/system/bt/stack/smp/ |
D | p_256_curvepara.cc | 29 elliptic_curve_t* ec = &curve_p256; in p_256_init_curve() local 31 ec->p[7] = 0xFFFFFFFF; in p_256_init_curve() 32 ec->p[6] = 0x00000001; in p_256_init_curve() 33 ec->p[5] = 0x0; in p_256_init_curve() 34 ec->p[4] = 0x0; in p_256_init_curve() 35 ec->p[3] = 0x0; in p_256_init_curve() 36 ec->p[2] = 0xFFFFFFFF; in p_256_init_curve() 37 ec->p[1] = 0xFFFFFFFF; in p_256_init_curve() 38 ec->p[0] = 0xFFFFFFFF; in p_256_init_curve() 40 memset(ec->omega, 0, KEY_LENGTH_DWORDS_P256); in p_256_init_curve() [all …]
|
/system/update_engine/update_manager/ |
D | update_manager-inl.h | 33 EvaluationContext* ec, in EvaluatePolicy() argument 42 if (ec->is_expired()) { in EvaluatePolicy() 44 << ec->DumpContext(); in EvaluatePolicy() 45 ec->ResetExpiration(); in EvaluatePolicy() 49 ec->ResetEvaluation(); in EvaluatePolicy() 57 ec, state_.get(), &error, result, args...); in EvaluatePolicy() 61 << "\nEvaluation context: " << ec->DumpContext(); in EvaluatePolicy() 64 ec, state_.get(), &error, result, args...); in EvaluatePolicy() 81 std::shared_ptr<EvaluationContext> ec, in OnPolicyReadyToEvaluate() argument 88 EvalStatus status = EvaluatePolicy(ec.get(), policy_method, &result, args...); in OnPolicyReadyToEvaluate() [all …]
|
D | enterprise_device_policy_impl.cc | 28 EvaluationContext* ec, in UpdateCheckAllowed() argument 36 ec->GetValue(dp_provider->var_device_policy_is_loaded()); in UpdateCheckAllowed() 42 ec->GetValue(dp_provider->var_update_disabled()); in UpdateCheckAllowed() 46 const bool* allow_kiosk_app_control_chrome_version_p = ec->GetValue( in UpdateCheckAllowed() 62 ec->GetValue(system_provider->var_kiosk_required_platform_version()); in UpdateCheckAllowed() 77 ec->GetValue(dp_provider->var_target_version_prefix()); in UpdateCheckAllowed() 85 ec->GetValue(dp_provider->var_rollback_to_target_version()); in UpdateCheckAllowed() 116 ec->GetValue(dp_provider->var_rollback_allowed_milestones()); in UpdateCheckAllowed() 122 ec->GetValue(dp_provider->var_release_channel_delegated()); in UpdateCheckAllowed() 125 ec->GetValue(dp_provider->var_release_channel()); in UpdateCheckAllowed()
|
D | interactive_update_policy_impl.cc | 26 EvaluationContext* ec, in UpdateCheckAllowed() argument 32 ec, state->updater_provider(), &interactive)) { in UpdateCheckAllowed() 43 EvaluationContext* ec, in UpdateCanBeApplied() argument 50 ec, state->updater_provider(), &interactive)) { in UpdateCanBeApplied() 61 EvaluationContext* ec, in CheckInteractiveUpdateRequested() argument 66 ec->GetValue(updater_provider->var_forced_update_requested()); in CheckInteractiveUpdateRequested()
|
D | next_update_check_policy_impl.cc | 35 EvaluationContext* ec, in UpdateCheckAllowed() argument 43 ec, state, error, &next_update_check, policy_constants_) != in UpdateCheckAllowed() 47 if (!ec->IsWallclockTimeGreaterThan(next_update_check)) { in UpdateCheckAllowed() 57 EvaluationContext* ec, in NextUpdateCheckTime() argument 72 ec->GetValue(updater_provider->var_updater_started_time()); in NextUpdateCheckTime() 76 ec->GetValue(updater_provider->var_last_checked_time()); in NextUpdateCheckTime() 78 const auto* seed = ec->GetValue(state->random_provider()->var_seed()); in NextUpdateCheckTime() 96 ec->GetValue(updater_provider->var_server_dictated_poll_interval()); in NextUpdateCheckTime() 107 ec->GetValue(updater_provider->var_consecutive_failed_update_checks()); in NextUpdateCheckTime()
|
