/system/security/keystore/ |
D | keystore_utils.cpp | 63 void add_legacy_key_authorizations(int keyType, keystore::AuthorizationSet* params) { in add_legacy_key_authorizations() argument 65 params->push_back(TAG_PURPOSE, KeyPurpose::SIGN); in add_legacy_key_authorizations() 66 params->push_back(TAG_PURPOSE, KeyPurpose::VERIFY); in add_legacy_key_authorizations() 67 params->push_back(TAG_PURPOSE, KeyPurpose::ENCRYPT); in add_legacy_key_authorizations() 68 params->push_back(TAG_PURPOSE, KeyPurpose::DECRYPT); in add_legacy_key_authorizations() 69 params->push_back(TAG_PADDING, PaddingMode::NONE); in add_legacy_key_authorizations() 71 params->push_back(TAG_PADDING, PaddingMode::RSA_PKCS1_1_5_SIGN); in add_legacy_key_authorizations() 72 params->push_back(TAG_PADDING, PaddingMode::RSA_PKCS1_1_5_ENCRYPT); in add_legacy_key_authorizations() 73 params->push_back(TAG_PADDING, PaddingMode::RSA_PSS); in add_legacy_key_authorizations() 74 params->push_back(TAG_PADDING, PaddingMode::RSA_OAEP); in add_legacy_key_authorizations() [all …]
|
D | legacy_keymaster_device_wrapper.cpp | 70 params = new keymaster_key_param_t[keyParams.size()]; in KmParamSet() 77 params[i] = keymaster_param_enum(tag, keyParams[i].f.integer); in KmParamSet() 81 params[i] = keymaster_param_int(tag, keyParams[i].f.integer); in KmParamSet() 85 params[i] = keymaster_param_long(tag, keyParams[i].f.longInteger); in KmParamSet() 88 params[i] = keymaster_param_date(tag, keyParams[i].f.dateTime); in KmParamSet() 92 params[i] = keymaster_param_bool(tag); in KmParamSet() 94 params[i].tag = KM_TAG_INVALID; in KmParamSet() 98 params[i] = in KmParamSet() 103 params[i].tag = KM_TAG_INVALID; in KmParamSet() 109 KmParamSet(KmParamSet&& other) : keymaster_key_param_set_t{other.params, other.length} { in KmParamSet() [all …]
|
D | key_store_service.cpp | 57 bool containsTag(const hidl_vec<KeyParameter>& params, Tag tag) { in containsTag() argument 58 return params.end() != std::find_if(params.begin(), params.end(), in containsTag() 62 bool isAuthenticationBound(const hidl_vec<KeyParameter>& params) { in isAuthenticationBound() argument 63 return !containsTag(params, Tag::NO_AUTH_REQUIRED); in isAuthenticationBound() 96 KeyStoreServiceReturnCode updateParamsForAttestation(uid_t callingUid, AuthorizationSet* params) { in updateParamsForAttestation() argument 102 if (factoryResetSinceIdRotation) params->push_back(TAG_RESET_SINCE_ID_ROTATION); in updateParamsForAttestation() 119 params->push_back(TAG_ATTESTATION_APPLICATION_ID, asn1_attestation_id); in updateParamsForAttestation() 388 keystore::AuthorizationSet params; in generate() local 389 add_legacy_key_authorizations(keyType, ¶ms); in generate() 393 params.push_back(TAG_ALGORITHM, Algorithm::EC); in generate() [all …]
|
/system/bt/osi/test/ |
D | hash_map_utils_test.cc | 40 char params[] = ""; in TEST_F() local 41 map = hash_map_utils_new_from_string_params(params); in TEST_F() 46 char params[] = ";;;"; in TEST_F() local 47 map = hash_map_utils_new_from_string_params(params); in TEST_F() 52 char params[] = "keyOfSomething=value=OfSomething"; in TEST_F() local 55 map = hash_map_utils_new_from_string_params(params); in TEST_F() 62 char params[] = "key=valu0;key=value1"; in TEST_F() local 65 map = hash_map_utils_new_from_string_params(params); in TEST_F() 71 char params[] = "keyOfSomething=valueOfSomething"; in TEST_F() local 74 map = hash_map_utils_new_from_string_params(params); in TEST_F() [all …]
