/system/update_engine/ |
D | excluder_chromeos.cc | 54 vector<string> keys; in Reset() local 55 if (!prefs_->GetSubKeys(kExclusionPrefsSubDir, &keys)) in Reset() 57 for (const auto& key : keys) in Reset()
|
/system/update_engine/payload_consumer/ |
D | certificate_parser_android_unittest.cc | 40 std::vector<std::unique_ptr<EVP_PKEY, decltype(&EVP_PKEY_free)>> keys; in TEST() local 42 ASSERT_TRUE(parser->ReadPublicKeysFromCertificates(ota_cert, &keys)); in TEST() 43 ASSERT_EQ(1u, keys.size()); in TEST()
|
D | payload_verifier.cc | 71 std::vector<std::unique_ptr<EVP_PKEY, decltype(&EVP_PKEY_free)>> keys; in CreateInstance() local 72 keys.emplace_back(std::move(pub_key)); in CreateInstance() 73 return std::unique_ptr<PayloadVerifier>(new PayloadVerifier(std::move(keys))); in CreateInstance()
|
/system/bt/stack/btm/ |
D | btm_ble.cc | 1202 p_dev_rec->ble.keys.local_counter++; in btm_ble_increment_sign_ctr() 1204 p_dev_rec->ble.keys.counter++; in btm_ble_increment_sign_ctr() 1206 is_local, p_dev_rec->ble.keys.local_counter, in btm_ble_increment_sign_ctr() 1207 p_dev_rec->ble.keys.counter); in btm_ble_increment_sign_ctr() 1250 if (p_dev_rec && p_dev_rec->ble.keys.div) { in btm_get_local_div() 1252 *p_div = p_dev_rec->ble.keys.div; in btm_get_local_div() 1290 p_rec->ble.keys.pltk = p_keys->penc_key.ltk; in btm_sec_save_le_key() 1291 memcpy(p_rec->ble.keys.rand, p_keys->penc_key.rand, BT_OCTET8_LEN); in btm_sec_save_le_key() 1292 p_rec->ble.keys.sec_level = p_keys->penc_key.sec_level; in btm_sec_save_le_key() 1293 p_rec->ble.keys.ediv = p_keys->penc_key.ediv; in btm_sec_save_le_key() [all …]
|
D | btm_ble_addr.cc | 163 if (rpa_matches_irk(rpa, p_dev_rec->ble.keys.irk)) { in btm_ble_addr_resolvable() 187 if (rpa_matches_irk(*random_bda, p_dev_rec->ble.keys.irk)) { in btm_ble_match_random_bda()
|
/system/sepolicy/ |
D | README | 46 * keys.conf 70 mac_permissions.xml to public keys found in pem files. This script takes 72 Details of the configuration file (keys.conf) can be found in the subsection 73 keys.conf. This tool is also responsible for stripping the comments and 76 keys.conf 77 The keys.conf file is used for controlling the mapping of "tags" found in 78 the mac_permissions.xml signature stanzas with actual public keys found in 89 to ones release keys. 92 organization and may need to extract the pem file for the insertkeys/keys.conf tools. 97 After extracting the pem, you can rename it, and configure keys.conf and
|
D | mac_permissions.mk | 10 all_plat_mac_perms_keys := $(call build_policy, keys.conf, $(PLAT_PRIVATE_POLICY) $(SYSTEM_EXT_PRIV… 48 all_system_ext_mac_perms_keys := $(call build_policy, keys.conf, $(SYSTEM_EXT_PRIVATE_POLICY) $(REQ… 79 all_product_mac_perms_keys := $(call build_policy, keys.conf, $(PRODUCT_PRIVATE_POLICY) $(REQD_MASK… 110 all_vendor_mac_perms_keys := $(call build_policy, keys.conf, $(PLAT_VENDOR_POLICY) $(BOARD_VENDOR_S… 142 all_odm_mac_perms_keys := $(call build_policy, keys.conf, $(BOARD_ODM_SEPOLICY_DIRS) $(REQD_MASK_PO…
|
/system/libziparchive/ |
D | test_ziparchive_large.py | 67 self.assertEquals(sorted(entry_dict.keys()), sorted(read_names)) 82 self.assertEquals(sorted(entry_dict.keys()), sorted(read_names)) 96 self.assertEquals(sorted(entry_dict.keys()), sorted(read_names)) 126 self.assertEquals(sorted(entry_dict.keys()), sorted(read_names)) 140 self.assertEquals(sorted(entry_dict.keys()), sorted(read_names))
|
/system/update_engine/common/ |
D | prefs.h | 48 std::vector<std::string>* keys) const = 0; 79 std::vector<std::string>* keys) const override; 123 std::vector<std::string>* keys) const override; 163 std::vector<std::string>* keys) const override;
|
D | prefs.cc | 115 bool PrefsBase::GetSubKeys(const string& ns, vector<string>* keys) const { in GetSubKeys() 116 return storage_->GetSubKeys(ns, keys); in GetSubKeys() 158 vector<string>* keys) const { in GetSubKeys() 168 keys->push_back(f.value().substr( in GetSubKeys() 224 vector<string>* keys) const { in GetSubKeys() 237 keys->push_back((lower_it++)->first); in GetSubKeys()
|
D | fake_prefs.cc | 109 bool FakePrefs::GetSubKeys(const string& ns, vector<string>* keys) const { in GetSubKeys() 112 keys->push_back(pr.first); in GetSubKeys()
|
D | prefs_interface.h | 88 std::vector<std::string>* keys) const = 0;
|
D | fake_prefs.h | 53 std::vector<std::string>* keys) const override;
|
/system/sepolicy/prebuilts/api/30.0/private/ |
D | fsverity_init.te | 6 # Allow to read /proc/keys for searching key id. 9 # Kernel only prints the keys that can be accessed and only kernel keyring is needed here.
