/system/tpm/attestation/common/ |
D | print_interface_proto.cc | 71 std::string output = in GetProtoDebugStringWithIndent() local 75 output += indent + " key_label: "; in GetProtoDebugStringWithIndent() 76 base::StringAppendF(&output, "%s", value.key_label().c_str()); in GetProtoDebugStringWithIndent() 77 output += "\n"; in GetProtoDebugStringWithIndent() 80 output += indent + " key_type: "; in GetProtoDebugStringWithIndent() 81 base::StringAppendF(&output, "%s", GetProtoDebugStringWithIndent( in GetProtoDebugStringWithIndent() 84 output += "\n"; in GetProtoDebugStringWithIndent() 87 output += indent + " key_usage: "; in GetProtoDebugStringWithIndent() 88 base::StringAppendF(&output, "%s", GetProtoDebugStringWithIndent( in GetProtoDebugStringWithIndent() 91 output += "\n"; in GetProtoDebugStringWithIndent() [all …]
|
D | print_common_proto.cc | 89 std::string output = in GetProtoDebugStringWithIndent() local 93 output += indent + " quote: "; in GetProtoDebugStringWithIndent() 95 &output, "%s", in GetProtoDebugStringWithIndent() 97 output += "\n"; in GetProtoDebugStringWithIndent() 100 output += indent + " quoted_data: "; in GetProtoDebugStringWithIndent() 102 &output, "%s", in GetProtoDebugStringWithIndent() 105 output += "\n"; in GetProtoDebugStringWithIndent() 108 output += indent + " quoted_pcr_value: "; in GetProtoDebugStringWithIndent() 109 base::StringAppendF(&output, "%s", in GetProtoDebugStringWithIndent() 113 output += "\n"; in GetProtoDebugStringWithIndent() [all …]
|
D | crypto_utility_impl_test.cc | 49 std::vector<uint8_t> output; in HexDecode() local 50 CHECK(base::HexStringToBytes(hex, &output)); in HexDecode() 51 return std::string(reinterpret_cast<char*>(output.data()), output.size()); in HexDecode() 110 std::string output; in TEST_F() local 111 EXPECT_TRUE(crypto_utility_->EncryptData(std::string(), key, key, &output)); in TEST_F() 116 std::string output; in TEST_F() local 117 EXPECT_FALSE(crypto_utility_->EncryptData(std::string(), key, key, &output)); in TEST_F() 121 std::string output; in TEST_F() local 122 EXPECT_FALSE(crypto_utility_->UnsealKey("invalid", &output, &output)); in TEST_F() 130 std::string output; in TEST_F() local [all …]
|
/system/tpm/tpm_manager/common/ |
D | print_tpm_manager_proto.cc | 130 std::string output = in GetProtoDebugStringWithIndent() local 134 output += indent + " index: "; in GetProtoDebugStringWithIndent() 135 base::StringAppendF(&output, "%u (0x%08X)", value.index(), value.index()); in GetProtoDebugStringWithIndent() 136 output += "\n"; in GetProtoDebugStringWithIndent() 139 output += indent + " policy: "; in GetProtoDebugStringWithIndent() 141 &output, "%s", in GetProtoDebugStringWithIndent() 143 output += "\n"; in GetProtoDebugStringWithIndent() 146 output += indent + " world_read_allowed: "; in GetProtoDebugStringWithIndent() 147 base::StringAppendF(&output, "%s", in GetProtoDebugStringWithIndent() 149 output += "\n"; in GetProtoDebugStringWithIndent() [all …]
|
/system/tpm/trunks/ |
D | background_command_transceiver_test.cc | 54 std::string* output) { in SendCommandAndWaitAndAssign() argument 55 *output = transceiver->SendCommandAndWait("test"); in SendCommandAndWaitAndAssign() 83 std::string output = "not_assigned"; in TEST_F() local 84 background_transceiver.SendCommand("test", base::Bind(Assign, &output)); in TEST_F() 88 } while (output == "not_assigned"); in TEST_F() 90 EXPECT_EQ(std::string(kTestThreadName), output); in TEST_F() 96 std::string output = "not_assigned"; in TEST_F() local 100 &background_transceiver, &output)); in TEST_F() 104 EXPECT_EQ(std::string("test_thread"), output); in TEST_F()