|
/system/bt/btif/src/ |
D | btif_gatt_test.cc | 202 const btgatt_test_params_t* params) { in btif_gattc_test_command_impl() argument 206 LOG_DEBUG(LOG_TAG, "%s: ENABLE - enable=%d", __func__, params->u1); in btif_gattc_test_command_impl() 207 if (params->u1) { in btif_gattc_test_command_impl() 223 __func__, params->bda1->address[0], params->bda1->address[1], in btif_gattc_test_command_impl() 224 params->bda1->address[2], params->bda1->address[3], in btif_gattc_test_command_impl() 225 params->bda1->address[4], params->bda1->address[5], params->u1, in btif_gattc_test_command_impl() 226 params->u2); in btif_gattc_test_command_impl() 228 if (params->u1 == BT_DEVICE_TYPE_BLE) in btif_gattc_test_command_impl() 229 BTM_SecAddBleDevice(*params->bda1, NULL, BT_DEVICE_TYPE_BLE, in btif_gattc_test_command_impl() 230 params->u2); in btif_gattc_test_command_impl() [all …]
|
D | btif_ble_advertiser.cc | 63 const AdvertiseParameters& params) { in parseParams() argument 64 p_params->advertising_event_properties = params.advertising_event_properties; in parseParams() 65 p_params->adv_int_min = params.min_interval; in parseParams() 66 p_params->adv_int_max = params.max_interval; in parseParams() 67 p_params->channel_map = params.channel_map; in parseParams() 69 p_params->tx_power = params.tx_power; in parseParams() 70 p_params->primary_advertising_phy = params.primary_advertising_phy; in parseParams() 71 p_params->secondary_advertising_phy = params.secondary_advertising_phy; in parseParams() 73 params.scan_request_notification_enable; in parseParams() 124 void SetParameters(uint8_t advertiser_id, AdvertiseParameters params, in SetParameters() argument [all …]
|
D | btif_gatt_client.cc | 59 int command, const btgatt_test_params_t* params); 384 btgatt_read_params_t* params = new btgatt_read_params_t; in read_char_cb() local 385 params->value_type = 0x00 /* GATTC_READ_VALUE_TYPE_VALUE */; in read_char_cb() 386 params->status = status; in read_char_cb() 387 params->handle = handle; in read_char_cb() 388 params->value.len = len; in read_char_cb() 390 if (len > 0) memcpy(params->value.value, value, len); in read_char_cb() 395 base::Owned(params)); in read_char_cb() 407 btgatt_read_params_t* params = new btgatt_read_params_t; in read_using_char_uuid_cb() local 408 params->value_type = 0x00 /* GATTC_READ_VALUE_TYPE_VALUE */; in read_using_char_uuid_cb() [all …]
|
/system/libufdt/tests/src/ |
D | ufdt_gen_test_dts.c | 133 static int gen_dts(FILE *fp, const struct gen_params *params) { in gen_dts() argument 134 if (!params->no_header) { in gen_dts() 135 output_header(fp, params->plugin); in gen_dts() 138 if (params->node_num > 0) { in gen_dts() 139 output_root_begin(fp, params->depth); in gen_dts() 140 output_unused_nodes(fp, params->unused_num); in gen_dts() 141 output_nodes(fp, params->node_num, "status", "disabled"); in gen_dts() 142 output_root_end(fp, params->depth); in gen_dts() 146 output_ref_nodes(fp, start_id, params->append_num, "new_prop", "bar"); in gen_dts() 147 start_id += params->append_num; in gen_dts() [all …]
