/system/keymaster/android_keymaster/ |
D | operation.cpp | 100 !key.authorizations().Contains(TAG_PADDING, *padding) && in GetAndValidatePadding() 101 !key.authorizations().Contains(TAG_PADDING_OLD, *padding)) { in GetAndValidatePadding() 125 if (key.authorizations().Contains(TAG_DIGEST, KM_DIGEST_NONE)) { in GetAndValidateDigest() 139 !key.authorizations().Contains(TAG_DIGEST, *digest) && in GetAndValidateDigest() 140 !key.authorizations().Contains(TAG_DIGEST_OLD, *digest)) { in GetAndValidateDigest()
|
/system/keymaster/km_openssl/ |
D | aes_key.cpp | 50 if (hw_enforced.Contains(TAG_BLOCK_MODE, KM_MODE_GCM) || in LoadKey() 51 sw_enforced.Contains(TAG_BLOCK_MODE, KM_MODE_GCM)) { in LoadKey() 70 if (key_description.Contains(TAG_BLOCK_MODE, KM_MODE_GCM)) { in validate_algorithm_specific_new_key_params()
|
D | ec_key_factory.cpp | 95 } else if (!authorizations.Contains(TAG_KEY_SIZE, key_size)) { in GenerateKey() 97 } else if (!authorizations.Contains(TAG_EC_CURVE, ec_curve)) { in GenerateKey() 135 if (key_description.Contains(TAG_ATTESTATION_CHALLENGE)) { in GenerateKey() 143 !key_description.Contains(TAG_PURPOSE, KM_PURPOSE_SIGN) /* fake_signature */, &error); in GenerateKey() 181 if (key_description.Contains(KM_TAG_ATTESTATION_CHALLENGE)) { in ImportKey() 189 !key_description.Contains(TAG_PURPOSE, KM_PURPOSE_SIGN) /* fake_signature */, &error); in ImportKey()
|
D | attestation_utils.cpp | 213 if (!auths.Contains(TAG_ALGORITHM, KM_ALGORITHM_RSA) && in check_attest_key_auths() 214 !auths.Contains(TAG_ALGORITHM, KM_ALGORITHM_EC)) { in check_attest_key_auths() 217 if (!auths.Contains(TAG_PURPOSE, KM_PURPOSE_ATTEST_KEY)) { in check_attest_key_auths() 296 cert_params.is_signing_key = proxy.Contains(TAG_PURPOSE, KM_PURPOSE_SIGN); in generate_attestation() 297 cert_params.is_encryption_key = proxy.Contains(TAG_PURPOSE, KM_PURPOSE_DECRYPT); in generate_attestation() 298 cert_params.is_agreement_key = proxy.Contains(TAG_PURPOSE, KM_PURPOSE_AGREE_KEY); in generate_attestation()
|
D | rsa_key_factory.cpp | 105 if (key_description.Contains(TAG_ATTESTATION_CHALLENGE)) { in GenerateKey() 112 key_size < 1024 || !key_description.Contains(TAG_PURPOSE, KM_PURPOSE_SIGN); in GenerateKey() 153 if (key_description.Contains(KM_TAG_ATTESTATION_CHALLENGE)) { in ImportKey() 160 key_size < 1024 || !key_description.Contains(TAG_PURPOSE, KM_PURPOSE_SIGN); in ImportKey()
|
D | triple_des_key.cpp | 58 if (key_description.Contains(TAG_MIN_MAC_LENGTH)) return KM_ERROR_INVALID_TAG; in validate_algorithm_specific_new_key_params()
|
D | certificate_utils.cpp | 362 cert_params.is_signing_key = key.authorizations().Contains(TAG_PURPOSE, KM_PURPOSE_SIGN); in generate_self_signed_cert() 363 cert_params.is_encryption_key = key.authorizations().Contains(TAG_PURPOSE, KM_PURPOSE_DECRYPT); in generate_self_signed_cert() 364 cert_params.is_agreement_key = key.authorizations().Contains(TAG_PURPOSE, KM_PURPOSE_AGREE_KEY); in generate_self_signed_cert()
|