|
/system/keymaster/tests/ |
D | ckdf_test.cpp | 33 const char* output; member 92 auto expected = hex2blob(test.output); in TEST() 94 KeymasterKeyBlob output; in TEST() local 95 output.Reset(expected.data_length); in TEST() 97 ASSERT_EQ(KM_ERROR_OK, ckdf(key, label, context, &output)); in TEST() 98 EXPECT_TRUE(std::equal(output.begin(), output.end(), expected.begin())); in TEST()
|
/system/bt/build/toolchain/gcc/ |
D | BUILD.gn | 21 depfile = "{{output}}.d" 22 …-MMD -MF $depfile {{defines}} {{include_dirs}} {{cflags}} {{cflags_c}} -c {{source}} -o {{output}}" 24 description = "CC {{output}}" 31 depfile = "{{output}}.d" 32 …MMD -MF $depfile {{defines}} {{include_dirs}} {{cflags}} {{cflags_cc}} -c {{source}} -o {{output}}" 34 description = "CXX {{output}}" 41 rspfile = "{{output}}.rsp" 42 command = "rm -f {{output}} && ar rcs {{output}} @$rspfile" 89 command = "touch {{output}}" 90 description = "STAMP {{output}}" [all …]
|
/system/keymaster/km_openssl/ |
D | kdf.cpp | 61 bool Kdf::Uint32ToBigEndianByteArray(uint32_t number, uint8_t* output) { in Uint32ToBigEndianByteArray() argument 62 if (!output) in Uint32ToBigEndianByteArray() 65 output[0] = (number >> 24) & 0xff; in Uint32ToBigEndianByteArray() 66 output[1] = (number >> 16) & 0xff; in Uint32ToBigEndianByteArray() 67 output[2] = (number >> 8) & 0xff; in Uint32ToBigEndianByteArray() 68 output[3] = (number)&0xff; in Uint32ToBigEndianByteArray()
|
D | block_cipher_operation.cpp | 171 Buffer* output, size_t* input_consumed) { in Update() argument 174 if (!InternalUpdate(input.peek_read(), input.available_read(), output, &error)) return error; in Update() 188 AuthorizationSet* output_params, Buffer* output) { in Finish() argument 190 if (!UpdateForFinish(additional_params, input, output_params, output, &error)) return error; in Finish() 191 if (!output->reserve(block_size_bytes())) return KM_ERROR_MEMORY_ALLOCATION_FAILED; in Finish() 198 if (!EVP_CipherFinal_ex(&ctx_, output->peek_write(), &output_written)) { in Finish() 206 if (!output->advance_write(output_written)) return KM_ERROR_UNKNOWN_ERROR; in Finish() 360 Buffer* output, keymaster_error_t* error) { in InternalUpdate() argument 361 assert(output); in InternalUpdate() 366 if (!output->reserve(input_length + block_size_bytes())) { in InternalUpdate() [all …]
|
D | ckdf.cpp | 42 KeymasterKeyBlob* output) { in DEFINE_OPENSSL_OBJECT_POINTER() 46 const uint32_t blocks = div_round_up(output->key_material_size, AES_BLOCK_SIZE); in DEFINE_OPENSSL_OBJECT_POINTER() 47 const uint32_t L = output->key_material_size * 8; // bits in DEFINE_OPENSSL_OBJECT_POINTER() 70 auto output_pos = const_cast<uint8_t*>(output->begin()); in DEFINE_OPENSSL_OBJECT_POINTER() 71 memset(output_pos, 0, output->key_material_size); in DEFINE_OPENSSL_OBJECT_POINTER() 106 if (output_pos <= output->end() - AES_BLOCK_SIZE) { in DEFINE_OPENSSL_OBJECT_POINTER() 112 size_t to_copy = output->end() - output_pos; in DEFINE_OPENSSL_OBJECT_POINTER() 119 assert(output_pos == output->end()); in DEFINE_OPENSSL_OBJECT_POINTER()
|
