/system/extras/libfec/ |
D | fec_open.cpp | 45 check(offset); in find_offset() 46 check(get_appr_size); in find_offset() 47 check(get_real_size); in find_offset() 91 check(f); in find_verity_offset() 92 check(offset); in find_verity_offset() 101 check(f); in parse_ecc_header() 102 check(f->ecc.rsn > 0 && f->ecc.rsn < FEC_RSM); in parse_ecc_header() 103 check(f->size > sizeof(fec_header)); in parse_ecc_header() 200 check(f); in parse_ecc() 201 check(offset % FEC_BLOCKSIZE == 0); in parse_ecc() [all …]
|
D | fec_verity.cpp | 48 check(dst); in parse_hex() 49 check(src); in parse_hex() 50 check(2 * size == strlen(src)); in parse_hex() 56 check(l >= 0); in parse_hex() 57 check(h >= 0); in parse_hex() 73 check(src); in parse_uint64() 74 check(dst); in parse_uint64() 126 check(md); in get_hash() 128 check(mdctx); in get_hash() 137 check(hash_size == digest_length_); in get_hash() [all …]
|
D | fec_read.cpp | 110 check(offset % FEC_BLOCKSIZE == 0); in __ecc_read() 122 check(!use_erasures || !f->hashtree().hash_data.empty()); in __ecc_read() 156 check(data_index >= 0); in __ecc_read() 192 check(rc <= (use_erasures ? e->roots : e->roots / 2)); in __ecc_read() 211 check(f); in ecc_init() 237 check(f); in ecc_read() 238 check(dest); in ecc_read() 239 check(offset < f->data_size); in ecc_read() 240 check(offset + count <= f->data_size); in ecc_read() 241 check(errors); in ecc_read() [all …]
|
D | avb_utils.cpp | 44 check(vbmeta_offset <= f->size - sizeof(footer) - vbmeta_size); in parse_vbmeta_from_footer() 105 check(hashtree_descriptor.salt_len < vbmeta.size()); in parse_avb_image() 106 check(salt_offset < vbmeta.size() - hashtree_descriptor.salt_len); in parse_avb_image() 107 check(hashtree_descriptor.root_digest_len < vbmeta.size()); in parse_avb_image() 108 check(root_offset < vbmeta.size() - hashtree_descriptor.root_digest_len); in parse_avb_image() 121 check(hashtree_descriptor.fec_offset == in parse_avb_image() 123 check(hashtree_descriptor.fec_offset <= in parse_avb_image()
|
D | fec_process.cpp | 46 check(f); in process() 47 check(buf); in process() 48 check(func); in process() 85 check(left > 0); in process() 114 check(left == 0); in process()
|
/system/tools/mkbootimg/tests/ |
D | mkbootimg_test.py | 122 subprocess.run(mkbootimg_cmds, check=True, cwd=self._exec_dir) 123 subprocess.run(unpack_bootimg_cmds, check=True) 158 result = subprocess.run(avbtool_info_cmds, check=True, 200 subprocess.run(mkbootimg_cmds, check=True, capture_output=True, 232 subprocess.run(mkbootimg_cmds, check=True) 233 subprocess.run(unpack_bootimg_cmds, check=True) 298 subprocess.run(mkbootimg_cmds, check=True) 299 result = subprocess.run(unpack_bootimg_cmds, check=True, 350 subprocess.run(mkbootimg_cmds, check=True) 351 result = subprocess.run(unpack_bootimg_cmds, check=True, [all …]
|
/system/apex/apexd/ |
D | apexservice.cpp | 170 if (auto check = CheckCallerSystemOrRoot("unstagePackages"); !check.isOk()) { in unstagePackages() local 171 return check; in unstagePackages() 192 auto check = CheckCallerSystemOrRoot("submitStagedSession"); in submitStagedSession() local 193 if (!check.isOk()) { in submitStagedSession() 194 return check; in submitStagedSession() 222 auto check = CheckCallerSystemOrRoot("markStagedSessionReady"); in markStagedSessionReady() local 223 if (!check.isOk()) { in markStagedSessionReady() 224 return check; in markStagedSessionReady() 243 auto check = CheckCallerSystemOrRoot("markStagedSessionSuccessful"); in markStagedSessionSuccessful() local 244 if (!check.isOk()) { in markStagedSessionSuccessful() [all …]
|
/system/media/audio_utils/tests/ |
D | format_tests.cpp | 53 uint8_t check[size]; in fillRamp() local 55 check, AUDIO_FORMAT_PCM_8_BIT, in fillRamp() 57 EXPECT_EQ(0, memcmp(check, bytes, size)); in fillRamp() 86 uint32_t check[SAMPLES]; in TEST_P() local 97 check, dst_encoding, in TEST_P() 104 EXPECT_EQ(0, memcmp(check, data, SAMPLES * audio_bytes_per_sample(dst_encoding))); in TEST_P()
|
D | string_tests.cpp | 35 void check(char (&s)[size], int start, size_t actual) { in check() function 70 check(dst, DST_START, sizeof(dst)); in TEST() 75 check(dst, OVER_START, sizeof(dst)); in TEST() 82 check(dst, UNDER_START, sizeof(under)); in TEST()
|
/system/media/audio_utils/fuzz/format_fuzzer/ |
D | format_fuzzer.cpp | 53 uint8_t check[size]; in fillBuffer() local 55 check, AUDIO_FORMAT_PCM_8_BIT, in fillBuffer() 84 uint32_t check[size]; in LLVMFuzzerTestOneInput() local 93 check, dst_encoding, in LLVMFuzzerTestOneInput()
|
/system/core/libnetutils/ |
