/system/bt/stack/smp/ |
D | p_256_curvepara.cc | 29 elliptic_curve_t* ec; in p_256_init_curve() local 32 ec = &curve_p256; in p_256_init_curve() 34 ec->p[7] = 0xFFFFFFFF; in p_256_init_curve() 35 ec->p[6] = 0x00000001; in p_256_init_curve() 36 ec->p[5] = 0x0; in p_256_init_curve() 37 ec->p[4] = 0x0; in p_256_init_curve() 38 ec->p[3] = 0x0; in p_256_init_curve() 39 ec->p[2] = 0xFFFFFFFF; in p_256_init_curve() 40 ec->p[1] = 0xFFFFFFFF; in p_256_init_curve() 41 ec->p[0] = 0xFFFFFFFF; in p_256_init_curve() [all …]
|
/system/apex/apexd/ |
D | apex_shim.cpp | 95 std::error_code ec; in IsRegularFile() local 96 fs::file_status status = entry.status(ec); in IsRegularFile() 97 if (ec) { in IsRegularFile() 99 << "Failed to stat " << path << " : " << ec); in IsRegularFile() 125 std::error_code ec; in IsWhitelistedTopLevelEntry() local 128 bool is_empty = fs::is_empty(path, ec); in IsWhitelistedTopLevelEntry() 129 if (ec) { in IsWhitelistedTopLevelEntry() 131 << "Failed to scan " << path << " : " << ec); in IsWhitelistedTopLevelEntry() 139 auto iter = fs::directory_iterator(path, ec); in IsWhitelistedTopLevelEntry() 140 if (ec) { in IsWhitelistedTopLevelEntry() [all …]
|
D | apexd_utils.h | 88 std::error_code ec; in WalkDir() local 89 auto it = fs::directory_iterator(path, ec); in WalkDir() 91 while (!ec && it != end) { in WalkDir() 93 it.increment(ec); in WalkDir() 95 if (ec) { in WalkDir() 97 << " for reading : " << ec.message()); in WalkDir() 169 std::error_code ec; in PathExists() local 170 if (!fs::exists(fs::path(path), ec)) { in PathExists() 171 if (ec) { in PathExists() 173 << ec.message()); in PathExists()
|
/system/update_engine/update_manager/ |
D | update_manager-inl.h | 33 EvaluationContext* ec, in EvaluatePolicy() argument 42 if (ec->is_expired()) { in EvaluatePolicy() 44 << ec->DumpContext(); in EvaluatePolicy() 45 ec->ResetExpiration(); in EvaluatePolicy() 49 ec->ResetEvaluation(); in EvaluatePolicy() 57 ec, state_.get(), &error, result, args...); in EvaluatePolicy() 61 << "\nEvaluation context: " << ec->DumpContext(); in EvaluatePolicy() 64 ec, state_.get(), &error, result, args...); in EvaluatePolicy() 81 scoped_refptr<EvaluationContext> ec, in OnPolicyReadyToEvaluate() argument 88 EvalStatus status = EvaluatePolicy(ec.get(), policy_method, &result, args...); in OnPolicyReadyToEvaluate() [all …]
|
D | enterprise_device_policy_impl.cc | 28 EvaluationContext* ec, in UpdateCheckAllowed() argument 36 ec->GetValue(dp_provider->var_device_policy_is_loaded()); in UpdateCheckAllowed() 42 ec->GetValue(dp_provider->var_update_disabled()); in UpdateCheckAllowed() 46 const bool* allow_kiosk_app_control_chrome_version_p = ec->GetValue( in UpdateCheckAllowed() 62 ec->GetValue(system_provider->var_kiosk_required_platform_version()); in UpdateCheckAllowed() 77 ec->GetValue(dp_provider->var_target_version_prefix()); in UpdateCheckAllowed() 85 ec->GetValue(dp_provider->var_rollback_to_target_version()); in UpdateCheckAllowed() 120 ec->GetValue(dp_provider->var_rollback_allowed_milestones()); in UpdateCheckAllowed() 126 ec->GetValue(dp_provider->var_release_channel_delegated()); in UpdateCheckAllowed() 129 ec->GetValue(dp_provider->var_release_channel()); in UpdateCheckAllowed()
