Home
last modified time | relevance | path

Searched refs:None (Results 1 – 25 of 90) sorted by relevance

1234

/system/security/keystore2/src/
Dpermission.rs290 KeystorePerm with default (None = 0, none) {
371 return None; in next()
541 None => { in check_key_permission()
704 let key = KeyDescriptor { domain: Domain::APP, nspace: 0, alias: None, blob: None }; in check_grant_permission_app()
725 alias: None, in check_grant_permission_selinux()
726 blob: None, in check_grant_permission_selinux()
741 let key = KeyDescriptor { domain: Domain::GRANT, nspace: 0, alias: None, blob: None }; in check_key_permission_domain_grant()
766 let key = KeyDescriptor { domain: Domain::APP, nspace: 0, alias: None, blob: None }; in check_key_permission_domain_app()
768 assert!(check_key_permission(0, &system_server_ctx, KeyPerm::use_(), &key, &None).is_ok()); in check_key_permission_domain_app()
769 … assert!(check_key_permission(0, &system_server_ctx, KeyPerm::delete(), &key, &None).is_ok()); in check_key_permission_domain_app()
[all …]
Denforcements.rs71 Arc::new(Self { state: AuthRequestState::OpAuth, hat: Mutex::new(None) }) in op_auth()
77 hat: Mutex::new(None), in timestamped_op_auth()
109 AuthRequestState::OpAuth => None, in get_auth_tokens()
274 None in finalize_create_authorization()
276 _ => None, in finalize_create_authorization()
292 let mut confirmation_token: Option<Vec<u8>> = None; in before_finish()
343 None in get_auth_tokens()
351 DeferredAuthState::NoAuthRequired => Ok((None, None)), in get_auth_tokens()
417 None => { in authorize_create()
419 None, in authorize_create()
[all …]
Dtry_insert.rs63 None => unsafe { std::hint::unreachable_unchecked() }, in get_or_try_to_insert_with()
82 let mut x = None; in test()
84 assert_eq!(x, None); in test()
96 x = None; in test()
Draw_device.rs81 Some(Error::Km(ErrorCode::HARDWARE_TYPE_UNAVAILABLE)) => Ok(None), in get_or_none()
127 &CertificateInfo::new(None, None), in create_and_store_key()
141 blob: None, in internal_descriptor()
162 Some(&Error::Rc(ResponseCode::KEY_NOT_FOUND)) => Ok(None), in not_found_is_none()
197 None in lookup_or_generate_key()
232 km_dev.generateKey(&params, None) in lookup_or_generate_key()
329 operation.finish(Some(input), None, None, None, None) in use_key_in_one_step()
Dlegacy_blob.rs279 let mut multi: Option<u8> = None; in decode_alias()
286 None in decode_alias()
288 (b'+'..=b'.', None) => Some((c - b'+') << 6), in decode_alias()
289 (b'0'..=b'~', None) => { in decode_alias()
291 None in decode_alias()
321 _ => None, in new_from_stream()
385 (blob_types::SUPER_KEY, _, None) | (blob_types::SUPER_KEY_AES256, _, None) => { in new_from_stream()
419 decrypt(&data, &iv, &tag, None, None) in new_from_stream_decrypt_with()
560 None => return Ok(Vec::new()), in read_characteristics_file()
584 _ => None, in read_characteristics_file()
[all …]
Ddatabase.rs553 None in try_get()
1246 KeyDescriptor { domain, nspace, alias: Some(alias.to_string()), blob: None }; in key_exists()
1321 blob: None, in load_super_key()
1331 Some(KsError::Rc(ResponseCode::KEY_NOT_FOUND)) => Ok(None), in load_super_key()
1377 None => None, in get_or_create_key_with()
1390 None => { in get_or_create_key_with()
1567 None, in create_attestation_key_entry()
1646 (None, SubComponentType::CERT) | (None, SubComponentType::CERT_CHAIN) => { in set_blob_internal()
1654 (None, _) => { in set_blob_internal()
1770 None, in store_signed_attestation_certificate_chain()
[all …]
Dsecurity_level.rs125 0 => None, in store_new_key()
129 0 => None, in store_new_key()
219 check_key_permission(KeyPerm::use_(), key, &None) in create_operation()
222 check_key_permission(KeyPerm::req_forced_op(), key, &None).context( in create_operation()
229 None => { in create_operation()
236 None, in create_operation()