D | rsa_operation.cpp | 131 if (!begin_params.Contains(TAG_PADDING, KM_PAD_RSA_OAEP)) { in GetAndValidateMgfDigest() 140 if (!key.authorizations().Contains(TAG_RSA_OAEP_MGF_DIGEST, KM_DIGEST_SHA1)) { in GetAndValidateMgfDigest() 150 } else if (!key.authorizations().Contains(TAG_RSA_OAEP_MGF_DIGEST, *digest)) { in GetAndValidateMgfDigest()
|
/system/update_engine/payload_consumer/ |
D | snapshot_extent_writer_unittest.cc | 80 bool Contains(size_t block) { in Contains() function in chromeos_update_engine::FakeCowWriter 122 ASSERT_TRUE(cow_writer_.Contains(123)) in TEST_F() 141 ASSERT_TRUE(cow_writer_.Contains(123)); in TEST_F() 142 ASSERT_TRUE(cow_writer_.Contains(125)); in TEST_F() 170 ASSERT_TRUE(cow_writer_.Contains(123)); in TEST_F() 171 ASSERT_TRUE(cow_writer_.Contains(125)); in TEST_F()
|
/system/linkerconfig/modules/tests/ |
D | apex_test.cc | 42 using ::testing::Contains; 108 Contains("bar.so")); in TEST() 160 ASSERT_THAT((*apexes)["foo"].require_libs, Contains("bar.so")); in TEST_F() 164 ASSERT_THAT((*apexes)["bar"].provide_libs, Contains("bar.so")); in TEST_F() 168 ASSERT_THAT((*apexes)["baz"].jni_libs, Contains("baz.so")); in TEST_F()
|
/system/apex/apexd/ |
D | apex_database_test.cpp | 104 bool Contains(const MountedApexDatabase& db, const std::string& package, in Contains() function 148 ASSERT_TRUE(Contains(db, kPackage, kLoopName, kPath, kMountPoint, kDeviceName, in TEST() 154 EXPECT_FALSE(Contains(db, kPackage, kLoopName, kPath, kMountPoint, in TEST() 179 ASSERT_TRUE(Contains(db, kPackage[i], kLoopName[i], kPath[i], in TEST() 186 EXPECT_FALSE(Contains(db, kPackage[0], kLoopName[0], kPath[0], kMountPoint[0], in TEST() 190 EXPECT_TRUE(Contains(db, kPackage[1], kLoopName[1], kPath[1], kMountPoint[1], in TEST() 194 EXPECT_TRUE(Contains(db, kPackage[2], kLoopName[2], kPath[2], kMountPoint[2], in TEST() 198 EXPECT_TRUE(Contains(db, kPackage[3], kLoopName[3], kPath[3], kMountPoint[3], in TEST()
|
/system/bt/stack/test/ |
D | ble_advertiser_test.cc | 28 using ::testing::Contains; 264 AllOf(SizeIs(1), Contains(Field(&SetEnableData::handle, in TEST_F() 282 AllOf(SizeIs(1), Contains(Field(&SetEnableData::handle, in TEST_F() 403 AllOf(SizeIs(1), Contains(Field(&SetEnableData::handle, in TEST_F() 415 AllOf(SizeIs(1), Contains(Field(&SetEnableData::handle, in TEST_F() 492 AllOf(SizeIs(1), Contains(Field(&SetEnableData::handle, in TEST_F() 712 Contains(Field(&SetEnableData::max_extended_advertising_events, in TEST_F() 757 Contains(Field(&SetEnableData::max_extended_advertising_events, in TEST_F() 774 AllOf(SizeIs(1), Contains(Field(&SetEnableData::handle, in TEST_F() 862 AllOf(SizeIs(1), Contains(Field(&SetEnableData::handle, in TEST_F() [all …]
|
/system/nvram/hal/tests/ |
D | nvram_hal_test.cc | 47 bool Contains(T value, const std::vector<T>& target) { in Contains() function 56 [target](T value) { return Contains(value, target); }); in ContainsAll() 67 CHECK(!Contains(NV_CONTROL_PERSISTENT_WRITE_LOCK, control_list)) in CreateSpace() 69 CHECK(!Contains(NV_CONTROL_BOOT_WRITE_LOCK, control_list) || in CreateSpace() 70 !Contains(NV_CONTROL_WRITE_AUTHORIZATION, control_list) || in CreateSpace() 184 while (Contains(*index, space_index_list)) { in GetNextBurnSpace() 251 EXPECT_TRUE(Contains(kTestIndex1, space_index_list2)); in TEST() 259 EXPECT_FALSE(Contains(kTestIndex1, space_index_list3)); in TEST()
