider->Init() && in DefaultStateFactory() 80 random_provider->Init() && in DefaultStateFactory() 82 shill_provider->Init() && in DefaultStateFactory() 84 system_provider->Init() && time_provider->Init() && in DefaultStateFactory() 85 updater_provider->Init())) { in DefaultStateFactory()
|
D | real_device_policy_provider_unittest.cc | 121 EXPECT_TRUE(provider_->Init()); in TEST_F() 130 EXPECT_TRUE(provider_->Init()); in TEST_F() 148 EXPECT_TRUE(provider_->Init()); in TEST_F() 159 EXPECT_TRUE(provider_->Init()); in TEST_F() 172 EXPECT_TRUE(provider_->Init()); in TEST_F() 201 EXPECT_TRUE(provider_->Init()); in TEST_F() 242 EXPECT_TRUE(provider_->Init()); in TEST_F() 255 EXPECT_TRUE(provider_->Init()); in TEST_F() 267 EXPECT_TRUE(provider_->Init()); in TEST_F() 281 EXPECT_TRUE(provider_->Init()); in TEST_F() [all …]
|
/system/keymaster/include/keymaster/km_openssl/ |
D | hkdf.h | 35 bool Init(Buffer& secret, Buffer& salt) { in Init() function 36 return Init(secret.peek_read(), secret.available_read(), salt.peek_read(), in Init() 40 bool Init(const uint8_t* secret, size_t secret_len, const uint8_t* salt, size_t salt_len) { in Init() function 41 return Kdf::Init(KM_DIGEST_SHA_2_256, secret, secret_len, salt, salt_len); in Init()
|
D | iso18033kdf.h | 37 bool Init(keymaster_digest_t digest_type, const uint8_t* secret, size_t secret_len) { in Init() function 38 return Kdf::Init(digest_type, secret, secret_len, nullptr /* salt */, 0 /* salt_len */); in Init()
|
D | hmac.h | 34 bool Init(const uint8_t* key, size_t key_length); 35 bool Init(const Buffer& key);
|
/system/update_engine/ |
D | omaha_request_params_unittest.cc | 78 EXPECT_TRUE(params_.Init("", "", false)); in TEST_F() 84 EXPECT_TRUE(params_.Init("ForcedVersion", "", false)); in TEST_F() 90 EXPECT_TRUE(params_.Init("", "http://forced.google.com", false)); in TEST_F() 95 EXPECT_TRUE(params_.Init("", "", false)); in TEST_F() 100 EXPECT_TRUE(params_.Init("", "", false)); in TEST_F() 107 EXPECT_TRUE(params_.Init("", "", false)); in TEST_F() 115 EXPECT_TRUE(params.Init("", "", false)); in TEST_F() 120 EXPECT_TRUE(params_.Init("", "", false)); in TEST_F() 129 EXPECT_TRUE(params.Init("", "", false)); in TEST_F() 134 EXPECT_TRUE(params_.Init("", "", false)); in TEST_F() [all …]
|
D | daemon_state_android.cc | 56 if (!prefs->Init(non_volatile_path.Append(kPrefsSubDirectory))) { in Initialize() 64 certificate_checker_->Init(); in Initialize() 76 update_attempter_->Init(); in StartUpdater()
|
D | testrunner.cc | 42 chromeos_update_engine::Terminator::Init(2); in main() 44 base::CommandLine::Init(argc, argv); in main()
|
D | real_system_state.cc | 108 if (!prefs->Init(non_volatile_path.Append(kPrefsSubDirectory))) { in Initialize() 121 if (!prefs->Init( in Initialize() 143 if (!request_params_.Init("", "", false)) { in Initialize() 150 certificate_checker_->Init(); in Initialize() 156 update_attempter_->Init(); in Initialize()
|
D | sideload_main.cc | 144 handler.Init(); in ApplyUpdatePayload() 146 subprocess.Init(&handler); in ApplyUpdatePayload() 170 update_attempter.Init(); in ApplyUpdatePayload() 197 chromeos_update_engine::Terminator::Init(); in main() 199 brillo::FlagHelper::Init(argc, argv, "Update Engine Sideload"); in main()
|
/system/core/libziparchive/ |
D | zip_archive_stream_entry.cc | 40 bool ZipArchiveStreamEntry::Init(const ZipEntry& entry) { in Init() function in ZipArchiveStreamEntry 57 bool Init(const ZipEntry& entry) override; 66 bool ZipArchiveStreamEntryUncompressed::Init(const ZipEntry& entry) { in Init() function in ZipArchiveStreamEntryUncompressed 67 if (!ZipArchiveStreamEntry::Init(entry)) { in Init() 121 bool Init(const ZipEntry& entry) override; 141 bool ZipArchiveStreamEntryCompressed::Init(const ZipEntry& entry) { in Init() function in ZipArchiveStreamEntryCompressed 142 if (!ZipArchiveStreamEntry::Init(entry)) { in Init() 259 bool Init(const ZipEntry& entry) override; 262 bool ZipArchiveStreamEntryRawCompressed::Init(const ZipEntry& entry) { in Init() function in ZipArchiveStreamEntryRawCompressed 263 if (!ZipArchiveStreamEntryUncompressed::Init(entry)) { in Init() [all …]
|
/system/update_engine/common/ |
D | terminator.cc | 27 void Terminator::Init() { in Init() function in chromeos_update_engine::Terminator 33 void Terminator::Init(int exit_status) { in Init() function in chromeos_update_engine::Terminator 35 Init(); in Init()
