/system/security/keystore/include/keystore/ |
H A D | KeymasterCertificateChain.h | 28 : chain(std::move(other)) {} 35 hardware::hidl_vec<hardware::hidl_vec<uint8_t>> chain; member in struct:android::security::keymaster::KeymasterCertificateChain
|
/system/tools/hidl/ |
H A D | generateVts.cpp | 81 std::vector<const Interface *> chain = iface->typeChain(); local 87 for (auto it = chain.rbegin(); it != chain.rend(); ++it) {
|
H A D | EnumType.cpp | 43 std::vector<const EnumType*> chain = typeChain(); local 44 for (auto it = chain.rbegin(); it != chain.rend(); ++it) { 193 std::vector<const EnumType*> chain = typeChain(); local 194 for (auto it = chain.begin(); it != chain.end(); ++it) { 251 std::vector<const EnumType*> chain = typeChain(); local 253 for (auto it = chain.rbegin(); it != chain.rend(); ++it) { 471 std::vector<const EnumType*> chain local 556 std::vector<const EnumType*> chain = typeChain(); local 671 std::vector<const EnumType *> chain; local [all...] |
H A D | Interface.cpp | 265 std::vector<const Interface *> chain = typeChain(); 268 for (const Interface *iface : chain) { 276 std::vector<const Interface *> chain = typeChain(); 279 for (size_t i = 0; i < chain.size(); ++i) { 282 out << chain[i]->fullJavaName() << ".kInterfaceName"; 292 Formatter& out, const std::string& prefix, const std::vector<const Interface*>& chain, 294 out.join(chain.begin(), chain.end(), ",\n", [&](const auto& iface) { 320 std::vector<const Interface *> chain = typeChain(); 323 emitDigestChain(out, "(" + digestType->getInternalDataCppType() + ")", chain, 291 emitDigestChain( Formatter& out, const std::string& prefix, const std::vector<const Interface*>& chain, std::function<std::string(std::unique_ptr<ConstantExpression>)> byteToString) const argument 688 std::vector<const Interface *> chain = typeChain(); local [all...] |
/system/extras/simpleperf/ |
H A D | callchain.h | 34 std::vector<EntryT*> chain; member in struct:CallChainNode 66 if (match_length < p->chain.size()) { 110 if (is_same_sample(node->chain.front(), sample)) { 118 NodeT* node, const std::vector<EntryT*>& chain, size_t chain_start, 121 for (i = 0, j = chain_start; i < node->chain.size() && j < chain.size(); 123 if (!is_same_sample(node->chain[i], chain[j])) { 132 parent->chain, parent_length, parent->period, parent->children_period); 136 parent->chain 117 GetMatchingLengthInNode( NodeT* node, const std::vector<EntryT*>& chain, size_t chain_start, std::function<bool(const EntryT*, const EntryT*)> is_same_sample) argument 141 AllocateNode(const std::vector<EntryT*>& chain, size_t chain_start, uint64_t period, uint64_t children_period) argument [all...] |
H A D | CallChainJoiner.cpp | 46 // 1. Build current call chain. 47 std::vector<CacheNode*> chain; local 50 chain.push_back(node); 54 // nodes of current call chain exist in the cache and have the same relation as in current 55 // call chain. If true, we can extend current call chain. 57 if (chain.size() < cache_stat_.matched_node_count_to_extend_callchain) { 60 size_t chain_pos = chain.size() - 2; 62 if (GetParent(chain[chain_pos]) != chain[chain_po [all...] |
/system/iot/attestation/atap/test/ |
H A D | atap_util_unittest.cpp | 55 static void validate_cert_chain(const uint8_t* buf, AtapCertChain* chain) { argument 56 uint32_t chain_size = cert_chain_serialized_size(chain) - sizeof(uint32_t); 59 for (size_t i = 0; i < chain->entry_count; ++i) { 60 validate_blob(&buf[index], &chain->entries[i]); 61 index += sizeof(uint32_t) + chain->entries[i].data_length; 65 static void alloc_test_cert_chain(AtapCertChain* chain) { argument 66 chain->entry_count = 3; 67 for (size_t i = 0; i < chain->entry_count; ++i) { 68 alloc_test_blob(&chain->entries[i]); 129 AtapCertChain chain; local [all...] |
/system/keymaster/tests/ |
H A D | android_keymaster_messages_test.cpp | 587 keymaster_cert_chain_t* chain = &deserialized->certificate_chain; local 589 EXPECT_NE(nullptr, chain->entries); 590 EXPECT_EQ(3U, chain->entry_count); 591 EXPECT_EQ(3U, chain->entries[0].data_length); 592 EXPECT_EQ(0, memcmp("foo", chain->entries[0].data, 3)); 593 EXPECT_EQ(3U, chain->entries[1].data_length); 594 EXPECT_EQ(0, memcmp("bar", chain->entries[1].data, 3)); 595 EXPECT_EQ(3U, chain->entries[2].data_length); 596 EXPECT_EQ(0, memcmp("baz", chain->entries[2].data, 3));
|
H A D | android_keymaster_test.cpp | 3938 static bool verify_chain(const keymaster_cert_chain_t& chain) { argument 3939 for (size_t i = 0; i < chain.entry_count - 1; ++i) { 3940 keymaster_blob_t& key_cert_blob = chain.entries[i]; 3941 keymaster_blob_t& signing_cert_blob = chain.entries[i + 1];
