Home
last modified time | relevance | path

Searched refs:tag (Results 76 – 100 of 339) sorted by relevance

12345678910>>...14

/system/netd/server/
DTrafficControllerTest.cpp132 int setUpSocketAndTag(int protocol, uint64_t* cookie, uint32_t tag, uid_t uid, in setUpSocketAndTag() argument
138 EXPECT_EQ(0, mTc.tagSocket(sock, tag, uid, callingUid)); in setUpSocketAndTag()
142 void expectUidTag(uint64_t cookie, uid_t uid, uint32_t tag) { in expectUidTag() argument
146 EXPECT_EQ(tag, tagResult.value().tag); in expectUidTag()
151 void populateFakeStats(uint64_t cookie, uint32_t uid, uint32_t tag, StatsKey* key) { in populateFakeStats() argument
152 UidTagValue cookieMapkey = {.uid = (uint32_t)uid, .tag = tag}; in populateFakeStats()
154 *key = {.uid = uid, .tag = tag, .counterSet = TEST_COUNTERSET, .ifaceIndex = 1}; in populateFakeStats()
159 key->tag = 0; in populateFakeStats()
163 key->tag = tag; in populateFakeStats()
277 void expectFakeStatsUnchanged(uint64_t cookie, uint32_t tag, uint32_t uid, in expectFakeStatsUnchanged() argument
[all …]
/system/core/trusty/keymaster/3.0/
DTrustyKeymaster3Device.cpp69 inline keymaster_tag_type_t typeFromTag(const keymaster_tag_t tag) { in typeFromTag() argument
70 return keymaster_tag_get_type(tag); in typeFromTag()
79 auto tag = legacy_enum_conversion(keyParams[i].tag); in KmParamSet() local
80 switch (typeFromTag(tag)) { in KmParamSet()
83 params[i] = keymaster_param_enum(tag, keyParams[i].f.integer); in KmParamSet()
87 params[i] = keymaster_param_int(tag, keyParams[i].f.integer); in KmParamSet()
91 params[i] = keymaster_param_long(tag, keyParams[i].f.longInteger); in KmParamSet()
94 params[i] = keymaster_param_date(tag, keyParams[i].f.dateTime); in KmParamSet()
98 params[i] = keymaster_param_bool(tag); in KmParamSet()
100 params[i].tag = KM_TAG_INVALID; in KmParamSet()
[all …]
/system/keymaster/ng/
DAndroidKeymaster3Device.cpp81 inline keymaster_tag_type_t typeFromTag(const keymaster_tag_t tag) { in typeFromTag() argument
82 return keymaster_tag_get_type(tag); in typeFromTag()
91 auto tag = legacy_enum_conversion(keyParams[i].tag); in KmParamSet() local
92 switch (typeFromTag(tag)) { in KmParamSet()
95 params[i] = keymaster_param_enum(tag, keyParams[i].f.integer); in KmParamSet()
99 params[i] = keymaster_param_int(tag, keyParams[i].f.integer); in KmParamSet()
103 params[i] = keymaster_param_long(tag, keyParams[i].f.longInteger); in KmParamSet()
106 params[i] = keymaster_param_date(tag, keyParams[i].f.dateTime); in KmParamSet()
110 params[i] = keymaster_param_bool(tag); in KmParamSet()
112 params[i].tag = KM_TAG_INVALID; in KmParamSet()
[all …]
/system/logging/logd/
Devent.logtags1 # The entries in this file map a sparse set of log tag numbers to tag names.
14 # Optionally, after the tag names can be put a description for the value(s)
15 # of the tag. Description are in the format
39 1005 tag_def (tag|1),(name|3),(format|3)
DREADME.property47 log.tag string persist The global logging level, VERBOSE,
51 persist.log.tag string build default for log.tag
52 log.tag.<tag> string persist The <tag> specific logging level.
