/system/librustutils/ |
D | users.rs | 24 pub fn multiuser_get_user_id(uid: u32) -> u32 { in multiuser_get_user_id() argument 29 pub fn multiuser_get_app_id(uid: u32) -> u32 { in multiuser_get_app_id() argument 34 pub fn multiuser_get_uid(user_id: u32, app_id: u32) -> u32 { in multiuser_get_uid() argument
|
/system/nfc/src/include/ |
D | nfc_types.h | 50 #define UINT32_TO_STREAM(p, u32) \ argument 52 *(p)++ = (uint8_t)(u32); \ 53 *(p)++ = (uint8_t)((u32) >> 8); \ 54 *(p)++ = (uint8_t)((u32) >> 16); \ 55 *(p)++ = (uint8_t)((u32) >> 24); \ 86 #define STREAM_TO_UINT32(u32, p) \ argument 88 (u32) = (((uint32_t)(*(p))) + ((((uint32_t)(*((p) + 1)))) << 8) + \ 109 #define UINT32_TO_BE_STREAM(p, u32) \ argument 111 *(p)++ = (uint8_t)((u32) >> 24); \ 112 *(p)++ = (uint8_t)((u32) >> 16); \ [all …]
|
/system/extras/ext4_utils/include/ext4_utils/ |
D | ext4_utils.h | 68 typedef unsigned int u32; typedef 79 u32 bg_free_blocks_count; 80 u32 bg_free_inodes_count; 81 u32 bg_used_dirs_count; 93 u32 first_data_block; 95 u32 inode_table_blocks; 96 u32 groups; 97 u32 bg_desc_blocks; 98 u32 default_i_flags; 109 int bitmap_get_bit(u8* bitmap, u32 bit); // vold
|
/system/security/fsverity/libfsverity_rs/ |
D | sys.rs | 25 pub const FS_VERITY_HASH_ALG_SHA256: u32 = 1; 47 pub version: u32, 48 pub hash_algorithm: u32, 49 pub block_size: u32, 50 pub salt_size: u32, 52 pub sig_size: u32, 53 pub __reserved1: u32,
|
/system/netd/server/ |
D | StrictController.cpp | 90 const char *u32; in setupIptablesHooks() local 91 u32 = "0>>22&0x3C@ 12>>26&0x3C@ 0&0xFFFF0000=0x16030000 &&" in setupIptablesHooks() 94 LOCAL_CLEAR_DETECT, u32, connmarkFlagAccept); in setupIptablesHooks() 96 u32 = "0>>22&0x3C@ 8&0xFFFF0000=0x16FE0000 &&" in setupIptablesHooks() 99 LOCAL_CLEAR_DETECT, u32, connmarkFlagAccept); in setupIptablesHooks() 104 u32 = "52>>26&0x3C@ 40&0xFFFF0000=0x16030000 &&" in setupIptablesHooks() 107 LOCAL_CLEAR_DETECT, u32, connmarkFlagAccept); in setupIptablesHooks() 109 u32 = "48&0xFFFF0000=0x16FE0000 &&" in setupIptablesHooks() 112 LOCAL_CLEAR_DETECT, u32, connmarkFlagAccept); in setupIptablesHooks() 121 u32 = "0>>22&0x3C@ 12>>26&0x3C@ 0&0x0=0x0"; in setupIptablesHooks() [all …]
|
/system/security/keystore2/tests/ |
D | keystore2_client_grant_key_tests.rs | 91 const USER_ID: u32 = 99; in keystore2_grant_key_with_invalid_perm_expecting_syserror() 92 const APPLICATION_ID: u32 = 10001; in keystore2_grant_key_with_invalid_perm_expecting_syserror() 112 const USER_ID: u32 = 99; in keystore2_grant_key_with_perm_none() 113 const APPLICATION_ID: u32 = 10001; in keystore2_grant_key_with_perm_none() 114 static GRANTEE_UID: u32 = USER_ID * AID_USER_OFFSET + APPLICATION_ID; in keystore2_grant_key_with_perm_none() 115 static GRANTEE_GID: u32 = GRANTEE_UID; in keystore2_grant_key_with_perm_none() 166 const USER_ID: u32 = 99; in keystore2_grant_get_info_use_key_perm() 167 const APPLICATION_ID: u32 = 10001; in keystore2_grant_get_info_use_key_perm() 168 static GRANTEE_UID: u32 = USER_ID * AID_USER_OFFSET + APPLICATION_ID; in keystore2_grant_get_info_use_key_perm() 169 static GRANTEE_GID: u32 = GRANTEE_UID; in keystore2_grant_get_info_use_key_perm() [all …]
|
