/system/security/keystore2/src/ |
D | permission.rs | 290 KeystorePerm with default (None = 0, none) { 371 return None; in next() 541 None => { in check_key_permission() 704 let key = KeyDescriptor { domain: Domain::APP, nspace: 0, alias: None, blob: None }; in check_grant_permission_app() 725 alias: None, in check_grant_permission_selinux() 726 blob: None, in check_grant_permission_selinux() 741 let key = KeyDescriptor { domain: Domain::GRANT, nspace: 0, alias: None, blob: None }; in check_key_permission_domain_grant() 766 let key = KeyDescriptor { domain: Domain::APP, nspace: 0, alias: None, blob: None }; in check_key_permission_domain_app() 768 assert!(check_key_permission(0, &system_server_ctx, KeyPerm::use_(), &key, &None).is_ok()); in check_key_permission_domain_app() 769 … assert!(check_key_permission(0, &system_server_ctx, KeyPerm::delete(), &key, &None).is_ok()); in check_key_permission_domain_app() [all …]
|
D | enforcements.rs | 71 Arc::new(Self { state: AuthRequestState::OpAuth, hat: Mutex::new(None) }) in op_auth() 77 hat: Mutex::new(None), in timestamped_op_auth() 109 AuthRequestState::OpAuth => None, in get_auth_tokens() 274 None in finalize_create_authorization() 276 _ => None, in finalize_create_authorization() 292 let mut confirmation_token: Option<Vec<u8>> = None; in before_finish() 343 None in get_auth_tokens() 351 DeferredAuthState::NoAuthRequired => Ok((None, None)), in get_auth_tokens() 417 None => { in authorize_create() 419 None, in authorize_create() [all …]
|
D | try_insert.rs | 63 None => unsafe { std::hint::unreachable_unchecked() }, in get_or_try_to_insert_with() 82 let mut x = None; in test() 84 assert_eq!(x, None); in test() 96 x = None; in test()
|
D | raw_device.rs | 81 Some(Error::Km(ErrorCode::HARDWARE_TYPE_UNAVAILABLE)) => Ok(None), in get_or_none() 127 &CertificateInfo::new(None, None), in create_and_store_key() 141 blob: None, in internal_descriptor() 162 Some(&Error::Rc(ResponseCode::KEY_NOT_FOUND)) => Ok(None), in not_found_is_none() 197 None in lookup_or_generate_key() 232 km_dev.generateKey(¶ms, None) in lookup_or_generate_key() 329 operation.finish(Some(input), None, None, None, None) in use_key_in_one_step()
|
D | legacy_blob.rs | 279 let mut multi: Option<u8> = None; in decode_alias() 286 None in decode_alias() 288 (b'+'..=b'.', None) => Some((c - b'+') << 6), in decode_alias() 289 (b'0'..=b'~', None) => { in decode_alias() 291 None in decode_alias() 321 _ => None, in new_from_stream() 385 (blob_types::SUPER_KEY, _, None) | (blob_types::SUPER_KEY_AES256, _, None) => { in new_from_stream() 419 decrypt(&data, &iv, &tag, None, None) in new_from_stream_decrypt_with() 560 None => return Ok(Vec::new()), in read_characteristics_file() 584 _ => None, in read_characteristics_file() [all …]
|
D | database.rs | 553 None in try_get() 1246 KeyDescriptor { domain, nspace, alias: Some(alias.to_string()), blob: None }; in key_exists() 1321 blob: None, in load_super_key() 1331 Some(KsError::Rc(ResponseCode::KEY_NOT_FOUND)) => Ok(None), in load_super_key() 1377 None => None, in get_or_create_key_with() 1390 None => { in get_or_create_key_with() 1567 None, in create_attestation_key_entry() 1646 (None, SubComponentType::CERT) | (None, SubComponentType::CERT_CHAIN) => { in set_blob_internal() 1654 (None, _) => { in set_blob_internal() 1770 None, in store_signed_attestation_certificate_chain() [all …]
|
D | security_level.rs | 125 0 => None, in store_new_key() 129 0 => None, in store_new_key() 219 check_key_permission(KeyPerm::use_(), key, &None) in create_operation() 222 check_key_permission(KeyPerm::req_forced_op(), key, &None).context( in create_operation() 229 None => { in create_operation() 236 None, in create_operation() 237 None, in create_operation() 361 None => { in create_operation() 379 0 => None, in create_operation() 385 upgradedBlob: if key.domain == Domain::BLOB { upgraded_blob } else { None }, in create_operation() [all …]