|
/system/nfc/src/nfa/dm/ |
D | nfa_dm_main.c | 245 p_stored = nfa_dm_cb.params.pf_rc; in nfa_dm_check_set_config() 249 p_stored = nfa_dm_cb.params.total_duration; in nfa_dm_check_set_config() 257 p_stored = nfa_dm_cb.params.la_bit_frame_sdd; in nfa_dm_check_set_config() 259 p_cur_len = &nfa_dm_cb.params.la_bit_frame_sdd_len; in nfa_dm_check_set_config() 262 p_stored = nfa_dm_cb.params.la_platform_config; in nfa_dm_check_set_config() 264 p_cur_len = &nfa_dm_cb.params.la_platform_config_len; in nfa_dm_check_set_config() 267 p_stored = nfa_dm_cb.params.la_sel_info; in nfa_dm_check_set_config() 269 p_cur_len = &nfa_dm_cb.params.la_sel_info_len; in nfa_dm_check_set_config() 272 p_stored = nfa_dm_cb.params.la_nfcid1; in nfa_dm_check_set_config() 274 p_cur_len = &nfa_dm_cb.params.la_nfcid1_len; in nfa_dm_check_set_config() [all …]
|
/system/libufdt/utils/src/ |
D | mkdtimg_cfg_create.c | 120 static int process_command_cfg_create(const struct cfg_create_params *params) { in process_command_cfg_create() argument 125 cfg_fp = fopen(params->cfg_filename, "r"); in process_command_cfg_create() 127 fprintf(stderr, "Can not open config file: %s\n", params->cfg_filename); in process_command_cfg_create() 131 printf("create image file: %s...\n", params->img_filename); in process_command_cfg_create() 133 img_fp = fopen(params->img_filename, "wb"); in process_command_cfg_create() 135 fprintf(stderr, "Can not create file: %s\n", params->img_filename); in process_command_cfg_create() 139 if (params->dtb_dir != NULL) { in process_command_cfg_create() 140 if (chdir(params->dtb_dir) != 0) { in process_command_cfg_create() 141 fprintf(stderr, "Can not switch to directory: %s\n", params->dtb_dir); in process_command_cfg_create() 169 struct cfg_create_params params; in handle_command_cfg_create() local [all …]
|
D | mkdtimg_dump.c | 150 const struct dump_params *params) { in dump_image_from_fp() argument 175 if (params->out_dtb_filename != NULL) { in dump_image_from_fp() 178 params->out_dtb_filename, i); in dump_image_from_fp() 191 static int process_command_dump(const struct dump_params *params) { in process_command_dump() argument 196 img_fp = fopen(params->img_filename, "rb"); in process_command_dump() 198 fprintf(stderr, "Can not open image file: %s\n", params->img_filename); in process_command_dump() 202 if (params->out_filename != NULL) { in process_command_dump() 203 out_fp = fopen(params->out_filename, "w"); in process_command_dump() 205 fprintf(stderr, "Can not create file: %s\n", params->out_filename); in process_command_dump() 210 ret = dump_image_from_fp(out_fp ? out_fp : stdout, img_fp, params); in process_command_dump() [all …]
|
/system/vold/ |
D | ScryptParameters.cpp | 23 int params[3] = {}; in parse_scrypt_parameters() local 36 params[i] = strtol(token, &endptr, 10); in parse_scrypt_parameters() 41 if ((*token == '\0') || (*endptr != '\0') || params[i] < 0 || params[i] > 255) { in parse_scrypt_parameters() 48 *Nf = params[0]; *rf = params[1]; *pf = params[2]; in parse_scrypt_parameters()
|
/system/update_engine/ |
