/system/bt/stack/smp/ |
D | p_256_curvepara.cc | 29 elliptic_curve_t* ec = &curve_p256; in p_256_init_curve() local 31 ec->p[7] = 0xFFFFFFFF; in p_256_init_curve() 32 ec->p[6] = 0x00000001; in p_256_init_curve() 33 ec->p[5] = 0x0; in p_256_init_curve() 34 ec->p[4] = 0x0; in p_256_init_curve() 35 ec->p[3] = 0x0; in p_256_init_curve() 36 ec->p[2] = 0xFFFFFFFF; in p_256_init_curve() 37 ec->p[1] = 0xFFFFFFFF; in p_256_init_curve() 38 ec->p[0] = 0xFFFFFFFF; in p_256_init_curve() 40 memset(ec->omega, 0, KEY_LENGTH_DWORDS_P256); in p_256_init_curve() [all …]
|
/system/apex/apexd/ |
D | apexd_utils.h | 93 std::error_code ec; in WalkDir() local 94 auto it = fs::directory_iterator(path, ec); in WalkDir() 96 while (!ec && it != end) { in WalkDir() 98 it.increment(ec); in WalkDir() 100 if (ec) { in WalkDir() 102 << "Can't open " << path << " for reading : " << ec.message(); in WalkDir() 164 std::error_code ec; in DeleteDirContent() local 165 std::filesystem::remove_all(file, ec); in DeleteDirContent() 166 if (ec) { in DeleteDirContent() 168 << "Failed to delete path " << file << " : " << ec.message(); in DeleteDirContent() [all …]
|
D | flattened_apex_test.cpp | 45 std::error_code ec; in TEST() local 46 bool is_dir = entry.is_directory(ec); in TEST() 47 ASSERT_FALSE(ec) << ec.message(); in TEST()
|
D | apex_shim.cpp | 120 std::error_code ec; in ValidateShimApex() local 126 auto iter = fs::recursive_directory_iterator(mount_point, ec); in ValidateShimApex() 135 fs::file_status status = iter->status(ec); in ValidateShimApex() 156 iter = iter.increment(ec); in ValidateShimApex() 157 if (ec) { in ValidateShimApex() 159 << ec.message(); in ValidateShimApex()
|
/system/update_engine/update_manager/ |
D | enterprise_device_policy_impl.cc | 28 EvaluationContext* ec, in UpdateCheckAllowed() argument 36 ec->GetValue(dp_provider->var_device_policy_is_loaded()); in UpdateCheckAllowed() 42 ec->GetValue(dp_provider->var_update_disabled()); in UpdateCheckAllowed() 46 const bool* allow_kiosk_app_control_chrome_version_p = ec->GetValue( in UpdateCheckAllowed() 62 ec->GetValue(system_provider->var_kiosk_required_platform_version()); in UpdateCheckAllowed() 71 ec->GetValue(dp_provider->var_device_minimum_version()); in UpdateCheckAllowed() 73 ec->GetValue(system_provider->var_chromeos_version())); in UpdateCheckAllowed() 101 ec->GetValue(dp_provider->var_target_version_prefix()); in UpdateCheckAllowed() 109 ec->GetValue(dp_provider->var_rollback_to_target_version()); in UpdateCheckAllowed() 140 ec->GetValue(dp_provider->var_rollback_allowed_milestones()); in UpdateCheckAllowed() [all …]
|
D | update_manager-inl.h | 33 EvaluationContext* ec, in EvaluatePolicy() argument 42 if (ec->is_expired()) { in EvaluatePolicy() 44 << ec->DumpContext(); in EvaluatePolicy() 45 ec->ResetExpiration(); in EvaluatePolicy() 49 ec->ResetEvaluation(); in EvaluatePolicy() 56 ec, state_.get(), &error, result, args...); in EvaluatePolicy() 60 << "\nEvaluation context: " << ec->DumpContext(); in EvaluatePolicy() 63 ec, state_.get(), &error, result, args...); in EvaluatePolicy() 78 std::shared_ptr<EvaluationContext> ec, in OnPolicyReadyToEvaluate() argument 85 EvalStatus status = EvaluatePolicy(ec.get(), policy_method, &result, args...); in OnPolicyReadyToEvaluate() [all …]
|
D | next_update_check_policy_impl.cc | 35 EvaluationContext* ec, in UpdateCheckAllowed() argument 43 ec, state, error, &next_update_check, policy_constants_) != in UpdateCheckAllowed() 47 if (!ec->IsWallclockTimeGreaterThan(next_update_check)) { in UpdateCheckAllowed() 57 EvaluationContext* ec, in NextUpdateCheckTime() argument 72 ec->GetValue(updater_provider->var_updater_started_time()); in NextUpdateCheckTime() 78 ec->GetValue(updater_provider->var_test_update_check_interval_timeout()); in NextUpdateCheckTime() 81 ec->GetValue(updater_provider->var_last_checked_time()); in NextUpdateCheckTime() 83 const auto* seed = ec->GetValue(state->random_provider()->var_seed()); in NextUpdateCheckTime() 109 ec->GetValue(updater_provider->var_server_dictated_poll_interval()); in NextUpdateCheckTime() 120 ec->GetValue(updater_provider->var_consecutive_failed_update_checks()); in NextUpdateCheckTime()
