/system/core/libpixelflinger/codeflinger/ |
D | Arm64Disassembler.cpp | 95 static void get_token(const char *instr, uint32_t index, char *token) in get_token() argument 102 token[j++] = instr[i]; in get_token() 111 token[j++] = instr[i]; in get_token() 114 token[j] = '\0'; in get_token() 134 static void decode_token(uint32_t code, char *token, char *instr_part) in decode_token() argument 136 if(strcmp(token, "<imm1>") == 0) in decode_token() 138 else if(strcmp(token, "<imm2>") == 0) in decode_token() 140 else if(strcmp(token, "<shift1>") == 0) in decode_token() 142 else if(strcmp(token, "<shift2>") == 0) in decode_token() 147 else if(strcmp(token, "<shift3>") == 0) in decode_token() [all …]
|
/system/security/keystore/tests/ |
D | verification_token_seralization_test.cpp | 32 VerificationToken token; in TEST() local 33 token.challenge = 12345; in TEST() 34 token.timestamp = 67890; in TEST() 35 token.securityLevel = SecurityLevel::TRUSTED_ENVIRONMENT; in TEST() 36 token.mac.resize(32); in TEST() 38 token.mac[n] = n; in TEST() 40 optional<vector<uint8_t>> serialized = serializeVerificationToken(token); in TEST() 44 ASSERT_EQ(token.challenge, deserialized.value().challenge); in TEST() 45 ASSERT_EQ(token.timestamp, deserialized.value().timestamp); in TEST() 46 ASSERT_EQ(token.securityLevel, deserialized.value().securityLevel); in TEST() [all …]
|
/system/tools/aidl/ |
D | aidl_language_l.ll | 45 /* This happens at every call to yylex (every time we receive one token) */ 56 \"[^\"]*\" { yylval->token = new AidlToken(yytext, extra_text); 57 return yy::parser::token::C_STR; } 87 "<<" { return(yy::parser::token::LSHIFT); } 88 ">>" { return(yy::parser::token::RSHIFT); } 89 "&&" { return(yy::parser::token::LOGICAL_AND); } 90 "||" { return(yy::parser::token::LOGICAL_OR); } 93 "<=" { return(yy::parser::token::LEQ); } 94 ">=" { return(yy::parser::token::GEQ); } 95 "==" { return(yy::parser::token::EQUALITY); } [all …]
|
D | aidl_language_y.yy | 71 AidlToken* token; 106 %token<token> ANNOTATION "annotation" 107 %token<token> C_STR "string literal" 108 %token<token> IDENTIFIER "identifier" 109 %token<token> INTERFACE "interface" 110 %token<token> PARCELABLE "parcelable" 111 %token<token> ONEWAY "oneway" 112 %token<token> ENUM "enum" 113 %token<token> CONST "const" 115 %token<character> CHARVALUE "char literal" [all …]
|
/system/keymaster/tests/ |
D | keymaster_enforcement_test.cpp | 54 bool auth_token_timed_out(const hw_auth_token_t& token, uint32_t timeout) const override { in auth_token_timed_out() argument 55 return current_time_ > ntoh(token.timestamp) + timeout; in auth_token_timed_out() 574 hw_auth_token_t token; in TEST_F() local 575 memset(&token, 0, sizeof(token)); in TEST_F() 576 token.version = HW_AUTH_TOKEN_VERSION; in TEST_F() 577 token.challenge = 99; in TEST_F() 578 token.user_id = 9; in TEST_F() 579 token.authenticator_id = 0; in TEST_F() 580 token.authenticator_type = hton(static_cast<uint32_t>(HW_AUTH_PASSWORD)); in TEST_F() 581 token.timestamp = 0; in TEST_F() [all …]
|
/system/security/keystore/include/keystore/ |
D | keystore_hidl_support.h | 88 inline static hidl_vec<uint8_t> authToken2HidlVec(const Km3HardwareAuthToken& token) { in authToken2HidlVec() argument 89 static_assert(std::is_same<decltype(token.hmac), in authToken2HidlVec() 92 static_assert(1 /* version size */ + sizeof(token.challenge) + sizeof(token.userId) + in authToken2HidlVec() 93 sizeof(token.authenticatorId) + sizeof(token.authenticatorType) + in authToken2HidlVec() 94 sizeof(token.timestamp) + kHmacSize == in authToken2HidlVec() 102 pos = copy_bytes_to_iterator(token.challenge, pos); in authToken2HidlVec() 103 pos = copy_bytes_to_iterator(token.userId, pos); in authToken2HidlVec() 104 pos = copy_bytes_to_iterator(token.authenticatorId, pos); in authToken2HidlVec() 105 pos = copy_bytes_to_iterator(token.authenticatorType, pos); in authToken2HidlVec() 106 pos = copy_bytes_to_iterator(token.timestamp, pos); in authToken2HidlVec() [all …]
