/system/nfc/halimpl/pn54x/ |
H A D | nfc_nci.c | 193 dev->nci_device.common.tag = HARDWARE_DEVICE_TAG; 226 .tag = HARDWARE_MODULE_TAG,
|
/system/core/fs_mgr/ |
H A D | fs_mgr_verity.cpp | 370 static int metadata_add(FILE *fp, long start, const char *tag, argument 374 fprintf(fp, "%s %u\n", tag, length) < 0) { 392 char tag[METADATA_TAG_MAX_LENGTH + 1]; local 438 tag, &length); 440 if (n == 2 && strcmp(tag, METADATA_EOD)) { 441 /* found a tag */ 444 if (!strcmp(tag, stag) && length == slength) { 576 char tag[METADATA_TAG_MAX_LENGTH + 1]; local 601 if (snprintf(tag, sizeof(tag), VERITY_LASTSIG_TA 647 char tag[METADATA_TAG_MAX_LENGTH + 1]; local [all...] |
/system/core/logd/ |
H A D | LogUtils.h | 45 const char* tagToName(uint32_t tag);
|
H A D | LogStatistics.cpp | 148 uint32_t tag = element->getTag(); local 149 if (tag) { 151 securityTagTable.add(tag, element); 153 tagTable.add(tag, element); 191 uint32_t tag = element->getTag(); local 192 if (tag) { 194 securityTagTable.subtract(tag, element); 196 tagTable.subtract(tag, element); 229 uint32_t tag = element->getTag(); local 230 if (tag) { [all...] |
/system/keymaster/ |
H A D | attestation_record.cpp | 189 switch (keymaster_tag_get_type(param.tag)) { 243 switch (entry.tag) { 379 keymaster_tag_type_t type = keymaster_tag_get_type(entry.tag); 385 assert((keymaster_tag_repeatable(entry.tag) && integer_set) || 386 (!keymaster_tag_repeatable(entry.tag) && integer_ptr)); 401 assert((keymaster_tag_repeatable(entry.tag) && integer_set) || 402 (!keymaster_tag_repeatable(entry.tag) && integer_ptr)); 558 for (const auto& tag : kDeviceAttestationTags) { 559 if (attestation_params.find(tag) != -1) { 618 // Copy all enumerated values with the specified tag fro 619 get_repeated_enums(const stack_st_ASN1_INTEGER* stack, keymaster_tag_t tag, AuthorizationSet* auth_list) argument 632 get_enum(const ASN1_INTEGER* asn1_int, TypedEnumTag<Type, Tag, KeymasterEnum> tag, AuthorizationSet* auth_list) argument 640 get_ulong(const ASN1_INTEGER* asn1_int, keymaster_tag_t tag, AuthorizationSet* auth_list) argument [all...] |
H A D | keymaster_tags.cpp | 22 const char* StringifyTag(keymaster_tag_t tag) { argument 23 switch (tag) { 137 // DEFINE_KEYMASTER_TAG is used to create TypedTag instances for each non-enum keymaster tag. 182 // DEFINE_KEYMASTER_ENUM_TAG is used to create TypedEnumTag instances for each enum keymaster tag.