|
D | apc.rs | 108 None => match root_cause.downcast_ref::<selinux::Error>() { in map_or_log_err() 113 Err(BinderStatus::new_service_specific_error(rc, None)) in map_or_log_err() 140 0..=2 => return None, in get_remaining_back_off() 190 Self { session: None, rate_limiting: Default::default(), confirmation_token_sender } in new() 220 None => return, // Nothing to do in result() 246 (ResponseCode::OK, _, None) => { in result() 285 None => {} in present_prompt() 298 None => { in present_prompt() 332 None => { in cancel_prompt()
|
D | boot_level_keys.rs | 113 None, in get_level_zero_key() 160 return Ok(None); in get_hkdf_key() 259 assert_eq!(None, blkc.aes_key(0)?); in test_output_is_consistent() 266 assert_eq!(None, blkc.aes_key(0)?); in test_output_is_consistent() 273 assert_eq!(None, blkc.aes_key(0)?); in test_output_is_consistent() 280 assert_eq!(None, blkc.aes_key(0)?); in test_output_is_consistent() 281 assert_eq!(None, blkc.aes_key(10)?); in test_output_is_consistent()
|
D | watchdog.rs | 76 let mut next_timeout: Option<Duration> = None; in update_overdue_and_find_next_timeout() 92 None => Some(timeout), in update_overdue_and_find_next_timeout() 130 None => { in log_report() 177 thread: None, in new() 197 return None; in watch_with_optional() 217 Self::watch_with_optional(wd, None, id, timeout) in watch() 273 (true, None) => (Self::NOISY_REPORT_TIMEOUT, false), in spawn_thread() 274 (false, None) => (state.timeout, true), in spawn_thread()
|
D | async_task.rs | 124 thread: None, in new() 129 shelf: None, in new() 225 (None, false, _) => { in spawn_thread() 228 (None, true, true) => { in spawn_thread() 236 (None, true, false) => None, in spawn_thread() 274 assert_eq!(shelf.put(s), None); in test_shelf() 285 assert_eq!(shelf.put(e1), None); in test_shelf() 302 assert_eq!(shelf.remove_downcast_ref::<Elf>(), None); in test_shelf() 314 assert_eq!(shelf.get_downcast_ref::<i32>(), None); in test_shelf() 315 assert_eq!(shelf.get_downcast_mut::<i32>(), None); in test_shelf() [all …]
|
D | operation.rs | 242 _ => return None, in get_pruning_info() 409 Ok(None) in update() 453 Ok(None) in finish() 544 None => { in create_operation() 672 let mut oldest_caller_op: Option<CandidateInfo> = None; in prune() 674 None, in prune() 711 None => { in prune() 715 None in prune() 774 None => break Ok(()), in prune() 778 None => break Err(Error::Rc(ResponseCode::BACKEND_BUSY)), in prune() [all …]
|
D | authorization.rs | 91 return Err(BinderStatus::new_service_specific_error(rc, None)); in map_or_log_err() 96 None => match root_cause.downcast_ref::<selinux::Error>() { in map_or_log_err() 101 Err(BinderStatus::new_service_specific_error(rc, None)) in map_or_log_err() 179 (LockScreenEvent::UNLOCK, None) => { in on_lock_screen_event() 189 (LockScreenEvent::LOCK, None) => { in on_lock_screen_event()
|
D | attestation_key_utils.rs | 62 None if challenge_present => rem_prov_state in get_attest_key_info() 73 None => Ok(None), in get_attest_key_info()
|
D | service.rs | 155 None in get_key_entry() 201 Some(Error::Rc(ResponseCode::KEY_NOT_FOUND)) => Ok(None), in update_subcomponent() 210 db.set_blob(&key_id_guard, SubComponentType::CERT, public_cert, None) in update_subcomponent() 213 db.set_blob(&key_id_guard, SubComponentType::CERT_CHAIN, certificate_chain, None) in update_subcomponent() 231 blob: None, in update_subcomponent() 241 check_key_permission(KeyPerm::rebind(), &key, &None) in update_subcomponent() 274 match check_key_permission(KeyPerm::get_info(), &k, &None) { in list_entries() 346 check_key_permission(KeyPerm::grant(), k, &None) in ungrant()
|
