Searched defs:chain (Results 1 - 16 of 16) sorted by path

/system/extras/simpleperf/
H A DCallChainJoiner.cpp46 // 1. Build current call chain.
47 std::vector<CacheNode*> chain; local
50 chain.push_back(node);
54 // nodes of current call chain exist in the cache and have the same relation as in current
55 // call chain. If true, we can extend current call chain.
57 if (chain.size() < cache_stat_.matched_node_count_to_extend_callchain) {
60 size_t chain_pos = chain.size() - 2;
62 if (GetParent(chain[chain_pos]) != chain[chain_po
[all...]
H A Dcallchain.h34 std::vector<EntryT*> chain; member in struct:CallChainNode
66 if (match_length < p->chain.size()) {
110 if (is_same_sample(node->chain.front(), sample)) {
118 NodeT* node, const std::vector<EntryT*>& chain, size_t chain_start,
121 for (i = 0, j = chain_start; i < node->chain.size() && j < chain.size();
123 if (!is_same_sample(node->chain[i], chain[j])) {
132 parent->chain, parent_length, parent->period, parent->children_period);
136 parent->chain
117 GetMatchingLengthInNode( NodeT* node, const std::vector<EntryT*>& chain, size_t chain_start, std::function<bool(const EntryT*, const EntryT*)> is_same_sample) argument
141 AllocateNode(const std::vector<EntryT*>& chain, size_t chain_start, uint64_t period, uint64_t children_period) argument
[all...]
/system/iot/attestation/atap/test/
H A Datap_util_unittest.cpp55 static void validate_cert_chain(const uint8_t* buf, AtapCertChain* chain) { argument
56 uint32_t chain_size = cert_chain_serialized_size(chain) - sizeof(uint32_t);
59 for (size_t i = 0; i < chain->entry_count; ++i) {
60 validate_blob(&buf[index], &chain->entries[i]);
61 index += sizeof(uint32_t) + chain->entries[i].data_length;
65 static void alloc_test_cert_chain(AtapCertChain* chain) { argument
66 chain->entry_count = 3;
67 for (size_t i = 0; i < chain->entry_count; ++i) {
68 alloc_test_blob(&chain->entries[i]);
129 AtapCertChain chain; local
[all...]
/system/keymaster/km_openssl/
H A Dattestation_utils.cpp92 inline bool certCopier(keymaster_blob_t** out, const keymaster_cert_chain_t& chain, argument
94 for (size_t i = 0; i < chain.entry_count; ++i) {
95 *(*out)++ = certBlobifier(chain.entries[i], fail);
101 inline bool certCopier(keymaster_blob_t** out, keymaster_cert_chain_t&& chain, bool* fail) { argument
102 for (size_t i = 0; i < chain.entry_count; ++i) {
103 *(*out)++ = certBlobifier(std::move(chain.entries[i]), fail);
105 delete[] chain.entries;
106 chain.entries = nullptr;
107 chain.entry_count = 0;
141 * emptyCert, or another keymater_cert_chain_t in which case the certs of the chain ar
[all...]
/system/keymaster/tests/
H A Dandroid_keymaster_messages_test.cpp587 keymaster_cert_chain_t* chain = &deserialized->certificate_chain; local
589 EXPECT_NE(nullptr, chain->entries);
590 EXPECT_EQ(3U, chain->entry_count);
591 EXPECT_EQ(3U, chain->entries[0].data_length);
592 EXPECT_EQ(0, memcmp("foo", chain->entries[0].data, 3));
593 EXPECT_EQ(3U, chain->entries[1].data_length);
594 EXPECT_EQ(0, memcmp("bar", chain->entries[1].data, 3));
595 EXPECT_EQ(3U, chain->entries[2].data_length);
596 EXPECT_EQ(0, memcmp("baz", chain->entries[2].data, 3));
H A Dandroid_keymaster_test.cpp3938 static bool verify_chain(const keymaster_cert_chain_t& chain) { argument
3939 for (size_t i = 0; i < chain.entry_count - 1; ++i) {
3940 keymaster_blob_t& key_cert_blob = chain.entries[i];
3941 keymaster_blob_t& signing_cert_blob = chain.entries[i + 1];
/system/netd/server/
H A DBandwidthController.cpp92 * - quota'd rules in the costly chain should be before bw_penalty_box lookups.
96 * - global quota for all costly interfaces uses a single costly chain:
202 * ignore rule in the input chain would actually break the INPUT chain;
361 const std::string& chain, IptJumpOp jumpHandling,
365 StringAppendF(&cmd, "%s %s -m owner --uid-owner %s%s\n", opToString(op), chain.c_str(),
376 constexpr char chain[] = "bw_costly_shared"; local
396 StringPrintf("-I bw_INPUT %d -i %s --jump %s", ruleInsertPos, iface.c_str(), chain),
397 StringPrintf("-I bw_OUTPUT %d -o %s --jump %s", ruleInsertPos, iface.c_str(), chain),
398 StringPrintf("-A bw_FORWARD -i %s --jump %s", iface.c_str(), chain),
360 manipulateSpecialApps(const std::vector<std::string>& appStrUids, const std::string& chain, IptJumpOp jumpHandling, IptOp op) argument
433 constexpr char chain[] = "bw_costly_shared"; local
508 const std::string chain = "bw_costly_" + iface; local
570 const std::string chain = "bw_costly_" + iface; local
[all...]