D | boot_control_chromeos.cc | 162 CgptAddParams params; in IsSlotBootable() local 163 memset(¶ms, '\0', sizeof(params)); in IsSlotBootable() 164 params.drive_name = const_cast<char*>(boot_disk_name_.c_str()); in IsSlotBootable() 165 params.partition = partition_num; in IsSlotBootable() 167 int retval = CgptGetPartitionDetails(¶ms); in IsSlotBootable() 171 return params.successful || params.tries > 0; in IsSlotBootable() 186 CgptAddParams params; in MarkSlotUnbootable() local 187 memset(¶ms, 0, sizeof(params)); in MarkSlotUnbootable() 189 params.drive_name = const_cast<char*>(boot_disk_name_.c_str()); in MarkSlotUnbootable() 190 params.partition = partition_num; in MarkSlotUnbootable() [all …]
|
D | omaha_request_params_unittest.cc | 115 OmahaRequestParams params(&fake_system_state_); in TEST_F() local 116 params.set_root(tempdir_.path().value()); in TEST_F() 117 EXPECT_TRUE(params.Init("", "", false)); in TEST_F() 118 EXPECT_TRUE(params.SetTargetChannel("canary-channel", false, nullptr)); in TEST_F() 119 EXPECT_FALSE(params.is_powerwash_allowed()); in TEST_F() 129 OmahaRequestParams params(&fake_system_state_); in TEST_F() local 130 params.set_root(tempdir_.path().value()); in TEST_F() 131 EXPECT_TRUE(params.Init("", "", false)); in TEST_F() 132 EXPECT_TRUE(params.SetTargetChannel("canary-channel", true, nullptr)); in TEST_F() 133 EXPECT_TRUE(params.is_powerwash_allowed()); in TEST_F() [all …]
|
D | omaha_request_action_unittest.cc | 421 void TestEvent(OmahaRequestParams params, in TestEvent() argument 431 fake_system_state.set_request_params(¶ms); in TestEvent() 825 OmahaRequestParams params = request_params_; in TEST_F() local 826 params.set_wall_clock_based_wait_enabled(true); in TEST_F() 827 params.set_update_check_count_wait_enabled(false); in TEST_F() 828 params.set_waiting_period(TimeDelta::FromDays(2)); in TEST_F() 831 TestUpdateCheck(¶ms, in TEST_F() 844 params.set_interactive(true); in TEST_F() 846 TestUpdateCheck(¶ms, in TEST_F() 861 OmahaRequestParams params = request_params_; in TEST_F() local [all …]
|
D | omaha_response_handler_action_unittest.cc | 369 OmahaRequestParams params(&fake_system_state_); in TEST_F() local 371 params.set_root(tempdir.path().value()); in TEST_F() 372 params.set_current_channel("canary-channel"); in TEST_F() 380 EXPECT_TRUE(params.SetTargetChannel("stable-channel", true, nullptr)); in TEST_F() 381 params.UpdateDownloadChannel(); in TEST_F() 382 EXPECT_TRUE(params.to_more_stable_channel()); in TEST_F() 383 EXPECT_TRUE(params.is_powerwash_allowed()); in TEST_F() 385 fake_system_state_.set_request_params(¶ms); in TEST_F() 404 OmahaRequestParams params(&fake_system_state_); in TEST_F() local 406 params.set_root(tempdir.path().value()); in TEST_F() [all …]
|
/system/core/fs_mgr/ |
D | fs_mgr_verity.cpp | 193 const struct verity_table_params *params); 196 const struct verity_table_params *params) in format_verity_table() argument 201 if (params->mode == VERITY_MODE_RESTART) { in format_verity_table() 203 } else if (params->mode == VERITY_MODE_LOGGING) { in format_verity_table() 207 if (params->ecc.valid) { in format_verity_table() 211 params->table, 1 + VERITY_TABLE_OPT_FEC_ARGS, mode_flag, params->ecc_dev, in format_verity_table() 212 params->ecc.start / FEC_BLOCKSIZE, params->ecc.blocks, params->ecc.roots); in format_verity_table() 216 params->table, VERITY_TABLE_OPT_FEC_ARGS, params->ecc_dev, in format_verity_table() 217 params->ecc.start / FEC_BLOCKSIZE, params->ecc.blocks, params->ecc.roots); in format_verity_table() 220 res = snprintf(buf, bufsize, "%s 2 " VERITY_TABLE_OPT_IGNZERO " %s", params->table, in format_verity_table() [all …]