53 persist.log.tag.<tag> string build default for log.tag.<tag>
/system/keymaster/tests/
Dandroid_keymaster_test_utils.h57 bool contains(const AuthorizationSet& set, TypedEnumTag<KM_ENUM, Tag, KeymasterEnum> tag, in contains() argument
59 int pos = set.find(tag); in contains()
64 bool contains(const AuthorizationSet& set, TypedEnumTag<KM_ENUM_REP, Tag, KeymasterEnum> tag, in contains() argument
67 while ((pos = set.find(tag, pos)) != -1) in contains()
73 bool contains(const AuthorizationSet& set, TypedTag<KM_UINT, Tag> tag, uint32_t val) { in contains() argument
74 int pos = set.find(tag); in contains()
79 bool contains(const AuthorizationSet& set, TypedTag<KM_UINT_REP, Tag> tag, uint32_t val) { in contains() argument
81 while ((pos = set.find(tag, pos)) != -1) in contains()
87 bool contains(const AuthorizationSet& set, TypedTag<KM_ULONG, Tag> tag, uint64_t val) { in contains() argument
88 int pos = set.find(tag); in contains()
[all …]
/system/keymaster/key_blob_utils/
Dauth_encrypted_key_blob.cpp140 retval.tag = Buffer(kAesGcmTagLength); in AesGcmEncryptKey()
149 retval.tag.peek_write()))) { in AesGcmEncryptKey()
155 !retval.tag.advance_write(kAesGcmTagLength)) { in AesGcmEncryptKey()
186 const_cast<uint8_t*>(key.encrypted_key.tag.peek_read())))) { in AesGcmDecryptKey()
214 encrypted_key.ciphertext.SerializedSize() + encrypted_key.tag.SerializedSize() + in SerializeAuthEncryptedBlob()
229 buf = encrypted_key.tag.Serialize(buf, end); in SerializeAuthEncryptedBlob()
260 !retval.encrypted_key.tag.Deserialize(buf_ptr, end) || // in DeserializeAuthEncryptedBlob()
271 retval.encrypted_key.tag.available_read() != OCB_TAG_LENGTH) { in DeserializeAuthEncryptedBlob()
279 retval.encrypted_key.tag.available_read() != kAesGcmTagLength) { in DeserializeAuthEncryptedBlob()
302 retval.tag.Reinitialize(OCB_TAG_LENGTH); in EncryptKey()
[all …]
Dsoftware_keyblobs.cpp44 bool UpgradeIntegerTag(keymaster_tag_t tag, uint32_t value, AuthorizationSet* set, in UpgradeIntegerTag() argument
46 int index = set->find(tag); in UpgradeIntegerTag()
49 param.tag = tag; in UpgradeIntegerTag()
258 switch (entry.tag) { in SetKeyBlobAuthorizations()
271 LOG_W("No on-body detection supported, skipping tag %d", entry.tag); in SetKeyBlobAuthorizations()
282 LOG_E("Tag %d not supported by SoftKeymaster", entry.tag); in SetKeyBlobAuthorizations()
288 if (hw_enforced->GetTagCount(entry.tag) != 0) in SetKeyBlobAuthorizations()
291 LOG_E("Tag %d not supported by SoftKeymaster", entry.tag); in SetKeyBlobAuthorizations()
307 LOG_E("Tag %d not allowed in key generation/import", entry.tag); in SetKeyBlobAuthorizations()
365 if (hw_enforced->GetTagCount(entry.tag) == 0) sw_enforced->push_back(entry); in SetKeyBlobAuthorizations()
/system/core/libqtaguid/include/qtaguid/
Dqtaguid.h33 extern int legacy_tagSocket(int sockfd, int tag, uid_t uid);
56 extern int legacy_deleteTagData(int tag, uid_t uid);
/system/security/keystore2/src/
Daudit_log.rs67 fn log_key_event(tag: u32, key: &KeyDescriptor, calling_app: uid_t, success: bool) { in log_key_event()
68 with_log_context(tag, |ctx| { in log_key_event()
76 fn with_log_context<F>(tag: u32, f: F) in with_log_context()
80 if let Some(ctx) = LogContext::new(LogIdSecurity, tag) { in with_log_context()
/system/core/libcutils/include/cutils/
Dqtaguid.h29 extern int qtaguid_tagSocket(int sockfd, int tag, uid_t uid);
52 extern int qtaguid_deleteTagData(int tag, uid_t uid);
/system/core/libcutils/include_outside_system/cutils/
Dqtaguid.h29 extern int qtaguid_tagSocket(int sockfd, int tag, uid_t uid);
52 extern int qtaguid_deleteTagData(int tag, uid_t uid);
/system/libfmq/
DFmqInternal.cpp33 void errorWriteLog(int tag, const char* info) { in errorWriteLog() argument
34 android_errorWriteLog(tag, info); in errorWriteLog()
/system/logging/liblog/include/log/
Devent_tag_map.h47 unsigned int tag);
54 unsigned int tag);
/system/extras/profcollectd/libprofcollectd/
Dtrace_provider.rs32 fn trace(&self, trace_dir: &Path, tag: &str, sampling_period: &Duration); in trace()
51 pub fn get_path(dir: &Path, tag: &str, ext: &str) -> Box<Path> { in get_path()