|
/system/bt/gd/packet/parser/ |
D | language_l.ll | 10 using token = yy::parser::token; 53 "_body_" { return(token::BODY); } 54 "_payload_" { return(token::PAYLOAD); } 55 "_size_" { return(token::SIZE); } 56 "_count_" { return(token::COUNT); } 57 "_fixed_" { return(token::FIXED); } 58 "_reserved_" { return(token::RESERVED); } 59 "_checksum_start_" { return(token::CHECKSUM_START); } 60 "_padding_" { return(token::PADDING); } 62 "checksum" { return(token::CHECKSUM); } [all …]
|
/system/tools/hidl/ |
D | hidl-gen_l.ll | 57 using token = yy::parser::token; 62 return token::TYPE; \ 95 return isDoc ? token::DOC_COMMENT : token::MULTILINE_COMMENT; 105 "enum" { return token::ENUM; } 106 "extends" { return token::EXTENDS; } 107 "generates" { return token::GENERATES; } 108 "import" { return token::IMPORT; } 109 "interface" { return token::INTERFACE; } 110 "package" { return token::PACKAGE; } 111 "safe_union" { return token::SAFE_UNION; } [all …]
|
/system/security/keystore/ |
D | operation.cpp | 33 sp<IBinder> token = new ::android::BBinder(); in addOperation() local 34 mMap.emplace(token, std::make_shared<Operation>(handle, keyid, purpose, dev, in addOperation() 36 if (pruneable) mLru.push_back(token); in addOperation() 38 mAppTokenMap[appToken].push_back(token); in addOperation() 39 return token; in addOperation() 42 std::shared_ptr<Operation> OperationMap::getOperation(const sp<IBinder>& token) { in getOperation() argument 43 auto entry = mMap.find(token); in getOperation() 48 updateLru(token); in getOperation() 52 void OperationMap::updateLru(const sp<IBinder>& token) { in updateLru() argument 53 auto lruEntry = std::find(mLru.begin(), mLru.end(), token); in updateLru() [all …]
|
/system/hwservicemanager/ |
D | TokenManager.cpp | 30 namespace token { namespace 65 uint64_t id = getTokenId(interface.token); in createToken() 80 hidl_cb(interface.token); in createToken() 85 TokenManager::lookupToken(const hidl_vec<uint8_t> &token) { in lookupToken() argument 86 uint64_t tokenId = getTokenId(token); in lookupToken() 100 if (!constantTimeCompare(token, interface.token)) { in lookupToken() 108 Return<bool> TokenManager::unregister(const hidl_vec<uint8_t> &token) { in unregister() argument 109 auto it = lookupToken(token); in unregister() 119 Return<sp<IBase>> TokenManager::get(const hidl_vec<uint8_t> &token) { in get() argument 120 auto it = lookupToken(token); in get() [all …]
|
D | TokenManager.h | 28 namespace token { 33 using ::android::hidl::token::V1_0::ITokenManager; 46 Return<bool> unregister(const hidl_vec<uint8_t> &token) override; 47 Return<sp<IBase>> get(const hidl_vec<uint8_t> &token) override; 57 static uint64_t getTokenId(const hidl_vec<uint8_t> &token); 64 hidl_vec<uint8_t> token; // First eight bytes are tokenId. Remaining bytes are hmac. member 71 lookupToken(const hidl_vec<uint8_t> &token);
|
/system/vold/ |
D | ScryptParameters.cpp | 24 char* token; in parse_scrypt_parameters() local 32 for (i = 0, token = strtok_r(const_cast<char*>(paramstr), ":", &saveptr); in parse_scrypt_parameters() 33 token != nullptr && i < 3; i++, token = strtok_r(nullptr, ":", &saveptr)) { in parse_scrypt_parameters() 35 params[i] = strtol(token, &endptr, 10); in parse_scrypt_parameters() 40 if ((*token == '\0') || (*endptr != '\0') || params[i] < 0 || params[i] > 255) { in parse_scrypt_parameters() 44 if (token != nullptr) { in parse_scrypt_parameters()