|
D | chromeos_policy.cc | 201 EvalStatus ChromeOSPolicy::UpdateCheckAllowed(EvaluationContext* ec, in UpdateCheckAllowed() argument 249 ec, in UpdateCheckAllowed() 262 EvalStatus ChromeOSPolicy::UpdateCanBeApplied(EvaluationContext* ec, in UpdateCanBeApplied() argument 281 ec, in UpdateCanBeApplied() 297 EvaluationContext* ec, in UpdateCanStart() argument 321 EvalStatus check_status = UpdateCheckAllowed(ec, state, error, &check_result); in UpdateCanStart() 332 ec, state, error, &backoff_url_result, update_state); in UpdateCanStart() 348 ec->GetValue(dp_provider->var_device_policy_is_loaded()); in UpdateCanStart() 363 ec->GetValue(state->config_provider()->var_is_oobe_enabled()); in UpdateCanStart() 368 ec->GetValue(state->system_provider()->var_is_oobe_complete()); in UpdateCanStart() [all …]
|
D | interactive_update_policy_impl.cc | 26 EvaluationContext* ec, in UpdateCheckAllowed() argument 32 ec, state->updater_provider(), &interactive)) { in UpdateCheckAllowed() 43 EvaluationContext* ec, in UpdateCanBeApplied() argument 50 ec, state->updater_provider(), &interactive)) { in UpdateCanBeApplied() 61 EvaluationContext* ec, in CheckInteractiveUpdateRequested() argument 66 ec->GetValue(updater_provider->var_forced_update_requested()); in CheckInteractiveUpdateRequested()
|
D | next_update_check_policy_impl.cc | 35 EvaluationContext* ec, in UpdateCheckAllowed() argument 43 ec, state, error, &next_update_check, policy_constants_) != in UpdateCheckAllowed() 47 if (!ec->IsWallclockTimeGreaterThan(next_update_check)) { in UpdateCheckAllowed() 57 EvaluationContext* ec, in NextUpdateCheckTime() argument 72 ec->GetValue(updater_provider->var_updater_started_time()); in NextUpdateCheckTime() 76 ec->GetValue(updater_provider->var_last_checked_time()); in NextUpdateCheckTime() 78 const auto* seed = ec->GetValue(state->random_provider()->var_seed()); in NextUpdateCheckTime() 96 ec->GetValue(updater_provider->var_server_dictated_poll_interval()); in NextUpdateCheckTime() 107 ec->GetValue(updater_provider->var_consecutive_failed_update_checks()); in NextUpdateCheckTime()
|
D | policy_utils.h | 49 EvaluationContext* ec, in ConsultPolicies() argument 56 (policy->*policy_method)(ec, state, error, result, args...); in ConsultPolicies() 72 EvalStatus UpdateCheckAllowed(EvaluationContext* ec, in UpdateCheckAllowed() argument 80 EvaluationContext* ec, in UpdateCanBeApplied() argument 88 EvalStatus UpdateCanStart(EvaluationContext* ec, in UpdateCanStart() argument 96 EvalStatus UpdateDownloadAllowed(EvaluationContext* ec, in UpdateDownloadAllowed() argument 103 EvalStatus P2PEnabled(EvaluationContext* ec, in P2PEnabled() argument 110 EvalStatus P2PEnabledChanged(EvaluationContext* ec, in P2PEnabledChanged() argument
