Home
last modified time | relevance | path

Searched refs:keys (Results 1 – 25 of 74) sorted by relevance

123

/system/update_engine/
Dexcluder_chromeos.cc54 vector<string> keys; in Reset() local
55 if (!prefs_->GetSubKeys(kExclusionPrefsSubDir, &keys)) in Reset()
57 for (const auto& key : keys) in Reset()
/system/update_engine/payload_consumer/
Dcertificate_parser_android_unittest.cc40 std::vector<std::unique_ptr<EVP_PKEY, decltype(&EVP_PKEY_free)>> keys; in TEST() local
42 ASSERT_TRUE(parser->ReadPublicKeysFromCertificates(ota_cert, &keys)); in TEST()
43 ASSERT_EQ(1u, keys.size()); in TEST()
Dpayload_verifier.cc71 std::vector<std::unique_ptr<EVP_PKEY, decltype(&EVP_PKEY_free)>> keys; in CreateInstance() local
72 keys.emplace_back(std::move(pub_key)); in CreateInstance()
73 return std::unique_ptr<PayloadVerifier>(new PayloadVerifier(std::move(keys))); in CreateInstance()
/system/bt/stack/btm/
Dbtm_ble.cc1202 p_dev_rec->ble.keys.local_counter++; in btm_ble_increment_sign_ctr()
1204 p_dev_rec->ble.keys.counter++; in btm_ble_increment_sign_ctr()
1206 is_local, p_dev_rec->ble.keys.local_counter, in btm_ble_increment_sign_ctr()
1207 p_dev_rec->ble.keys.counter); in btm_ble_increment_sign_ctr()
1250 if (p_dev_rec && p_dev_rec->ble.keys.div) { in btm_get_local_div()
1252 *p_div = p_dev_rec->ble.keys.div; in btm_get_local_div()
1290 p_rec->ble.keys.pltk = p_keys->penc_key.ltk; in btm_sec_save_le_key()
1291 memcpy(p_rec->ble.keys.rand, p_keys->penc_key.rand, BT_OCTET8_LEN); in btm_sec_save_le_key()
1292 p_rec->ble.keys.sec_level = p_keys->penc_key.sec_level; in btm_sec_save_le_key()
1293 p_rec->ble.keys.ediv = p_keys->penc_key.ediv; in btm_sec_save_le_key()
[all …]
Dbtm_ble_addr.cc163 if (rpa_matches_irk(rpa, p_dev_rec->ble.keys.irk)) { in btm_ble_addr_resolvable()
187 if (rpa_matches_irk(*random_bda, p_dev_rec->ble.keys.irk)) { in btm_ble_match_random_bda()
/system/sepolicy/
DREADME46 * keys.conf
70 mac_permissions.xml to public keys found in pem files. This script takes
72 Details of the configuration file (keys.conf) can be found in the subsection
73 keys.conf. This tool is also responsible for stripping the comments and
76 keys.conf
77 The keys.conf file is used for controlling the mapping of "tags" found in
78 the mac_permissions.xml signature stanzas with actual public keys found in
89 to ones release keys.
92 organization and may need to extract the pem file for the insertkeys/keys.conf tools.
97 After extracting the pem, you can rename it, and configure keys.conf and
Dmac_permissions.mk10 all_plat_mac_perms_keys := $(call build_policy, keys.conf, $(PLAT_PRIVATE_POLICY) $(SYSTEM_EXT_PRIV…
48 all_system_ext_mac_perms_keys := $(call build_policy, keys.conf, $(SYSTEM_EXT_PRIVATE_POLICY) $(REQ…
79 all_product_mac_perms_keys := $(call build_policy, keys.conf, $(PRODUCT_PRIVATE_POLICY) $(REQD_MASK…
110 all_vendor_mac_perms_keys := $(call build_policy, keys.conf, $(PLAT_VENDOR_POLICY) $(BOARD_VENDOR_S…
142 all_odm_mac_perms_keys := $(call build_policy, keys.conf, $(BOARD_ODM_SEPOLICY_DIRS) $(REQD_MASK_PO…
/system/libziparchive/
Dtest_ziparchive_large.py67 self.assertEquals(sorted(entry_dict.keys()), sorted(read_names))
82 self.assertEquals(sorted(entry_dict.keys()), sorted(read_names))
96 self.assertEquals(sorted(entry_dict.keys()), sorted(read_names))
126 self.assertEquals(sorted(entry_dict.keys()), sorted(read_names))
140 self.assertEquals(sorted(entry_dict.keys()), sorted(read_names))
/system/update_engine/common/
Dprefs.h48 std::vector<std::string>* keys) const = 0;
79 std::vector<std::string>* keys) const override;
123 std::vector<std::string>* keys) const override;
163 std::vector<std::string>* keys) const override;
Dprefs.cc115 bool PrefsBase::GetSubKeys(const string& ns, vector<string>* keys) const { in GetSubKeys()