D | rsa_operation.cpp | 281 Buffer* output, size_t* input_consumed) { in Update() argument 284 return RsaOperation::Update(additional_params, input, output_params, output, in Update() 295 AuthorizationSet* /* output_params */, Buffer* output) { in Finish() argument 296 assert(output); in Finish() 303 return SignUndigested(output); in Finish() 305 return SignDigested(output); in Finish() 323 keymaster_error_t RsaSignOperation::SignUndigested(Buffer* output) { in SignUndigested() argument 328 if (!output->Reinitialize(RSA_size(rsa.get()))) in SignUndigested() 345 bytes_encrypted = RSA_private_encrypt(key_len, to_encrypt, output->peek_write(), rsa.get(), in SignUndigested() 357 output->peek_write(), rsa.get(), RSA_PKCS1_PADDING); in SignUndigested() [all …]
|
/system/extras/tests/workloads/ |
D | defs.sh | 57 (-o) output=$2; shift;; 127 output=${output:="./out"} 130 if [ -f $output ]; then 131 > $output 148 echo DEBUG: $* >&2 >> $output 291 echo =============================== >> $output 292 echo Before iteration $_iter >> $output 293 echo =============================== >> $output 294 ${ADB}cat /proc/meminfo 2>&1 >> $output 295 ${ADB}dumpsys meminfo 2>&1 >> $output [all …]
|
/system/bt/build/toolchain/clang/ |
D | BUILD.gn | 40 depfile = "{{output}}.d" 41 …-MMD -MF $depfile {{defines}} {{include_dirs}} {{cflags}} {{cflags_c}} -c {{source}} -o {{output}}" 43 description = "CC {{output}}" 50 depfile = "{{output}}.d" 51 …MMD -MF $depfile {{defines}} {{include_dirs}} {{cflags}} {{cflags_cc}} -c {{source}} -o {{output}}" 53 description = "CXX {{output}}" 60 rspfile = "{{output}}.rsp" 61 command = "rm -f {{output}} && ar rcs {{output}} @$rspfile" 108 command = "touch {{output}}" 109 description = "STAMP {{output}}" [all …]
|
/system/core/libutils/tests/ |
D | Unicode_test.cpp | 103 char16_t output[1 + 1 + 1 + 2 + 1]; // Room for NULL in TEST_F() local 105 utf8_to_utf16(str, sizeof(str), output, sizeof(output) / sizeof(output[0])); in TEST_F() 107 EXPECT_EQ(0x0030, output[0]) in TEST_F() 109 EXPECT_EQ(0x0100, output[1]) in TEST_F() 111 EXPECT_EQ(0x2323, output[2]) in TEST_F() 113 EXPECT_EQ(0xD800, output[3]) in TEST_F() 115 EXPECT_EQ(0xDC00, output[4]) in TEST_F() 117 EXPECT_EQ(NULL, output[5]) in TEST_F()
|
/system/core/logd/ |
D | LogStatistics.cpp | 397 std::string output = formatLine(name, size, pruned); in format() local 400 return output; in format() 408 return output; in format() 428 output += formatLine(std::string(" PID/UID COMMAND LINE"), ditto, in format() 430 output += byPid; in format() 433 return output; in format() 583 std::string output; in formatMsec() local 584 if (val < sec) return output; in formatMsec() 587 output = android::base::StringPrintf("%" PRIu64 "d ", val / day); in formatMsec() 592 output += android::base::StringPrintf("%" PRIu64 ":", in formatMsec() [all …]
|
/system/core/mkbootimg/ |
D | mkbootimg | 66 args.output.write(pack('8s', BOOT_MAGIC)) 67 args.output.write(pack('10I', 78 args.output.write(pack('16s', args.board.encode())) # asciiz product name 79 args.output.write(pack('512s', args.cmdline[:512].encode())) 91 args.output.write(img_id) 92 args.output.write(pack('1024s', args.cmdline[512:].encode())) 95 args.output.write(pack('I', filesize(args.recovery_dtbo))) # size in bytes 97 args.output.write(pack('Q', get_recovery_dtbo_offset(args))) # recovery dtbo offset 99 args.output.write(pack('Q', 0)) # Will be set to 0 for devices without a recovery dtbo 100 args.output.write(pack('I', args.output.tell() + 4)) # size of boot header [all …]
|
/system/tools/hidl/test/error_test/ |
D | hidl_error_test.sh | 13 output=$($HIDL_GEN_PATH -L check -r test:$HIDL_ERROR_TEST_DIR test.$package@1.0 2>&1) 19 echo "$output" | while read line; do echo "test output: $line"; done 28 if [[ $output != *$error* ]]; then 30 echo "$output" | while read line; do echo "test output: $line"; done