|
H A D | authorization_set_test.cpp | 82 EXPECT_EQ(KM_TAG_ALGORITHM, set[pos].tag); 113 EXPECT_EQ(KM_TAG_PURPOSE, set[pos].tag); 117 EXPECT_EQ(KM_TAG_PURPOSE, set[pos].tag); 123 EXPECT_EQ(KM_TAG_USER_SECURE_ID, set[pos].tag); 139 EXPECT_EQ(KM_TAG_PURPOSE, set[0].tag); 144 EXPECT_EQ(KM_TAG_INVALID, set[10].tag); 174 EXPECT_EQ(KM_TAG_APPLICATION_ID, deserialized[pos].tag); 204 EXPECT_EQ(set[i].tag, deserialized[i].tag); 209 EXPECT_EQ(KM_TAG_APPLICATION_ID, deserialized[pos].tag); [all...] |
H A D | ocb.c | 45 /* Set the AES key length to use and length of authentication tag to produce. 850 /* Process remaining associated data, compute its tag contribution */ 919 int ad_len, void* ct, void* tag, int final) { 1006 /* Process remaining plaintext and compute its tag contribution */ 1054 offset = xor_block(offset, ctx->Ldollar); /* Part of tag gen */ 1055 ta[k] = xor_block(offset, checksum); /* Part of tag gen */ 1057 offset = xor_block(ta[k], ctx->ad_checksum); /* Part of tag gen */ 1084 if (tag) { 1086 *(block*)tag = offset; 1088 memcpy((char*)tag, 918 ae_encrypt(ae_ctx* ctx, const void* nonce, const void* pt, int pt_len, const void* ad, int ad_len, void* ct, void* tag, int final) argument 1129 ae_decrypt(ae_ctx* ctx, const void* nonce, const void* ct, int ct_len, const void* ad, int ad_len, void* pt, const void* tag, int final) argument [all...] |
H A D | ec_keymaster1_key.cpp | 48 if (entry.tag == TAG_DIGEST) {
|
/system/extras/simpleperf/runtest/ |
H A D | runtest.py | 204 assert root.tag == 'runtests' 206 assert test.tag == 'test' 214 if test_item.tag == 'executable': 216 elif test_item.tag == 'report': 218 elif (test_item.tag == 'symbol_overhead' or 219 test_item.tag == 'symbol_children_overhead'): 221 assert symbol_item.tag == 'symbol' 235 if test_item.tag == 'symbol_overhead': 250 elif test_item.tag == 'symbol_callgraph_relation':
|
/system/media/camera/docs/ |
H A D | camera_metadata_tags.mako | 61 * defined with tag >= VENDOR_SECTION_START 72 * before the section _END tag to preserve existing enumeration values. In 73 * addition, the name and type of the tag needs to be added to
|
H A D | html.mako | 85 /* TODO: generate abbr element for each tag link? */ 142 # linkify tag names such as "android.x.y.z" into html anchors 348 % for tag in prop.tags: 349 <li><a href="#tag_${tag.id}">${tag.id}</a></li> 397 % for tag in metadata.tags: 398 <li id="tag_${tag.id}">${tag.id} - ${tag.description} 400 % for prop in tag [all...] |
/system/core/liblog/ |
H A D | logprint.c | 93 static FilterInfo* filterinfo_new(const char* tag, android_LogPriority pri) { argument 97 p_ret->mTag = strdup(tag); 180 const char* tag) { 185 if (0 == strcmp(tag, p_curFilter->mTag)) { 199 * and tag, and 0 if it should not 202 const char* tag, 204 return pri >= filterPriForTag(p_format, tag); 311 else if (!strcmp(formatString, "tag")) format = FORMAT_TAG; 516 * format: <priority:1><tag:N>\0<message:N>\0 518 * tag st 179 filterPriForTag(AndroidLogFormat* p_format, const char* tag) argument 201 android_log_shouldPrintLine(AndroidLogFormat* p_format, const char* tag, android_LogPriority pri) argument [all...] |
H A D | log_event_list.c | 33 uint32_t tag; member in struct:__anon1572 48 LIBLOG_ABI_PUBLIC android_log_context create_android_logger(uint32_t tag) { argument 56 context->tag = tag; 328 ? __android_log_bwrite(context->tag, msg, len) 329 : __android_log_security_bwrite(context->tag, msg, len);
|
H A D | logd_writer.c | 169 * uint32_t tag 190 buffer.header.tag = htole32(LIBLOG_LOG_TAG); 210 buffer.header.tag = htole32(LIBLOG_LOG_TAG);