|
D | update_time_restrictions_policy_impl.cc | 35 EvaluationContext* ec, in UpdateCanBeApplied() argument 44 if (!ec->GetValue(dp_provider->var_auto_launched_kiosk_app_id())) in UpdateCanBeApplied() 47 const Time* curr_date = ec->GetValue(time_provider->var_curr_date()); in UpdateCanBeApplied() 48 const int* curr_hour = ec->GetValue(time_provider->var_curr_hour()); in UpdateCanBeApplied() 49 const int* curr_minute = ec->GetValue(time_provider->var_curr_minute()); in UpdateCanBeApplied() 60 ec->GetValue(dp_provider->var_disallowed_time_intervals()); in UpdateCanBeApplied()
|
D | android_things_policy.cc | 48 EvaluationContext* ec, in UpdateCheckAllowed() argument 89 ec, in UpdateCheckAllowed() 105 EvaluationContext* ec, in UpdateCanBeApplied() argument 125 ec, in UpdateCanBeApplied() 141 EvalStatus AndroidThingsPolicy::UpdateCanStart(EvaluationContext* ec, in UpdateCanStart() argument 152 EvalStatus AndroidThingsPolicy::UpdateDownloadAllowed(EvaluationContext* ec, in UpdateDownloadAllowed() argument 163 EvalStatus AndroidThingsPolicy::P2PEnabled(EvaluationContext* ec, in P2PEnabled() argument 173 EvalStatus AndroidThingsPolicy::P2PEnabledChanged(EvaluationContext* ec, in P2PEnabledChanged() argument
|
D | chromeos_policy.h | 57 EvalStatus UpdateCheckAllowed(EvaluationContext* ec, 63 EvaluationContext* ec, 69 EvalStatus UpdateCanStart(EvaluationContext* ec, 75 EvalStatus UpdateDownloadAllowed(EvaluationContext* ec, 80 EvalStatus P2PEnabled(EvaluationContext* ec, 85 EvalStatus P2PEnabledChanged(EvaluationContext* ec, 151 EvaluationContext* ec, 169 EvalStatus UpdateScattering(EvaluationContext* ec,
|
D | android_things_policy.h | 35 EvalStatus UpdateCheckAllowed(EvaluationContext* ec, 43 EvaluationContext* ec, 50 EvalStatus UpdateCanStart(EvaluationContext* ec, 57 EvalStatus UpdateDownloadAllowed(EvaluationContext* ec, 64 EvalStatus P2PEnabled(EvaluationContext* ec, 71 EvalStatus P2PEnabledChanged(EvaluationContext* ec,
|
D | default_policy.cc | 37 EvalStatus DefaultPolicy::UpdateCheckAllowed(EvaluationContext* ec, in UpdateCheckAllowed() argument 51 ec->IsMonotonicTimeGreaterThan( in UpdateCheckAllowed() 62 EvalStatus DefaultPolicy::UpdateCanBeApplied(EvaluationContext* ec, in UpdateCanBeApplied() argument 71 EvalStatus DefaultPolicy::UpdateCanStart(EvaluationContext* ec, in UpdateCanStart() argument 90 EvalStatus DefaultPolicy::UpdateDownloadAllowed(EvaluationContext* ec, in UpdateDownloadAllowed() argument 98 EvalStatus DefaultPolicy::P2PEnabled(EvaluationContext* ec, in P2PEnabled() argument 106 EvalStatus DefaultPolicy::P2PEnabledChanged(EvaluationContext* ec, in P2PEnabledChanged() argument
|
D | update_manager.cc | 49 for (auto& ec : ec_repo_) in ~UpdateManager() local 50 ec->RemoveObserversAndTimeout(); in ~UpdateManager() 53 void UpdateManager::UnregisterEvalContext(EvaluationContext* ec) { in UnregisterEvalContext() argument 54 if (!ec_repo_.erase(ec)) { in UnregisterEvalContext()
|
