/system/memory/libmemtrack/ |
D | memtrack_test.cpp | 65 size_t v2; in main() local 82 v2 = DIV_ROUND_UP(memtrack_proc_graphics_pss(p), 1024); in main() 88 if (v1 | v2 | v3 | v4 | v5 | v6) { in main() 89 fprintf(stdout, "%5d %6zu %6zu %6zu %6zu %6zu %6zu %s\n", pid, v1, v2, v3, v4, v5, v6, in main()
|
/system/extras/libfscrypt/ |
D | fscrypt.cpp | 285 fscrypt_policy_v2 v2; in EnsurePolicy() member 311 kern_policy.v2.version = FSCRYPT_POLICY_V2; in EnsurePolicy() 312 kern_policy.v2.contents_encryption_mode = policy.options.contents_mode; in EnsurePolicy() 313 kern_policy.v2.filenames_encryption_mode = policy.options.filenames_mode; in EnsurePolicy() 314 kern_policy.v2.flags = policy.options.flags; in EnsurePolicy() 315 policy.key_raw_ref.copy(reinterpret_cast<char*>(kern_policy.v2.master_key_identifier), in EnsurePolicy()
|
/system/apex/shim/build/ |
D | Android.bp | 64 name: "com.android.apex.cts.shim.v2", 171 ":com.android.apex.cts.shim.v2", 311 // v2 cts shim package signed by bob, without lineage 317 ":com.android.apex.cts.shim.v2", 325 …v2-signing-enabled false --key $(location :com.android.apex.rotation.key.bob.pk8) --cert $(locatio… 328 // v2 cts shim package signed by bob + lineage 334 ":com.android.apex.cts.shim.v2", 343 …v2-signing-enabled false --key $(location :com.android.apex.rotation.key.bob.pk8) --cert $(locatio… 346 // v2 cts shim package signed by bob + lineage + rollback capability 352 ":com.android.apex.cts.shim.v2", [all …]
|
/system/sepolicy/prebuilts/api/28.0/public/ |
D | untrusted_v2_app.te | 2 ### Untrusted v2 sandbox apps.
|
/system/sepolicy/prebuilts/api/26.0/public/ |
D | untrusted_v2_app.te | 2 ### Untrusted v2 sandbox apps.
|
/system/sepolicy/prebuilts/api/27.0/public/ |
D | untrusted_v2_app.te | 2 ### Untrusted v2 sandbox apps.
|
/system/core/libpixelflinger/ |
D | trap.cpp | 99 const GGLcoord* v2 ) in triangle_dump_points() argument 107 v2[0]*tri, v2[1]*tri, v2[0], v2[1] ); in triangle_dump_points() 463 const GGLcoord* v0, const GGLcoord* v1, const GGLcoord* v2) in trianglex_debug() argument 467 aa_trianglex(con,v0,v1,v2); in trianglex_debug() 469 trianglex_big(con,v0,v1,v2); in trianglex_debug() 474 linex(con, v1, v2, TRI_ONE); in trianglex_debug() 475 linex(con, v2, v0, TRI_ONE); in trianglex_debug() 480 const GGLcoord* v0, const GGLcoord* v1, const GGLcoord* v2) in trianglex_xor() argument 482 trianglex_big(con,v0,v1,v2); in trianglex_xor() 483 trianglex_small(con,v0,v1,v2); in trianglex_xor() [all …]
|
/system/apex/shim/ |
D | README.md | 30 com.android.apex.cts.shim.v2 \ 44 …duct/${DEVICE}/obj/ETC/com.android.apex.cts.shim.v2_intermediates/com.android.apex.cts.shim.v2.apex
|
D | Android.bp | 29 src: "com.android.apex.cts.shim.v2.apex", 30 filename: "com.android.apex.cts.shim.v2.apex",
|
/system/teeui/libteeui/include/teeui/ |
D | utils.h | 239 const Coordinate<px, Numeric>& v2) { 240 return v1 + v2; 245 const Coordinate<px, Numeric>& v2) { 246 return v1 - v2; 251 const Coordinate<px, Numeric>& v2) { 252 return v1 * v2; 257 const Coordinate<px, Numeric>& v2) { 258 return v1 / v2; 275 constexpr BinOp(const T1& v1, const T2& v2) : v1_(v1), v2_(v2) {} 281 Coordinate<px, Numeric> v2 = ctx = v2_; [all …]
|
/system/sepolicy/prebuilts/api/26.0/private/ |
D | untrusted_v2_app.te | 2 ### Untrusted v2 sandbox apps.