D | legacy_migrator.rs | 213 blob: None, in list_uid() 230 Ok(LegacyMigrator::STATE_EMPTY) => return None, in do_serialized() 251 (Self::STATE_EMPTY, None) in do_serialized() 353 Ok(None) => {} in with_try_migrate_super_key() 366 Ok(None) in with_try_migrate_super_key() 454 .load_by_uid_alias(uid, &alias, None) in check_and_migrate() 470 None => { in check_and_migrate() 536 None => { in check_and_migrate() 638 .load_by_uid_alias(uid, &alias, None) in bulk_delete() 679 None in bulk_delete() [all …]
|
/system/bt/gd/rust/common/src/ |
D | sys_prop.rs | 25 None in get() 33 None in get() 41 None in get_u32() 51 _ => None, in get_bool() 54 None in get_bool()
|
/system/media/camera/docs/ |
D | metadata_template.mako | 47 % if section.description is not None: 78 % if prop.details is not None: 82 % if prop.ndk_details is not None: 86 % if prop.hal_details is not None: 112 % if prop.type_notes is not None: 115 % if prop.container is not None: 119 % if prop.typedef is not None: 159 % if value.visibility is not None: 162 % if value.id is not None: 169 % if value.notes is not None: [all …]
|
/system/security/keystore2/src/km_compat/ |
D | lib.rs | 54 None => return, 76 legacy.generateKey(&kps, None /* attest_key */).expect("Failed to generate key"); in generate_key() 169 legacy.importKey(&kps, kf, &kd, None /* attest_key */).expect("Failed to import key"); in test_import_key() 263 let result = legacy.begin(purpose, &blob, &kps, None); in begin() 272 let begin_result = begin(legacy.as_ref(), &blob, KeyPurpose::ENCRYPT, None); in test_begin_abort() 285 let begin_result = begin(legacy.as_ref(), &blob, KeyPurpose::ENCRYPT, None); in test_begin_update_finish() 290 None, /* authToken */ in test_begin_update_finish() 291 None, /* timestampToken */ in test_begin_update_finish() 298 None, /* signature */ in test_begin_update_finish() 299 None, /* authToken */ in test_begin_update_finish() [all …]
|
/system/security/keystore2/system_property/ |
D | lib.rs | 85 None in get_prop_info() 101 let name = if name.is_null() { None } else { Some(CStr::from_ptr(name)) }; in read_raw() 102 let value = if value.is_null() { None } else { Some(CStr::from_ptr(value)) }; in read_raw() 148 None => { in wait_for_property_creation()
|
/system/security/keystore2/apc_compat/ |
D | apc_compat.rs | 91 (true, _) | (_, 0) => None, in confirmation_result_callback() 101 (true, _) | (_, 0) => None, in confirmation_result_callback() 123 h if h == unsafe { INVALID_SERVICE_HANDLE } => None, in try_get_service()
|
/system/logging/rust/ |
D | liblog_event_list.rs | 44 return None; in new() 52 None in new()
|
/system/bt/gd/rust/hci/src/ |
D | lib.rs | 175 let mut pending: Option<QueuedCommand> = None; in dispatch() 191 None => panic!("Unexpected status event with opcode {:?}", this_opcode), in dispatch() 204 … None => panic!("Unexpected complete event with opcode {:?}", this_opcode), in dispatch() 215 None => panic!("Unhandled le subevent {:?}", code), in dispatch() 229 None if code == EventCode::NumberOfCompletedPackets =>{}, in dispatch() 230 None => panic!("Unhandled event {:?}", code), in dispatch()
|
/system/bt/gd/rust/link/src/acl/ |
D | fragment.rs | 26 Self { buffer: None, remaining: 0, out } in new() 33 AclChild::None => { in on_packet() 63 None => warn!("got continuation packet without pending reassembly"), in on_packet()
|
/system/tools/aidl/tests/rust/ |
D | test_client.rs | 307 repeated = vec![None, None]; in test_parcel_file_descriptor_array() 370 let result = service.$func(None); 371 assert_eq!(result, Ok(None)); 400 None, 418 let result = service.RepeatNullableParcelable(None); in test_nullable_parcelable() 419 assert_eq!(result, Ok(None)); in test_nullable_parcelable() 438 assert_eq!(service.TakesANullableIBinder(None), Ok(())); in test_binder() 444 let mut repeated = None; 445 let result = $service.$func(None, &mut repeated); 447 assert_eq!(result, Ok(None)); [all …]
|