|
/system/sepolicy/private/ |
D | fsverity_init.te | 6 # Allow to read /proc/keys for searching key id. 9 # Kernel only prints the keys that can be accessed and only kernel keyring is needed here.
|
/system/bt/gd/security/ |
D | pairing_handler_le.cc | 321 DistributedKeysOrFailure keys = ReceiveKeys(keys_i_receive); in DistributeKeys() local 322 if (std::holds_alternative<PairingFailure>(keys)) { in DistributeKeys() 323 return keys; in DistributeKeys() 329 return keys; in DistributeKeys() 334 DistributedKeysOrFailure keys = ReceiveKeys(keys_i_receive); in DistributeKeys() local 335 if (std::holds_alternative<PairingFailure>(keys)) { in DistributeKeys() 336 return keys; in DistributeKeys() 339 return keys; in DistributeKeys()
|
/system/sepolicy/prebuilts/api/29.0/private/ |
D | fsverity_init.te | 10 # Allow to read /proc/keys for searching key id. 13 # Kernel only prints the keys that can be accessed and only kernel keyring is needed here.
|
/system/security/keystore/tests/ |
D | list_auth_bound_keys_test.sh | 49 if cli $USER2_ID list-apps-with-keys; then
|
/system/sepolicy/tools/ |
D | check_seapp.c | 710 static rule_map *rule_map_new(kvp keys[], size_t num_of_keys, int lineno, in rule_map_new() argument 736 k = &(keys[i]); in rule_map_new() 813 k = &(keys[i]); in rule_map_new() 1076 kvp keys[KVP_NUM_OF_RULES]; in parse_file() local 1107 memset(keys, 0, sizeof(kvp) * KVP_NUM_OF_RULES); in parse_file() 1116 keys[token_cnt].key = strdup(name); in parse_file() 1117 if (!keys[token_cnt].key) in parse_file() 1120 keys[token_cnt].value = strdup(value); in parse_file() 1121 if (!keys[token_cnt].value) in parse_file() 1135 rule_map *r = rule_map_new(keys, token_cnt, lineno, in_file->name, is_never_allow); in parse_file()
|
/system/extras/libjsonpb/ |
D | README.md | 39 defined) or the original field name as keys in the input JSON file. 58 - Whether the Protobuf file defines JSON keys clearly. The JSON keys must be 62 in the following Protobuf file, only keys `foo_bar` and `barBaz` are allowed
|
/system/bt/audio_bluetooth_hw/ |
D | audio_bluetooth_hw.cc | 58 const char* keys) { in adev_get_parameters() argument 59 LOG(VERBOSE) << __func__ << ": keys=[" << keys << "]"; in adev_get_parameters()
|
/system/sepolicy/tests/ |
D | combine_maps.py | 50 if bottom_type not in bottom.rTypeattributesets.keys():
|
/system/core/init/ |
D | perfboot.py | 263 keys = [key for key in record.keys() if key[0] == tag] 264 return [record[k] for k in sorted(keys)]
|
/system/core/libutils/ |
D | LruCache_test.cpp | 144 void assertInstanceCount(ssize_t keys, ssize_t values) { in assertInstanceCount() argument 145 if (keys != ComplexKey::instanceCount || values != ComplexValue::instanceCount) { in assertInstanceCount() 146 FAIL() << "Expected " << keys << " keys and " << values << " values " in assertInstanceCount()
|
/system/extras/simpleperf/scripts/ |
D | annotate.py | 366 for func_name in file_period.function_dict.keys(): 374 for line in sorted(file_period.line_dict.keys()): 427 for line in file_period.line_dict.keys(): 429 for func_name in file_period.function_dict.keys():
|