237 None, in create_operation()
361 None => { in create_operation()
379 0 => None, in create_operation()
385 upgradedBlob: if key.domain == Domain::BLOB { upgraded_blob } else { None }, in create_operation()
[all …]
Dapc.rs108 None => match root_cause.downcast_ref::<selinux::Error>() { in map_or_log_err()
113 Err(BinderStatus::new_service_specific_error(rc, None)) in map_or_log_err()
140 0..=2 => return None, in get_remaining_back_off()
190 Self { session: None, rate_limiting: Default::default(), confirmation_token_sender } in new()
220 None => return, // Nothing to do in result()
246 (ResponseCode::OK, _, None) => { in result()
285 None => {} in present_prompt()
298 None => { in present_prompt()
332 None => { in cancel_prompt()
Dboot_level_keys.rs113 None, in get_level_zero_key()
160 return Ok(None); in get_hkdf_key()
259 assert_eq!(None, blkc.aes_key(0)?); in test_output_is_consistent()
266 assert_eq!(None, blkc.aes_key(0)?); in test_output_is_consistent()
273 assert_eq!(None, blkc.aes_key(0)?); in test_output_is_consistent()
280 assert_eq!(None, blkc.aes_key(0)?); in test_output_is_consistent()
281 assert_eq!(None, blkc.aes_key(10)?); in test_output_is_consistent()
Dwatchdog.rs76 let mut next_timeout: Option<Duration> = None; in update_overdue_and_find_next_timeout()
92 None => Some(timeout), in update_overdue_and_find_next_timeout()
130 None => { in log_report()
177 thread: None, in new()
197 return None; in watch_with_optional()
217 Self::watch_with_optional(wd, None, id, timeout) in watch()
273 (true, None) => (Self::NOISY_REPORT_TIMEOUT, false), in spawn_thread()
274 (false, None) => (state.timeout, true), in spawn_thread()
Dasync_task.rs124 thread: None, in new()
129 shelf: None, in new()
225 (None, false, _) => { in spawn_thread()
228 (None, true, true) => { in spawn_thread()
236 (None, true, false) => None, in spawn_thread()
274 assert_eq!(shelf.put(s), None); in test_shelf()
285 assert_eq!(shelf.put(e1), None); in test_shelf()
302 assert_eq!(shelf.remove_downcast_ref::<Elf>(), None); in test_shelf()
314 assert_eq!(shelf.get_downcast_ref::<i32>(), None); in test_shelf()
315 assert_eq!(shelf.get_downcast_mut::<i32>(), None); in test_shelf()
[all …]
Doperation.rs242 _ => return None, in get_pruning_info()
409 Ok(None) in update()
453 Ok(None) in finish()
544 None => { in create_operation()
672 let mut oldest_caller_op: Option<CandidateInfo> = None; in prune()
674 None, in prune()
711 None => { in prune()
715 None in prune()
774 None => break Ok(()), in prune()
778 None => break Err(Error::Rc(ResponseCode::BACKEND_BUSY)), in prune()
[all …]
Dauthorization.rs91 return Err(BinderStatus::new_service_specific_error(rc, None)); in map_or_log_err()
96 None => match root_cause.downcast_ref::<selinux::Error>() { in map_or_log_err()
101 Err(BinderStatus::new_service_specific_error(rc, None)) in map_or_log_err()
179 (LockScreenEvent::UNLOCK, None) => { in on_lock_screen_event()
189 (LockScreenEvent::LOCK, None) => { in on_lock_screen_event()
Dattestation_key_utils.rs62 None if challenge_present => rem_prov_state in get_attest_key_info()
73 None => Ok(None), in get_attest_key_info()
Dservice.rs155 None in get_key_entry()
201 Some(Error::Rc(ResponseCode::KEY_NOT_FOUND)) => Ok(None), in update_subcomponent()
210 db.set_blob(&key_id_guard, SubComponentType::CERT, public_cert, None) in update_subcomponent()
213 db.set_blob(&key_id_guard, SubComponentType::CERT_CHAIN, certificate_chain, None) in update_subcomponent()
231 blob: None, in update_subcomponent()
241 check_key_permission(KeyPerm::rebind(), &key, &None) in update_subcomponent()
274 match check_key_permission(KeyPerm::get_info(), &k, &None) { in list_entries()
346 check_key_permission(KeyPerm::grant(), k, &None) in ungrant()
Dlegacy_migrator.rs213 blob: None, in list_uid()
