/system/netd/server/ |
D | TrafficControllerTest.cpp | 132 int setUpSocketAndTag(int protocol, uint64_t* cookie, uint32_t tag, uid_t uid, in setUpSocketAndTag() argument 138 EXPECT_EQ(0, mTc.tagSocket(sock, tag, uid, callingUid)); in setUpSocketAndTag() 142 void expectUidTag(uint64_t cookie, uid_t uid, uint32_t tag) { in expectUidTag() argument 146 EXPECT_EQ(tag, tagResult.value().tag); in expectUidTag() 151 void populateFakeStats(uint64_t cookie, uint32_t uid, uint32_t tag, StatsKey* key) { in populateFakeStats() argument 152 UidTagValue cookieMapkey = {.uid = (uint32_t)uid, .tag = tag}; in populateFakeStats() 154 *key = {.uid = uid, .tag = tag, .counterSet = TEST_COUNTERSET, .ifaceIndex = 1}; in populateFakeStats() 159 key->tag = 0; in populateFakeStats() 163 key->tag = tag; in populateFakeStats() 277 void expectFakeStatsUnchanged(uint64_t cookie, uint32_t tag, uint32_t uid, in expectFakeStatsUnchanged() argument [all …]
|
/system/core/trusty/keymaster/3.0/ |
D | TrustyKeymaster3Device.cpp | 69 inline keymaster_tag_type_t typeFromTag(const keymaster_tag_t tag) { in typeFromTag() argument 70 return keymaster_tag_get_type(tag); in typeFromTag() 79 auto tag = legacy_enum_conversion(keyParams[i].tag); in KmParamSet() local 80 switch (typeFromTag(tag)) { in KmParamSet() 83 params[i] = keymaster_param_enum(tag, keyParams[i].f.integer); in KmParamSet() 87 params[i] = keymaster_param_int(tag, keyParams[i].f.integer); in KmParamSet() 91 params[i] = keymaster_param_long(tag, keyParams[i].f.longInteger); in KmParamSet() 94 params[i] = keymaster_param_date(tag, keyParams[i].f.dateTime); in KmParamSet() 98 params[i] = keymaster_param_bool(tag); in KmParamSet() 100 params[i].tag = KM_TAG_INVALID; in KmParamSet() [all …]
|
/system/keymaster/ng/ |
D | AndroidKeymaster3Device.cpp | 81 inline keymaster_tag_type_t typeFromTag(const keymaster_tag_t tag) { in typeFromTag() argument 82 return keymaster_tag_get_type(tag); in typeFromTag() 91 auto tag = legacy_enum_conversion(keyParams[i].tag); in KmParamSet() local 92 switch (typeFromTag(tag)) { in KmParamSet() 95 params[i] = keymaster_param_enum(tag, keyParams[i].f.integer); in KmParamSet() 99 params[i] = keymaster_param_int(tag, keyParams[i].f.integer); in KmParamSet() 103 params[i] = keymaster_param_long(tag, keyParams[i].f.longInteger); in KmParamSet() 106 params[i] = keymaster_param_date(tag, keyParams[i].f.dateTime); in KmParamSet() 110 params[i] = keymaster_param_bool(tag); in KmParamSet() 112 params[i].tag = KM_TAG_INVALID; in KmParamSet() [all …]
|
/system/logging/logd/ |
D | event.logtags | 1 # The entries in this file map a sparse set of log tag numbers to tag names. 14 # Optionally, after the tag names can be put a description for the value(s) 15 # of the tag. Description are in the format 39 1005 tag_def (tag|1),(name|3),(format|3)
|
D | README.property | 47 log.tag string persist The global logging level, VERBOSE, 51 persist.log.tag string build default for log.tag 52 log.tag.<tag> string persist The <tag> specific logging level. 53 persist.log.tag.<tag> string build default for log.tag.<tag>
|
/system/keymaster/tests/ |
D | android_keymaster_test_utils.h | 57 bool contains(const AuthorizationSet& set, TypedEnumTag<KM_ENUM, Tag, KeymasterEnum> tag, in contains() argument 59 int pos = set.find(tag); in contains() 64 bool contains(const AuthorizationSet& set, TypedEnumTag<KM_ENUM_REP, Tag, KeymasterEnum> tag, in contains() argument 67 while ((pos = set.find(tag, pos)) != -1) in contains() 73 bool contains(const AuthorizationSet& set, TypedTag<KM_UINT, Tag> tag, uint32_t val) { in contains() argument 74 int pos = set.find(tag); in contains() 79 bool contains(const AuthorizationSet& set, TypedTag<KM_UINT_REP, Tag> tag, uint32_t val) { in contains() argument 81 while ((pos = set.find(tag, pos)) != -1) in contains() 87 bool contains(const AuthorizationSet& set, TypedTag<KM_ULONG, Tag> tag, uint64_t val) { in contains() argument 88 int pos = set.find(tag); in contains() [all …]
