Home
last modified time | relevance | path

Searched refs:ec (Results 1 – 25 of 230) sorted by relevance

12345678910

/system/bt/stack/smp/
Dp_256_curvepara.cc29 elliptic_curve_t* ec = &curve_p256; in p_256_init_curve() local
31 ec->p[7] = 0xFFFFFFFF; in p_256_init_curve()
32 ec->p[6] = 0x00000001; in p_256_init_curve()
33 ec->p[5] = 0x0; in p_256_init_curve()
34 ec->p[4] = 0x0; in p_256_init_curve()
35 ec->p[3] = 0x0; in p_256_init_curve()
36 ec->p[2] = 0xFFFFFFFF; in p_256_init_curve()
37 ec->p[1] = 0xFFFFFFFF; in p_256_init_curve()
38 ec->p[0] = 0xFFFFFFFF; in p_256_init_curve()
40 memset(ec->omega, 0, KEY_LENGTH_DWORDS_P256); in p_256_init_curve()
[all …]
/system/apex/apexd/
Dapexd_utils.h93 std::error_code ec; in WalkDir() local
94 auto it = fs::directory_iterator(path, ec); in WalkDir()
96 while (!ec && it != end) { in WalkDir()
98 it.increment(ec); in WalkDir()
100 if (ec) { in WalkDir()
102 << "Can't open " << path << " for reading : " << ec.message(); in WalkDir()
164 std::error_code ec; in DeleteDirContent() local
165 std::filesystem::remove_all(file, ec); in DeleteDirContent()
166 if (ec) { in DeleteDirContent()
168 << "Failed to delete path " << file << " : " << ec.message(); in DeleteDirContent()
[all …]
Dflattened_apex_test.cpp45 std::error_code ec; in TEST() local
46 bool is_dir = entry.is_directory(ec); in TEST()
47 ASSERT_FALSE(ec) << ec.message(); in TEST()
Dapex_shim.cpp120 std::error_code ec; in ValidateShimApex() local
126 auto iter = fs::recursive_directory_iterator(mount_point, ec); in ValidateShimApex()
135 fs::file_status status = iter->status(ec); in ValidateShimApex()
156 iter = iter.increment(ec); in ValidateShimApex()
157 if (ec) { in ValidateShimApex()
159 << ec.message(); in ValidateShimApex()
/system/update_engine/update_manager/
Denterprise_device_policy_impl.cc28 EvaluationContext* ec, in UpdateCheckAllowed() argument
36 ec->GetValue(dp_provider->var_device_policy_is_loaded()); in UpdateCheckAllowed()
42 ec->GetValue(dp_provider->var_update_disabled()); in UpdateCheckAllowed()
46 const bool* allow_kiosk_app_control_chrome_version_p = ec->GetValue( in UpdateCheckAllowed()
62 ec->GetValue(system_provider->var_kiosk_required_platform_version()); in UpdateCheckAllowed()
71 ec->GetValue(dp_provider->var_device_minimum_version()); in UpdateCheckAllowed()
73 ec->GetValue(system_provider->var_chromeos_version())); in UpdateCheckAllowed()
101 ec->GetValue(dp_provider->var_target_version_prefix()); in UpdateCheckAllowed()
109 ec->GetValue(dp_provider->var_rollback_to_target_version()); in UpdateCheckAllowed()
140 ec->GetValue(dp_provider->var_rollback_allowed_milestones()); in UpdateCheckAllowed()
[all …]
Dupdate_manager-inl.h33 EvaluationContext* ec, in EvaluatePolicy() argument
42 if (ec->is_expired()) { in EvaluatePolicy()
44 << ec->DumpContext(); in EvaluatePolicy()
45 ec->ResetExpiration(); in EvaluatePolicy()
49 ec->ResetEvaluation(); in EvaluatePolicy()
56 ec, state_.get(), &error, result, args...); in EvaluatePolicy()
60 << "\nEvaluation context: " << ec->DumpContext(); in EvaluatePolicy()
63 ec, state_.get(), &error, result, args...); in EvaluatePolicy()
78 std::shared_ptr<EvaluationContext> ec, in OnPolicyReadyToEvaluate() argument
85 EvalStatus status = EvaluatePolicy(ec.get(), policy_method, &result, args...); in OnPolicyReadyToEvaluate()
[all …]
Dnext_update_check_policy_impl.cc35 EvaluationContext* ec, in UpdateCheckAllowed() argument
43 ec, state, error, &next_update_check, policy_constants_) != in UpdateCheckAllowed()
47 if (!ec->IsWallclockTimeGreaterThan(next_update_check)) { in UpdateCheckAllowed()
57 EvaluationContext* ec, in NextUpdateCheckTime() argument
72 ec->GetValue(updater_provider->var_updater_started_time()); in NextUpdateCheckTime()
78 ec->GetValue(updater_provider->var_test_update_check_interval_timeout()); in NextUpdateCheckTime()
81 ec->GetValue(updater_provider->var_last_checked_time()); in NextUpdateCheckTime()
