/system/tpm/trunks/ |
H A D | hmac_session_test.cc | 47 HmacAuthorizationDelegate* GetHmacDelegate(HmacSessionImpl* session) { argument 48 return &(session->hmac_delegate_); 58 HmacSessionImpl session(factory_); 61 EXPECT_EQ(nullptr, session.GetDelegate()); 65 HmacSessionImpl session(factory_); 66 EXPECT_EQ(GetHmacDelegate(&session), session.GetDelegate()); 70 HmacSessionImpl session(factory_); 75 EXPECT_EQ(TPM_RC_SUCCESS, session.StartBoundSession(bind_entity, "", true)); 79 HmacSessionImpl session(factory [all...] |
H A D | policy_session_test.cc | 47 HmacAuthorizationDelegate* GetHmacDelegate(PolicySessionImpl* session) { argument 48 return &(session->hmac_delegate_); 58 PolicySessionImpl session(factory_); 61 EXPECT_EQ(nullptr, session.GetDelegate()); 65 PolicySessionImpl session(factory_); 66 EXPECT_EQ(GetHmacDelegate(&session), session.GetDelegate()); 70 PolicySessionImpl session(factory_); 72 session.StartBoundSession(TPM_RH_FIRST, "auth", true)); 76 PolicySessionImpl session(factory [all...] |
H A D | trunks_client_test.cc | 74 std::unique_ptr<HmacSession> session = factory_.GetHmacSession(); local 75 if (utility->StartSession(session.get()) != TPM_RC_SUCCESS) { 76 LOG(ERROR) << "Error starting hmac session."; 82 TPM_RC result = utility->StirRandom(entropy_data, session->GetDelegate()); 88 utility->GenerateRandom(num_bytes, session->GetDelegate(), &random_data); 103 std::unique_ptr<HmacSession> session = factory_.GetHmacSession(); local 104 if (utility->StartSession(session.get()) != TPM_RC_SUCCESS) { 105 LOG(ERROR) << "Error starting hmac session."; 113 kNoCreationPCR, session->GetDelegate(), &key_blob, nullptr); 119 result = utility->LoadKey(key_blob, session 144 std::unique_ptr<HmacSession> session = factory_.GetHmacSession(); local 171 std::unique_ptr<HmacSession> session = factory_.GetHmacSession(); local 201 std::unique_ptr<HmacSession> session = factory_.GetHmacSession(); local 242 std::unique_ptr<HmacSession> session = factory_.GetHmacSession(); local 297 std::unique_ptr<HmacSession> session = factory_.GetHmacSession(); local 363 std::unique_ptr<HmacSession> session = factory_.GetHmacSession(); local 819 std::unique_ptr<HmacSession> session = factory_.GetHmacSession(); local 988 PerformRSAEncrpytAndDecrpyt( TPM_HANDLE key_handle, const std::string& key_authorization, HmacSession* session) argument [all...] |
H A D | trunks_client_test.h | 106 // TODO(usanghi): Remove |session| argument once we can support multiple 110 HmacSession* session);
|
H A D | tpm_utility_impl.cc | 274 std::unique_ptr<HmacSession> session = factory_.GetHmacSession(); local 275 result = session->StartUnboundSession(true); 283 session->SetEntityAuthorizationValue(""); 284 session->SetFutureAuthorizationValue(endorsement_password); 287 session->GetDelegate()); 293 session->SetFutureAuthorizationValue(lockout_password); 296 session->GetDelegate()); 303 session->SetEntityAuthorizationValue(kWellKnownPassword); 304 session->SetFutureAuthorizationValue(owner_password); 306 session 1096 StartSession(HmacSession* session) argument 1111 std::unique_ptr<PolicySession> session = factory_.GetTrialSession(); local [all...] |
H A D | tpm_utility.h | 240 virtual TPM_RC StartSession(HmacSession* session) = 0; 242 // This method uses a trial session to compute the |policy_digest| when
|
H A D | tpm_utility_impl.h | 119 TPM_RC StartSession(HmacSession* session) override;
|
H A D | trunks_factory_for_test.cc | 270 TPM_RC StartSession(HmacSession* session) override { 271 return target_->StartSession(session);
|
/system/netd/server/dns/ |
H A D | DnsTlsSessionCache.cpp | 40 int DnsTlsSessionCache::newSessionCallback(SSL* ssl, SSL_SESSION* session) { argument 41 if (!ssl || !session) { 42 ALOGE("Null SSL object in new session callback"); 48 ALOGE("null transport in new session callback"); 51 ALOGV("Recording session"); 52 cache->recordSession(session); 53 return 1; // Increment the refcount of session. 56 void DnsTlsSessionCache::recordSession(SSL_SESSION* session) { argument 58 mSessions.emplace_front(session);