|
/system/keymaster/key_blob_utils/ |
D | auth_encrypted_key_blob.cpp | 140 retval.tag = Buffer(kAesGcmTagLength); in AesGcmEncryptKey() 149 retval.tag.peek_write()))) { in AesGcmEncryptKey() 155 !retval.tag.advance_write(kAesGcmTagLength)) { in AesGcmEncryptKey() 186 const_cast<uint8_t*>(key.encrypted_key.tag.peek_read())))) { in AesGcmDecryptKey() 214 encrypted_key.ciphertext.SerializedSize() + encrypted_key.tag.SerializedSize() + in SerializeAuthEncryptedBlob() 229 buf = encrypted_key.tag.Serialize(buf, end); in SerializeAuthEncryptedBlob() 260 !retval.encrypted_key.tag.Deserialize(buf_ptr, end) || // in DeserializeAuthEncryptedBlob() 271 retval.encrypted_key.tag.available_read() != OCB_TAG_LENGTH) { in DeserializeAuthEncryptedBlob() 279 retval.encrypted_key.tag.available_read() != kAesGcmTagLength) { in DeserializeAuthEncryptedBlob() 302 retval.tag.Reinitialize(OCB_TAG_LENGTH); in EncryptKey() [all …]
|
D | software_keyblobs.cpp | 44 bool UpgradeIntegerTag(keymaster_tag_t tag, uint32_t value, AuthorizationSet* set, in UpgradeIntegerTag() argument 46 int index = set->find(tag); in UpgradeIntegerTag() 49 param.tag = tag; in UpgradeIntegerTag() 258 switch (entry.tag) { in SetKeyBlobAuthorizations() 271 LOG_W("No on-body detection supported, skipping tag %d", entry.tag); in SetKeyBlobAuthorizations() 282 LOG_E("Tag %d not supported by SoftKeymaster", entry.tag); in SetKeyBlobAuthorizations() 288 if (hw_enforced->GetTagCount(entry.tag) != 0) in SetKeyBlobAuthorizations() 291 LOG_E("Tag %d not supported by SoftKeymaster", entry.tag); in SetKeyBlobAuthorizations() 307 LOG_E("Tag %d not allowed in key generation/import", entry.tag); in SetKeyBlobAuthorizations() 365 if (hw_enforced->GetTagCount(entry.tag) == 0) sw_enforced->push_back(entry); in SetKeyBlobAuthorizations()
|
/system/core/libqtaguid/include/qtaguid/ |
D | qtaguid.h | 33 extern int legacy_tagSocket(int sockfd, int tag, uid_t uid); 56 extern int legacy_deleteTagData(int tag, uid_t uid);
|
/system/security/keystore2/src/ |
D | audit_log.rs | 67 fn log_key_event(tag: u32, key: &KeyDescriptor, calling_app: uid_t, success: bool) { in log_key_event() 68 with_log_context(tag, |ctx| { in log_key_event() 76 fn with_log_context<F>(tag: u32, f: F) in with_log_context() 80 if let Some(ctx) = LogContext::new(LogIdSecurity, tag) { in with_log_context()
|
/system/core/libcutils/include/cutils/ |
D | qtaguid.h | 29 extern int qtaguid_tagSocket(int sockfd, int tag, uid_t uid); 52 extern int qtaguid_deleteTagData(int tag, uid_t uid);
|
/system/core/libcutils/include_outside_system/cutils/ |
D | qtaguid.h | 29 extern int qtaguid_tagSocket(int sockfd, int tag, uid_t uid); 52 extern int qtaguid_deleteTagData(int tag, uid_t uid);
|
/system/libfmq/ |
D | FmqInternal.cpp | 33 void errorWriteLog(int tag, const char* info) { in errorWriteLog() argument 34 android_errorWriteLog(tag, info); in errorWriteLog()
|
/system/logging/liblog/include/log/ |
D | event_tag_map.h | 47 unsigned int tag); 54 unsigned int tag);
|
/system/extras/profcollectd/libprofcollectd/ |
D | trace_provider.rs | 32 fn trace(&self, trace_dir: &Path, tag: &str, sampling_period: &Duration); in trace() 51 pub fn get_path(dir: &Path, tag: &str, ext: &str) -> Box<Path> { in get_path() 52 let filename = format!("{}_{}", Utc::now().format("%Y%m%d-%H%M%S"), tag); in get_path()
|
/system/bt/gd/os/ |
D | log.h | 103 #define android_errorWriteLog(tag, subTag) LOG_ERROR("ERROR tag: 0x%x, sub_tag: %s", tag, subTag) argument 107 #define android_errorWriteWithInfoLog(tag, subTag, uid, data, dataLen) \ argument 108 LOG_ERROR("ERROR tag: 0x%x, sub_tag: %s", tag, subTag)
|
/system/extras/ANRdaemon/ |