83 const auto* seed = ec->GetValue(state->random_provider()->var_seed()); in NextUpdateCheckTime()
109 ec->GetValue(updater_provider->var_server_dictated_poll_interval()); in NextUpdateCheckTime()
120 ec->GetValue(updater_provider->var_consecutive_failed_update_checks()); in NextUpdateCheckTime()
Dinteractive_update_policy_impl.cc26 EvaluationContext* ec, in UpdateCheckAllowed() argument
32 ec, state->updater_provider(), &interactive)) { in UpdateCheckAllowed()
43 EvaluationContext* ec, in UpdateCanBeApplied() argument
50 ec, state->updater_provider(), &interactive)) { in UpdateCanBeApplied()
61 EvaluationContext* ec, in CheckInteractiveUpdateRequested() argument
66 ec->GetValue(updater_provider->var_forced_update_requested()); in CheckInteractiveUpdateRequested()
Dupdate_time_restrictions_policy_impl.cc35 EvaluationContext* ec, in UpdateCanBeApplied() argument
44 if (!ec->GetValue(dp_provider->var_auto_launched_kiosk_app_id())) in UpdateCanBeApplied()
47 const Time* curr_date = ec->GetValue(time_provider->var_curr_date()); in UpdateCanBeApplied()
48 const int* curr_hour = ec->GetValue(time_provider->var_curr_hour()); in UpdateCanBeApplied()
49 const int* curr_minute = ec->GetValue(time_provider->var_curr_minute()); in UpdateCanBeApplied()
60 ec->GetValue(dp_provider->var_disallowed_time_intervals()); in UpdateCanBeApplied()
Dpolicy_utils.h49 EvaluationContext* ec, in ConsultPolicies() argument
56 (policy->*policy_method)(ec, state, error, result, args...); in ConsultPolicies()
71 EvalStatus UpdateCheckAllowed(EvaluationContext* ec, in UpdateCheckAllowed() argument
79 EvaluationContext* ec, in UpdateCanBeApplied() argument
87 EvalStatus UpdateCanStart(EvaluationContext* ec, in UpdateCanStart() argument
95 EvalStatus P2PEnabled(EvaluationContext* ec, in P2PEnabled() argument
102 EvalStatus P2PEnabledChanged(EvaluationContext* ec, in P2PEnabledChanged() argument
Dchromeos_policy.cc213 EvalStatus ChromeOSPolicy::UpdateCheckAllowed(EvaluationContext* ec, in UpdateCheckAllowed() argument
264 ec, in UpdateCheckAllowed()
277 EvalStatus ChromeOSPolicy::UpdateCanBeApplied(EvaluationContext* ec, in UpdateCanBeApplied() argument
296 ec, in UpdateCanBeApplied()
312 EvaluationContext* ec, in UpdateCanStart() argument
336 EvalStatus check_status = UpdateCheckAllowed(ec, state, error, &check_result); in UpdateCanStart()
347 ec, state, error, &backoff_url_result, update_state); in UpdateCanStart()
363 ec->GetValue(dp_provider->var_device_policy_is_loaded()); in UpdateCanStart()
378 ec->GetValue(state->config_provider()->var_is_oobe_enabled()); in UpdateCanStart()
383 ec->GetValue(state->system_provider()->var_is_oobe_complete()); in UpdateCanStart()
[all …]
Dchromeos_policy.h57 EvalStatus UpdateCheckAllowed(EvaluationContext* ec,
63 EvaluationContext* ec,
69 EvalStatus UpdateCanStart(EvaluationContext* ec,
75 EvalStatus P2PEnabled(EvaluationContext* ec,
80 EvalStatus P2PEnabledChanged(EvaluationContext* ec,
146 EvaluationContext* ec,
164 EvalStatus UpdateScattering(EvaluationContext* ec,
Dupdate_manager.cc35 for (auto& ec : ec_repo_) in ~UpdateManager() local
36 ec->RemoveObserversAndTimeout(); in ~UpdateManager()
46 void UpdateManager::UnregisterEvalContext(EvaluationContext* ec) { in UnregisterEvalContext() argument
51 std::shared_ptr<EvaluationContext>(ec, [](EvaluationContext*) {}))) { in UnregisterEvalContext()
Ddefault_policy.cc36 EvalStatus DefaultPolicy::UpdateCheckAllowed(EvaluationContext* ec, in UpdateCheckAllowed() argument
53 ec->IsMonotonicTimeGreaterThan( in UpdateCheckAllowed()
64 EvalStatus DefaultPolicy::UpdateCanBeApplied(EvaluationContext* ec, in UpdateCanBeApplied() argument
73 EvalStatus DefaultPolicy::UpdateCanStart(EvaluationContext* ec, in UpdateCanStart() argument
92 EvalStatus DefaultPolicy::P2PEnabled(EvaluationContext* ec, in P2PEnabled() argument
100 EvalStatus DefaultPolicy::P2PEnabledChanged(EvaluationContext* ec, in P2PEnabledChanged() argument
