/system/security/keystore2/src/km_compat/ |
D | lib.rs | 61 let legacy = get_device_or_skip_test!(); in test_get_hardware_info() localVariable 62 let hinfo = legacy.getHardwareInfo(); in test_get_hardware_info() 68 let legacy = get_device_or_skip_test!(); in test_add_rng_entropy() localVariable 69 let result = legacy.addRngEntropy(&[42; 16]); in test_add_rng_entropy() 74 fn generate_key(legacy: &dyn IKeyMintDevice, kps: Vec<KeyParameter>) -> KeyCreationResult { in generate_key() 76 legacy.generateKey(&kps, None /* attest_key */).expect("Failed to generate key"); in generate_key() 85 fn generate_rsa_key(legacy: &dyn IKeyMintDevice, encrypt: bool, attest: bool) -> Vec<u8> { in generate_rsa_key() 131 let creation_result = generate_key(legacy, kps); in generate_rsa_key() 143 let legacy = get_device_or_skip_test!(); in test_generate_key_no_encrypt() localVariable 144 generate_rsa_key(legacy.as_ref(), false, false); in test_generate_key_no_encrypt() [all …]
|
/system/core/healthd/ |
D | healthd_mode_charger_hidl.cpp | 37 .battery_level = health_info.legacy.legacy.batteryLevel, in OnHealthInfoChanged() 39 health_info.legacy.legacy.batteryStatus), in OnHealthInfoChanged()
|
/system/keymint/common/src/keyblob/ |
D | legacy.rs | 3 use crate::tag::legacy::{consume_i32, consume_u32, consume_u8, consume_vec}; 65 let hw_enforced_data = crate::tag::legacy::serialize(&self.hw_enforced)?; in serialize() 66 let sw_enforced_data = crate::tag::legacy::serialize(&self.sw_enforced)?; in serialize() 132 let hw_enforced = crate::tag::legacy::deserialize(&mut data)?; in deserialize() 133 let sw_enforced = crate::tag::legacy::deserialize(&mut data)?; in deserialize() 173 let hw_enforced_data = crate::tag::legacy::serialize(&self.hw_enforced)?; in serialize() 174 let sw_enforced_data = crate::tag::legacy::serialize(&self.sw_enforced)?; in serialize() 215 let hw_enforced = crate::tag::legacy::deserialize(&mut data)?; in deserialize() 216 let sw_enforced = crate::tag::legacy::deserialize(&mut data)?; in deserialize() 234 let hidden_data = crate::tag::legacy::serialize(hidden)?; in compute_hmac()
|
/system/chre/chre_api/ |
D | archive_chre_api.sh | 19 mkdir legacy/$DIRECTORY 20 cp -r include/chre_api/* legacy/$DIRECTORY
|
/system/tools/sysprop/tests/ |
D | ApiCheckerTest.cpp | 43 module: "android.legacy" 83 module: "android.legacy" 133 module: "android.legacy"
|
D | CppGenTest.cpp | 52 legacy_prop_name: "legacy.android.test.string"
|
D | TypeCheckerTest.cpp | 63 legacy_prop_name: "ro.legacy.prop4"
|
/system/keymint/tests/tests/ |
D | keyblob_test.rs | 7 use kmr_common::{crypto, crypto::Rng, expect_err, keyblob, keyblob::legacy::KeyBlob}; 57 let hidden = kmr_common::keyblob::legacy::hidden(&[], &[b"SW"]).unwrap(); in test_serialize_authenticated_legacy_keyblob() 95 let hidden = kmr_common::keyblob::legacy::hidden(&[], &[b"SW"]).unwrap(); in test_deserialize_authenticated_legacy_keyblob_fail() 148 let hidden = kmr_common::keyblob::legacy::hidden(&[], &[b"SW"]).unwrap(); in test_deserialize_authenticated_legacy_keyblob_truncated()
|
/system/tools/sysprop/ |
D | ApiChecker.cpp | 53 bool legacy = false; in CompareProps() local 61 legacy = true; in CompareProps() 92 if (!legacy) { in CompareProps()
|
/system/netd/server/ |
D | NetworkController.h | 134 const char* nexthop, bool legacy, uid_t uid, int mtu); 136 const char* nexthop, bool legacy, uid_t uid, int mtu); 138 const char* nexthop, bool legacy, uid_t uid); 175 const char* nexthop, RouteOperation op, bool legacy, uid_t uid,
|
