/system/chre/platform/linux/ |
D | system_timer.cc | 107 struct itimerspec spec = {}; in isActive() local 108 int ret = timer_gettime(mTimerId, &spec); in isActive() 113 isActive = (spec.it_value.tv_sec > 0 || spec.it_value.tv_nsec > 0); in isActive() 121 struct itimerspec spec = {}; in setInternal() local 124 NanosecondsToTimespec(delayNs, &spec.it_value); in setInternal() 125 NanosecondsToTimespec(0, &spec.it_interval); in setInternal() 127 int ret = timer_settime(mTimerId, kFlags, &spec, nullptr); in setInternal()
|
/system/extras/verity/ |
D | Utils.java | 38 import java.security.spec.ECPublicKeySpec; 39 import java.security.spec.ECPrivateKeySpec; 40 import java.security.spec.X509EncodedKeySpec; 41 import java.security.spec.PKCS8EncodedKeySpec; 42 import java.security.spec.InvalidKeySpecException; 50 import javax.crypto.spec.PBEKeySpec; 166 PKCS8EncodedKeySpec spec = decryptPrivateKey(der); in loadDERPrivateKey() local 168 if (spec == null) { in loadDERPrivateKey() 169 spec = new PKCS8EncodedKeySpec(der); in loadDERPrivateKey() 172 ASN1InputStream bIn = new ASN1InputStream(new ByteArrayInputStream(spec.getEncoded())); in loadDERPrivateKey() [all …]
|
/system/secretkeeper/dice_policy/building/src/ |
D | lib.rs | 134 fn is_target_node(node_payload: &Value, spec: &ConstraintSpec) -> bool { in is_target_node() 135 match &spec.target_entry { in is_target_node() 163 spec: &ConstraintSpec, in expand_wildcard_entry() 166 let pos = wildcard_position(&spec.path)?; in expand_wildcard_entry() 168 let size = size_of_array_in_nested_container(target_node, &spec.path[..pos])?; in expand_wildcard_entry() 169 Ok((0..size as i64).map(|i| replace_key(spec, pos, i)).collect()) in expand_wildcard_entry() 174 fn replace_key(spec: &ConstraintSpec, pos: usize, new_key: i64) -> ConstraintSpec { in replace_key() 175 let mut spec: ConstraintSpec = spec.clone(); in replace_key() localVariable 176 spec.path[pos] = new_key; in replace_key() 177 spec in replace_key()
|
/system/nfc/ |
D | run_unit_tests.sh | 89 for spec in "${tests[@]}" 96 if [ "${name}" != "${spec}" ]; then
|
/system/vold/ |
D | KeyUtil.cpp | 105 static bool buildKeySpecifier(fscrypt_key_specifier* spec, const EncryptionPolicy& policy) { in buildKeySpecifier() argument 113 spec->type = FSCRYPT_KEY_SPEC_TYPE_DESCRIPTOR; in buildKeySpecifier() 114 memcpy(spec->u.descriptor, policy.key_raw_ref.c_str(), FSCRYPT_KEY_DESCRIPTOR_SIZE); in buildKeySpecifier() 122 spec->type = FSCRYPT_KEY_SPEC_TYPE_IDENTIFIER; in buildKeySpecifier() 123 memcpy(spec->u.identifier, policy.key_raw_ref.c_str(), FSCRYPT_KEY_IDENTIFIER_SIZE); in buildKeySpecifier()
|
/system/core/fs_mgr/libdm/include/libdm/ |
D | dm.h | 65 struct dm_target_spec spec; member 68 TargetInfo(const struct dm_target_spec& spec, const std::string& data) in TargetInfo() 69 : spec(spec), data(data) {} in TargetInfo() 281 static std::string GetTargetType(const struct dm_target_spec& spec);
|
/system/core/fs_mgr/libdm/ |
D | dm_target.cpp | 47 struct dm_target_spec* spec = reinterpret_cast<struct dm_target_spec*>(&data[0]); in Serialize() local 48 spec->sector_start = start(); in Serialize() 49 spec->length = size(); in Serialize() 50 snprintf(spec->target_type, sizeof(spec->target_type), "%s", name().c_str()); in Serialize() 51 spec->next = (uint32_t)data.size(); in Serialize()