|
/system/libhidl/transport/token/1.0/ |
D | ITokenManager.hal | 17 package android.hidl.token@1.0; 27 * to the interface until the token is destroyed by calling unregister. 29 * Must return empty token on failure. 31 * @param store Interface which can later be fetched with the returned token. 32 * @return token Opaque value which may be used as inputs to other functions. 34 createToken(interface store) generates (vec<uint8_t>token); 37 * Destory a token and the strong reference to the associated interface. 39 * @param token Token received from createToken 40 * @return success Whether or not the token was successfully unregistered. 42 unregister(vec<uint8_t> token) generates (bool success); [all …]
|
/system/keymaster/ng/include/ |
D | keystore_hidl_support.h | 103 inline static hidl_vec<uint8_t> authToken2HidlVec(const HardwareAuthToken& token) { in authToken2HidlVec() argument 105 std::is_same<decltype(token.hmac), ::android::hardware::hidl_array<uint8_t, 32>>::value, in authToken2HidlVec() 107 static_assert(1 /* version size */ + sizeof(token.challenge) + sizeof(token.userId) + in authToken2HidlVec() 108 sizeof(token.authenticatorId) + sizeof(token.authenticatorType) + in authToken2HidlVec() 109 sizeof(token.timestamp) + 32 /* HMAC size */ in authToken2HidlVec() 117 pos = copy_bytes_to_iterator(token.challenge, pos); in authToken2HidlVec() 118 pos = copy_bytes_to_iterator(token.userId, pos); in authToken2HidlVec() 119 pos = copy_bytes_to_iterator(token.authenticatorId, pos); in authToken2HidlVec() 120 pos = copy_bytes_to_iterator(token.authenticatorType, pos); in authToken2HidlVec() 121 pos = copy_bytes_to_iterator(token.timestamp, pos); in authToken2HidlVec() [all …]
|
/system/tools/aidl/tests/ |
D | aidl_test_service.cpp | 119 void LogRepeatedStringToken(const String16& token) { in LogRepeatedStringToken() argument 120 ALOGI("Repeating '%s' of length=%zu", android::String8(token).string(), in LogRepeatedStringToken() 121 token.size()); in LogRepeatedStringToken() 125 void LogRepeatedToken(const T& token) { in LogRepeatedToken() argument 127 token_str << token; in LogRepeatedToken() 131 Status RepeatBoolean(bool token, bool* _aidl_return) override { in RepeatBoolean() argument 132 LogRepeatedToken(token ? 1 : 0); in RepeatBoolean() 133 *_aidl_return = token; in RepeatBoolean() 136 Status RepeatByte(int8_t token, int8_t* _aidl_return) override { in RepeatByte() argument 137 LogRepeatedToken(token); in RepeatByte() [all …]
|
/system/bt/main/shim/ |
D | dumpsys.cc | 31 void bluetooth::shim::RegisterDumpsysFunction(const void* token, in RegisterDumpsysFunction() argument 35 CHECK(dumpsys_functions_->find(token) == dumpsys_functions_->end()); in RegisterDumpsysFunction() 36 dumpsys_functions_->insert({token, func}); in RegisterDumpsysFunction() 39 void bluetooth::shim::UnregisterDumpsysFunction(const void* token) { in UnregisterDumpsysFunction() argument 40 CHECK(dumpsys_functions_->find(token) != dumpsys_functions_->end()); in UnregisterDumpsysFunction() 41 dumpsys_functions_->erase(token); in UnregisterDumpsysFunction()
|
/system/gatekeeper/ |