Ddefault_policy.h66 EvalStatus UpdateCheckAllowed(EvaluationContext* ec,
72 EvaluationContext* ec,
78 EvalStatus UpdateCanStart(EvaluationContext* ec,
84 EvalStatus P2PEnabled(EvaluationContext* ec,
89 EvalStatus P2PEnabledChanged(EvaluationContext* ec,
Dout_of_box_experience_policy_impl.cc23 EvalStatus OobePolicyImpl::UpdateCheckAllowed(EvaluationContext* ec, in UpdateCheckAllowed() argument
31 ec->GetValue(state->config_provider()->var_is_oobe_enabled()); in UpdateCheckAllowed()
34 ec->GetValue(system_provider->var_is_oobe_complete()); in UpdateCheckAllowed()
Dofficial_build_check_policy_impl.cc23 EvaluationContext* ec, in UpdateCheckAllowed() argument
28 ec->GetValue(state->system_provider()->var_is_official_build()); in UpdateCheckAllowed()
30 const int64_t* interval_timeout_p = ec->GetValue( in UpdateCheckAllowed()
Dinteractive_update_policy_impl.h35 EvalStatus UpdateCheckAllowed(EvaluationContext* ec,
41 EvaluationContext* ec,
57 bool CheckInteractiveUpdateRequested(EvaluationContext* ec,
Dminimum_version_policy_impl.cc27 EvaluationContext* ec, in UpdateCanBeApplied() argument
33 ec->GetValue(state->system_provider()->var_chromeos_version())); in UpdateCanBeApplied()
39 const base::Version* minimum_version = ec->GetValue( in UpdateCanBeApplied()
Denough_slots_ab_updates_policy_impl.cc24 EvaluationContext* ec, in UpdateCheckAllowed() argument
29 ec->GetValue(state->system_provider()->var_num_slots()); in UpdateCheckAllowed()
Dpolicy.h253 virtual EvalStatus UpdateCheckAllowed(EvaluationContext* ec,
263 EvaluationContext* ec,
275 virtual EvalStatus UpdateCanStart(EvaluationContext* ec,
283 virtual EvalStatus P2PEnabled(EvaluationContext* ec,
293 virtual EvalStatus P2PEnabledChanged(EvaluationContext* ec,
/system/apex/tests/native/
Dapex_shared_libraries_test.cpp76 std::error_code ec; in TEST() local
77 if (!fs::is_symlink(p, ec)) { in TEST()
83 auto target = fs::read_symlink(p.path(), ec); in TEST()
84 if (ec || !StartsWith(target.string(), kApexSharedLibsRoot)) { in TEST()
89 auto dest = fs::canonical(p.path(), ec); in TEST()
90 EXPECT_FALSE(ec) << "Failed to resolve " << p.path() << " (symlink to " in TEST()
91 << target << "): " << ec; in TEST()
92 if (ec) { in TEST()
/system/security/keystore2/src/
Derror.rs214 Some(Error::Km(ec)) => ec.0, in get_error_code()
246 fn nested_nested_ec(ec: ErrorCode) -> anyhow::Result<()> { in nested_nested_ec()
247 Err(anyhow!(Error::Km(ec))).context("nested nested ec") in nested_nested_ec()
250 fn nested_ec(ec: ErrorCode) -> anyhow::Result<()> { in nested_ec()
251 nested_nested_ec(ec).context("nested ec") in nested_ec()
311 for ec in ErrorCode::UNKNOWN_ERROR.0..ErrorCode::ROOT_OF_TRUST_ALREADY_SET.0 { in keystore_error_test()
313 Result::<(), i32>::Err(ec), in keystore_error_test()
314 map_or_log_err(nested_ec(ErrorCode(ec)), |_| Err(BinderStatus::ok())) in keystore_error_test()
321 for ec in ErrorCode::UNKNOWN_ERROR.0..ErrorCode::ROOT_OF_TRUST_ALREADY_SET.0 { in keystore_error_test()
323 Result::<(), i32>::Err(ec), in keystore_error_test()
[all …]
/system/security/ondevice-signing/
DVerityUtils.cpp178 std::error_code ec; in addFilesToVerityRecursive() local
180 auto it = std::filesystem::recursive_directory_iterator(path, ec); in addFilesToVerityRecursive()
183 while (!ec && it != end) { in addFilesToVerityRecursive()
194 if (ec) { in addFilesToVerityRecursive()
195 return Error() << "Failed to iterate " << path << ": " << ec; in addFilesToVerityRecursive()
228 std::error_code ec; in verifyAllFilesInVerity() local
230 auto it = std::filesystem::recursive_directory_iterator(path, ec); in verifyAllFilesInVerity()
233 while (!ec && it != end) { in verifyAllFilesInVerity()
250 if (ec) { in verifyAllFilesInVerity()
251 return Error() << "Failed to iterate " << path << ": " << ec; in verifyAllFilesInVerity()
/system/extras/simpleperf/testdata/etm/
Dperf_inject.data11 10e0-10ec:1
22 10ec->0:1

12345678910