D | policy_utils.h | 49 EvaluationContext* ec, in ConsultPolicies() argument 56 (policy->*policy_method)(ec, state, error, result, args...); in ConsultPolicies() 72 EvalStatus UpdateCheckAllowed(EvaluationContext* ec, in UpdateCheckAllowed() argument 80 EvaluationContext* ec, in UpdateCanBeApplied() argument 88 EvalStatus UpdateCanStart(EvaluationContext* ec, in UpdateCanStart() argument 96 EvalStatus UpdateDownloadAllowed(EvaluationContext* ec, in UpdateDownloadAllowed() argument 103 EvalStatus P2PEnabled(EvaluationContext* ec, in P2PEnabled() argument 110 EvalStatus P2PEnabledChanged(EvaluationContext* ec, in P2PEnabledChanged() argument
|
D | update_time_restrictions_policy_impl.cc | 35 EvaluationContext* ec, in UpdateCanBeApplied() argument 44 if (!ec->GetValue(dp_provider->var_auto_launched_kiosk_app_id())) in UpdateCanBeApplied() 47 const Time* curr_date = ec->GetValue(time_provider->var_curr_date()); in UpdateCanBeApplied() 48 const int* curr_hour = ec->GetValue(time_provider->var_curr_hour()); in UpdateCanBeApplied() 49 const int* curr_minute = ec->GetValue(time_provider->var_curr_minute()); in UpdateCanBeApplied() 60 ec->GetValue(dp_provider->var_disallowed_time_intervals()); in UpdateCanBeApplied()
|
D | chromeos_policy.cc | 212 EvalStatus ChromeOSPolicy::UpdateCheckAllowed(EvaluationContext* ec, in UpdateCheckAllowed() argument 260 ec, in UpdateCheckAllowed() 273 EvalStatus ChromeOSPolicy::UpdateCanBeApplied(EvaluationContext* ec, in UpdateCanBeApplied() argument 292 ec, in UpdateCanBeApplied() 308 EvaluationContext* ec, in UpdateCanStart() argument 332 EvalStatus check_status = UpdateCheckAllowed(ec, state, error, &check_result); in UpdateCanStart() 343 ec, state, error, &backoff_url_result, update_state); in UpdateCanStart() 359 ec->GetValue(dp_provider->var_device_policy_is_loaded()); in UpdateCanStart() 374 ec->GetValue(state->config_provider()->var_is_oobe_enabled()); in UpdateCanStart() 379 ec->GetValue(state->system_provider()->var_is_oobe_complete()); in UpdateCanStart() [all …]
|
D | chromeos_policy.h | 57 EvalStatus UpdateCheckAllowed(EvaluationContext* ec, 63 EvaluationContext* ec, 69 EvalStatus UpdateCanStart(EvaluationContext* ec, 75 EvalStatus UpdateDownloadAllowed(EvaluationContext* ec, 80 EvalStatus P2PEnabled(EvaluationContext* ec, 85 EvalStatus P2PEnabledChanged(EvaluationContext* ec, 151 EvaluationContext* ec, 169 EvalStatus UpdateScattering(EvaluationContext* ec,
|
D | android_things_policy.h | 35 EvalStatus UpdateCheckAllowed(EvaluationContext* ec, 43 EvaluationContext* ec, 50 EvalStatus UpdateCanStart(EvaluationContext* ec, 57 EvalStatus UpdateDownloadAllowed(EvaluationContext* ec, 64 EvalStatus P2PEnabled(EvaluationContext* ec, 71 EvalStatus P2PEnabledChanged(EvaluationContext* ec,
|
D | android_things_policy.cc | 54 EvaluationContext* ec, in UpdateCheckAllowed() argument 96 ec, in UpdateCheckAllowed() 112 EvaluationContext* ec, in UpdateCanBeApplied() argument 132 ec, in UpdateCanBeApplied() 148 EvalStatus AndroidThingsPolicy::UpdateCanStart(EvaluationContext* ec, in UpdateCanStart() argument 159 EvalStatus AndroidThingsPolicy::UpdateDownloadAllowed(EvaluationContext* ec, in UpdateDownloadAllowed() argument 170 EvalStatus AndroidThingsPolicy::P2PEnabled(EvaluationContext* ec, in P2PEnabled() argument 180 EvalStatus AndroidThingsPolicy::P2PEnabledChanged(EvaluationContext* ec, in P2PEnabledChanged() argument
|
D | default_policy.cc | 37 EvalStatus DefaultPolicy::UpdateCheckAllowed(EvaluationContext* ec, in UpdateCheckAllowed() argument 51 ec->IsMonotonicTimeGreaterThan( in UpdateCheckAllowed() 62 EvalStatus DefaultPolicy::UpdateCanBeApplied(EvaluationContext* ec, in UpdateCanBeApplied() argument 71 EvalStatus DefaultPolicy::UpdateCanStart(EvaluationContext* ec, in UpdateCanStart() argument 90 EvalStatus DefaultPolicy::UpdateDownloadAllowed(EvaluationContext* ec, in UpdateDownloadAllowed() argument 98 EvalStatus DefaultPolicy::P2PEnabled(EvaluationContext* ec, in P2PEnabled() argument 106 EvalStatus DefaultPolicy::P2PEnabledChanged(EvaluationContext* ec, in P2PEnabledChanged() argument