|
/system/core/adb/ |
H A D | adb.cpp | 158 char *tag; local 163 case A_SYNC: tag = "SYNC"; break; 164 case A_CNXN: tag = "CNXN" ; break; 165 case A_OPEN: tag = "OPEN"; break; 166 case A_OKAY: tag = "OKAY"; break; 167 case A_CLSE: tag = "CLSE"; break; 168 case A_WRTE: tag = "WRTE"; break; 169 case A_AUTH: tag = "AUTH"; break; 170 default: tag = "????"; break; 174 label, tag, [all...] |
/system/nfc/halimpl/bcm2079x/ |
H A D | nfc_nci.c | 122 dev->nci_device.common.tag = HARDWARE_DEVICE_TAG; 155 .tag = HARDWARE_MODULE_TAG,
|
/system/core/include/log/ |
H A D | log_event_list.h | 78 * Creates a context associated with an event tag to write elements to 81 android_log_context create_android_logger(uint32_t tag); 130 explicit android_log_event_list(int tag) : ret(0) { argument 131 ctx = create_android_logger(static_cast<uint32_t>(tag));
|
/system/core/liblog/include/log/ |
H A D | log_event_list.h | 78 * Creates a context associated with an event tag to write elements to 81 android_log_context create_android_logger(uint32_t tag); 130 explicit android_log_event_list(int tag) : ret(0) { argument 131 ctx = create_android_logger(static_cast<uint32_t>(tag));
|
/system/security/keystore/ |
H A D | keymaster_enforcement.cpp | 148 switch (auth_set[pos].tag) { 197 switch (auth_set[pos].tag) { 227 if (int32_t(param.tag) == KM_TAG_PADDING_OLD || int32_t(param.tag) == KM_TAG_DIGEST_OLD) 230 switch (param.tag) { 516 assert(auth_set[auth_type_index].tag == KM_TAG_USER_AUTH_TYPE); 528 assert(auth_set[auth_timeout_index].tag == KM_TAG_AUTH_TIMEOUT);
|
H A D | blob.cpp | 65 * output to 'out' (which may be the same location as 'in') and 128-bit tag to 'tag'. 68 const uint8_t* iv, uint8_t* tag) { 90 EVP_CIPHER_CTX_ctrl(ctx.get(), EVP_CTRL_GCM_GET_TAG, kGcmTagLength, tag); 97 * 128-bit tag at 'tag' and writing plaintext to 'out' (which may be the same location as 'in'). 100 const uint8_t* iv, const uint8_t* tag) { 106 EVP_CIPHER_CTX_ctrl(ctx.get(), EVP_CTRL_GCM_SET_TAG, kGcmTagLength, const_cast<uint8_t*>(tag)); 116 ALOGD("Failed to decrypt blob; ciphertext or tag is likely corrupted"); 67 AES_gcm_encrypt(const uint8_t* in, uint8_t* out, size_t len, const uint8_t* key, const uint8_t* iv, uint8_t* tag) argument 99 AES_gcm_decrypt(const uint8_t* in, uint8_t* out, size_t len, const uint8_t* key, const uint8_t* iv, const uint8_t* tag) argument
|
/system/core/liblog/tests/ |
H A D | liblog_benchmark.cpp | 136 * uint32_t tag 170 buffer.header.tag = 0; 212 * uint32_t tag 245 buffer->payload.header.tag = 0; 286 * uint32_t tag 319 buffer->payload.header.tag = 0; 360 * uint32_t tag 393 buffer->payload.header.tag = 0; 432 * uint32_t tag 465 buffer->payload.header.tag [all...] |
/system/tpm/trunks/ |
H A D | resource_manager.cc | 486 TPM_ST tag; local 487 TPM_RC result = Parse_TPM_ST(&buffer, &tag, nullptr); 491 if (tag != TPM_ST_SESSIONS && tag != TPM_ST_NO_SESSIONS) { 494 command_info->has_sessions = (tag == TPM_ST_SESSIONS); 572 TPM_ST tag; local 573 TPM_RC result = Parse_TPM_ST(&buffer, &tag, nullptr); 577 if (tag != TPM_ST_SESSIONS && tag != TPM_ST_NO_SESSIONS) { 580 response_info->has_sessions = (tag [all...] |
/system/sepolicy/prebuilts/api/26.0/private/ |
H A D | property_contexts | 38 log.tag u:object_r:log_tag_prop:s0 39 log.tag.WifiHAL u:object_r:wifi_log_prop:s0 51 persist.log.tag u:object_r:log_tag_prop:s0
|
/system/sepolicy/private/ |
H A D | property_contexts | 38 log.tag u:object_r:log_tag_prop:s0 39 log.tag.WifiHAL u:object_r:wifi_log_prop:s0 51 persist.log.tag u:object_r:log_tag_prop:s0
|