52 let filename = format!("{}_{}", Utc::now().format("%Y%m%d-%H%M%S"), tag); in get_path()
/system/bt/gd/os/
Dlog.h103 #define android_errorWriteLog(tag, subTag) LOG_ERROR("ERROR tag: 0x%x, sub_tag: %s", tag, subTag) argument
107 #define android_errorWriteWithInfoLog(tag, subTag, uid, data, dataLen) \ argument
108 LOG_ERROR("ERROR tag: 0x%x, sub_tag: %s", tag, subTag)
/system/extras/ANRdaemon/
DANRdaemon.cpp93 static uint64_t tag = 0; variable
412 dfs_set_property(tag, apps, true); in start()
561 tag |= ATRACE_TAG_ACTIVITY_MANAGER; in get_options()
563 tag |= ATRACE_TAG_INPUT; in get_options()
565 tag |= ATRACE_TAG_SYNC_MANAGER; in get_options()
567 tag |= ATRACE_TAG_DALVIK; in get_options()
569 tag |= ATRACE_TAG_GRAPHICS; in get_options()
571 tag |= ATRACE_TAG_AUDIO; in get_options()
573 tag |= ATRACE_TAG_HAL; in get_options()
575 tag |= ATRACE_TAG_RS; in get_options()
[all …]
/system/netd/bpf_progs/
Dnetd.c245 uint32_t uid, tag; in bpf_traffic_account() local
248 tag = utag->tag; in bpf_traffic_account()
251 tag = 0; in bpf_traffic_account()
258 if (tag == TAG_SYSTEM_DNS && uid == AID_DNS) { in bpf_traffic_account()
265 StatsKey key = {.uid = uid, .tag = tag, .counterSet = 0, .ifaceIndex = skb->ifindex}; in bpf_traffic_account()
276 if (key.tag) { in bpf_traffic_account()
278 key.tag = 0; in bpf_traffic_account()
/system/bt/
DEventLogTags.logtags1 # The entries in this file map a sparse set of log tag numbers to tag names.
14 # Optionally, after the tag names can be put a description for the value(s)
15 # of the tag. Description are in the format
/system/bt/gd/common/
Dinit_flags.h32 inline static bool IsDebugLoggingEnabledForTag(const std::string& tag) { in IsDebugLoggingEnabledForTag() argument
33 auto tag_setting = logging_debug_explicit_tag_settings.find(tag); in IsDebugLoggingEnabledForTag()
/system/security/keystore2/src/crypto/
Dlib.rs82 pub fn aes_gcm_decrypt(data: &[u8], iv: &[u8], tag: &[u8], key: &[u8]) -> Result<ZVec, Error> { in aes_gcm_decrypt()
90 if tag.len() != TAG_LENGTH { in aes_gcm_decrypt()
112 tag.as_ptr(), in aes_gcm_decrypt()
137 let mut tag: Vec<u8> = vec![0; TAG_LENGTH]; in aes_gcm_encrypt() localVariable
149 tag.as_mut_ptr(), in aes_gcm_encrypt()
152 Ok((ciphertext, iv, tag)) in aes_gcm_encrypt()
472 let (cipher_text, iv, tag) = aes_gcm_encrypt(message, &key).unwrap(); in test_wrapper_roundtrip()
473 let message2 = aes_gcm_decrypt(&cipher_text, &iv, &tag, &key).unwrap(); in test_wrapper_roundtrip()
484 let mut tag = vec![0; 16]; in test_encrypt_decrypt() localVariable
493 tag.as_mut_ptr(), in test_encrypt_decrypt()
[all …]
/system/keymaster/android_keymaster/
Dkeymaster_enforcement.cpp154 switch (auth_set[pos].tag) { in AuthorizeUpdateOrFinish()
184 if (param.tag == KM_TAG_USER_SECURE_ID) { in AuthorizeUpdateOrFinish()
209 switch (auth_set[pos].tag) { in AuthorizeBegin()
239 if (param.tag == KM_TAG_PADDING_OLD || param.tag == KM_TAG_DIGEST_OLD) continue; in AuthorizeBegin()
241 switch (param.tag) { in AuthorizeBegin()
510 assert(auth_set[auth_type_index].tag == KM_TAG_USER_AUTH_TYPE); in AuthTokenMatches()
511 if (auth_set[auth_type_index].tag != KM_TAG_USER_AUTH_TYPE) return false; in AuthTokenMatches()
521 assert(auth_set[auth_timeout_index].tag == KM_TAG_AUTH_TIMEOUT); in AuthTokenMatches()
522 if (auth_set[auth_timeout_index].tag != KM_TAG_AUTH_TIMEOUT) return false; in AuthTokenMatches()
/system/logging/liblog/
Dlog_event_write.cpp25 int __android_log_error_write(int tag, const char* subTag, int32_t uid, const char* data, in __android_log_error_write() argument
30 android_log_context ctx = create_android_logger(tag); in __android_log_error_write()
Devent.logtags1 # The entries in this file map a sparse set of log tag numbers to tag names.
14 # Optionally, after the tag names can be put a description for the value(s)
15 # of the tag. Description are in the format
/system/core/storaged/
DEventLogTags.logtags1 # The entries in this file map a sparse set of log tag numbers to tag names.
14 # Optionally, after the tag names can be put a description for the value(s)
15 # of the tag. Description are in the format

12345678910>>...14