|
D | untrusted_app_all.te | 5 ### apps which target the v2 security sandbox (ephemeral_app for instant apps, 6 ### untrusted_v2_app for fully installed v2 apps).
|
/system/sepolicy/prebuilts/api/27.0/private/ |
D | untrusted_v2_app.te | 2 ### Untrusted v2 sandbox apps.
|
D | untrusted_app_all.te | 5 ### apps which target the v2 security sandbox (ephemeral_app for instant apps, 6 ### untrusted_v2_app for fully installed v2 apps).
|
/system/timezone/ |
D | README.android | 129 - Major version numbers are mutually incompatible. e.g. v2 is not compatible 131 - Minor version numbers are backwards compatible. e.g. a v2.2 distro will work 132 on a v2.1 device but not a v2.3 device.
|
/system/core/adb/daemon/ |
D | file_sync_service.cpp | 185 template <bool v2> 190 std::conditional_t<v2, decltype(syncmsg::dent_v2), decltype(syncmsg::dent_v1)>; in do_list() 193 if constexpr (v2) { in do_list() 214 if constexpr (v2) { in do_list() 224 if constexpr (v2) { in do_list()
|
/system/sepolicy/prebuilts/api/28.0/private/ |
D | untrusted_v2_app.te | 2 ### Untrusted v2 sandbox apps.
|
D | untrusted_app_all.te | 5 ### apps which target the v2 security sandbox (ephemeral_app for instant apps, 6 ### untrusted_v2_app for fully installed v2 apps).
|
/system/media/audio_utils/include/audio_utils/ |
D | variadic_utils.h | 269 && fold([](const bool& v1, const bool& v2) { return v1 && v2; }, 270 tupleOp([](const auto &v1, const auto &v2) { return equivalent(v1, v2); },
|
/system/core/libpixelflinger/include/pixelflinger/ |
D | pixelflinger.h | 211 GGLcoord const* v0, GGLcoord const* v1, GGLcoord const* v2);
|
/system/ca-certificates/google/files/ |
D | 2afc57aa.0 | 72 URI:http://www.trustcenter.de/crl/v2/tc_class_2_ca_II.crl
|
/system/bt/stack/crypto_toolbox/ |
D | aes.cc | 256 uint_8t p1 = x, p2 = BPOLY, n1 = hibit(x), n2 = 0x80, v1 = 1, v2 = 0; in gf_inv() local 266 v2 ^= (v1 * n2); /* shift accumulated value and */ in gf_inv() 276 v1 ^= v2 * n1; in gf_inv() 280 return v2; in gf_inv()
|
/system/bt/gd/crypto_toolbox/ |
D | aes.cc | 208 uint_8t p1 = x, p2 = BPOLY, n1 = hibit(x), n2 = 0x80, v1 = 1, v2 = 0; in gf_inv() local 218 v2 ^= (v1 * n2); /* shift accumulated value and */ in gf_inv() 228 v1 ^= v2 * n1; in gf_inv() 232 return v2; in gf_inv()
|
/system/keymaster/key_blob_utils/ |
D | ocb.c | 439 #define EXPAND_ASSIST(v1, v2, v3, v4, shuff_const, aes_const) \ argument 440 v2 = _mm_aeskeygenassist_si128(v4, aes_const); \ 445 v2 = _mm_shuffle_epi32(v2, shuff_const); \ 446 v1 = _mm_xor_si128(v1, v2)
|
/system/libhidl/ |
D | test_main.cpp | 217 vector<int32_t> v2 = hv1; // cast in TEST_F() local 218 EXPECT_ARRAYEQ(v2, v, 3); in TEST_F()
|