/system/tpm/trunks/ |
H A D | mock_tpm.cc | 187 const TPM_EO& operation, 191 operation, authorization_delegate, callback); 179 PolicyNV(const TPMI_RH_NV_AUTH& auth_handle, const std::string& auth_handle_name, const TPMI_RH_NV_INDEX& nv_index, const std::string& nv_index_name, const TPMI_SH_POLICY& policy_session, const std::string& policy_session_name, const TPM2B_OPERAND& operand_b, const UINT16& offset, const TPM_EO& operation, AuthorizationDelegate* authorization_delegate, const PolicyNVResponse& callback) argument
|
H A D | tpm_generated.cc | 22248 const TPM_EO& operation, 22291 rc = Serialize_TPM_EO(operation, &operation_bytes); 22462 const TPM_EO& operation, 22473 policy_session_name, operand_b, offset, operation, &command, 22490 const TPM_EO& operation, 22496 policy_session_name, operand_b, offset, operation, &command, 22511 const TPM_EO& operation, 22544 rc = Serialize_TPM_EO(operation, &operation_bytes); 22708 const TPM_EO& operation, 22718 policy_session, policy_session_name, operand_b, offset, operation, 22239 SerializeCommand_PolicyNV( const TPMI_RH_NV_AUTH& auth_handle, const std::string& auth_handle_name, const TPMI_RH_NV_INDEX& nv_index, const std::string& nv_index_name, const TPMI_SH_POLICY& policy_session, const std::string& policy_session_name, const TPM2B_OPERAND& operand_b, const UINT16& offset, const TPM_EO& operation, std::string* serialized_command, AuthorizationDelegate* authorization_delegate) argument 22454 PolicyNV(const TPMI_RH_NV_AUTH& auth_handle, const std::string& auth_handle_name, const TPMI_RH_NV_INDEX& nv_index, const std::string& nv_index_name, const TPMI_SH_POLICY& policy_session, const std::string& policy_session_name, const TPM2B_OPERAND& operand_b, const UINT16& offset, const TPM_EO& operation, AuthorizationDelegate* authorization_delegate, const PolicyNVResponse& callback) argument 22482 PolicyNVSync(const TPMI_RH_NV_AUTH& auth_handle, const std::string& auth_handle_name, const TPMI_RH_NV_INDEX& nv_index, const std::string& nv_index_name, const TPMI_SH_POLICY& policy_session, const std::string& policy_session_name, const TPM2B_OPERAND& operand_b, const UINT16& offset, const TPM_EO& operation, AuthorizationDelegate* authorization_delegate) argument 22506 SerializeCommand_PolicyCounterTimer( const TPMI_SH_POLICY& policy_session, const std::string& policy_session_name, const TPM2B_OPERAND& operand_b, const UINT16& offset, const TPM_EO& operation, std::string* serialized_command, AuthorizationDelegate* authorization_delegate) argument 22704 PolicyCounterTimer(const TPMI_SH_POLICY& policy_session, const std::string& policy_session_name, const TPM2B_OPERAND& operand_b, const UINT16& offset, const TPM_EO& operation, AuthorizationDelegate* authorization_delegate, const PolicyCounterTimerResponse& callback) argument 22727 PolicyCounterTimerSync( const TPMI_SH_POLICY& policy_session, const std::string& policy_session_name, const TPM2B_OPERAND& operand_b, const UINT16& offset, const TPM_EO& operation, AuthorizationDelegate* authorization_delegate) argument [all...] |
/system/update_engine/payload_consumer/ |
H A D | delta_performer.cc | 245 // expect an update to have at least one operation, so the expectation is that 298 LOG(ERROR) << "Failed to perform " << op_type_name << " operation " 299 << next_operation_num_ << ", which is the operation " 629 // Check whether we received all of the next operation's data payload. 633 // Validate the operation only if the metadata signature is present. 646 LOG(ERROR) << "Mandatory operation hash check failed"; 651 LOG(WARNING) << "Ignoring operation validation errors"; 656 // Makes sure we unblock exit when this operation completes. 711 // In major version 2, we don't add dummy operation to the payload. 838 const chromeos_update_engine::InstallOperation& operation) { 837 CanPerformInstallOperation( const chromeos_update_engine::InstallOperation& operation) argument 853 PerformReplaceOperation( const InstallOperation& operation) argument 892 PerformZeroOrDiscardOperation( const InstallOperation& operation) argument 932 PerformMoveOperation(const InstallOperation& operation) argument 983 ValidateSourceHash(const brillo::Blob& calculated_hash, const InstallOperation& operation, const FileDescriptorPtr source_fd, ErrorCode* error) argument 1021 PerformSourceCopyOperation( const InstallOperation& operation, ErrorCode* error) argument 1066 PerformBsdiffOperation(const InstallOperation& operation) argument 1175 PerformSourceBsdiffOperation( const InstallOperation& operation, ErrorCode* error) argument 1296 PerformPuffDiffOperation(const InstallOperation& operation, ErrorCode* error) argument 1335 ExtractSignatureMessageFromOperation( const InstallOperation& operation) argument 1465 ValidateOperationHash( const InstallOperation& operation) argument [all...] |
/system/update_engine/payload_generator/ |