|
D | dm.cpp | 583 struct dm_target_spec* spec = reinterpret_cast<struct dm_target_spec*>(&buffer[cursor]); in GetTable() local 585 uint32_t next_cursor = std::min(io->data_start + spec->next, data_end); in GetTable() 592 table->emplace_back(*spec, data); in GetTable() 612 std::string DeviceMapper::GetTargetType(const struct dm_target_spec& spec) { in GetTargetType() argument 613 if (const void* p = memchr(spec.target_type, '\0', sizeof(spec.target_type))) { in GetTargetType() 614 ptrdiff_t length = reinterpret_cast<const char*>(p) - spec.target_type; in GetTargetType() 615 return std::string{spec.target_type, static_cast<size_t>(length)}; in GetTargetType() 617 return std::string{spec.target_type, sizeof(spec.target_type)}; in GetTargetType() 690 return spec.target_type == "snapshot"s && data == "Overflow"s; in IsOverflowSnapshot()
|
D | dm_test.cpp | 139 EXPECT_EQ(strcmp(targets[0].spec.target_type, "linear"), 0); in TEST_F() 141 EXPECT_EQ(targets[0].spec.sector_start, 0); in TEST_F() 142 EXPECT_EQ(targets[0].spec.length, 1); in TEST_F() 143 EXPECT_EQ(strcmp(targets[1].spec.target_type, "linear"), 0); in TEST_F() 145 EXPECT_EQ(targets[1].spec.sector_start, 1); in TEST_F() 146 EXPECT_EQ(targets[1].spec.length, 1); in TEST_F() 149 EXPECT_EQ(DeviceMapper::GetTargetType(targets[0].spec), std::string{"linear"}); in TEST_F() 150 EXPECT_EQ(DeviceMapper::GetTargetType(targets[1].spec), std::string{"linear"}); in TEST_F() 332 ASSERT_EQ(strncmp(status[0].spec.target_type, "snapshot-merge", strlen("snapshot-merge")), in MergeImpl() 447 ASSERT_EQ(strncmp(target_status[0].spec.target_type, "snapshot", strlen("snapshot")), 0); in TEST_F()
|
/system/nvram/messages/include/nvram/messages/ |
D | proto.hpp | 337 constexpr auto spec = kFieldSpec; in EncodeMember() local 339 spec.Get(*static_cast<const StructType*>(object)), writer); in EncodeMember() 345 constexpr auto spec = kFieldSpec; in DecodeMember() local 347 spec.Get(*static_cast<StructType*>(object)), reader); in DecodeMember()
|
/system/core/fs_mgr/tools/ |
D | dmctl.cpp | 426 std::cout << target.spec.sector_start << "-" in DmListDevices() 427 << (target.spec.sector_start + target.spec.length) << ": " in DmListDevices() 428 << target.spec.target_type; in DmListDevices() 581 std::cout << target.spec.sector_start << "-" in DumpTable() 582 << (target.spec.sector_start + target.spec.length) << ": " in DumpTable() 583 << target.spec.target_type; in DumpTable()
|
/system/libbase/ |
D | logging.cpp | 371 std::string spec(specs[i]); in InitLogging() local 372 if (spec.size() == 3 && StartsWith(spec, "*:")) { in InitLogging() 373 switch (spec[2]) { in InitLogging() 399 LOG(FATAL) << "unsupported '" << spec << "' in ANDROID_LOG_TAGS (" << tags in InitLogging()
|
/system/security/identity/util/src/java/com/android/security/identity/internal/ |
D | Iso18013.java | 35 import java.security.spec.ECPoint; 42 import javax.crypto.spec.SecretKeySpec;
|
D | Util.java | 51 import java.security.spec.ECGenParameterSpec; 67 import javax.crypto.spec.SecretKeySpec; 70 import java.security.spec.ECPoint;
|
/system/core/trusty/libtrusty/tipc-test/ |
D | tipc_test.c | 982 struct timespec spec; in get_time_us() local 984 clock_gettime(CLOCK_MONOTONIC, &spec); in get_time_us() 985 return spec.tv_sec * 1000000 + spec.tv_nsec / 1000; in get_time_us()
