/device/google/cuttlefish/host/commands/secure_env/ |
D | tpm_gatekeeper.cpp | 154 secure_env::Storage& storage, in GetFailureRecordImpl() argument 159 if (!CF_EXPECT(storage.HasKey(key))) { in GetFailureRecordImpl() 161 CF_EXPECT(storage.Write(key, *data)); in GetFailureRecordImpl() 163 auto record_read = CF_EXPECT(storage.Read(key)); in GetFailureRecordImpl() 172 CF_EXPECT(storage.Write(key, *data)); in GetFailureRecordImpl() 182 secure_env::Storage& storage = secure ? secure_storage_ : insecure_storage_; in GetFailureRecord() local 183 auto result = GetFailureRecordImpl(storage, uid, secure_user_id, record); in GetFailureRecord() 192 secure_env::Storage& storage, in WriteFailureRecordImpl() argument 197 CF_EXPECT(storage.Write(key, *data)); in WriteFailureRecordImpl() 203 secure_env::Storage& storage = secure ? secure_storage_ : insecure_storage_; in ClearFailureRecord() local [all …]
|
D | Android.bp | 81 "storage/tpm_storage.cpp", 88 "storage/storage.cpp", 121 "storage/insecure_json_storage.cpp",
|
D | secure_env_not_windows_main.cpp | 194 .registerProvider([](secure_env::Storage& storage) -> oemlock::OemLock* { in ChooseOemlockComponent() argument 195 return new oemlock::OemLock(storage); in ChooseOemlockComponent()
|
/device/google/cuttlefish/host/commands/secure_env/oemlock/ |
D | oemlock.cpp | 35 Result<void> InitializeDefaultState(secure_env::Storage& storage) { in InitializeDefaultState() argument 36 if (storage.Exists()) { in InitializeDefaultState() 41 CF_EXPECT(storage.Write(kStateKey, *data)); in InitializeDefaultState() 45 Result<bool> ReadFlag(secure_env::Storage& storage, int bit) { in ReadFlag() argument 46 auto data = CF_EXPECT(storage.Read(kStateKey)); in ReadFlag() 51 Result<void> WriteFlag(secure_env::Storage& storage, int bit, bool value) { in WriteFlag() argument 52 auto data = CF_EXPECT(storage.Read(kStateKey)); in WriteFlag() 57 CF_EXPECT(storage.Write(kStateKey, *data_to_write)); in WriteFlag() 63 OemLock::OemLock(secure_env::Storage& storage) : storage_(storage) { in OemLock() argument
|
/device/google/cuttlefish/guest/hals/health/storage/ |
D | Android.bp | 22 name: "android.hardware.health.storage-service.cuttlefish", 38 "android.hardware.health.storage-V1-ndk", 54 name: "com.google.cf.health.storage", 62 binaries: ["android.hardware.health.storage-service.cuttlefish"], 64 "android.hardware.health.storage-service.cuttlefish.rc", 65 "android.hardware.health.storage-service.cuttlefish.xml", 70 name: "android.hardware.health.storage-service.cuttlefish.rc", 71 src: "android.hardware.health.storage-service.cuttlefish.rc", 76 name: "android.hardware.health.storage-service.cuttlefish.xml", 77 src: "android.hardware.health.storage-service.cuttlefish.xml",
|
D | android.hardware.health.storage-service.cuttlefish.rc | 17 service vendor.health-storage-default /apex/com.google.cf.health.storage/bin/hw/android.hardware.he… 18 interface aidl android.hardware.health.storage.IStorage/default
|
D | service.cpp | 23 using aidl::android::hardware::health::storage::Storage; 30 auto storage = ndk::SharedRefBase::make<Storage>(); in main() local 33 storage->asBinder().get(), name.c_str())); in main()
|
/device/google/cuttlefish/host/commands/secure_env/rust/ |
D | sdd.rs | 21 use kmr_proto::storage; 29 fn read_sdd_file() -> Result<storage::SecureDeletionData, Error> { in read_sdd_file() 33 storage::SecureDeletionData::parse_from_reader(&mut f).map_err(|e| { in read_sdd_file() 38 fn write_sdd_file(data: &storage::SecureDeletionData) -> Result<(), Error> { in write_sdd_file() 53 data: storage::SecureDeletionData, 76 let mut sdd_mgr = Self { data: storage::SecureDeletionData::default() }; in new() 181 self.data = storage::SecureDeletionData::default(); in delete_all()
|
/device/linaro/dragonboard/ |
D | init.common.rc | 23 # See storage config details at http://source.android.com/tech/storage/ 24 # since /storage is mounted on post-fs in init.rc 25 symlink /sdcard /storage/sdcard0
|
/device/linaro/hikey/ |
D | init.common.rc | 31 # See storage config details at http://source.android.com/tech/storage/ 32 # since /storage is mounted on post-fs in init.rc 33 symlink /sdcard /storage/sdcard0
|
/device/google/cuttlefish/ |
D | CleanSpec.mk | 69 $(call add-clean-step, rm -rf $(PRODUCT_OUT)/vendor/bin/hw/android.hardware.health.storage@1.0-serv… 70 $(call add-clean-step, rm -rf $(PRODUCT_OUT)/vendor/etc/init/android.hardware.health.storage@1.0-se… 71 …(PRODUCT_OUT)/vendor/etc/vintf/manifest/manifest_android.hardware.health.storage@1.0.cuttlefish.xm…
|
/device/google/cuttlefish/tools/ |
D | create_base_image.go | 264 gce(WarnOnFail, `alpha storage rm `+gs_file) 267 gce(WarnOnFail, `alpha storage cp `+abt+`/`+zip_file+` gs://cloud-android-testing-esp`) 272 `" --storage-location="`+location+`" --guest-os-features=UEFI_COMPATIBLE`) 395 `" --machine-type=n1-standard-4 --scopes storage-ro --accelerator="type=`+
|
/device/google/gs-common/storage/ |
D | storage.mk | 1 BOARD_VENDOR_SEPOLICY_DIRS += device/google/gs-common/storage/sepolicy
|
/device/google/pantah/location/ |
D | scd_user.conf | 3 LogDirectory=/sdcard/gps/broadcom/storage
|
D | scd_user.conf.p10 | 3 LogDirectory=/sdcard/gps/broadcom/storage
|
D | scd_user.conf.c10 | 3 LogDirectory=/sdcard/gps/broadcom/storage
|
D | scd.conf | 3 LogDirectory=/sdcard/gps/broadcom/storage
|
D | scd.conf.p10 | 3 LogDirectory=/sdcard/gps/broadcom/storage
|
/device/google/shusky/location/ |
D | scd_user.conf | 3 LogDirectory=/sdcard/gps/broadcom/storage
|
D | scd.conf | 3 LogDirectory=/sdcard/gps/broadcom/storage
|
/device/google/gs101/location/ |
D | scd_user.conf | 3 LogDirectory=/sdcard/gps/broadcom/storage
|
D | scd.conf | 3 LogDirectory=/sdcard/gps/broadcom/storage
|
/device/google/lynx/location/ |
D | scd_user.conf.l10 | 3 LogDirectory=/sdcard/gps/broadcom/storage
|
/device/google/felix/location/ |
D | scd_user.conf.f10 | 3 LogDirectory=/sdcard/gps/broadcom/storage
|
/device/generic/goldfish/sepolicy/vendor/ |
D | zygote.te | 2 # Suppress denials to storage. Webview zygote should not be accessing.
|