230 Ok(LegacyMigrator::STATE_EMPTY) => return None, in do_serialized()
251 (Self::STATE_EMPTY, None) in do_serialized()
353 Ok(None) => {} in with_try_migrate_super_key()
366 Ok(None) in with_try_migrate_super_key()
454 .load_by_uid_alias(uid, &alias, None) in check_and_migrate()
470 None => { in check_and_migrate()
536 None => { in check_and_migrate()
638 .load_by_uid_alias(uid, &alias, None) in bulk_delete()
679 None in bulk_delete()
[all …]
/system/bt/gd/rust/common/src/
Dsys_prop.rs25 None in get()
33 None in get()
41 None in get_u32()
51 _ => None, in get_bool()
54 None in get_bool()
/system/media/camera/docs/
Dmetadata_template.mako47 % if section.description is not None:
78 % if prop.details is not None:
82 % if prop.ndk_details is not None:
86 % if prop.hal_details is not None:
112 % if prop.type_notes is not None:
115 % if prop.container is not None:
119 % if prop.typedef is not None:
159 % if value.visibility is not None:
162 % if value.id is not None:
169 % if value.notes is not None:
[all …]
/system/security/keystore2/src/km_compat/
Dlib.rs54 None => return,
76 legacy.generateKey(&kps, None /* attest_key */).expect("Failed to generate key"); in generate_key()
169 legacy.importKey(&kps, kf, &kd, None /* attest_key */).expect("Failed to import key"); in test_import_key()
263 let result = legacy.begin(purpose, &blob, &kps, None); in begin()
272 let begin_result = begin(legacy.as_ref(), &blob, KeyPurpose::ENCRYPT, None); in test_begin_abort()
285 let begin_result = begin(legacy.as_ref(), &blob, KeyPurpose::ENCRYPT, None); in test_begin_update_finish()
290 None, /* authToken */ in test_begin_update_finish()
291 None, /* timestampToken */ in test_begin_update_finish()
298 None, /* signature */ in test_begin_update_finish()
299 None, /* authToken */ in test_begin_update_finish()
[all …]
/system/security/keystore2/system_property/
Dlib.rs85 None in get_prop_info()
101 let name = if name.is_null() { None } else { Some(CStr::from_ptr(name)) }; in read_raw()
102 let value = if value.is_null() { None } else { Some(CStr::from_ptr(value)) }; in read_raw()
148 None => { in wait_for_property_creation()
/system/security/keystore2/apc_compat/
Dapc_compat.rs91 (true, _) | (_, 0) => None, in confirmation_result_callback()
101 (true, _) | (_, 0) => None, in confirmation_result_callback()
123 h if h == unsafe { INVALID_SERVICE_HANDLE } => None, in try_get_service()
/system/logging/rust/
Dliblog_event_list.rs44 return None; in new()
52 None in new()
/system/bt/gd/rust/hci/src/
Dlib.rs175 let mut pending: Option<QueuedCommand> = None; in dispatch()
191 None => panic!("Unexpected status event with opcode {:?}", this_opcode), in dispatch()
204None => panic!("Unexpected complete event with opcode {:?}", this_opcode), in dispatch()
215 None => panic!("Unhandled le subevent {:?}", code), in dispatch()
229 None if code == EventCode::NumberOfCompletedPackets =>{}, in dispatch()
230 None => panic!("Unhandled event {:?}", code), in dispatch()
/system/bt/gd/rust/link/src/acl/
Dfragment.rs26 Self { buffer: None, remaining: 0, out } in new()
33 AclChild::None => { in on_packet()
63 None => warn!("got continuation packet without pending reassembly"), in on_packet()
/system/tools/aidl/tests/rust/
Dtest_client.rs307 repeated = vec![None, None]; in test_parcel_file_descriptor_array()
370 let result = service.$func(None);
371 assert_eq!(result, Ok(None));
400 None,
418 let result = service.RepeatNullableParcelable(None); in test_nullable_parcelable()
419 assert_eq!(result, Ok(None)); in test_nullable_parcelable()
438 assert_eq!(service.TakesANullableIBinder(None), Ok(())); in test_binder()
444 let mut repeated = None;
445 let result = $service.$func(None, &mut repeated);
447 assert_eq!(result, Ok(None));
[all …]

1234