D | packet.c | 105 ip.check = 0; in send_packet() 108 ip.check = finish_sum(checksum(&ip, sizeof(ip), 0)); in send_packet() 113 udp.check = 0; in send_packet() 128 udp.check = finish_sum(udpsum); in send_packet() 209 ALOGW("IP header checksum failure (0x%x)", packet.ip.check); in receive_packet() 240 temp = packet.udp.check; in receive_packet() 241 packet.udp.check = 0; in receive_packet() 243 packet.udp.check = temp; in receive_packet()
|
/system/tools/hidl/test/version_test/ |
D | Android.bp | 15 cmd: "$(location hidl-gen) -L check " + 25 "($(location hidl-gen) -L check " + 29 "($(location hidl-gen) -L check " + 33 "($(location hidl-gen) -L check " + 37 "($(location hidl-gen) -L check " + 41 "($(location hidl-gen) -L check " +
|
/system/tools/mkbootimg/gki/ |
D | certify_bootimg_test.py | 115 result = subprocess.run(avbtool_info_cmd, check=False, 159 subprocess.run(avbtool_cmd, check=False, stderr=subprocess.DEVNULL) 773 result = subprocess.run(avbtool_info_cmds, check=True, 795 subprocess.run(certify_bootimg_cmds, check=True, cwd=self._exec_dir) 815 subprocess.run(certify_bootimg_cmds, check=True, cwd=self._exec_dir) 845 subprocess.run(certify_bootimg_cmds, check=True, cwd=self._exec_dir) 878 subprocess.run(certify_bootimg_cmds, check=True, cwd=self._exec_dir) 934 subprocess.run(certify_bootimg_cmds, check=True, cwd=self._exec_dir) 976 subprocess.run(certify_bootimg_cmds, check=True, 1020 subprocess.run(certify_bootimg_cmds, check=True, cwd=self._exec_dir) [all …]
|
/system/libfmq/ |
D | FmqInternal.cpp | 25 void check(bool exp) { in check() function 29 void check(bool exp, const char* message) { in check() function
|
/system/sepolicy/prebuilts/api/34.0/private/ |
D | keystore.te | 17 # Allow to check whether security logging is enabled. 20 # Allow keystore to check if the system is rkp only. 23 # Allow keystore to check rkpd feature flags
|
/system/tools/hidl/test/hash_test/ |
D | Android.bp | 15 cmd: "$(location hidl-gen) -L check " + 20 "!($(location hidl-gen) -F -L check " + 25 "!($(location hidl-gen) -L check " +
|
/system/sepolicy/private/ |
D | keystore.te | 17 # Allow to check whether security logging is enabled. 20 # Allow keystore to check if the system is rkp only. 23 # Allow keystore to check rkpd feature flags
|
/system/libfmq/base/fmq/ |
D | MQDescriptorBase.h | 58 void check(bool exp, const char* message); 82 check(length <= SIZE_MAX - kAlignmentSize / 8 + 1, "Queue size too large"); in alignToWordBoundary()
|
/system/sepolicy/tools/ |
D | README | 19 argument in order to check the validity of the security contexts 63 sepolicy-check 68 …sepolicy-check -s <domain> -t <type> -c <class> -p <permission> -P out/target/product/<board>/root… 75 …Tool to check if fuzzer is added for new services. it is used by fuzzer_bindings_test soong module… 82 …-s [SRCs...] list of service_contexts files. Tool will check if there is f…
|
D | sepolicy-check.c | 43 int check(int op, uint16_t arg1, uint16_t arg2) { in check() function 86 match &= check(s_op, source_type, cur->key.source_type); in expand_and_check() 87 match &= check(t_op, target_type, cur->key.target_type); in expand_and_check() 88 match &= check(c_op, target_class, cur->key.target_class); in expand_and_check()
|
/system/core/fastboot/ |
D | usb_linux.cpp | 131 static int check(void *_desc, int len, unsigned type, int size) in check() function 158 if (check(ptr, len, USB_DT_DEVICE, USB_DT_DEVICE_SIZE)) in filter_usb_device() 164 if (check(ptr, len, USB_DT_CONFIG, USB_DT_CONFIG_SIZE)) in filter_usb_device() 213 if (check(hdr, len, USB_DT_INTERFACE, USB_DT_INTERFACE_SIZE) == 0) in filter_usb_device() 235 if (check(hdr, len, USB_DT_ENDPOINT, USB_DT_ENDPOINT_SIZE) == 0) in filter_usb_device() 258 if (check((struct usb_descriptor_hdr *)ptr, len, in filter_usb_device()
|
/system/keymaster/include/keymaster/ |
D | keymaster_tags.h | 66 static void check() {} 105 StaticAssert<(tag & tag_type) == tag_type>::check(); 106 StaticAssert<(tag_type != KM_ENUM) && (tag_type != KM_ENUM_REP)>::check(); 123 StaticAssert<(tag & tag_type) == tag_type>::check(); 124 StaticAssert<(tag_type == KM_ENUM) || (tag_type == KM_ENUM_REP)>::check();
|
/system/tools/mkbootimg/ |
D | repack_bootimg.py | 116 decompression_cmd, check=False, capture_output=True) 128 ['toybox', 'cpio', '-idu'], check=True, 149 ['mkbootfs', self._ramdisk_dir], check=True, capture_output=True) 152 subprocess.run(compression_cmd, check=True, 193 result = subprocess.run(unpack_bootimg_cmds, check=True,
|
/system/sepolicy/prebuilts/api/33.0/private/ |
D | keystore.te | 17 # Allow to check whether security logging is enabled. 20 # Allow keystore to check if the system is rkp only.
|
/system/update_engine/scripts/ |
D | paycheck.py | 148 args.check = (args.check or args.report or args.assert_type or 191 if args.check and not args.meta_sig: 211 if args.check:
|