Searched defs:operation (Results 1 - 14 of 14) sorted by last modified time

/system/tpm/trunks/
H A Dmock_tpm.cc187 const TPM_EO& operation,
191 operation, authorization_delegate, callback);
179 PolicyNV(const TPMI_RH_NV_AUTH& auth_handle, const std::string& auth_handle_name, const TPMI_RH_NV_INDEX& nv_index, const std::string& nv_index_name, const TPMI_SH_POLICY& policy_session, const std::string& policy_session_name, const TPM2B_OPERAND& operand_b, const UINT16& offset, const TPM_EO& operation, AuthorizationDelegate* authorization_delegate, const PolicyNVResponse& callback) argument
H A Dtpm_generated.cc22248 const TPM_EO& operation,
22291 rc = Serialize_TPM_EO(operation, &operation_bytes);
22462 const TPM_EO& operation,
22473 policy_session_name, operand_b, offset, operation, &command,
22490 const TPM_EO& operation,
22496 policy_session_name, operand_b, offset, operation, &command,
22511 const TPM_EO& operation,
22544 rc = Serialize_TPM_EO(operation, &operation_bytes);
22708 const TPM_EO& operation,
22718 policy_session, policy_session_name, operand_b, offset, operation,
22239 SerializeCommand_PolicyNV( const TPMI_RH_NV_AUTH& auth_handle, const std::string& auth_handle_name, const TPMI_RH_NV_INDEX& nv_index, const std::string& nv_index_name, const TPMI_SH_POLICY& policy_session, const std::string& policy_session_name, const TPM2B_OPERAND& operand_b, const UINT16& offset, const TPM_EO& operation, std::string* serialized_command, AuthorizationDelegate* authorization_delegate) argument
22454 PolicyNV(const TPMI_RH_NV_AUTH& auth_handle, const std::string& auth_handle_name, const TPMI_RH_NV_INDEX& nv_index, const std::string& nv_index_name, const TPMI_SH_POLICY& policy_session, const std::string& policy_session_name, const TPM2B_OPERAND& operand_b, const UINT16& offset, const TPM_EO& operation, AuthorizationDelegate* authorization_delegate, const PolicyNVResponse& callback) argument
22482 PolicyNVSync(const TPMI_RH_NV_AUTH& auth_handle, const std::string& auth_handle_name, const TPMI_RH_NV_INDEX& nv_index, const std::string& nv_index_name, const TPMI_SH_POLICY& policy_session, const std::string& policy_session_name, const TPM2B_OPERAND& operand_b, const UINT16& offset, const TPM_EO& operation, AuthorizationDelegate* authorization_delegate) argument
22506 SerializeCommand_PolicyCounterTimer( const TPMI_SH_POLICY& policy_session, const std::string& policy_session_name, const TPM2B_OPERAND& operand_b, const UINT16& offset, const TPM_EO& operation, std::string* serialized_command, AuthorizationDelegate* authorization_delegate) argument
22704 PolicyCounterTimer(const TPMI_SH_POLICY& policy_session, const std::string& policy_session_name, const TPM2B_OPERAND& operand_b, const UINT16& offset, const TPM_EO& operation, AuthorizationDelegate* authorization_delegate, const PolicyCounterTimerResponse& callback) argument
22727 PolicyCounterTimerSync( const TPMI_SH_POLICY& policy_session, const std::string& policy_session_name, const TPM2B_OPERAND& operand_b, const UINT16& offset, const TPM_EO& operation, AuthorizationDelegate* authorization_delegate) argument
[all...]
/system/update_engine/payload_consumer/
H A Ddelta_performer.cc245 // expect an update to have at least one operation, so the expectation is that
298 LOG(ERROR) << "Failed to perform " << op_type_name << " operation "
299 << next_operation_num_ << ", which is the operation "
629 // Check whether we received all of the next operation's data payload.
633 // Validate the operation only if the metadata signature is present.
646 LOG(ERROR) << "Mandatory operation hash check failed";
651 LOG(WARNING) << "Ignoring operation validation errors";
656 // Makes sure we unblock exit when this operation completes.
711 // In major version 2, we don't add dummy operation to the payload.
838 const chromeos_update_engine::InstallOperation& operation) {
837 CanPerformInstallOperation( const chromeos_update_engine::InstallOperation& operation) argument
853 PerformReplaceOperation( const InstallOperation& operation) argument
892 PerformZeroOrDiscardOperation( const InstallOperation& operation) argument
932 PerformMoveOperation(const InstallOperation& operation) argument
983 ValidateSourceHash(const brillo::Blob& calculated_hash, const InstallOperation& operation, const FileDescriptorPtr source_fd, ErrorCode* error) argument
1021 PerformSourceCopyOperation( const InstallOperation& operation, ErrorCode* error) argument
1066 PerformBsdiffOperation(const InstallOperation& operation) argument
1175 PerformSourceBsdiffOperation( const InstallOperation& operation, ErrorCode* error) argument
1296 PerformPuffDiffOperation(const InstallOperation& operation, ErrorCode* error) argument
1335 ExtractSignatureMessageFromOperation( const InstallOperation& operation) argument
1465 ValidateOperationHash( const InstallOperation& operation) argument
[all...]