|
D | interactive_update_policy_impl.cc | 26 EvaluationContext* ec, in UpdateCheckAllowed() argument 32 ec, state->updater_provider(), &interactive)) { in UpdateCheckAllowed() 43 EvaluationContext* ec, in UpdateCanBeApplied() argument 50 ec, state->updater_provider(), &interactive)) { in UpdateCanBeApplied() 61 EvaluationContext* ec, in CheckInteractiveUpdateRequested() argument 66 ec->GetValue(updater_provider->var_forced_update_requested()); in CheckInteractiveUpdateRequested()
|
D | update_time_restrictions_policy_impl.cc | 35 EvaluationContext* ec, in UpdateCanBeApplied() argument 44 if (!ec->GetValue(dp_provider->var_auto_launched_kiosk_app_id())) in UpdateCanBeApplied() 47 const Time* curr_date = ec->GetValue(time_provider->var_curr_date()); in UpdateCanBeApplied() 48 const int* curr_hour = ec->GetValue(time_provider->var_curr_hour()); in UpdateCanBeApplied() 49 const int* curr_minute = ec->GetValue(time_provider->var_curr_minute()); in UpdateCanBeApplied() 60 ec->GetValue(dp_provider->var_disallowed_time_intervals()); in UpdateCanBeApplied()
|
D | policy_utils.h | 49 EvaluationContext* ec, in ConsultPolicies() argument 56 (policy->*policy_method)(ec, state, error, result, args...); in ConsultPolicies() 71 EvalStatus UpdateCheckAllowed(EvaluationContext* ec, in UpdateCheckAllowed() argument 79 EvaluationContext* ec, in UpdateCanBeApplied() argument 87 EvalStatus UpdateCanStart(EvaluationContext* ec, in UpdateCanStart() argument 95 EvalStatus P2PEnabled(EvaluationContext* ec, in P2PEnabled() argument 102 EvalStatus P2PEnabledChanged(EvaluationContext* ec, in P2PEnabledChanged() argument
|
D | chromeos_policy.cc | 213 EvalStatus ChromeOSPolicy::UpdateCheckAllowed(EvaluationContext* ec, in UpdateCheckAllowed() argument 264 ec, in UpdateCheckAllowed() 277 EvalStatus ChromeOSPolicy::UpdateCanBeApplied(EvaluationContext* ec, in UpdateCanBeApplied() argument 296 ec, in UpdateCanBeApplied() 312 EvaluationContext* ec, in UpdateCanStart() argument 336 EvalStatus check_status = UpdateCheckAllowed(ec, state, error, &check_result); in UpdateCanStart() 347 ec, state, error, &backoff_url_result, update_state); in UpdateCanStart() 363 ec->GetValue(dp_provider->var_device_policy_is_loaded()); in UpdateCanStart() 378 ec->GetValue(state->config_provider()->var_is_oobe_enabled()); in UpdateCanStart() 383 ec->GetValue(state->system_provider()->var_is_oobe_complete()); in UpdateCanStart() [all …]
|
D | chromeos_policy.h | 57 EvalStatus UpdateCheckAllowed(EvaluationContext* ec, 63 EvaluationContext* ec, 69 EvalStatus UpdateCanStart(EvaluationContext* ec, 75 EvalStatus P2PEnabled(EvaluationContext* ec, 80 EvalStatus P2PEnabledChanged(EvaluationContext* ec, 146 EvaluationContext* ec, 164 EvalStatus UpdateScattering(EvaluationContext* ec,
|
D | update_manager.cc | 35 for (auto& ec : ec_repo_) in ~UpdateManager() local 36 ec->RemoveObserversAndTimeout(); in ~UpdateManager() 46 void UpdateManager::UnregisterEvalContext(EvaluationContext* ec) { in UnregisterEvalContext() argument 51 std::shared_ptr<EvaluationContext>(ec, [](EvaluationContext*) {}))) { in UnregisterEvalContext()
|
D | default_policy.cc | 36 EvalStatus DefaultPolicy::UpdateCheckAllowed(EvaluationContext* ec, in UpdateCheckAllowed() argument 53 ec->IsMonotonicTimeGreaterThan( in UpdateCheckAllowed() 64 EvalStatus DefaultPolicy::UpdateCanBeApplied(EvaluationContext* ec, in UpdateCanBeApplied() argument 73 EvalStatus DefaultPolicy::UpdateCanStart(EvaluationContext* ec, in UpdateCanStart() argument 92 EvalStatus DefaultPolicy::P2PEnabled(EvaluationContext* ec, in P2PEnabled() argument 100 EvalStatus DefaultPolicy::P2PEnabledChanged(EvaluationContext* ec, in P2PEnabledChanged() argument
|