|
D | default_policy.h | 68 EvalStatus UpdateCheckAllowed(EvaluationContext* ec, 74 EvaluationContext* ec, 80 EvalStatus UpdateCanStart(EvaluationContext* ec, 86 EvalStatus UpdateDownloadAllowed(EvaluationContext* ec, 91 EvalStatus P2PEnabled(EvaluationContext* ec, 96 EvalStatus P2PEnabledChanged(EvaluationContext* ec,
|
D | update_manager.cc | 38 for (auto& ec : ec_repo_) in ~UpdateManager() local 39 ec->RemoveObserversAndTimeout(); in ~UpdateManager() 49 void UpdateManager::UnregisterEvalContext(EvaluationContext* ec) { in UnregisterEvalContext() argument 54 std::shared_ptr<EvaluationContext>(ec, [](EvaluationContext*) {}))) { in UnregisterEvalContext()
|
D | out_of_box_experience_policy_impl.cc | 23 EvalStatus OobePolicyImpl::UpdateCheckAllowed(EvaluationContext* ec, in UpdateCheckAllowed() argument 31 ec->GetValue(state->config_provider()->var_is_oobe_enabled()); in UpdateCheckAllowed() 34 ec->GetValue(system_provider->var_is_oobe_complete()); in UpdateCheckAllowed()
|
D | interactive_update_policy_impl.h | 35 EvalStatus UpdateCheckAllowed(EvaluationContext* ec, 41 EvaluationContext* ec, 57 bool CheckInteractiveUpdateRequested(EvaluationContext* ec,
|
D | policy.h | 247 virtual EvalStatus UpdateCheckAllowed(EvaluationContext* ec, 257 EvaluationContext* ec, 269 virtual EvalStatus UpdateCanStart(EvaluationContext* ec, 281 virtual EvalStatus UpdateDownloadAllowed(EvaluationContext* ec, 288 virtual EvalStatus P2PEnabled(EvaluationContext* ec, 298 virtual EvalStatus P2PEnabledChanged(EvaluationContext* ec,
|
D | official_build_check_policy_impl.cc | 23 EvaluationContext* ec, in UpdateCheckAllowed() argument 28 ec->GetValue(state->system_provider()->var_is_official_build()); in UpdateCheckAllowed()
|
D | enough_slots_ab_updates_policy_impl.cc | 24 EvaluationContext* ec, in UpdateCheckAllowed() argument 29 ec->GetValue(state->system_provider()->var_num_slots()); in UpdateCheckAllowed()
|
D | api_restricted_downloads_policy_impl.cc | 27 EvaluationContext* ec, in UpdateCanBeApplied() argument 34 ec->GetValue(state->updater_provider()->var_update_restrictions()); in UpdateCanBeApplied()
|
/system/apex/apexd/ |
D | apexd_utils.h | 93 std::error_code ec; in WalkDir() local 94 auto it = fs::directory_iterator(path, ec); in WalkDir() 96 while (!ec && it != end) { in WalkDir() 98 it.increment(ec); in WalkDir() 100 if (ec) { in WalkDir() 102 << " for reading : " << ec.message(); in WalkDir() 169 std::error_code ec; in DeleteDir() local 170 fs::remove_all(path, ec); in DeleteDir() 171 if (ec) { in DeleteDir() 172 return Error() << "Failed to delete path " << path << " : " << ec.message(); in DeleteDir() [all …]
|
D | flattened_apex_test.cpp | 45 std::error_code ec; in TEST() local 46 bool is_dir = entry.is_directory(ec); in TEST() 47 ASSERT_FALSE(ec) << ec.message(); in TEST()
|
D | apex_shim.cpp | 118 std::error_code ec; in ValidateShimApex() local 124 auto iter = fs::recursive_directory_iterator(mount_point, ec); in ValidateShimApex() 133 fs::file_status status = iter->status(ec); in ValidateShimApex() 154 iter = iter.increment(ec); in ValidateShimApex() 155 if (ec) { in ValidateShimApex() 157 << ec.message(); in ValidateShimApex()
|
/system/extras/simpleperf/testdata/etm/ |
D | perf_inject.data | 11 10e0-10ec:1 22 10ec->0:1
|
/system/ca-certificates/google/files/ |
D | 5021a0a2.0 | 28 1d:a2:00:01:00:02:ec:b7:60:80:78:8d:b6:06 53 27:9c:e3:5c:cf:4e:81:dc:19:bb:91:90:7d:ec:e6: 73 ab:35:7c:53:3e:a6:27:f1:a1:2d:da:1a:23:9d:cc:dd:ec:3c: 76 ec:c9:d6:47:72:78:4b:10:46:14:8e:5f:0e:af:ec:c7:2f:ab: 77 10:d7:b6:f1:6e:ec:86:b2:c2:e8:0d:92:73:dc:a2:f4:0f:3a: 81 0f:2c:b6:9e:e3:15:bf:d9:36:1c:ba:25:1a:52:3d:1a:ec:22:
|