H A DBandwidthControllerTest.cpp286 const std::string chain = "bw_costly_" + iface; local
287 const char* c_chain = chain.c_str();
305 const std::string chain = "bw_costly_" + iface; local
306 const char* c_chain = chain.c_str();
343 const std::string chain = "bw_costly_shared"; local
344 const char* c_chain = chain.c_str();
363 const std::string chain = "bw_costly_shared"; local
364 const char* c_chain = chain.c_str();
H A DFirewallController.cpp58 // fw_dozable chain is called from both INPUT and OUTPUT, this includes both packets that we need
129 int FirewallController::enableChildChains(ChildChain chain, bool enable) { argument
132 switch(chain) {
147 return gCtls->trafficCtrl.toggleUidOwnerMap(chain, enable);
198 FirewallType FirewallController::getFirewallType(ChildChain chain) { argument
199 switch(chain) {
213 int FirewallController::setUidRule(ChildChain chain, int uid, FirewallRule rule) { argument
216 FirewallType firewallType = getFirewallType(chain);
228 switch(chain) {
242 ALOGW("Unknown child chain
259 createChain(const char* chain, FirewallType type) argument
[all...]
H A DTrafficController.cpp450 int TrafficController::changeUidOwnerRule(ChildChain chain, uid_t uid, FirewallRule rule, argument
458 switch (chain) {
473 ALOGE("change uid(%u) rule of %d failed: %s, rule: %d, type: %d", uid, chain,
524 ALOGE("unknown chain name: %s", name.c_str());
528 ALOGE("Failed to clean up chain: %s: %s", name.c_str(), res.msg().c_str());
534 int TrafficController::toggleUidOwnerMap(ChildChain chain, bool enable) { argument
539 switch (chain) {
553 ALOGE("Failed to toggleUidOwnerMap(%d): %s", chain, res.msg().c_str());
H A DTrafficControllerTest.cpp165 void checkUidOwnerRuleForChain(ChildChain chain, BpfMap<uint32_t, uint8_t>& targetMap) { argument
167 EXPECT_EQ(0, mTc.changeUidOwnerRule(chain, uid, DENY, BLACKLIST));
173 EXPECT_EQ(0, mTc.changeUidOwnerRule(chain, uid, ALLOW, WHITELIST));
178 EXPECT_EQ(0, mTc.changeUidOwnerRule(chain, uid, DENY, WHITELIST));
184 EXPECT_EQ(0, mTc.changeUidOwnerRule(chain, uid, ALLOW, BLACKLIST));
190 EXPECT_EQ(-ENOENT, mTc.changeUidOwnerRule(chain, uid, ALLOW, BLACKLIST));
/system/security/keystore/include/keystore/
H A DKeymasterCertificateChain.h28 : chain(std::move(other)) {}
35 hardware::hidl_vec<hardware::hidl_vec<uint8_t>> chain; member in struct:android::security::keymaster::KeymasterCertificateChain
/system/security/keystore/
H A Dkey_store_service.cpp1600 ::android::security::keymaster::KeymasterCertificateChain* chain,
1644 if (chain) {
1645 *chain = KeymasterCertificateChain(certChain);
1662 ::android::security::keymaster::KeymasterCertificateChain* chain,
1743 *chain = ::android::security::keymaster::KeymasterCertificateChain(certChain);
1599 attestKey(const String16& name, const KeymasterArguments& params, ::android::security::keymaster::KeymasterCertificateChain* chain, int32_t* aidl_return) argument
1661 attestDeviceIds(const KeymasterArguments& params, ::android::security::keymaster::KeymasterCertificateChain* chain, int32_t* aidl_return) argument
/system/tools/hidl/
H A DEnumType.cpp43 std::vector<const EnumType*> chain = typeChain(); local
44 for (auto it = chain.rbegin(); it != chain.rend(); ++it) {
193 std::vector<const EnumType*> chain = typeChain(); local
194 for (auto it = chain.begin(); it != chain.end(); ++it) {
251 std::vector<const EnumType*> chain = typeChain(); local
253 for (auto it = chain.rbegin(); it != chain.rend(); ++it) {
471 std::vector<const EnumType*> chain local
556 std::vector<const EnumType*> chain = typeChain(); local
671 std::vector<const EnumType *> chain; local
[all...]
H A DInterface.cpp265 std::vector<const Interface *> chain = typeChain();
268 for (const Interface *iface : chain) {
276 std::vector<const Interface *> chain = typeChain();
279 for (size_t i = 0; i < chain.size(); ++i) {
282 out << chain[i]->fullJavaName() << ".kInterfaceName";
292 Formatter& out, const std::string& prefix, const std::vector<const Interface*>& chain,
294 out.join(chain.begin(), chain.end(), ",\n", [&](const auto& iface) {
320 std::vector<const Interface *> chain = typeChain();
323 emitDigestChain(out, "(" + digestType->getInternalDataCppType() + ")", chain,
291 emitDigestChain( Formatter& out, const std::string& prefix, const std::vector<const Interface*>& chain, std::function<std::string(std::unique_ptr<ConstantExpression>)> byteToString) const argument
688 std::vector<const Interface *> chain = typeChain(); local
[all...]
H A DgenerateVts.cpp81 std::vector<const Interface *> chain = iface->typeChain(); local
87 for (auto it = chain.rbegin(); it != chain.rend(); ++it) {

Completed in 1265 milliseconds