|
H A D | DnsTlsSessionCache.h | 33 // Cache of recently seen SSL_SESSIONs. This is used to support session tickets. 37 // Prepare SSL objects to use this session cache. These methods must be called 42 // Get the most recently discovered session. For TLS 1.3 compatibility and 43 // maximum privacy, each session will only be returned once, so the caller 44 // gains ownership of the session. (Here and throughout, 51 static int newSessionCallback(SSL* _Nullable ssl, SSL_SESSION* _Nullable session); 54 void recordSession(SSL_SESSION* _Nullable session) EXCLUDES(mLock);
|
H A D | DnsTlsSocket.cpp | 157 // Enable session cache 218 bssl::UniquePtr<SSL_SESSION> session = mCache->getSession(); local 219 if (session) { 220 ALOGV("Setting session"); 221 SSL_set_session(ssl.get(), session.get()); 223 ALOGV("No session available"); 252 // TODO: Call SSL_shutdown before discarding the session if validation fails.
|
/system/core/trusty/storage/lib/include/trusty/lib/ |
H A D | storage.h | 41 * storage_open_session() - Opens a storage session. 43 * @session_p: pointer to location in which to store session handle 51 * storage_close_session() - Closes the session. 52 * @session: the session to close 54 void storage_close_session(storage_session_t session); 58 * @session: the storage_session_t returned from a call to storage_open_session 76 int storage_open_file(storage_session_t session, file_handle_t *handle_p, 87 * @session: the storage_session_t returned from a call to storage_open_session 93 int storage_delete_file(storage_session_t session, cons [all...] |
/system/tpm/attestation/server/ |
H A D | pkcs11_key_store.cc | 55 // A helper class to scope a PKCS #11 session. 67 LOG(ERROR) << "Failed to open PKCS #11 session."; 74 LOG(WARNING) << "Failed to close PKCS #11 session."; 102 ScopedSession session(slot); 103 if (!session.IsValid()) { 104 LOG(ERROR) << "Pkcs11KeyStore: Failed to open token session."; 107 CK_OBJECT_HANDLE key_handle = FindObject(session.handle(), key_name); 114 if (C_GetAttributeValue(session.handle(), key_handle, &attribute, 1) != 121 if (C_GetAttributeValue(session.handle(), key_handle, &attribute, 1) != 142 ScopedSession session(slo [all...] |
/system/core/trusty/storage/lib/ |
H A D | storage.c | 104 static ssize_t send_reqv(storage_session_t session, argument 110 rc = writev(session, tx_iovs, tx_iovcnt); 117 rc = readv(session, rx_iovs, rx_iovcnt); 137 void storage_close_session(storage_session_t session) argument 139 tipc_close(session); 143 int storage_open_file(storage_session_t session, file_handle_t *handle_p, const char *name, argument 152 ssize_t rc = send_reqv(session, tx, 3, rx, 2); 162 *handle_p = make_file_handle(session, rsp.handle); 180 int storage_delete_file(storage_session_t session, const char *name, uint32_t opflags) argument 187 ssize_t rc = send_reqv(session, t 301 storage_end_transaction(storage_session_t session, bool complete) argument [all...] |
/system/bt/osi/test/ |
H A D | metrics_test.cc | 115 A2DPSession* session = new A2DPSession(); local 116 session->set_media_timer_min_millis(metrics.media_timer_min_ms); 117 session->set_media_timer_max_millis(metrics.media_timer_max_ms); 118 session->set_media_timer_avg_millis(metrics.media_timer_avg_ms); 119 session->set_buffer_overruns_max_count(metrics.buffer_overruns_max_count); 120 session->set_buffer_overruns_total(metrics.buffer_overruns_total); 121 session->set_buffer_underruns_average(metrics.buffer_underruns_average); 122 session->set_buffer_underruns_count(metrics.buffer_underruns_count); 123 session->set_audio_duration_millis(metrics.audio_duration_ms); 124 return session; 133 BluetoothSession* session = new BluetoothSession(); local 566 A2DPSession* session = MakeA2DPSession(metrics_sum); local 624 A2DPSession* session = MakeA2DPSession(metrics1); local 706 A2DPSession* session = MakeA2DPSession(metrics_sum); local 788 A2DPSession* session = MakeA2DPSession(metrics_sum); local [all...] |