|
/system/keymaster/km_openssl/ |
H A D | attestation_utils.cpp | 92 inline bool certCopier(keymaster_blob_t** out, const keymaster_cert_chain_t& chain, argument 94 for (size_t i = 0; i < chain.entry_count; ++i) { 95 *(*out)++ = certBlobifier(chain.entries[i], fail); 101 inline bool certCopier(keymaster_blob_t** out, keymaster_cert_chain_t&& chain, bool* fail) { argument 102 for (size_t i = 0; i < chain.entry_count; ++i) { 103 *(*out)++ = certBlobifier(std::move(chain.entries[i]), fail); 105 delete[] chain.entries; 106 chain.entries = nullptr; 107 chain.entry_count = 0; 141 * emptyCert, or another keymater_cert_chain_t in which case the certs of the chain ar [all...] |
/system/netd/server/ |
H A D | BandwidthControllerTest.cpp | 286 const std::string chain = "bw_costly_" + iface; local 287 const char* c_chain = chain.c_str(); 305 const std::string chain = "bw_costly_" + iface; local 306 const char* c_chain = chain.c_str(); 343 const std::string chain = "bw_costly_shared"; local 344 const char* c_chain = chain.c_str(); 363 const std::string chain = "bw_costly_shared"; local 364 const char* c_chain = chain.c_str();
|
H A D | FirewallController.cpp | 58 // fw_dozable chain is called from both INPUT and OUTPUT, this includes both packets that we need 129 int FirewallController::enableChildChains(ChildChain chain, bool enable) { argument 132 switch(chain) { 147 return gCtls->trafficCtrl.toggleUidOwnerMap(chain, enable); 198 FirewallType FirewallController::getFirewallType(ChildChain chain) { argument 199 switch(chain) { 213 int FirewallController::setUidRule(ChildChain chain, int uid, FirewallRule rule) { argument 216 FirewallType firewallType = getFirewallType(chain); 228 switch(chain) { 242 ALOGW("Unknown child chain 259 createChain(const char* chain, FirewallType type) argument [all...] |
H A D | TrafficControllerTest.cpp | 165 void checkUidOwnerRuleForChain(ChildChain chain, BpfMap<uint32_t, uint8_t>& targetMap) { argument 167 EXPECT_EQ(0, mTc.changeUidOwnerRule(chain, uid, DENY, BLACKLIST)); 173 EXPECT_EQ(0, mTc.changeUidOwnerRule(chain, uid, ALLOW, WHITELIST)); 178 EXPECT_EQ(0, mTc.changeUidOwnerRule(chain, uid, DENY, WHITELIST)); 184 EXPECT_EQ(0, mTc.changeUidOwnerRule(chain, uid, ALLOW, BLACKLIST)); 190 EXPECT_EQ(-ENOENT, mTc.changeUidOwnerRule(chain, uid, ALLOW, BLACKLIST));
|
H A D | BandwidthController.cpp | 92 * - quota'd rules in the costly chain should be before bw_penalty_box lookups. 96 * - global quota for all costly interfaces uses a single costly chain: 202 * ignore rule in the input chain would actually break the INPUT chain; 361 const std::string& chain, IptJumpOp jumpHandling, 365 StringAppendF(&cmd, "%s %s -m owner --uid-owner %s%s\n", opToString(op), chain.c_str(), 376 constexpr char chain[] = "bw_costly_shared"; local 396 StringPrintf("-I bw_INPUT %d -i %s --jump %s", ruleInsertPos, iface.c_str(), chain), 397 StringPrintf("-I bw_OUTPUT %d -o %s --jump %s", ruleInsertPos, iface.c_str(), chain), 398 StringPrintf("-A bw_FORWARD -i %s --jump %s", iface.c_str(), chain), 360 manipulateSpecialApps(const std::vector<std::string>& appStrUids, const std::string& chain, IptJumpOp jumpHandling, IptOp op) argument 433 constexpr char chain[] = "bw_costly_shared"; local 508 const std::string chain = "bw_costly_" + iface; local 570 const std::string chain = "bw_costly_" + iface; local [all...] |
H A D | TrafficController.cpp | 450 int TrafficController::changeUidOwnerRule(ChildChain chain, uid_t uid, FirewallRule rule, argument 458 switch (chain) { 473 ALOGE("change uid(%u) rule of %d failed: %s, rule: %d, type: %d", uid, chain, 524 ALOGE("unknown chain name: %s", name.c_str()); 528 ALOGE("Failed to clean up chain: %s: %s", name.c_str(), res.msg().c_str()); 534 int TrafficController::toggleUidOwnerMap(ChildChain chain, bool enable) { argument 539 switch (chain) { 553 ALOGE("Failed to toggleUidOwnerMap(%d): %s", chain, res.msg().c_str());
|
/system/security/keystore/ |
H A D | key_store_service.cpp | 1600 ::android::security::keymaster::KeymasterCertificateChain* chain, 1644 if (chain) { 1645 *chain = KeymasterCertificateChain(certChain); 1662 ::android::security::keymaster::KeymasterCertificateChain* chain, 1743 *chain = ::android::security::keymaster::KeymasterCertificateChain(certChain); 1599 attestKey(const String16& name, const KeymasterArguments& params, ::android::security::keymaster::KeymasterCertificateChain* chain, int32_t* aidl_return) argument 1661 attestDeviceIds(const KeymasterArguments& params, ::android::security::keymaster::KeymasterCertificateChain* chain, int32_t* aidl_return) argument
|