D | gatekeeper.cpp | 231 hw_auth_token_t token; in MintAuthToken() local 233 token.version = HW_AUTH_TOKEN_VERSION; in MintAuthToken() 234 token.challenge = challenge; in MintAuthToken() 235 token.user_id = user_id; in MintAuthToken() 236 token.authenticator_id = authenticator_id; in MintAuthToken() 237 token.authenticator_type = htobe32(HW_AUTH_PASSWORD); in MintAuthToken() 238 token.timestamp = htobe64(timestamp); in MintAuthToken() 240 constexpr uint32_t hashable_length = sizeof(token.version) + in MintAuthToken() 241 sizeof(token.challenge) + in MintAuthToken() 242 sizeof(token.user_id) + in MintAuthToken() [all …]
|
/system/libhidl/transport/token/1.0/utils/ |
D | HybridInterface.cpp | 26 using ::android::hidl::token::V1_0::ITokenManager; 76 sp<HInterface> retrieveHalInterface(const HalToken& token) { in retrieveHalInterface() argument 83 transaction = gTokenManager->get(token); in retrieveHalInterface() 91 bool createHalToken(const sp<HInterface>& interface, HalToken* token) { in createHalToken() argument 99 *token = newToken; in createHalToken() 105 bool deleteHalToken(const HalToken& token) { in deleteHalToken() argument 112 transaction = gTokenManager->unregister(token); in deleteHalToken()
|
/system/tools/hidl/lint/lints/ |
D | enumMaxAndAll.cpp | 49 for (const std::string& token : tokens) { in enumValueNames() local 50 if (token == "ALL" || token == "COUNT" || token == "MAX") { in enumValueNames() 51 errorString = "\"" + token + "\"" + in enumValueNames()
|
/system/tools/hidl/c2hal/ |
D | c2hal_y.yy | 85 %token START_HEADER 86 %token START_EXPR 88 %token STRUCT 89 %token UNION 90 %token ENUM 91 %token CLASS 92 %token CONST 93 %token VOID 94 %token INCLUDE 95 %token DEFINE [all …]
|
/system/tools/aidl/tests/android/aidl/tests/ |
D | ITestService.aidl | 48 boolean RepeatBoolean(boolean token); in RepeatBoolean() argument 49 byte RepeatByte(byte token); in RepeatByte() argument 50 char RepeatChar(char token); in RepeatChar() argument 51 int RepeatInt(int token); in RepeatInt() argument 52 long RepeatLong(long token); in RepeatLong() argument 53 float RepeatFloat(float token); in RepeatFloat() argument 54 double RepeatDouble(double token); in RepeatDouble() argument 55 String RepeatString(String token); in RepeatString() argument 56 ByteEnum RepeatByteEnum(ByteEnum token); in RepeatByteEnum() argument 57 IntEnum RepeatIntEnum(IntEnum token); in RepeatIntEnum() argument [all …]
|
/system/bt/gd/hci/ |
D | address.cc | 71 std::string token; in FromString() local 73 while (getline(stream, token, ':')) { in FromString() 78 if (token.length() != 2) { in FromString() 83 addr.address.at(5 - index) = std::strtol(token.c_str(), &temp, 16); in FromString() 84 if (temp == token.c_str()) { in FromString() 88 if (temp != (token.c_str() + token.size())) { in FromString()
|
/system/core/adb/crypto/tests/ |
D | key_test.cpp | 48 const char token[SHA_DIGEST_LENGTH] = "abcdefghij123456789"; in TEST() local 51 EXPECT_EQ(RSA_sign(NID_sha1, reinterpret_cast<const uint8_t*>(token), sizeof(token), sig.data(), in TEST() 62 EXPECT_EQ(RSA_verify(NID_sha1, reinterpret_cast<const uint8_t*>(token), sizeof(token), in TEST()
|
D | rsa_2048_key_test.cpp | 51 const char token[SHA_DIGEST_LENGTH] = "abcdefghij123456789"; in TEST() local 54 EXPECT_EQ(RSA_sign(NID_sha1, reinterpret_cast<const uint8_t*>(token), sizeof(token), sig.data(), in TEST() 65 EXPECT_EQ(RSA_verify(NID_sha1, reinterpret_cast<const uint8_t*>(token), sizeof(token), in TEST()
|
/system/core/libcutils/ |
D | canned_fs_config.cpp | 56 char* token; in load_canned_fs_config() local 74 token = strtok(NULL, " "); in load_canned_fs_config() 75 if (token && strncmp(token, "capabilities=", 13) == 0) { in load_canned_fs_config() 76 p->capabilities = strtoll(token+13, NULL, 0); in load_canned_fs_config() 79 } while (token); in load_canned_fs_config()
|