D | ANRdaemon.cpp | 93 static uint64_t tag = 0; variable 412 dfs_set_property(tag, apps, true); in start() 561 tag |= ATRACE_TAG_ACTIVITY_MANAGER; in get_options() 563 tag |= ATRACE_TAG_INPUT; in get_options() 565 tag |= ATRACE_TAG_SYNC_MANAGER; in get_options() 567 tag |= ATRACE_TAG_DALVIK; in get_options() 569 tag |= ATRACE_TAG_GRAPHICS; in get_options() 571 tag |= ATRACE_TAG_AUDIO; in get_options() 573 tag |= ATRACE_TAG_HAL; in get_options() 575 tag |= ATRACE_TAG_RS; in get_options() [all …]
|
/system/netd/bpf_progs/ |
D | netd.c | 245 uint32_t uid, tag; in bpf_traffic_account() local 248 tag = utag->tag; in bpf_traffic_account() 251 tag = 0; in bpf_traffic_account() 258 if (tag == TAG_SYSTEM_DNS && uid == AID_DNS) { in bpf_traffic_account() 265 StatsKey key = {.uid = uid, .tag = tag, .counterSet = 0, .ifaceIndex = skb->ifindex}; in bpf_traffic_account() 276 if (key.tag) { in bpf_traffic_account() 278 key.tag = 0; in bpf_traffic_account()
|
/system/bt/ |
D | EventLogTags.logtags | 1 # The entries in this file map a sparse set of log tag numbers to tag names. 14 # Optionally, after the tag names can be put a description for the value(s) 15 # of the tag. Description are in the format
|
/system/bt/gd/common/ |
D | init_flags.h | 32 inline static bool IsDebugLoggingEnabledForTag(const std::string& tag) { in IsDebugLoggingEnabledForTag() argument 33 auto tag_setting = logging_debug_explicit_tag_settings.find(tag); in IsDebugLoggingEnabledForTag()
|
/system/security/keystore2/src/crypto/ |
D | lib.rs | 82 pub fn aes_gcm_decrypt(data: &[u8], iv: &[u8], tag: &[u8], key: &[u8]) -> Result<ZVec, Error> { in aes_gcm_decrypt() 90 if tag.len() != TAG_LENGTH { in aes_gcm_decrypt() 112 tag.as_ptr(), in aes_gcm_decrypt() 137 let mut tag: Vec<u8> = vec![0; TAG_LENGTH]; in aes_gcm_encrypt() localVariable 149 tag.as_mut_ptr(), in aes_gcm_encrypt() 152 Ok((ciphertext, iv, tag)) in aes_gcm_encrypt() 472 let (cipher_text, iv, tag) = aes_gcm_encrypt(message, &key).unwrap(); in test_wrapper_roundtrip() 473 let message2 = aes_gcm_decrypt(&cipher_text, &iv, &tag, &key).unwrap(); in test_wrapper_roundtrip() 484 let mut tag = vec![0; 16]; in test_encrypt_decrypt() localVariable 493 tag.as_mut_ptr(), in test_encrypt_decrypt() [all …]
|
/system/keymaster/android_keymaster/ |
D | keymaster_enforcement.cpp | 154 switch (auth_set[pos].tag) { in AuthorizeUpdateOrFinish() 184 if (param.tag == KM_TAG_USER_SECURE_ID) { in AuthorizeUpdateOrFinish() 209 switch (auth_set[pos].tag) { in AuthorizeBegin() 239 if (param.tag == KM_TAG_PADDING_OLD || param.tag == KM_TAG_DIGEST_OLD) continue; in AuthorizeBegin() 241 switch (param.tag) { in AuthorizeBegin() 510 assert(auth_set[auth_type_index].tag == KM_TAG_USER_AUTH_TYPE); in AuthTokenMatches() 511 if (auth_set[auth_type_index].tag != KM_TAG_USER_AUTH_TYPE) return false; in AuthTokenMatches() 521 assert(auth_set[auth_timeout_index].tag == KM_TAG_AUTH_TIMEOUT); in AuthTokenMatches() 522 if (auth_set[auth_timeout_index].tag != KM_TAG_AUTH_TIMEOUT) return false; in AuthTokenMatches()
|
/system/logging/liblog/ |
D | log_event_write.cpp | 25 int __android_log_error_write(int tag, const char* subTag, int32_t uid, const char* data, in __android_log_error_write() argument 30 android_log_context ctx = create_android_logger(tag); in __android_log_error_write()
|
D | event.logtags | 1 # The entries in this file map a sparse set of log tag numbers to tag names. 14 # Optionally, after the tag names can be put a description for the value(s) 15 # of the tag. Description are in the format
|
/system/core/storaged/ |
D | EventLogTags.logtags | 1 # The entries in this file map a sparse set of log tag numbers to tag names. 14 # Optionally, after the tag names can be put a description for the value(s) 15 # of the tag. Description are in the format
|