116 return storage_->GetSubKeys(ns, keys); in GetSubKeys()
158 vector<string>* keys) const { in GetSubKeys()
168 keys->push_back(f.value().substr( in GetSubKeys()
224 vector<string>* keys) const { in GetSubKeys()
237 keys->push_back((lower_it++)->first); in GetSubKeys()
Dfake_prefs.cc109 bool FakePrefs::GetSubKeys(const string& ns, vector<string>* keys) const { in GetSubKeys()
112 keys->push_back(pr.first); in GetSubKeys()
Dprefs_interface.h88 std::vector<std::string>* keys) const = 0;
Dfake_prefs.h53 std::vector<std::string>* keys) const override;
/system/sepolicy/prebuilts/api/30.0/private/
Dfsverity_init.te6 # Allow to read /proc/keys for searching key id.
9 # Kernel only prints the keys that can be accessed and only kernel keyring is needed here.
/system/sepolicy/private/
Dfsverity_init.te6 # Allow to read /proc/keys for searching key id.
9 # Kernel only prints the keys that can be accessed and only kernel keyring is needed here.
/system/bt/gd/security/
Dpairing_handler_le.cc321 DistributedKeysOrFailure keys = ReceiveKeys(keys_i_receive); in DistributeKeys() local
322 if (std::holds_alternative<PairingFailure>(keys)) { in DistributeKeys()
323 return keys; in DistributeKeys()
329 return keys; in DistributeKeys()
334 DistributedKeysOrFailure keys = ReceiveKeys(keys_i_receive); in DistributeKeys() local
335 if (std::holds_alternative<PairingFailure>(keys)) { in DistributeKeys()
336 return keys; in DistributeKeys()
339 return keys; in DistributeKeys()
/system/sepolicy/prebuilts/api/29.0/private/
Dfsverity_init.te10 # Allow to read /proc/keys for searching key id.
13 # Kernel only prints the keys that can be accessed and only kernel keyring is needed here.
/system/security/keystore/tests/
Dlist_auth_bound_keys_test.sh49 if cli $USER2_ID list-apps-with-keys; then
/system/sepolicy/tools/
Dcheck_seapp.c710 static rule_map *rule_map_new(kvp keys[], size_t num_of_keys, int lineno, in rule_map_new() argument
736 k = &(keys[i]); in rule_map_new()
813 k = &(keys[i]); in rule_map_new()
1076 kvp keys[KVP_NUM_OF_RULES]; in parse_file() local
1107 memset(keys, 0, sizeof(kvp) * KVP_NUM_OF_RULES); in parse_file()
1116 keys[token_cnt].key = strdup(name); in parse_file()
1117 if (!keys[token_cnt].key) in parse_file()
1120 keys[token_cnt].value = strdup(value); in parse_file()
1121 if (!keys[token_cnt].value) in parse_file()
1135 rule_map *r = rule_map_new(keys, token_cnt, lineno, in_file->name, is_never_allow); in parse_file()
/system/extras/libjsonpb/
DREADME.md39 defined) or the original field name as keys in the input JSON file.
58 - Whether the Protobuf file defines JSON keys clearly. The JSON keys must be
62 in the following Protobuf file, only keys `foo_bar` and `barBaz` are allowed
/system/bt/audio_bluetooth_hw/
Daudio_bluetooth_hw.cc58 const char* keys) { in adev_get_parameters() argument
59 LOG(VERBOSE) << __func__ << ": keys=[" << keys << "]"; in adev_get_parameters()
/system/sepolicy/tests/
Dcombine_maps.py50 if bottom_type not in bottom.rTypeattributesets.keys():
/system/core/init/
Dperfboot.py263 keys = [key for key in record.keys() if key[0] == tag]
264 return [record[k] for k in sorted(keys)]
/system/core/libutils/
DLruCache_test.cpp144 void assertInstanceCount(ssize_t keys, ssize_t values) { in assertInstanceCount() argument
145 if (keys != ComplexKey::instanceCount || values != ComplexValue::instanceCount) { in assertInstanceCount()
146 FAIL() << "Expected " << keys << " keys and " << values << " values " in assertInstanceCount()
/system/extras/simpleperf/scripts/
Dannotate.py366 for func_name in file_period.function_dict.keys():
374 for line in sorted(file_period.line_dict.keys()):
427 for line in file_period.line_dict.keys():
429 for func_name in file_period.function_dict.keys():

123