D | keystore2_client_list_entries_tests.rs | 58 const USER_ID: u32 = 91; in keystore2_list_entries_success() 59 const APPLICATION_ID: u32 = 10006; in keystore2_list_entries_success() 60 static GRANTEE_UID: u32 = USER_ID * AID_USER_OFFSET + APPLICATION_ID; in keystore2_list_entries_success() 61 static GRANTEE_GID: u32 = GRANTEE_UID; in keystore2_list_entries_success() 196 const USER_ID: u32 = 92; in keystore2_list_entries_with_long_aliases_success() 197 const APPLICATION_ID: u32 = 10002; in keystore2_list_entries_with_long_aliases_success() 198 static CLIENT_UID: u32 = USER_ID * AID_USER_OFFSET + APPLICATION_ID; in keystore2_list_entries_with_long_aliases_success() 199 static CLIENT_GID: u32 = CLIENT_UID; in keystore2_list_entries_with_long_aliases_success()
|
D | keystore2_client_operation_tests.rs | 54 Uid::from_raw(base_uid + (i as u32)), in create_operations() 55 Gid::from_raw(base_gid + (i as u32)), in create_operations() 276 const USER_ID: u32 = 99; in keystore2_ops_prune_test() 277 const APPLICATION_ID: u32 = 10601; in keystore2_ops_prune_test() 373 const USER_ID: u32 = 99; in keystore2_forced_op_perm_denied_test() 374 const APPLICATION_ID: u32 = 10601; in keystore2_forced_op_perm_denied_test() 403 const USER_ID: u32 = 99; in keystore2_forced_op_success_test() 404 const APPLICATION_ID: u32 = 10601; in keystore2_forced_op_success_test()
|
D | keystore2_client_update_subcomponent_tests.rs | 160 const USER_ID_1: u32 = 99; in keystore2_update_subcomponent_fails_permission_denied() 161 const APPLICATION_ID: u32 = 10001; in keystore2_update_subcomponent_fails_permission_denied() 162 static GRANTEE_1_UID: u32 = USER_ID_1 * AID_USER_OFFSET + APPLICATION_ID; in keystore2_update_subcomponent_fails_permission_denied() 163 static GRANTEE_1_GID: u32 = GRANTEE_1_UID; in keystore2_update_subcomponent_fails_permission_denied() 165 const USER_ID_2: u32 = 98; in keystore2_update_subcomponent_fails_permission_denied() 166 static GRANTEE_2_UID: u32 = USER_ID_2 * AID_USER_OFFSET + APPLICATION_ID; in keystore2_update_subcomponent_fails_permission_denied() 167 static GRANTEE_2_GID: u32 = GRANTEE_2_UID; in keystore2_update_subcomponent_fails_permission_denied()
|
/system/keymint/wire/src/ |
D | legacy.rs | 53 const TRUSTY_RESPONSE_BITMASK: u32 = 0x01; 56 pub const TRUSTY_STOP_BITMASK: u32 = 0x02; 86 pub fn message_version(&self) -> u32 { in message_version() argument 100 pub const KM_DATE: u32 = 20201219; 109 UnknownCommand(u32), 110 InvalidEnumValue(u32), 121 fn from_code_and_data(cmd: u32, data: &[u8]) -> Result<Self, Error>; in from_code_and_data() argument 125 let (raw_cmd, data) = <u32>::deserialize(data)?; in deserialize_trusty_request_message() 146 fn raw_code(&self) -> u32; in raw_code() argument 154 Err { cmd: u32, code: ErrorCode }, [all …]
|
D | keymint.rs | 69 pub boot_patchlevel: u32, // YYYYMMDD format 331 MinMacLength(u32), 342 MaxUsesPerBoot(u32), 343 UsageCountLimit(u32), 344 UserId(u32), 347 UserAuthType(u32), 348 AuthTimeout(u32), 358 OsVersion(u32), 359 OsPatchlevel(u32), 371 VendorPatchlevel(u32), [all …]
|
/system/security/keystore2/src/ |
D | audit_log.rs | 25 const TAG_KEY_GENERATED: u32 = 210024; 26 const TAG_KEY_IMPORTED: u32 = 210025; 27 const TAG_KEY_DESTROYED: u32 = 210026; 28 const TAG_KEY_INTEGRITY_VIOLATION: u32 = 210032; 67 fn log_key_event(tag: u32, key: &KeyDescriptor, calling_app: uid_t, success: bool) { in log_key_event() argument 76 fn with_log_context<F>(tag: u32, f: F) in with_log_context() argument