D | NetworkController.cpp | 658 const char* nexthop, bool legacy, uid_t uid, int mtu) { in addRoute() argument 659 return modifyRoute(netId, interface, destination, nexthop, ROUTE_ADD, legacy, uid, mtu); in addRoute() 663 const char* nexthop, bool legacy, uid_t uid, int mtu) { in updateRoute() argument 664 return modifyRoute(netId, interface, destination, nexthop, ROUTE_UPDATE, legacy, uid, mtu); in updateRoute() 668 const char* nexthop, bool legacy, uid_t uid) { in removeRoute() argument 669 return modifyRoute(netId, interface, destination, nexthop, ROUTE_REMOVE, legacy, uid, 0); in removeRoute() 953 const char* nexthop, enum RouteOperation op, bool legacy, in modifyRoute() argument 974 } else if (legacy) { in modifyRoute()
|
D | NetdNativeService.cpp | 968 bool legacy = false; in networkAddRouteParcel() local 974 legacy, uid, route.mtu); in networkAddRouteParcel() 982 bool legacy = false; in networkUpdateRouteParcel() local 988 legacy, uid, route.mtu); in networkUpdateRouteParcel() 1002 bool legacy = false; in networkAddRoute() local 1005 nextHop.empty() ? nullptr : nextHop.c_str(), legacy, uid, 0); in networkAddRoute() 1013 bool legacy = false; in networkRemoveRoute() local 1016 nextHop.empty() ? nullptr : nextHop.c_str(), legacy, uid); in networkRemoveRoute() 1024 bool legacy = true; in networkAddLegacyRoute() local 1026 nextHop.empty() ? nullptr : nextHop.c_str(), legacy, in networkAddLegacyRoute() [all …]
|
/system/keymint/common/src/tag/ |
D | tests.rs | 42 let got_data = legacy::serialize(&want_params).unwrap(); in test_legacy_serialization() 46 let got_params = legacy::deserialize(&mut data).unwrap(); in test_legacy_serialization()
|
/system/keymint/tests/src/bin/ |
D | auth-keyblob-parse.rs | 9 keyblob::{legacy::KeyBlob, *}, 161 filtered.sort_by(tag::legacy::param_compare); in process() 173 keygen_params.sort_by(tag::legacy::param_compare); in process()
|
D | encrypted-keyblob-parse.rs | 3 use kmr_common::keyblob::legacy::EncryptedKeyBlob;
|
/system/linkerconfig/ |
D | rundiff.sh | 147 mkdir -p $1/legacy 149 linkerconfig -r $TMP_PATH -t $1/legacy
|
/system/security/keystore2/src/database/ |
D | versioning.rs | 117 for legacy in &[false, true] { in upgrade_database_test() 118 if *legacy { in upgrade_database_test() 159 let from = if *legacy { 0 } else { from }; in upgrade_database_test()
|
/system/sepolicy/prebuilts/api/34.0/private/ |
D | charger.te | 5 # The system charger needs to be allowed to set these properties on legacy devices.
|
D | vold_prepare_subdirs.te | 56 # Migrate legacy labels to apex_system_server_data_file (b/217581286)
|
/system/sepolicy/private/ |
D | charger.te | 5 # The system charger needs to be allowed to set these properties on legacy devices.
|
/system/sepolicy/prebuilts/api/33.0/private/ |
D | charger.te | 5 # The system charger needs to be allowed to set these properties on legacy devices.
|
D | vold_prepare_subdirs.te | 56 # Migrate legacy labels to apex_system_server_data_file (b/217581286)
|
/system/core/libsync/tests/ |
D | sync_test.cpp | 246 struct sync_fence_info_data* legacy = sync_fence_info(f.getFd()); in CheckModernLegacyInfoMatch() local 249 ASSERT_TRUE(legacy != NULL); in CheckModernLegacyInfoMatch() 251 EXPECT_STREQ(modern->name, legacy->name); in CheckModernLegacyInfoMatch() 252 EXPECT_EQ(modern->status, legacy->status); in CheckModernLegacyInfoMatch() 255 struct sync_pt_info* pt = sync_pt_info(legacy, NULL); in CheckModernLegacyInfoMatch() 264 pt = sync_pt_info(legacy, pt); in CheckModernLegacyInfoMatch()
|
/system/nfc/ |
D | .clang-format | 19 # accommodate for handling of the large legacy code base.
|
/system/sepolicy/microdroid/system/private/ |
D | property.te | 12 # Don't audit legacy ctl. property handling. We only want the newer permission check to appear
|