|
/system/netd/server/ |
D | IptablesRestoreControllerTest.cpp | 162 std::string output; in TEST_F() local 172 EXPECT_EQ(0, con.execute(IptablesTarget::V4V6, "#Test\n", &output)); in TEST_F() 173 EXPECT_EQ("#Test\n#Test\n", output); // One for IPv4 and one for IPv6. in TEST_F() 185 std::string *output = (i % 2) ? &buffer : nullptr; in TEST_F() local 186 ASSERT_EQ(-1, con.execute(target, "malformed command\n", output)) << in TEST_F() 188 ASSERT_EQ(0, con.execute(target, "#Test\n", output)) << in TEST_F() 194 std::string output; in TEST_F() local 197 EXPECT_EQ(0, con.execute(IptablesTarget::V4V6, "#Test\n", &output)); in TEST_F() 243 std::string output; in TEST_F() local 245 EXPECT_EQ(0, con.execute(IptablesTarget::V4V6, commandString, &output)); in TEST_F() [all …]
|
D | IptablesRestoreController.cpp | 208 std::string *output) { in sendCommand() argument 247 if (!drainAndWaitForAck(*process, command, output)) { in sendCommand() 274 std::string *output) { in drainAndWaitForAck() argument 310 output->append(buffer, size); in drainAndWaitForAck() 311 size_t pos = output->find(PING); in drainAndWaitForAck() 313 if (output->size() > pos + PING_SIZE) { in drainAndWaitForAck() 314 size_t extra = output->size() - (pos + PING_SIZE); in drainAndWaitForAck() 316 extra, output->substr(pos + PING_SIZE, 128).c_str()); in drainAndWaitForAck() 318 output->resize(pos); in drainAndWaitForAck() 349 std::string *output) { in execute() argument [all …]
|
/system/extras/tools/ |
D | graph_lockdep_chains | 49 output="cat -" 129 --output | -o) 130 if [ "${output}" != "cat -" ]; then 135 output="cat - > ${2}" # run through eval 139 --output=*) 140 if [ "${output}" != "cat -" ]; then 145 output="cat - > ${1#--output=}" # run through eval 284 eval ${output}
|
/system/extras/libfec/test/ |
D | test_read.cpp | 46 ofstream output(argv[2], ios::binary | ios::trunc); in main() local 48 if (!output) { in main() 61 output.write(reinterpret_cast<const char *>(buffer.get()), count); in main() 63 if (!output) { in main()
|
/system/tools/aidl/tests/ |
D | test_util.cpp | 116 vector<string> output; in PrintDiff() local 120 output.push_back(" " + a_lines[i-1]); in PrintDiff() 124 output.push_back("-" + a_lines[i-1]); in PrintDiff() 127 output.push_back("+" + b_lines[j-1]); in PrintDiff() 136 for (auto it = output.crbegin(), frontier = output.crbegin(); in PrintDiff() 137 it != output.crend(); ++it) { in PrintDiff() 138 while (frontier != output.crend() && distance(it, frontier) <= 3) { in PrintDiff()
|
/system/core/libsparse/ |
D | append2simg.c | 51 int output; in main() local 79 output = open(output_path, O_RDWR | O_BINARY); in main() 80 if (output < 0) { in main() 85 sparse_output = sparse_file_import_auto(output, false, true); in main() 120 lseek64(output, 0, SEEK_SET); in main() 128 close(output); in main()
|
/system/keymaster/legacy_support/ |
D | keymaster_passthrough_operation.cpp | 29 Buffer* output) { in Finish() argument 78 if (output && accumulated_output_size) { in Finish() 79 if (!output->reserve(accumulated_output_size)) { in Finish() 83 output->write(outBlob.data, outBlob.data_length); in Finish() 97 Buffer* output) { in Finish() argument 105 if (output) output->Reinitialize(out.data, out.data_length); in Finish()
|
/system/connectivity/wificond/tests/ |
D | shell_unittest.cpp | 28 string output; in TEST() local 29 int result = RunShellCommand("echo hello world", &output); in TEST() 31 EXPECT_EQ("hello world\n", output); in TEST()
|