/system/core/libmemtrack/ |
D | memtrack_test.c | 108 size_t v2; in main() local 124 v2 = DIV_ROUND_UP(memtrack_proc_graphics_pss(p), 1024); in main() 130 if (v1 | v2 | v3 | v4 | v5 | v6) { in main() 132 v1, v2, v3, v4, v5, v6, cmdline); in main()
|
/system/extras/perfprofd/quipper/base/ |
D | logging.h | 251 std::string* MakeCheckOpString(const t1& v1, const t2& v2, const char* names) { in MakeCheckOpString() argument 253 ss << names << " (" << v1 << " vs. " << v2 << ")"; in MakeCheckOpString() 284 inline std::string* Check##name##Impl(const t1& v1, const t2& v2, \ 286 if (v1 op v2) return NULL; \ 287 else return MakeCheckOpString(v1, v2, names); \ 289 inline std::string* Check##name##Impl(int v1, int v2, const char* names) { \ 290 if (v1 op v2) return NULL; \ 291 else return MakeCheckOpString(v1, v2, names); \
|
/system/core/libpixelflinger/ |
D | trap.cpp | 99 const GGLcoord* v2 ) in triangle_dump_points() argument 107 v2[0]*tri, v2[1]*tri, v2[0], v2[1] ); in triangle_dump_points() 465 const GGLcoord* v0, const GGLcoord* v1, const GGLcoord* v2) in trianglex_debug() argument 469 aa_trianglex(con,v0,v1,v2); in trianglex_debug() 471 trianglex_big(con,v0,v1,v2); in trianglex_debug() 476 linex(con, v1, v2, TRI_ONE); in trianglex_debug() 477 linex(con, v2, v0, TRI_ONE); in trianglex_debug() 482 const GGLcoord* v0, const GGLcoord* v1, const GGLcoord* v2) in trianglex_xor() argument 484 trianglex_big(con,v0,v1,v2); in trianglex_xor() 485 trianglex_small(con,v0,v1,v2); in trianglex_xor() [all …]
|
/system/sepolicy/prebuilts/api/26.0/public/ |
D | untrusted_v2_app.te | 2 ### Untrusted v2 sandbox apps.
|
/system/sepolicy/public/ |
D | untrusted_v2_app.te | 2 ### Untrusted v2 sandbox apps.
|
/system/sepolicy/prebuilts/api/26.0/private/ |
D | untrusted_v2_app.te | 2 ### Untrusted v2 sandbox apps.
|
D | untrusted_app_all.te | 5 ### apps which target the v2 security sandbox (ephemeral_app for instant apps, 6 ### untrusted_v2_app for fully installed v2 apps).
|
D | seapp_contexts | 15 # isV2App=true will match apps in the v2 app sandbox.
|
/system/sepolicy/private/ |
D | untrusted_v2_app.te | 2 ### Untrusted v2 sandbox apps.
|
D | untrusted_app_all.te | 5 ### apps which target the v2 security sandbox (ephemeral_app for instant apps, 6 ### untrusted_v2_app for fully installed v2 apps).
|
D | seapp_contexts | 15 # isV2App=true will match apps in the v2 app sandbox.
|
/system/libvintf/test/ |
D | main.cpp | 214 VersionRange v2; in TEST_F() local 215 EXPECT_TRUE(parse("1.2-3", &v2)); in TEST_F() 216 EXPECT_EQ(v, v2); in TEST_F() 424 Version v2; in TEST_F() local 425 EXPECT_TRUE(gVersionConverter(&v2, xml)); in TEST_F() 426 EXPECT_EQ(v, v2); in TEST_F()
|
/system/libhidl/ |
D | test_main.cpp | 188 vector<int32_t> v2 = hv1; // cast in TEST_F() local 189 EXPECT_ARRAYEQ(v2, v, 3); in TEST_F()
|
/system/core/libpixelflinger/include/pixelflinger/ |
D | pixelflinger.h | 211 GGLcoord const* v0, GGLcoord const* v1, GGLcoord const* v2);
|
/system/ca-certificates/google/files/ |
D | 2afc57aa.0 | 72 URI:http://www.trustcenter.de/crl/v2/tc_class_2_ca_II.crl
|
/system/bt/stack/smp/ |
D | aes.cc | 259 uint_8t p1 = x, p2 = BPOLY, n1 = hibit(x), n2 = 0x80, v1 = 1, v2 = 0; in gf_inv() local 269 v2 ^= (v1 * n2); /* shift accumulated value and */ in gf_inv() 279 v1 ^= v2 * n1; in gf_inv() 283 return v2; in gf_inv()
|
/system/keymaster/ |
D | ocb.c | 428 #define EXPAND_ASSIST(v1, v2, v3, v4, shuff_const, aes_const) \ argument 429 v2 = _mm_aeskeygenassist_si128(v4, aes_const); \ 434 v2 = _mm_shuffle_epi32(v2, shuff_const); \ 435 v1 = _mm_xor_si128(v1, v2)
|
/system/tpm/trunks/generator/ |
D | raw_structures.txt | 2899 RSA a signature algorithm according to PKCS#1v2.1, 8.2 2907 RSA a padding algorithm according to PKCS#1v2.1, 7.2 2916 PKCS#1v2.1, 8.1 2925 PKCS#1v2.1, 7.1 13123 the PKCS#1v2.1 PSS scheme 13480 the PKCS#1v2.1 PSS scheme 13484 the PKCS#1v2.1 RSAES scheme 13493 the PKSC#1v2.1 OAEP scheme 14161 a PKCS#1v2.1PSS signature
|
D | raw_structures_fixed.txt | 2893 RSA a signature algorithm according to PKCS#1v2.1, 8.2 2901 RSA a padding algorithm according to PKCS#1v2.1, 7.2 2910 PKCS#1v2.1, 8.1 2919 PKCS#1v2.1, 7.1 13140 the PKCS#1v2.1 PSS scheme 13499 the PKCS#1v2.1 PSS scheme 13507 the PKSC#1v2.1 OAEP scheme 14176 a PKCS#1v2.1PSS signature
|
D | raw_commands_fixed.txt | 8234 This command performs RSA encryption using the indicated padding scheme according to PKCS#1v2.1 8248 1) TPM_ALG_OAEP – Data is OAEP padded as described in 7.1 of PKCS#1 v2.1. The only 8250 2) TPM_ALG_RSAES – Data is padded as described in 7.2 of PKCS#1 v2.1. 8317 After padding, the data is RSAEP encrypted according to 5.1.1 of PKCS#1v2.1. 8663 This command performs RSA decryption using the indicated padding scheme according to PKCS#1v2.1 8671 keyHandle (this is described in PKCS#1v2.1, clause 5.1.2). It will then validate the padding accord…
|
D | raw_commands.txt | 8223 This command performs RSA encryption using the indicated padding scheme according to PKCS#1v2.1 8237 1) TPM_ALG_OAEP – Data is OAEP padded as described in 7.1 of PKCS#1 v2.1. The only 8239 2) TPM_ALG_RSAES – Data is padded as described in 7.2 of PKCS#1 v2.1. 8306 After padding, the data is RSAEP encrypted according to 5.1.1 of PKCS#1v2.1. 8652 This command performs RSA decryption using the indicated padding scheme according to PKCS#1v2.1 8660 keyHandle (this is described in PKCS#1v2.1, clause 5.1.2). It will then validate the padding accord…
|