|
D | terminator.h | 30 static void Init(); 31 static void Init(int exit_status);
|
/system/core/libunwindstack/tests/ |
D | MemoryFileTest.cpp | 50 ASSERT_TRUE(memory_.Init(tf_->path, 0)); in TEST_F() 60 ASSERT_TRUE(memory_.Init(tf_->path, 10)); in TEST_F() 76 ASSERT_TRUE(memory_.Init(tf_->path, pagesize + 15)); in TEST_F() 92 ASSERT_TRUE(memory_.Init(tf_->path, 2 * pagesize)); in TEST_F() 113 ASSERT_TRUE(memory_.Init(tf_->path, 2 * pagesize + 10)); in TEST_F() 135 ASSERT_FALSE(memory_.Init(tf_->path, file_size + 2 * pagesize)); in TEST_F() 137 ASSERT_FALSE(memory_.Init(tf_->path, file_size)); in TEST_F() 139 ASSERT_FALSE(memory_.Init(tf_->path, 2 * pagesize + pagesize / 2 + pagesize / 4)); in TEST_F() 154 ASSERT_TRUE(memory_.Init(tf_->path, 0)); in TEST_F() 177 ASSERT_TRUE(memory_.Init(tf_->path, 0)); in TEST_F() [all …]
|
D | ElfTest.cpp | 113 ASSERT_FALSE(elf.Init()); in TEST_F() 125 ASSERT_FALSE(elf.Init()); in TEST_F() 149 ASSERT_FALSE(elf.Init()); in TEST_F() 162 ASSERT_FALSE(elf.Init()); in TEST_F() 174 ASSERT_TRUE(elf.Init()); in TEST_F() 186 ASSERT_TRUE(elf.Init()); in TEST_F() 198 ASSERT_TRUE(elf.Init()); in TEST_F() 210 ASSERT_TRUE(elf.Init()); in TEST_F() 222 ASSERT_TRUE(elf.Init()); in TEST_F() 234 ASSERT_TRUE(elf.Init()); in TEST_F() [all …]
|
/system/update_engine/payload_consumer/ |
D | verity_writer_android_unittest.cc | 48 ASSERT_TRUE(verity_writer_.Init(partition_)); in TEST_F() 66 ASSERT_TRUE(verity_writer_.Init(partition_)); in TEST_F() 74 EXPECT_FALSE(verity_writer_.Init(partition_)); in TEST_F() 79 EXPECT_FALSE(verity_writer_.Init(partition_)); in TEST_F() 86 ASSERT_TRUE(verity_writer_.Init(partition_)); in TEST_F() 108 ASSERT_TRUE(verity_writer_.Init(partition_)); in TEST_F()
|
D | extent_reader_unittest.cc | 82 EXPECT_TRUE(reader.Init(fd_, {extents.begin(), extents.end()}, kBlockSize)); in TEST_F() 94 EXPECT_TRUE(reader.Init(fd_, {extents.begin(), extents.end()}, kBlockSize)); in TEST_F() 103 EXPECT_TRUE(reader.Init(fd_, {}, kBlockSize)); in TEST_F() 113 EXPECT_TRUE(reader.Init(fd_, {extents.begin(), extents.end()}, kBlockSize)); in TEST_F() 122 EXPECT_TRUE(reader.Init(fd_, {extents.begin(), extents.end()}, kBlockSize)); in TEST_F() 129 reader.Init(fd_, {}, kBlockSize); in TEST_F() 137 EXPECT_TRUE(reader.Init(fd_, {extents.begin(), extents.end()}, kBlockSize)); in TEST_F() 150 EXPECT_TRUE(reader.Init(fd_, {extents.begin(), extents.end()}, kBlockSize)); in TEST_F()
|
D | xz_extent_writer_unittest.cc | 90 EXPECT_TRUE(xz_writer_->Init(fd_, {}, 1024)); in WriteAll() 133 EXPECT_TRUE(xz_writer_->Init(fd_, {}, 1024)); in TEST_F() 141 EXPECT_TRUE(xz_writer_->Init(fd_, {}, 1024)); in TEST_F()
|
D | extent_writer.h | 41 virtual bool Init(FileDescriptorPtr fd, 57 bool Init(FileDescriptorPtr fd, in Init() function
|
/system/core/libunwindstack/ |
D | MapInfo.cpp | 42 if (!memory->Init(name, prev_map->offset, map_size)) { in InitFileMemoryFromPreviousReadOnlyMap() 51 if (!memory->Init(name, prev_map->offset, max_size)) { in InitFileMemoryFromPreviousReadOnlyMap() 63 if (memory->Init(name, 0)) { in GetFileMemory() 84 if (!memory->Init(name, offset, map_size)) { in GetFileMemory() 93 if (memory->Init(name, offset, max_size)) { in GetFileMemory() 97 if (memory->Init(name, offset, map_size)) { in GetFileMemory() 107 if (memory->Init(name, 0) && Elf::IsValidElf(memory.get())) { in GetFileMemory() 127 if (memory->Init(name, offset, map_size)) { in GetFileMemory() 222 elf->Init(); in GetElf()
|
/system/keymaster/km_openssl/ |
D | hmac.cpp | 34 bool HmacSha256::Init(const Buffer& key) { in Init() function in keymaster::HmacSha256 35 return Init(key.peek_read(), key.available_read()); in Init() 38 bool HmacSha256::Init(const uint8_t* key, size_t key_len) { in Init() function in keymaster::HmacSha256
|
D | hkdf.cpp | 36 result = prk_hmac.Init(salt_.get(), salt_len_); in GenerateKey() 43 result = prk_hmac.Init(zeros.get(), digest_size_); in GenerateKey() 69 result = hmac.Init(pseudo_random_key.get(), digest_size_); in GenerateKey()
|
/system/core/fs_mgr/libdm/ |
D | loop_control.cpp | 95 Init(); in LoopDevice() 104 Init(); in LoopDevice() 116 void LoopDevice::Init() { in Init() function in android::dm::LoopDevice
|