/system/security/keystore2/src/vintf/ |
D | lib.rs | 28 len: usize, 51 let mut len: usize = 0; in get_hal_names() 61 let mut len: usize = 0; in get_hal_names_and_versions() 72 major_version: usize, in get_hidl_instances() argument 73 minor_version: usize, in get_hidl_instances() argument 76 let mut len: usize = 0; in get_hidl_instances() 96 pub fn get_aidl_instances(package: &str, version: usize, interface_name: &str) -> HalNames { in get_aidl_instances() argument 97 let mut len: usize = 0; in get_aidl_instances()
|
D | Android.bp | 55 "--size_t-is-usize",
|
/system/bt/gd/rust/link/src/acl/ |
D | fragment.rs | 15 const L2CAP_BASIC_FRAME_HEADER_LEN: usize = 4; 19 remaining: usize, 80 fn get_l2cap_pdu_size(first_packet: &Bytes) -> usize { in get_l2cap_pdu_size() argument 86 (&first_packet[..]).get_u16_le() as usize in get_l2cap_pdu_size() 92 mtu: usize, in fragmenting_stream() argument
|
/system/security/keystore2/src/ |
D | boot_level_keys.rs | 128 current: usize, 139 const HKDF_KEY_SIZE: usize = 32; 149 pub fn level_accessible(&self, boot_level: usize) -> bool { in level_accessible() 158 fn get_hkdf_key(&mut self, boot_level: usize) -> Result<Option<&ZVec>> { in get_hkdf_key() 182 pub fn advance_boot_level(&mut self, new_boot_level: usize) -> Result<()> { in advance_boot_level() 220 boot_level: usize, in expand_key() argument 221 out_len: usize, in expand_key() argument 232 pub fn aes_key(&mut self, boot_level: usize) -> Result<Option<ZVec>> { in aes_key()
|
D | legacy_blob.rs | 114 key_size: usize, 148 const SIZE: usize = std::mem::size_of::<bool>(); in read_bool() 154 const SIZE: usize = std::mem::size_of::<u32>(); in read_ne_u32() 160 const SIZE: usize = std::mem::size_of::<i32>(); in read_ne_i32() 166 const SIZE: usize = std::mem::size_of::<i64>(); in read_ne_i64() 207 const IV_SIZE: usize = keystore2_crypto::LEGACY_IV_LENGTH; 208 const GCM_TAG_LENGTH: usize = keystore2_crypto::TAG_LENGTH; 209 const SALT_SIZE: usize = keystore2_crypto::SALT_LENGTH; 219 const COMMON_HEADER_SIZE: usize = 4 + Self::IV_SIZE + Self::GCM_TAG_LENGTH + 4; 221 const VERSION_OFFSET: usize = 0; [all …]
|
D | entropy.rs | 21 static ENTROPY_SIZE: usize = 64; 45 fn get_entropy(size: usize) -> Result<Vec<u8>> { in get_entropy()
|
D | shared_secret_negotiation.rs | 54 Hidl { is_strongbox: bool, version: (usize, usize) }, 90 version: (usize, usize), in filter_map_legacy_km_instances() argument
|
D | operation.rs | 172 index: usize, 206 index: usize, 211 const MAX_RECEIVE_DATA: usize = 0x8000; 216 index: usize, in new() argument 525 let mut index: usize = 0; in create_operation() 559 fn get(&self, index: usize) -> Option<Arc<Operation>> { in get() 667 index: usize, in prune()
|
D | super_key.rs | 57 const MAX_MAX_BOOT_LEVEL: usize = 1_000_000_000; 310 .read(|_n, v| v.parse::<usize>().map_err(std::convert::Into::into)) in watch_boot_level() 343 .map_or(false, |c| c.level_accessible(boot_level as usize)) in level_accessible() 366 .map(|b| b.aes_key(*level as usize)) in lookup_key()