|
/system/nfc/src/nfa/rw/ |
D | nfa_rw_api.c | 157 p_msg->params.write_ndef.len = len; in NFA_RwWriteNDef() 158 p_msg->params.write_ndef.p_data = p_data; in NFA_RwWriteNDef() 192 p_msg->params.option = option; in NFA_RwPresenceCheck() 280 p_msg->params.set_readonly.b_hard_lock = b_hard_lock; in NFA_RwSetTagReadOnly() 440 p_msg->params.t1t_read.block_number = block_number; in NFA_RwT1tRead() 441 p_msg->params.t1t_read.index = index; in NFA_RwT1tRead() 473 p_msg->params.t1t_write.b_erase = b_erase; in NFA_RwT1tWrite() 475 p_msg->params.t1t_write.block_number = block_number; in NFA_RwT1tWrite() 476 p_msg->params.t1t_write.index = index; in NFA_RwT1tWrite() 477 p_msg->params.t1t_write.p_block_data[0] = data; in NFA_RwT1tWrite() [all …]
|
/system/extras/tests/audio/alsa/ |
D | pcmtest.cpp | 129 struct pcm_params *params; in getPcmParams() local 133 params = pcm_params_get(pcmnodes[i].card, pcmnodes[i].device, in getPcmParams() 135 if (params == NULL) in getPcmParams() 138 min = pcm_params_get_min(params, PCM_PARAM_RATE); in getPcmParams() 139 max = pcm_params_get_max(params, PCM_PARAM_RATE); in getPcmParams() 142 min = pcm_params_get_min(params, PCM_PARAM_CHANNELS); in getPcmParams() 143 max = pcm_params_get_max(params, PCM_PARAM_CHANNELS); in getPcmParams() 146 min = pcm_params_get_min(params, PCM_PARAM_SAMPLE_BITS); in getPcmParams() 147 max = pcm_params_get_max(params, PCM_PARAM_SAMPLE_BITS); in getPcmParams() 150 min = pcm_params_get_min(params, PCM_PARAM_PERIOD_SIZE); in getPcmParams() [all …]
|
/system/core/trusty/keymaster/ |
D | trusty_keymaster_device_test.cpp | 128 size_t dsa_message_len(const keymaster_dsa_keygen_params_t& params) { in dsa_message_len() argument 129 switch (params.key_size) { in dsa_message_len() 156 keymaster_rsa_keygen_params_t params = build_rsa_params(); in TEST_F() local 159 ASSERT_EQ(0, device.generate_keypair(TYPE_RSA, ¶ms, &ptr, &size)); in TEST_F() 175 keymaster_rsa_keygen_params_t params = build_rsa_params(); in TEST_F() local 178 ASSERT_EQ(0, device.generate_keypair(TYPE_RSA, ¶ms, &ptr, &size)); in TEST_F() 183 size_t message_len = params.modulus_size / 8; in TEST_F() 194 keymaster_rsa_keygen_params_t params = build_rsa_params(); in TEST_F() local 197 ASSERT_EQ(0, device.generate_keypair(TYPE_RSA, ¶ms, &ptr, &size)); in TEST_F() 202 size_t message_len = params.modulus_size / 8 - 1; in TEST_F() [all …]
|
/system/vold/tests/ |
D | CryptfsScryptHidlizationEquivalence_test.cpp | 158 keymaster_key_param_t params[] = { in keymaster_create_key_old() local 180 keymaster_key_param_set_t param_set = { params, sizeof(params)/sizeof(*params) }; in keymaster_create_key_old() 195 keymaster_rsa_keygen_params_t params; in keymaster_create_key_old() local 196 memset(¶ms, '\0', sizeof(params)); in keymaster_create_key_old() 197 params.public_exponent = RSA_EXPONENT; in keymaster_create_key_old() 198 params.modulus_size = RSA_KEY_SIZE; in keymaster_create_key_old() 200 if (keymaster0_dev->generate_keypair(keymaster0_dev, TYPE_RSA, ¶ms, in keymaster_create_key_old() 283 keymaster_rsa_sign_params_t params; in keymaster_sign_object_old() local 284 params.digest_type = DIGEST_NONE; in keymaster_sign_object_old() 285 params.padding_type = PADDING_NONE; in keymaster_sign_object_old() [all …]