|
D | legacy_importer.rs | 64 uid: u32, 69 fn new(uid: u32, alias: String) -> Self { in new() argument 75 Uid(u32), 76 User(u32), 81 recently_imported_super_key: HashSet<u32>, 89 const AID_WIFI: u32 = 1010; 203 (Domain::APP, namespace) => namespace as u32, in list_uid() 290 caller_uid: u32, in with_try_import() argument 346 user_id: u32, in with_try_import_super_key() argument 380 (Domain::APP, nspace) => nspace as u32, in bulk_delete_uid() [all …]
|
D | legacy_blob.rs | 197 fn read_ne_u32(stream: &mut dyn Read) -> Result<u32> { in read_ne_u32() argument 198 const SIZE: usize = std::mem::size_of::<u32>(); in read_ne_u32() 200 stream.read_exact(&mut buffer).map(|_| u32::from_ne_bytes(buffer)).context("In read_ne_u32.") in read_ne_u32() 386 let length = u32::from_be_bytes( in new_from_stream() 511 TagType((tag.0 as u32 & 0xFF000000u32) as i32) in tag_type() 689 uid: u32, in read_characteristics_file() argument 756 fn read_km_blob_file(&self, uid: u32, alias: &str) -> Result<Option<(Blob, String)>> { in read_km_blob_file() argument 805 uid: u32, in read_legacy_keystore_entry() argument 830 pub fn remove_legacy_keystore_entry(&self, uid: u32, alias: &str) -> Result<bool> { in remove_legacy_keystore_entry() argument 850 pub fn list_legacy_keystore_entries_for_uid(&self, uid: u32) -> Result<Vec<String>> { in list_legacy_keystore_entries_for_uid() [all …]
|
/system/core/libsparse/ |
D | sparse_defs.h | 24 #define __le32 u32 28 #define __be32 u32 32 #define __u32 u32 38 typedef unsigned int u32; typedef
|
/system/keymint/common/src/keyblob/ |
D | legacy.rs | 54 pub kdf_version: Option<u32>, 59 pub key_slot: Option<u32>, 69 + size_of::<u32>() in serialize() 71 + size_of::<u32>() in serialize() 73 + size_of::<u32>() in serialize() 77 + size_of::<u32>() in serialize() 80 result.extend_from_slice(&(self.nonce.len() as u32).to_ne_bytes()); in serialize() 82 result.extend_from_slice(&(self.ciphertext.len() as u32).to_ne_bytes()); in serialize() 84 result.extend_from_slice(&(self.tag.len() as u32).to_ne_bytes()); in serialize() 92 })? as u32; in serialize() [all …]
|
/system/security/keystore2/legacykeystore/ |
D | lib.rs | 105 fn list(&mut self, caller_uid: u32) -> Result<Vec<String>> { in list() 125 fn put(&mut self, caller_uid: u32, alias: &str, entry: &[u8]) -> Result<()> { in put() argument 136 fn get(&mut self, caller_uid: u32, alias: &str) -> Result<Option<Vec<u8>>> { in get() argument 148 fn remove(&mut self, caller_uid: u32, alias: &str) -> Result<bool> { in remove() argument 159 fn remove_uid(&mut self, uid: u32) -> Result<()> { in remove_uid() 167 fn remove_user(&mut self, user_id: u32) -> Result<()> { in remove_user() 253 fn delete_user(&self, user_id: u32) -> Result<()> { in delete_user() 265 recently_imported: HashSet<(u32, String)>, 276 const AID_WIFI: u32 = 1010; 298 fn get_effective_uid(uid: i32) -> Result<u32> { in get_effective_uid() argument [all …]
|
/system/security/keystore2/apc_compat/ |
D | apc_compat.rs | 73 type Callback = dyn FnOnce(u32, Option<&[u8]>, Option<&[u8]>); 77 rc: u32, in confirmation_result_callback() argument 155 ) -> Result<(), u32> in prompt_user_confirmation() 157 F: FnOnce(u32, Option<&[u8]>, Option<&[u8]>) + 'static, in prompt_user_confirmation() argument