|
/system/tools/hidl/lint/test/ |
D | main.cpp | 28 using ::testing::Contains; 93 EXPECT_THAT(errors, Contains(Property(&Lint::getMessage, ContainsRegex(errorMsg)))); \
|
/system/keymaster/include/keymaster/ |
D | authorization_set.h | 229 bool Contains(keymaster_tag_t tag) const { return find(tag) != -1; } in Contains() function 240 bool Contains(TypedEnumTag<KM_ENUM_REP, Tag, T> tag, T val) const { in Contains() function 248 bool Contains(TypedEnumTag<KM_ENUM, Tag, T> tag, T val) const { in Contains() function 255 template <keymaster_tag_t Tag> bool Contains(TypedTag<KM_UINT, Tag> tag, uint32_t val) const { in Contains() function 700 template <typename... ARGS> bool Contains(ARGS&&... args) const { in Contains() function 701 return hw_enforced_.Contains(forward<ARGS>(args)...) || in Contains() 702 sw_enforced_.Contains(forward<ARGS>(args)...); in Contains()
|
/system/extras/simpleperf/ |
D | thread_tree.h | 60 uint64_t Contains(uint64_t addr) const { return addr >= start_addr && addr < get_end_addr(); } in Contains() function 63 if (Contains(addr)) { in GetVaddrInFile()
|
/system/apex/libs/libapexutil/ |
D | apexutil_test.cpp | 35 using ::testing::Contains;
|
/system/timezone/ |
D | README.android | 12 - Contains tools useful for debugging time zone issues on Android devices. 19 - Contains files that provide inputs to the time zone rules update process. 24 - Contains tools that generate Android time zone files. 27 - Contains some derived files from the time zone rules update process and 32 - Contains tools and scripts related to testing time zone update code. See
|
/system/keymaster/contexts/ |
D | pure_soft_keymaster_context.cpp | 261 if (hw_enforced.Contains(KM_TAG_ROLLBACK_RESISTANCE) || in ParseKeyBlob() 262 hw_enforced.Contains(KM_TAG_USAGE_COUNT_LIMIT)) { in ParseKeyBlob() 431 if (!key->hw_enforced().Contains(TAG_PURPOSE, KM_PURPOSE_WRAP) && in UnwrapKey() 432 !key->sw_enforced().Contains(TAG_PURPOSE, KM_PURPOSE_WRAP)) { in UnwrapKey()
|
D | keymaster1_passthrough_context.cpp | 108 if (key->hw_enforced().Contains(TAG_PURPOSE) && in UpgradeKeyBlob() 109 !key->hw_enforced().Contains(TAG_OS_PATCHLEVEL)) { in UpgradeKeyBlob()
|
D | soft_keymaster_context.cpp | 215 if (km1_dev_ && key->hw_enforced().Contains(TAG_PURPOSE) && in UpgradeKeyBlob() 216 !key->hw_enforced().Contains(TAG_OS_PATCHLEVEL)) in UpgradeKeyBlob()
|
/system/keymaster/ng/include/ |
D | authorization_set.h | 155 bool Contains(Tag tag) const { return find(tag) != -1; } in Contains() function 158 bool Contains(TypedTag<tag_type, tag> ttag, const ValueT& value) const { in Contains() function
|
/system/keymaster/legacy_support/ |
D | ec_keymaster1_key.cpp | 80 } else if (!key_description.Contains(TAG_KEY_SIZE, key_size)) { in GenerateKey()
|
/system/bt/gd/packet/parser/ |
D | README | 54 Inheritance vs Contains
|
/system/chre/ |
D | README.md | 56 - ``chre_api/``: Contains the official definition of the CHRE API (current and 60 - ``doc/``: Contains documentation for the CHRE framework and associated topics
|