|
/system/keymaster/ |
D | keymaster_enforcement_test.cpp | 97 keymaster_key_param_t params[] = { in TEST_F() local 100 AuthorizationSet single_auth_set(params, array_length(params)); in TEST_F() 107 keymaster_key_param_t params[] = { in TEST_F() local 112 AuthorizationSet auth_set(params, array_length(params)); in TEST_F() 122 keymaster_key_param_t params[] = { in TEST_F() local 126 AuthorizationSet auth_set(params, array_length(params)); in TEST_F() 133 keymaster_key_param_t params[] = { in TEST_F() local 138 AuthorizationSet auth_set(params, array_length(params)); in TEST_F() 147 keymaster_key_param_t params[] = { in TEST_F() local 152 AuthorizationSet auth_set(params, array_length(params)); in TEST_F() [all …]
|
/system/chre/chre_api/include/chre_api/chre/ |
D | wifi.h | 509 bool chreWifiRequestScanAsync(const struct chreWifiScanParams *params, 524 struct chreWifiScanParams params = {}; in chreWifiRequestScanAsyncDefault() local 525 params.scanType = CHRE_WIFI_SCAN_TYPE_ACTIVE; in chreWifiRequestScanAsyncDefault() 526 params.maxScanAgeMs = 5000; // 5 seconds in chreWifiRequestScanAsyncDefault() 527 params.frequencyListLen = 0; in chreWifiRequestScanAsyncDefault() 528 params.ssidListLen = 0; in chreWifiRequestScanAsyncDefault() 529 return chreWifiRequestScanAsync(¶ms, cookie); in chreWifiRequestScanAsyncDefault()
|
/system/netd/server/ |
D | ResolverController.cpp | 204 const char** servers, int numservers, const __res_params* params) { in setDnsServers() argument 209 return -_resolv_set_nameservers_for_net(netId, servers, numservers, searchDomains, params); in setDnsServers() 253 std::vector<std::string>* domains, __res_params* params, in getDnsInfo() argument 273 *params = __res_params{}; in getDnsInfo() 276 res_domains, params, res_stats); in getDnsInfo() 293 android_net_res_stats_get_usable_servers(params, res_stats, nscount, valid_servers); in getDnsInfo() 325 const std::vector<int32_t>& params) { in setResolverConfiguration() argument 327 if (params.size() != INetd::RESOLVER_PARAMS_COUNT) { in setResolverConfiguration() 328 ALOGE("%s: params.size()=%zu", __FUNCTION__, params.size()); in setResolverConfiguration() 347 res_params.sample_validity = params[INetd::RESOLVER_PARAMS_SAMPLE_VALIDITY]; in setResolverConfiguration() [all …]
|
/system/bt/stack/avrc/ |
D | avrc_sdp.cc | 217 avrc_proto_desc_list[0].params[0] = AVCT_PSM; in AVRC_AddRecord() 218 avrc_proto_desc_list[0].params[1] = 0; in AVRC_AddRecord() 222 avrc_proto_desc_list[index].params[0] = AVCT_REV_1_4; in AVRC_AddRecord() 223 avrc_proto_desc_list[index].params[1] = 0; in AVRC_AddRecord() 234 avrc_add_proto_desc_list.list_elem[0].params[0] = AVCT_BR_PSM; in AVRC_AddRecord() 235 avrc_add_proto_desc_list.list_elem[0].params[1] = 0; in AVRC_AddRecord() 238 avrc_add_proto_desc_list.list_elem[1].params[0] = AVCT_REV_1_4; in AVRC_AddRecord() 239 avrc_add_proto_desc_list.list_elem[1].params[1] = 0; in AVRC_AddRecord()
|