|
/system/security/keystore2/aaid/ |
D | lib.rs | 23 pub fn get_aaid(uid: u32) -> Result<Vec<u8>, u32> { in get_aaid() argument
|
/system/extras/ext4_utils/ |
D | ext4_utils.cpp | 57 int bitmap_get_bit(u8* bitmap, u32 bit) { in bitmap_get_bit() 63 void bitmap_clear_bit(u8* bitmap, u32 bit) { in bitmap_clear_bit() 101 aux_info.blocks_per_ind = info.block_size / sizeof(u32); in ext4_create_fs_aux_info() 110 u32 last_group_size = aux_info.len_blocks == info.blocks_per_group in ext4_create_fs_aux_info() 113 u32 last_header_size = 2 + aux_info.inode_table_blocks; in ext4_create_fs_aux_info() 263 (extended ? (u32)gdp->bg_free_blocks_count_hi << 16 : 0) | in read_block_group_descriptors() 266 (extended ? (u32)gdp->bg_free_inodes_count_hi << 16 : 0) | in read_block_group_descriptors() 269 (extended ? (u32)gdp->bg_used_dirs_count_hi << 16 : 0) | gdp->bg_used_dirs_count_lo; in read_block_group_descriptors()
|
/system/core/trusty/utils/rpmb_dev/ |
D | rpmb_protocol.h | 118 static inline uint32_t rpmb_get_u32(struct rpmb_u32 u32) { in rpmb_get_u32() argument 123 for (i = 0; i < sizeof(u32.byte); i++) in rpmb_get_u32() 124 val = val << 8 | u32.byte[i]; in rpmb_get_u32()
|
/system/keymint/hal/src/ |
D | env.rs | 19 fn extract_u32(value: Option<regex::Match>) -> Result<u32, Error> { in extract_u32() argument 23 match s.parse::<u32>() { in extract_u32() 41 pub fn extract_truncated_patchlevel(prop_value: &str) -> Result<u32, Error> { in extract_truncated_patchlevel() argument 58 pub fn extract_patchlevel(prop_value: &str) -> Result<u32, Error> { in extract_patchlevel() argument
|
/system/keymint/common/src/tag/ |
D | legacy.rs | 39 pub fn consume_u32(data: &mut &[u8]) -> Result<u32, Error> { in consume_u32() argument 45 Ok(u32::from_ne_bytes(chunk)) in consume_u32() 139 blob_size += v.len() as u32; in serialize() 147 result.try_extend_from_slice(&(params.len() as u32).to_ne_bytes())?; in serialize() 154 result.try_extend_from_slice(&(param.tag() as u32).to_ne_bytes())?; in serialize() 157 KeyParam::Purpose(v) => result.try_extend_from_slice(&(*v as u32).to_ne_bytes())?, in serialize() 158 KeyParam::Algorithm(v) => result.try_extend_from_slice(&(*v as u32).to_ne_bytes())?, in serialize() 159 KeyParam::BlockMode(v) => result.try_extend_from_slice(&(*v as u32).to_ne_bytes())?, in serialize() 160 KeyParam::Digest(v) => result.try_extend_from_slice(&(*v as u32).to_ne_bytes())?, in serialize() 161 KeyParam::Padding(v) => result.try_extend_from_slice(&(*v as u32).to_ne_bytes())?, in serialize() [all …]
|
/system/security/keystore2/src/database/ |
D | versioning.rs | 18 pub fn create_or_get_version(tx: &Transaction, current_version: u32) -> Result<u32> { in create_or_get_version() argument 66 pub fn update_version(tx: &Transaction, new_version: u32) -> Result<()> { in update_version() 77 pub fn upgrade_database<F>(tx: &Transaction, current_version: u32, upgraders: &[F]) -> Result<()> in upgrade_database() argument 79 F: Fn(&Transaction) -> Result<u32> + 'static, in upgrade_database()
|
/system/security/prng_seeder/src/ |
D | conditioner.rs | 24 const NUM_REQUESTS_PER_RESEED: u32 = 256; 51 requests_since_reseed: u32,
|