/system/update_engine/payload_consumer/ |
D | verity_writer_android_unittest.cc | 55 ASSERT_TRUE(verity_writer_.Update(0, part_data.data(), 4096)); in TEST_F() 56 ASSERT_TRUE(verity_writer_.Update(4096, part_data.data() + 4096, 4096)); in TEST_F() 74 ASSERT_TRUE(verity_writer_.Update(0, part_data.data(), part_data.size())); in TEST_F() 75 ASSERT_TRUE(verity_writer_.Update(4096, part_data.data(), part_data.size())); in TEST_F() 76 ASSERT_TRUE(verity_writer_.Update(8192, part_data.data(), part_data.size())); in TEST_F() 84 ASSERT_TRUE(verity_writer_.Update(0, part_data.data(), part_data.size())); in TEST_F() 85 ASSERT_FALSE(verity_writer_.Update(8192, part_data.data(), part_data.size())); in TEST_F() 103 ASSERT_TRUE(verity_writer_.Update(0, part_data.data(), 4096)); in TEST_F() 104 ASSERT_TRUE(verity_writer_.Update(4096, part_data.data() + 4096, 4096)); in TEST_F() 126 ASSERT_TRUE(verity_writer_.Update(0, part_data.data(), 4096)); in TEST_F() [all …]
|
D | verity_writer_stub.cc | 33 bool VerityWriterStub::Update(uint64_t offset, in Update() function in chromeos_update_engine::VerityWriterStub
|
D | verity_writer_stub.h | 30 bool Update(uint64_t offset, const uint8_t* buffer, size_t size) override;
|
D | verity_writer_interface.h | 39 virtual bool Update(uint64_t offset, const uint8_t* buffer, size_t size) = 0;
|
D | verity_writer_android.h | 36 bool Update(uint64_t offset, const uint8_t* buffer, size_t size) override;
|
/system/update_engine/common/ |
D | hash_calculator_unittest.cc | 49 calc.Update("hi", 2); in TEST_F() 58 calc.Update("h", 1); in TEST_F() 59 calc.Update("i", 1); in TEST_F() 68 calc.Update("h", 1); in TEST_F() 73 calc_next.Update("i", 1); in TEST_F() 92 calc.Update(buf, strlen(buf)); in TEST_F() 152 calc.Update("h", 1); in TEST_F()
|
D | hash_calculator.cc | 37 bool HashCalculator::Update(const void* data, size_t length) { in Update() function in chromeos_update_engine::HashCalculator 64 if (rc < 0 || !Update(buffer.data(), rc)) { in UpdateFile() 87 TEST_AND_RETURN_FALSE(calc.Update(data, length)); in RawHashOfBytes()
|
D | hash_calculator.h | 45 bool Update(const void* data, size_t length);
|
/system/ca-certificates/wfa_certs/ |
D | TIMESTAMP | 1 Last Update (YYYY-MM-DD): 2018-01-09
|
/system/ca-certificates/google/ |
D | TIMESTAMP | 1 Last Update (YYYY-MM-DD): 2015-11-16
|
/system/extras/verity/ |
D | build_verity_tree_test.cpp | 55 ASSERT_TRUE(builder->Update(data.data(), data.size())); in GenerateHashTree() 139 ASSERT_TRUE(builder->Update(data.data() + offset, data_length)); in TEST_F() 161 ASSERT_TRUE(builder->Update(data.data() + offset, data_length)); in TEST_F() 183 ASSERT_TRUE(builder->Update(data.data() + offset, data_length)); in TEST_F()
|
D | build_verity_tree.cpp | 63 return sparse_hasher->Update(static_cast<const unsigned char*>(data), len) in generate_verity_tree()
|
/system/update_engine/cros/ |
D | mock_update_attempter.h | 34 Update,
|
/system/iorap/src/binder/ |
D | package_version_map.h | 47 bool Update(std::string package_name, int64_t version);
|
/system/keymaster/include/keymaster/km_openssl/ |
D | ecdsa_operation.h | 60 keymaster_error_t Update(const AuthorizationSet& additional_params, const Buffer& input, 75 keymaster_error_t Update(const AuthorizationSet& additional_params, const Buffer& input,
|
D | ecdh_operation.h | 40 keymaster_error_t Update(const AuthorizationSet& additional_params, const Buffer& input,
|
/system/core/fs_mgr/libsnapshot/ |
D | snapshot_metadata_updater.h | 45 bool Update() const;
|
/system/sepolicy/vendor/ |
D | vendor_install_recovery.te | 18 # Update the recovery block device based off a diff of the boot block device
|
/system/keymaster/km_openssl/ |
D | hmac_operation.h | 33 virtual keymaster_error_t Update(const AuthorizationSet& additional_params, const Buffer& input,
|
D | block_cipher_operation.h | 78 keymaster_error_t Update(const AuthorizationSet& additional_params, const Buffer& input, 149 keymaster_error_t Update(const AuthorizationSet& additional_params, const Buffer& input,
|
D | rsa_operation.cpp | 178 keymaster_error_t RsaOperation::Update(const AuthorizationSet& /* additional_params */, in Update() function in keymaster::RsaOperation 289 keymaster_error_t RsaSignOperation::Update(const AuthorizationSet& additional_params, in Update() function in keymaster::RsaSignOperation 294 return RsaOperation::Update(additional_params, input, output_params, output, in Update() 400 keymaster_error_t RsaVerifyOperation::Update(const AuthorizationSet& additional_params, in Update() function in keymaster::RsaVerifyOperation 405 return RsaOperation::Update(additional_params, input, output_params, output, in Update()
|
/system/sepolicy/prebuilts/api/27.0/public/ |
D | install_recovery.te | 17 # Update the recovery block device based off a diff of the boot block device
|
/system/sepolicy/prebuilts/api/29.0/public/ |
D | install_recovery.te | 17 # Update the recovery block device based off a diff of the boot block device
|
/system/sepolicy/prebuilts/api/26.0/public/ |
D | install_recovery.te | 17 # Update the recovery block device based off a diff of the boot block device
|
/system/sepolicy/prebuilts/api/28.0/public/ |
D | install_recovery.te | 17 # Update the recovery block device based off a diff of the boot block device
|