/system/update_engine/payload_generator/
H A Ddelta_diff_utils.cc342 new_file.name, // operation name
387 "<non-file-data>", // operation name
416 // regardless of the contents since they are already copied and no operation
509 // We split the operation at the extent boundary or when bigger than
524 // The current operation represents the move/copy operation for the
560 InstallOperation operation; local
587 &operation));
589 // Check if the operation writes nothing.
590 if (operation
680 InstallOperation operation; local
[all...]
H A Dinplace_generator.cc170 // make node depend on the copy operation
174 // Set src/dst extents and other proto variables for copy operation
194 // Add an edge from dst to copy operation
357 // converted to a REPLACE or REPLACE_BZ operation. Returns true on success,
465 // copy operation, we can replace all the dest extents w/ the real
563 // Replace the operation with a REPLACE or REPLACE_BZ to generate the same
578 -1, // chunk_blocks, forces to have a single operation.
672 const InstallOperation& operation,
677 TEST_AND_RETURN_FALSE(operation.dst_extents_size() > 0);
683 (field == READER) ? operation
671 AddInstallOpToBlocksVector( const InstallOperation& operation, const Graph& graph, Vertex::Index vertex, vector<Block>* blocks) argument
705 AddInstallOpToGraph(Graph* graph, Vertex::Index existing_vertex, vector<Block>* blocks, const InstallOperation& operation, const string& op_name) argument
[all...]
/system/iot/attestation/atap/libatap/
H A Datap_commands.c23 static AtapOperation operation; variable
125 operation = operation_start[ATAP_HEADER_LEN + 1];
126 if (!validate_operation(operation)) {
305 inner_ca_resp_ptr, inner_ca_resp_len, operation)) {
368 if (operation == ATAP_OPERATION_CERTIFY) {
428 if (operation == ATAP_OPERATION_ISSUE_ENCRYPTED) {
H A Datap_util.c229 bool validate_operation(AtapOperation operation) { argument
230 if (operation != ATAP_OPERATION_CERTIFY &&
231 operation != ATAP_OPERATION_ISSUE &&
232 operation != ATAP_OPERATION_ISSUE_ENCRYPTED) {
272 AtapOperation operation) {
295 /* Product keys (non special purpose) are omitted on certify operation. */
296 if (operation == ATAP_OPERATION_CERTIFY &&
270 validate_inner_ca_response(const uint8_t* buf, uint32_t buf_size, AtapOperation operation) argument
/system/iot/attestation/atap/test/
H A Datap_command_unittest.cpp45 AtapOperation operation);
82 AtapOperation operation) {
104 // Test operation is Issue, no authentication
80 validate_ca_request(const uint8_t* buf, uint32_t buf_size, AtapOperation operation) argument
/system/keymaster/android_keymaster/
H A Dandroid_keymaster.cpp31 #include <keymaster/operation.h>
278 OperationPtr operation(
280 if (operation.get() == NULL) return;
286 operation->set_key_id(key_id);
288 request.purpose, key_id, operation->authorizations(), request.additional_params,
294 response->error = operation->Begin(request.additional_params, &response->output_params);
298 response->op_handle = operation->operation_handle();
299 response->error = operation_table_->Add(move(operation));
308 Operation* operation = operation_table_->Find(request.op_handle); local
309 if (operation
337 Operation* operation = operation_table_->Find(request.op_handle); local
[all...]
H A Doperation_table.cpp18 #include <keymaster/operation.h>
25 keymaster_error_t OperationTable::Add(OperationPtr&& operation) { argument
33 table_[i] = move(operation);
/system/core/libpixelflinger/include/private/pixelflinger/
H A Dggl_context.h284 uint8_t operation; member in struct:android::blend_state_t
/system/bt/stack/btm/
H A Dbtm_ble_multi_adv.cc783 uint8_t operation, uint8_t length, uint8_t* data,
786 GetHciInterface()->SetScanResponseData(inst_id, operation, 0x01, length,
789 GetHciInterface()->SetAdvertisingData(inst_id, operation, 0x01, length,
794 uint8_t /*inst_id*/, uint8_t /* operation */, uint8_t /* length */,
821 uint8_t operation = isFirst ? moreThanOnePacket ? FIRST : COMPLETE local
827 inst_id, operation, length, data.data() + offset,
782 SetDataAdvDataSender(uint8_t is_scan_rsp, uint8_t inst_id, uint8_t operation, uint8_t length, uint8_t* data, MultiAdvCb cb) argument
/system/bt/stack/gatt/
H A Dgatt_int.h318 uint8_t operation; /* one logic channel can have one operation active */ member in struct:tGATT_CLCB
319 uint8_t op_subtype; /* operation subtype */
320 uint8_t status; /* operation status */
H A Dgatt_utils.cc534 if (p_clcb->operation == GATTC_OPTYPE_DISCOVERY &&
593 if (p_clcb->operation == GATTC_OPTYPE_DISCOVERY &&
1180 uint8_t op = p_clcb->operation, disc_type = GATT_DISC_MAX;
1184 uint8_t operation; local
1188 p_clcb->operation, p_clcb->op_subtype);
1191 if (p_cmpl_cb != NULL && p_clcb->operation != 0) {
1192 if (p_clcb->operation == GATTC_OPTYPE_READ) {
1200 if (p_clcb->operation == GATTC_OPTYPE_WRITE) {
1212 if (p_clcb->operation == GATTC_OPTYPE_CONFIG)
1215 if (p_clcb->operation
[all...]

Completed in 409 milliseconds