Home
last modified time | relevance | path

Searched refs:legacy (Results 1 – 25 of 83) sorted by relevance

1234

/system/security/keystore2/src/km_compat/
Dlib.rs61 let legacy = get_device_or_skip_test!(); in test_get_hardware_info() localVariable
62 let hinfo = legacy.getHardwareInfo(); in test_get_hardware_info()
68 let legacy = get_device_or_skip_test!(); in test_add_rng_entropy() localVariable
69 let result = legacy.addRngEntropy(&[42; 16]); in test_add_rng_entropy()
74 fn generate_key(legacy: &dyn IKeyMintDevice, kps: Vec<KeyParameter>) -> KeyCreationResult { in generate_key()
76 legacy.generateKey(&kps, None /* attest_key */).expect("Failed to generate key"); in generate_key()
85 fn generate_rsa_key(legacy: &dyn IKeyMintDevice, encrypt: bool, attest: bool) -> Vec<u8> { in generate_rsa_key()
131 let creation_result = generate_key(legacy, kps); in generate_rsa_key()
143 let legacy = get_device_or_skip_test!(); in test_generate_key_no_encrypt() localVariable
144 generate_rsa_key(legacy.as_ref(), false, false); in test_generate_key_no_encrypt()
[all …]
/system/core/healthd/
Dhealthd_mode_charger_hidl.cpp37 .battery_level = health_info.legacy.legacy.batteryLevel, in OnHealthInfoChanged()
39 health_info.legacy.legacy.batteryStatus), in OnHealthInfoChanged()
/system/keymint/common/src/keyblob/
Dlegacy.rs3 use crate::tag::legacy::{consume_i32, consume_u32, consume_u8, consume_vec};
65 let hw_enforced_data = crate::tag::legacy::serialize(&self.hw_enforced)?; in serialize()
66 let sw_enforced_data = crate::tag::legacy::serialize(&self.sw_enforced)?; in serialize()
132 let hw_enforced = crate::tag::legacy::deserialize(&mut data)?; in deserialize()
133 let sw_enforced = crate::tag::legacy::deserialize(&mut data)?; in deserialize()
173 let hw_enforced_data = crate::tag::legacy::serialize(&self.hw_enforced)?; in serialize()
174 let sw_enforced_data = crate::tag::legacy::serialize(&self.sw_enforced)?; in serialize()
215 let hw_enforced = crate::tag::legacy::deserialize(&mut data)?; in deserialize()
216 let sw_enforced = crate::tag::legacy::deserialize(&mut data)?; in deserialize()
234 let hidden_data = crate::tag::legacy::serialize(hidden)?; in compute_hmac()
/system/chre/chre_api/
Darchive_chre_api.sh19 mkdir legacy/$DIRECTORY
20 cp -r include/chre_api/* legacy/$DIRECTORY
/system/tools/sysprop/tests/
DApiCheckerTest.cpp43 module: "android.legacy"
83 module: "android.legacy"
133 module: "android.legacy"
DCppGenTest.cpp52 legacy_prop_name: "legacy.android.test.string"
DTypeCheckerTest.cpp63 legacy_prop_name: "ro.legacy.prop4"
/system/keymint/tests/tests/
Dkeyblob_test.rs7 use kmr_common::{crypto, crypto::Rng, expect_err, keyblob, keyblob::legacy::KeyBlob};
57 let hidden = kmr_common::keyblob::legacy::hidden(&[], &[b"SW"]).unwrap(); in test_serialize_authenticated_legacy_keyblob()
95 let hidden = kmr_common::keyblob::legacy::hidden(&[], &[b"SW"]).unwrap(); in test_deserialize_authenticated_legacy_keyblob_fail()
148 let hidden = kmr_common::keyblob::legacy::hidden(&[], &[b"SW"]).unwrap(); in test_deserialize_authenticated_legacy_keyblob_truncated()
/system/tools/sysprop/
DApiChecker.cpp53 bool legacy = false; in CompareProps() local
61 legacy = true; in CompareProps()
92 if (!legacy) { in CompareProps()
/system/netd/server/
DNetworkController.h134 const char* nexthop, bool legacy, uid_t uid, int mtu);
136 const char* nexthop, bool legacy, uid_t uid, int mtu);
138 const char* nexthop, bool legacy, uid_t uid);
175 const char* nexthop, RouteOperation op, bool legacy, uid_t uid,
DNetworkController.cpp658 const char* nexthop, bool legacy, uid_t uid, int mtu) { in addRoute() argument