/system/bt/binder/android/bluetooth/ |
H A D | IBluetoothAvrcpController.aidl | 22 import android.media.session.PlaybackState;
|
/system/tpm/tpm_manager/server/ |
H A D | tpm2_nvram_impl.h | 80 // Configures a new policy |session| for a given |policy_record|, 85 trunks::PolicySession* session); 87 // A helper to add policies to a |session| for a particular |command_code| and 91 trunks::PolicySession* session); 93 // A helper to add an OR policy to |session| based on |policy_record|. Returns 96 trunks::PolicySession* session);
|
H A D | tpm2_initializer_impl.cc | 153 std::unique_ptr<trunks::HmacSession> session = local 155 TPM_RC result = session->StartUnboundSession(false); 161 session->SetEntityAuthorizationValue(local_data.lockout_password()); 165 tpm_utility->ResetDictionaryAttackLock(session->GetDelegate());
|
H A D | tpm2_nvram_impl.cc | 473 LOG(ERROR) << "Error starting a default authorization session: " 504 trunks::PolicySession* session) { 505 TPM_RC result = session->StartUnboundSession(true /* enable_encryption */); 507 LOG(ERROR) << "Error starting a policy authorization session: " 511 session->SetEntityAuthorizationValue(authorization_value); 512 if (!AddPoliciesForCommand(policy_record, command_code, session)) { 515 if (!AddPolicyOR(policy_record, session)) { 524 trunks::PolicySession* session) { 525 TPM_RC result = session->PolicyCommandCode(command_code); 537 result = session 500 SetupPolicySession( const NvramPolicyRecord& policy_record, const std::string& authorization_value, trunks::TPM_CC command_code, trunks::PolicySession* session) argument 521 AddPoliciesForCommand( const NvramPolicyRecord& policy_record, trunks::TPM_CC command_code, trunks::PolicySession* session) argument 559 AddPolicyOR( const NvramPolicyRecord& policy_record, trunks::PolicySession* session) argument [all...] |
/system/bt/proto/bluetooth/metrics/ |
H A D | bluetooth.proto | 29 repeated BluetoothSession session = 1; 98 // A metrics dump takes a snapshot of current Bluetooth session and thus 106 // Duration of the session. 118 // The information about the RFComm session. 121 // The information about the A2DP audio session. 136 // Session information that gets logged for A2DP session. 159 // Total audio time in this A2DP session
|
/system/chre/core/ |
H A D | gnss_manager.cc | 89 GnssSession *session; member in struct:chre::CallbackState 94 LOGE("Failed to allocate callback state for GNSS session state change"); 98 cbState->session = this; 102 state->session->handleStatusChangeSync(state->enabled, state->errorCode); 164 LOGE("Failed to enable a GNSS session for nanoapp instance %" PRIu32, 169 CHRE_ASSERT_LOG(false, "Invalid GNSS session configuration"); 203 LOGW("Too many session state transitions"); 232 // An effective rate decrease for the session can only occur if the nanoapp 265 LOGW("Failed to update GNSS session request list for non-existent nanoapp"); 275 // The GNSS session wa [all...] |
/system/media/audio/include/system/ |
H A D | audio.h | 411 * audio session */ 413 audio_session_t session; /* audio session */ member in struct:audio_port_config_session_ext 430 struct audio_port_config_session_ext session; /* session specific info */ member in union:audio_port_config::__anon2011 459 /* extension for audio port structure when the audio port is an audio session */ 461 audio_session_t session; /* audio session */ member in struct:audio_port_session_ext 481 struct audio_port_session_ext session; member in union:audio_port::__anon2012
|
/system/extras/power_profile/camera_avg/Application/src/main/java/com/example/android/powerprofile/cameraavg/ |
H A D | CameraAvgFragment.java | 337 public void onCaptureProgressed(@NonNull CameraCaptureSession session, 344 public void onCaptureCompleted(@NonNull CameraCaptureSession session, 714 // When the session is ready, we start displaying the preview. 847 public void onCaptureCompleted(@NonNull CameraCaptureSession session,
|