D | default_policy.h | 66 EvalStatus UpdateCheckAllowed(EvaluationContext* ec, 72 EvaluationContext* ec, 78 EvalStatus UpdateCanStart(EvaluationContext* ec, 84 EvalStatus P2PEnabled(EvaluationContext* ec, 89 EvalStatus P2PEnabledChanged(EvaluationContext* ec,
|
D | out_of_box_experience_policy_impl.cc | 23 EvalStatus OobePolicyImpl::UpdateCheckAllowed(EvaluationContext* ec, in UpdateCheckAllowed() argument 31 ec->GetValue(state->config_provider()->var_is_oobe_enabled()); in UpdateCheckAllowed() 34 ec->GetValue(system_provider->var_is_oobe_complete()); in UpdateCheckAllowed()
|
D | official_build_check_policy_impl.cc | 23 EvaluationContext* ec, in UpdateCheckAllowed() argument 28 ec->GetValue(state->system_provider()->var_is_official_build()); in UpdateCheckAllowed() 30 const int64_t* interval_timeout_p = ec->GetValue( in UpdateCheckAllowed()
|
D | interactive_update_policy_impl.h | 35 EvalStatus UpdateCheckAllowed(EvaluationContext* ec, 41 EvaluationContext* ec, 57 bool CheckInteractiveUpdateRequested(EvaluationContext* ec,
|
D | minimum_version_policy_impl.cc | 27 EvaluationContext* ec, in UpdateCanBeApplied() argument 33 ec->GetValue(state->system_provider()->var_chromeos_version())); in UpdateCanBeApplied() 39 const base::Version* minimum_version = ec->GetValue( in UpdateCanBeApplied()
|
D | enough_slots_ab_updates_policy_impl.cc | 24 EvaluationContext* ec, in UpdateCheckAllowed() argument 29 ec->GetValue(state->system_provider()->var_num_slots()); in UpdateCheckAllowed()
|
D | policy.h | 253 virtual EvalStatus UpdateCheckAllowed(EvaluationContext* ec, 263 EvaluationContext* ec, 275 virtual EvalStatus UpdateCanStart(EvaluationContext* ec, 283 virtual EvalStatus P2PEnabled(EvaluationContext* ec, 293 virtual EvalStatus P2PEnabledChanged(EvaluationContext* ec,
|
/system/apex/tests/native/ |
D | apex_shared_libraries_test.cpp | 76 std::error_code ec; in TEST() local 77 if (!fs::is_symlink(p, ec)) { in TEST() 83 auto target = fs::read_symlink(p.path(), ec); in TEST() 84 if (ec || !StartsWith(target.string(), kApexSharedLibsRoot)) { in TEST() 89 auto dest = fs::canonical(p.path(), ec); in TEST() 90 EXPECT_FALSE(ec) << "Failed to resolve " << p.path() << " (symlink to " in TEST() 91 << target << "): " << ec; in TEST() 92 if (ec) { in TEST()
|
/system/security/keystore2/src/ |
D | error.rs | 214 Some(Error::Km(ec)) => ec.0, in get_error_code() 246 fn nested_nested_ec(ec: ErrorCode) -> anyhow::Result<()> { in nested_nested_ec() 247 Err(anyhow!(Error::Km(ec))).context("nested nested ec") in nested_nested_ec() 250 fn nested_ec(ec: ErrorCode) -> anyhow::Result<()> { in nested_ec() 251 nested_nested_ec(ec).context("nested ec") in nested_ec() 311 for ec in ErrorCode::UNKNOWN_ERROR.0..ErrorCode::ROOT_OF_TRUST_ALREADY_SET.0 { in keystore_error_test() 313 Result::<(), i32>::Err(ec), in keystore_error_test() 314 map_or_log_err(nested_ec(ErrorCode(ec)), |_| Err(BinderStatus::ok())) in keystore_error_test() 321 for ec in ErrorCode::UNKNOWN_ERROR.0..ErrorCode::ROOT_OF_TRUST_ALREADY_SET.0 { in keystore_error_test() 323 Result::<(), i32>::Err(ec), in keystore_error_test() [all …]
|
/system/security/ondevice-signing/ |
D | VerityUtils.cpp | 178 std::error_code ec; in addFilesToVerityRecursive() local 180 auto it = std::filesystem::recursive_directory_iterator(path, ec); in addFilesToVerityRecursive() 183 while (!ec && it != end) { in addFilesToVerityRecursive() 194 if (ec) { in addFilesToVerityRecursive() 195 return Error() << "Failed to iterate " << path << ": " << ec; in addFilesToVerityRecursive() 228 std::error_code ec; in verifyAllFilesInVerity() local 230 auto it = std::filesystem::recursive_directory_iterator(path, ec); in verifyAllFilesInVerity() 233 while (!ec && it != end) { in verifyAllFilesInVerity() 250 if (ec) { in verifyAllFilesInVerity() 251 return Error() << "Failed to iterate " << path << ": " << ec; in verifyAllFilesInVerity()
|
/system/extras/simpleperf/testdata/etm/ |
D | perf_inject.data | 11 10e0-10ec:1 22 10ec->0:1
|