|
/system/core/fs_mgr/libsnapshot/ |
D | snapshot_test.cpp | 256 is_dm_user = (DeviceMapper::GetTargetType(target.spec) == "user"); in CleanupSnapshotArtifacts() 695 ASSERT_EQ(DeviceMapper::GetTargetType(target.spec), "user"); in TEST_F() 697 ASSERT_EQ(DeviceMapper::GetTargetType(target.spec), "snapshot-merge"); in TEST_F() 759 ASSERT_EQ(DeviceMapper::GetTargetType(target.spec), "user"); in TEST_F() 761 ASSERT_EQ(DeviceMapper::GetTargetType(target.spec), "snapshot"); in TEST_F() 1564 ASSERT_EQ(DeviceMapper::GetTargetType(target.spec), "user"); in TEST_F() 1566 ASSERT_EQ(DeviceMapper::GetTargetType(target.spec), "user"); in TEST_F() 1568 ASSERT_EQ(DeviceMapper::GetTargetType(target.spec), "user"); in TEST_F() 1570 ASSERT_EQ(DeviceMapper::GetTargetType(target.spec), "snapshot-merge"); in TEST_F() 1572 ASSERT_EQ(DeviceMapper::GetTargetType(target.spec), "snapshot"); in TEST_F() [all …]
|
D | snapshot.cpp | 984 if (old_targets.size() != 1 || DeviceMapper::GetTargetType(old_targets[0].spec) != "snapshot") { in RewriteSnapshotDeviceTable() 996 table.Emplace<DmTargetSnapshot>(0, old_targets[0].spec.length, base_device, cow_device, in RewriteSnapshotDeviceTable() 1036 auto type = DeviceMapper::GetTargetType(snap_target.spec); in IsSnapshotDevice() 1087 *target_type = DeviceMapper::GetTargetType(target.spec); in QuerySnapshotStatus() 1560 if (DeviceMapper::GetTargetType(target.spec) != "snapshot-merge") { in CollapseSnapshotDevice() 1719 auto target_type = DeviceMapper::GetTargetType(target.spec); in PerformInitTransition() 1782 table.Emplace<DmTargetUser>(0, target.spec.length, misc_name); in PerformInitTransition() 1810 CHECK(base_sectors <= target.spec.length); in PerformInitTransition() 4276 auto target_type = DeviceMapper::GetTargetType(target.spec); in DetachFirstStageSnapuserdForSelinux() 4286 table.Emplace<DmTargetUser>(0, target.spec.length, misc_name); in DetachFirstStageSnapuserdForSelinux() [all …]
|
/system/gsid/ |
D | gsi_service.cpp | 489 const auto& spec = target.spec; in dumpDeviceMapperDevices() local 490 auto target_type = DeviceMapper::GetTargetType(spec); in dumpDeviceMapperDevices() 491 text << " " << target_type << " " << spec.sector_start << " " << spec.length << " " in dumpDeviceMapperDevices()
|
/system/chre/apps/nearby/location/lbs/contexthub/nanoapps/nearby/proto/ |
D | ble_filter.proto | 85 // packet. See go/nearby-presence-spec for details.
|
/system/secretkeeper/dice_policy/ |
D | README.md | 142 The spec is extracted from [DicePolicy.cddl][dicepolicycddl]
|
/system/security/identity/util/test/java/com/android/security/identity/internal/ |
D | UtilUnitTests.java | 42 import javax.crypto.spec.SecretKeySpec;
|
/system/core/fastboot/fuzzy_fastboot/ |
D | README.md | 8 release to find implementation bugs, make sure it conforms to the fastboot spec, 19 By checking a bootloader's conformance to the fastboot spec, as well as make sure 26 Thus, Fuzzy Fastboot also checks for proper conformance to the spec.
|
/system/core/fs_mgr/libfiemap/ |
D | fiemap_writer.cpp | 67 const auto& entry = target.spec; in ValidateDmTarget()
|
/system/core/fs_mgr/ |
D | fs_mgr.cpp | 2227 if (strcmp(target.spec.target_type, "verity") != 0) { in fs_mgr_get_hashtree_info()
|