D | default_policy.h | 68 EvalStatus UpdateCheckAllowed(EvaluationContext* ec, 74 EvaluationContext* ec, 80 EvalStatus UpdateCanStart(EvaluationContext* ec, 86 EvalStatus UpdateDownloadAllowed(EvaluationContext* ec, 91 EvalStatus P2PEnabled(EvaluationContext* ec, 96 EvalStatus P2PEnabledChanged(EvaluationContext* ec,
|
D | out_of_box_experience_policy_impl.cc | 23 EvalStatus OobePolicyImpl::UpdateCheckAllowed(EvaluationContext* ec, in UpdateCheckAllowed() argument 31 ec->GetValue(state->config_provider()->var_is_oobe_enabled()); in UpdateCheckAllowed() 34 ec->GetValue(system_provider->var_is_oobe_complete()); in UpdateCheckAllowed()
|
D | interactive_update_policy_impl.h | 35 EvalStatus UpdateCheckAllowed(EvaluationContext* ec, 41 EvaluationContext* ec, 57 bool CheckInteractiveUpdateRequested(EvaluationContext* ec,
|
D | policy.h | 244 virtual EvalStatus UpdateCheckAllowed(EvaluationContext* ec, 254 EvaluationContext* ec, 266 virtual EvalStatus UpdateCanStart(EvaluationContext* ec, 278 virtual EvalStatus UpdateDownloadAllowed(EvaluationContext* ec, 285 virtual EvalStatus P2PEnabled(EvaluationContext* ec, 295 virtual EvalStatus P2PEnabledChanged(EvaluationContext* ec,
|
D | official_build_check_policy_impl.cc | 23 EvaluationContext* ec, in UpdateCheckAllowed() argument 28 ec->GetValue(state->system_provider()->var_is_official_build()); in UpdateCheckAllowed()
|
D | enough_slots_ab_updates_policy_impl.cc | 24 EvaluationContext* ec, in UpdateCheckAllowed() argument 29 ec->GetValue(state->system_provider()->var_num_slots()); in UpdateCheckAllowed()
|
D | api_restricted_downloads_policy_impl.cc | 27 EvaluationContext* ec, in UpdateCanBeApplied() argument 34 ec->GetValue(state->updater_provider()->var_update_restrictions()); in UpdateCanBeApplied()
|
D | next_update_check_policy_impl.h | 51 EvalStatus UpdateCheckAllowed(EvaluationContext* ec, 74 EvaluationContext* ec,
|
/system/security/keystore-engine/ |
D | android_engine.cpp | 269 void operator()(EC_KEY* ec) const { in operator ()() 270 EC_KEY_free(ec); in operator ()() 315 Unique_EC_KEY ec(EC_KEY_new_method(g_keystore_engine->engine())); in wrap_ecdsa() local 316 if (ec.get() == nullptr) { in wrap_ecdsa() 320 if (!EC_KEY_set_group(ec.get(), EC_KEY_get0_group(public_ecdsa)) || in wrap_ecdsa() 321 !EC_KEY_set_public_key(ec.get(), EC_KEY_get0_public_key(public_ecdsa))) { in wrap_ecdsa() 330 if (!EC_KEY_set_ex_data(ec.get(), g_keystore_engine->ec_key_ex_index(), in wrap_ecdsa() 338 !EVP_PKEY_assign_EC_KEY(result.get(), ec.get())) { in wrap_ecdsa() 341 OWNERSHIP_TRANSFERRED(ec); in wrap_ecdsa()
|
/system/ca-certificates/google/files/ |
D | 5021a0a2.0 | 28 1d:a2:00:01:00:02:ec:b7:60:80:78:8d:b6:06 53 27:9c:e3:5c:cf:4e:81:dc:19:bb:91:90:7d:ec:e6: 73 ab:35:7c:53:3e:a6:27:f1:a1:2d:da:1a:23:9d:cc:dd:ec:3c: 76 ec:c9:d6:47:72:78:4b:10:46:14:8e:5f:0e:af:ec:c7:2f:ab: 77 10:d7:b6:f1:6e:ec:86:b2:c2:e8:0d:92:73:dc:a2:f4:0f:3a: 81 0f:2c:b6:9e:e3:15:bf:d9:36:1c:ba:25:1a:52:3d:1a:ec:22:
|