659 return modifyRoute(netId, interface, destination, nexthop, ROUTE_ADD, legacy, uid, mtu); in addRoute()
663 const char* nexthop, bool legacy, uid_t uid, int mtu) { in updateRoute() argument
664 return modifyRoute(netId, interface, destination, nexthop, ROUTE_UPDATE, legacy, uid, mtu); in updateRoute()
668 const char* nexthop, bool legacy, uid_t uid) { in removeRoute() argument
669 return modifyRoute(netId, interface, destination, nexthop, ROUTE_REMOVE, legacy, uid, 0); in removeRoute()
953 const char* nexthop, enum RouteOperation op, bool legacy, in modifyRoute() argument
974 } else if (legacy) { in modifyRoute()
DNetdNativeService.cpp968 bool legacy = false; in networkAddRouteParcel() local
974 legacy, uid, route.mtu); in networkAddRouteParcel()
982 bool legacy = false; in networkUpdateRouteParcel() local
988 legacy, uid, route.mtu); in networkUpdateRouteParcel()
1002 bool legacy = false; in networkAddRoute() local
1005 nextHop.empty() ? nullptr : nextHop.c_str(), legacy, uid, 0); in networkAddRoute()
1013 bool legacy = false; in networkRemoveRoute() local
1016 nextHop.empty() ? nullptr : nextHop.c_str(), legacy, uid); in networkRemoveRoute()
1024 bool legacy = true; in networkAddLegacyRoute() local
1026 nextHop.empty() ? nullptr : nextHop.c_str(), legacy, in networkAddLegacyRoute()
[all …]
/system/keymint/common/src/tag/
Dtests.rs42 let got_data = legacy::serialize(&want_params).unwrap(); in test_legacy_serialization()
46 let got_params = legacy::deserialize(&mut data).unwrap(); in test_legacy_serialization()
/system/keymint/tests/src/bin/
Dauth-keyblob-parse.rs9 keyblob::{legacy::KeyBlob, *},
161 filtered.sort_by(tag::legacy::param_compare); in process()
173 keygen_params.sort_by(tag::legacy::param_compare); in process()
Dencrypted-keyblob-parse.rs3 use kmr_common::keyblob::legacy::EncryptedKeyBlob;
/system/linkerconfig/
Drundiff.sh147 mkdir -p $1/legacy
149 linkerconfig -r $TMP_PATH -t $1/legacy
/system/security/keystore2/src/database/
Dversioning.rs117 for legacy in &[false, true] { in upgrade_database_test()
118 if *legacy { in upgrade_database_test()
159 let from = if *legacy { 0 } else { from }; in upgrade_database_test()
/system/sepolicy/prebuilts/api/34.0/private/
Dcharger.te5 # The system charger needs to be allowed to set these properties on legacy devices.
Dvold_prepare_subdirs.te56 # Migrate legacy labels to apex_system_server_data_file (b/217581286)
/system/sepolicy/private/
Dcharger.te5 # The system charger needs to be allowed to set these properties on legacy devices.
/system/sepolicy/prebuilts/api/33.0/private/
Dcharger.te5 # The system charger needs to be allowed to set these properties on legacy devices.
Dvold_prepare_subdirs.te56 # Migrate legacy labels to apex_system_server_data_file (b/217581286)
/system/core/libsync/tests/
Dsync_test.cpp246 struct sync_fence_info_data* legacy = sync_fence_info(f.getFd()); in CheckModernLegacyInfoMatch() local
249 ASSERT_TRUE(legacy != NULL); in CheckModernLegacyInfoMatch()
251 EXPECT_STREQ(modern->name, legacy->name); in CheckModernLegacyInfoMatch()
252 EXPECT_EQ(modern->status, legacy->status); in CheckModernLegacyInfoMatch()
255 struct sync_pt_info* pt = sync_pt_info(legacy, NULL); in CheckModernLegacyInfoMatch()
264 pt = sync_pt_info(legacy, pt); in CheckModernLegacyInfoMatch()
/system/nfc/
D.clang-format19 # accommodate for handling of the large legacy code base.
/system/sepolicy/microdroid/system/private/
Dproperty.te12 # Don't audit legacy ctl. property handling. We only want the newer permission check to appear

1234