H A D | delta_diff_utils.cc | 342 new_file.name, // operation name 387 "<non-file-data>", // operation name 416 // regardless of the contents since they are already copied and no operation 509 // We split the operation at the extent boundary or when bigger than 524 // The current operation represents the move/copy operation for the 560 InstallOperation operation; local 587 &operation)); 589 // Check if the operation writes nothing. 590 if (operation 680 InstallOperation operation; local [all...] |
H A D | inplace_generator.cc | 170 // make node depend on the copy operation 174 // Set src/dst extents and other proto variables for copy operation 194 // Add an edge from dst to copy operation 357 // converted to a REPLACE or REPLACE_BZ operation. Returns true on success, 465 // copy operation, we can replace all the dest extents w/ the real 563 // Replace the operation with a REPLACE or REPLACE_BZ to generate the same 578 -1, // chunk_blocks, forces to have a single operation. 672 const InstallOperation& operation, 677 TEST_AND_RETURN_FALSE(operation.dst_extents_size() > 0); 683 (field == READER) ? operation 671 AddInstallOpToBlocksVector( const InstallOperation& operation, const Graph& graph, Vertex::Index vertex, vector<Block>* blocks) argument 705 AddInstallOpToGraph(Graph* graph, Vertex::Index existing_vertex, vector<Block>* blocks, const InstallOperation& operation, const string& op_name) argument [all...] |
/system/iot/attestation/atap/libatap/ |
H A D | atap_commands.c | 23 static AtapOperation operation; variable 125 operation = operation_start[ATAP_HEADER_LEN + 1]; 126 if (!validate_operation(operation)) { 305 inner_ca_resp_ptr, inner_ca_resp_len, operation)) { 368 if (operation == ATAP_OPERATION_CERTIFY) { 428 if (operation == ATAP_OPERATION_ISSUE_ENCRYPTED) {
|
H A D | atap_util.c | 229 bool validate_operation(AtapOperation operation) { argument 230 if (operation != ATAP_OPERATION_CERTIFY && 231 operation != ATAP_OPERATION_ISSUE && 232 operation != ATAP_OPERATION_ISSUE_ENCRYPTED) { 272 AtapOperation operation) { 295 /* Product keys (non special purpose) are omitted on certify operation. */ 296 if (operation == ATAP_OPERATION_CERTIFY && 270 validate_inner_ca_response(const uint8_t* buf, uint32_t buf_size, AtapOperation operation) argument
|
/system/iot/attestation/atap/test/ |
H A D | atap_command_unittest.cpp | 45 AtapOperation operation); 82 AtapOperation operation) { 104 // Test operation is Issue, no authentication 80 validate_ca_request(const uint8_t* buf, uint32_t buf_size, AtapOperation operation) argument
|
/system/keymaster/android_keymaster/ |
H A D | android_keymaster.cpp | 31 #include <keymaster/operation.h> 278 OperationPtr operation( 280 if (operation.get() == NULL) return; 286 operation->set_key_id(key_id); 288 request.purpose, key_id, operation->authorizations(), request.additional_params, 294 response->error = operation->Begin(request.additional_params, &response->output_params); 298 response->op_handle = operation->operation_handle(); 299 response->error = operation_table_->Add(move(operation)); 308 Operation* operation = operation_table_->Find(request.op_handle); local 309 if (operation 337 Operation* operation = operation_table_->Find(request.op_handle); local [all...] |
H A D | operation_table.cpp | 18 #include <keymaster/operation.h> 25 keymaster_error_t OperationTable::Add(OperationPtr&& operation) { argument 33 table_[i] = move(operation);
|
/system/core/libpixelflinger/include/private/pixelflinger/ |
H A D | ggl_context.h | 284 uint8_t operation; member in struct:android::blend_state_t
|
/system/bt/stack/btm/ |
H A D | btm_ble_multi_adv.cc | 783 uint8_t operation, uint8_t length, uint8_t* data, 786 GetHciInterface()->SetScanResponseData(inst_id, operation, 0x01, length, 789 GetHciInterface()->SetAdvertisingData(inst_id, operation, 0x01, length, 794 uint8_t /*inst_id*/, uint8_t /* operation */, uint8_t /* length */, 821 uint8_t operation = isFirst ? moreThanOnePacket ? FIRST : COMPLETE local 827 inst_id, operation, length, data.data() + offset, 782 SetDataAdvDataSender(uint8_t is_scan_rsp, uint8_t inst_id, uint8_t operation, uint8_t length, uint8_t* data, MultiAdvCb cb) argument
|
/system/bt/stack/gatt/ |
H A D | gatt_int.h | 318 uint8_t operation; /* one logic channel can have one operation active */ member in struct:tGATT_CLCB 319 uint8_t op_subtype; /* operation subtype */ 320 uint8_t status; /* operation status */
|
H A D | gatt_utils.cc | 534 if (p_clcb->operation == GATTC_OPTYPE_DISCOVERY && 593 if (p_clcb->operation == GATTC_OPTYPE_DISCOVERY && 1180 uint8_t op = p_clcb->operation, disc_type = GATT_DISC_MAX; 1184 uint8_t operation; local 1188 p_clcb->operation, p_clcb->op_subtype); 1191 if (p_cmpl_cb != NULL && p_clcb->operation != 0) { 1192 if (p_clcb->operation == GATTC_OPTYPE_READ) { 1200 if (p_clcb->operation == GATTC_OPTYPE_WRITE) { 1212 if (p_clcb->operation == GATTC_OPTYPE_CONFIG) 1215 if (p_clcb->operation [all...] |