|
D | metrics_store.rs | 84 const SINGLE_ATOM_STORE_MAX_SIZE: usize = 250;
|
D | database.rs | 1131 max_blobs: usize, in handle_next_superseded_blobs() argument 1220 pub fn cleanup_leftovers(&mut self) -> Result<usize> { in cleanup_leftovers() argument 3133 fn insert_with_retry(inserter: impl Fn(i64) -> rusqlite::Result<usize>) -> Result<i64> { in insert_with_retry()
|
/system/security/keystore2/src/crypto/ |
D | lib.rs | 33 pub const GCM_IV_LENGTH: usize = 12; 35 pub const TAG_LENGTH: usize = 16; 37 pub const AES_256_KEY_LENGTH: usize = 32; 39 pub const AES_128_KEY_LENGTH: usize = 16; 41 pub const SALT_LENGTH: usize = 16; 45 pub const LEGACY_IV_LENGTH: usize = 16; 65 pub fn generate_random_data(size: usize) -> Result<Vec<u8>, Error> { in generate_random_data() 183 pub fn derive_key(&self, salt: Option<&[u8]>, key_length: usize) -> Result<ZVec, Error> { in derive_key() 224 let max_size: usize = EVP_MAX_MD_SIZE.try_into().unwrap(); in hkdf_extract() 253 pub fn hkdf_expand(out_len: usize, prk: &[u8], info: &[u8]) -> Result<ZVec, Error> { in hkdf_expand() argument [all …]
|
D | zvec.rs | 29 len: usize, 34 pub fn new(size: usize) -> Result<Self, Error> { in new() 46 pub fn reduce_len(&mut self, len: usize) { in reduce_len() argument
|
D | Android.bp | 61 "--size_t-is-usize",
|
/system/bt/gd/rust/hal/src/ |
D | rootcanal_hal.rs | 29 const SIZE_OF_EVENT_HEADER: usize = 2; 30 const _SIZE_OF_SCO_HEADER: usize = 3; 31 const SIZE_OF_ACL_HEADER: usize = 4; 32 const SIZE_OF_ISO_HEADER: usize = 4; 91 let len: usize = buffer[1].into(); in dispatch_incoming() 104 let len: usize = (buffer[2] as u16 + ((buffer[3] as u16) << 8)).into(); in dispatch_incoming() 117 let len: usize = (buffer[2] as u16 + (((buffer[3] & 0x3f) as u16) << 8)).into(); in dispatch_incoming()
|
D | lib.rs | 38 const H4_HEADER_SIZE: usize = 1;
|
/system/security/keystore2/apc_compat/ |
D | apc_compat.rs | 97 unsafe { slice::from_raw_parts(tbs_message, s as usize) }, in confirmation_result_callback() 107 unsafe { slice::from_raw_parts(confirmation_token, s as usize) }, in confirmation_result_callback()
|
/system/security/keystore2/aaid/ |
D | lib.rs | 32 0 => Ok(buffer[0..size as usize].to_vec()), in get_aaid()
|
D | Android.bp | 41 "--size_t-is-usize",
|
/system/security/keystore2/src/database/ |
D | utils.rs | 57 pub struct SqlField<'a>(usize, &'a Row<'a>); 61 pub fn new(index: usize, row: &'a Row<'a>) -> Self { in new() argument
|
D | versioning.rs | 81 if upgraders.len() < current_version as usize { in upgrade_database() 87 db_version = upgraders[db_version as usize](tx).with_context(|| { in upgrade_database()
|
D | perboot.rs | 114 pub fn auth_tokens_len(&self) -> usize { in auth_tokens_len() argument
|
/system/core/libstats/pull_rust/ |
D | Android.bp | 27 "--size_t-is-usize",
|
/system/security/keystore2/system_property/ |
D | Android.bp | 31 "--size_t-is-usize",
|
/system/logging/liblog/ |
D | Android.bp | 189 "--size_t-is-usize",
|