/packages/modules/IPsec/src/java/com/android/internal/net/ipsec/ike/message/ |
D | IkeAuthPayload.java | 63 protected IkeAuthPayload(boolean critical, int authMethod) { in IkeAuthPayload() argument 64 super(PAYLOAD_TYPE_AUTH, critical); in IkeAuthPayload() 68 protected static IkeAuthPayload getIkeAuthPayload(boolean critical, byte[] payloadBody) in getIkeAuthPayload() argument 81 return new IkeAuthPskPayload(critical, authData); in getIkeAuthPayload() 84 critical, AUTH_METHOD_RSA_DIGITAL_SIGN, authData); in getIkeAuthPayload() 87 critical, AUTH_METHOD_GENERIC_DIGITAL_SIGN, authData); in getIkeAuthPayload()
|
D | IkeSkPayload.java | 57 boolean critical, in IkeSkPayload() argument 67 critical, in IkeSkPayload() 86 boolean critical, in IkeSkPayload() argument 94 super(isSkf ? PAYLOAD_TYPE_SKF : PAYLOAD_TYPE_SK, critical); in IkeSkPayload()
|
D | IkeCertPayload.java | 79 protected IkeCertPayload(boolean critical, @CertificateEncoding int encodingType) { in IkeCertPayload() argument 80 super(PAYLOAD_TYPE_CERT, critical); in IkeCertPayload() 84 protected static IkeCertPayload getIkeCertPayload(boolean critical, byte[] payloadBody) in getIkeCertPayload() argument 93 return new IkeCertX509CertPayload(critical, certData); in getIkeCertPayload()
|
D | IkePayloadFactory.java | 101 boolean critical, in decodeIkeSkPayload() argument 110 critical, in decodeIkeSkPayload() 118 critical, in decodeIkeSkPayload() 237 boolean critical, in decodeIkeSkPayload() argument
|
D | IkeUnsupportedPayload.java | 36 IkeUnsupportedPayload(int payload, boolean critical) { in IkeUnsupportedPayload() argument 37 super(payload, critical); in IkeUnsupportedPayload()
|
D | IkeVendorPayload.java | 41 IkeVendorPayload(boolean critical, byte[] payloadBody) { in IkeVendorPayload() argument 42 super(PAYLOAD_TYPE_VENDOR, critical); in IkeVendorPayload()
|
D | IkeCertReqPayload.java | 56 public IkeCertReqPayload(boolean critical, byte[] payloadBody) throws IkeProtocolException { in IkeCertReqPayload() argument 57 super(PAYLOAD_TYPE_CERT_REQUEST, critical); in IkeCertReqPayload()
|
D | IkeNoncePayload.java | 57 IkeNoncePayload(boolean critical, byte[] payloadBody) throws IkeProtocolException { in IkeNoncePayload() argument 58 super(PAYLOAD_TYPE_NONCE, critical); in IkeNoncePayload()
|
D | IkeCertX509CertPayload.java | 49 protected IkeCertX509CertPayload(boolean critical, byte[] certData) in IkeCertX509CertPayload() argument 51 super(critical, CERTIFICATE_ENCODING_X509_CERT_SIGNATURE); in IkeCertX509CertPayload()
|
D | IkeAuthPskPayload.java | 48 protected IkeAuthPskPayload(boolean critical, byte[] authData) { in IkeAuthPskPayload() argument 49 super(critical, IkeAuthPayload.AUTH_METHOD_PRE_SHARED_KEY); in IkeAuthPskPayload()
|
D | IkeDeletePayload.java | 73 IkeDeletePayload(boolean critical, byte[] payloadBody) throws IkeProtocolException { in IkeDeletePayload() argument 74 super(PAYLOAD_TYPE_DELETE, critical); in IkeDeletePayload()
|
D | IkeTsPayload.java | 47 IkeTsPayload(boolean critical, byte[] payloadBody, boolean isInitiator) in IkeTsPayload() argument 49 super((isInitiator ? PAYLOAD_TYPE_TS_INITIATOR : PAYLOAD_TYPE_TS_RESPONDER), critical); in IkeTsPayload()
|
D | IkeSkfPayload.java | 58 boolean critical, in IkeSkfPayload() argument 67 critical, in IkeSkfPayload()
|
D | IkeIdPayload.java | 60 IkeIdPayload(boolean critical, byte[] payloadBody, boolean isInitiator) in IkeIdPayload() argument 62 super((isInitiator ? PAYLOAD_TYPE_ID_INITIATOR : PAYLOAD_TYPE_ID_RESPONDER), critical); in IkeIdPayload()
|
D | IkePayload.java | 156 IkePayload(int payload, boolean critical) { in IkePayload() argument 158 isCritical = critical; in IkePayload()
|
D | IkeAuthDigitalSignPayload.java | 143 boolean critical, @AuthMethod int authMethod, byte[] authData) in IkeAuthDigitalSignPayload() argument 145 super(critical, authMethod); in IkeAuthDigitalSignPayload()
|
D | IkeKePayload.java | 161 public IkeKePayload(boolean critical, byte[] payloadBody) throws IkeProtocolException { in IkeKePayload() argument 162 super(PAYLOAD_TYPE_KE, critical); in IkeKePayload()
|
/packages/modules/Bluetooth/tools/rootcanal/model/setup/ |
D | async_manager.cc | 326 void Synchronize(const CriticalCallback& critical) { in Synchronize() argument 328 critical(); in Synchronize() 591 void AsyncManager::Synchronize(const CriticalCallback& critical) { in Synchronize() argument 592 taskManager_p_->Synchronize(critical); in Synchronize()
|
/packages/modules/Connectivity/netbpfload/ |
D | NetBpfLoad.cpp | 113 bool critical; in loadAllElfObjects() local 114 int ret = loadProg(progPath.c_str(), &critical, bpfloader_ver, location); in loadAllElfObjects() 116 if (critical) retVal = ret; in loadAllElfObjects()
|
D | loader.cpp | 1096 vector<char> critical; in loadProg() local 1107 ret = readSectionByName("critical", elfFile, critical); in loadProg() 1116 *isCritical ? "critical for " : "optional", *isCritical ? (char*)critical.data() : "", in loadProg()
|
/packages/modules/Bluetooth/service/ |
D | proguard.flags | 2 # TODO: This could be optimized in the future to only keep the critical
|
/packages/apps/LegacyCamera/jni/ |
D | Android.bp | 24 // suppress existing non-critical warnings
|
/packages/modules/Virtualization/service_vm/requests/src/ |
D | cert.rs | 157 critical: false, in build_tbs_certificate()
|
/packages/modules/Virtualization/docs/ |
D | updatable_vm.md | 9 The following constructs have been used (and are critical) to support Updatable VM: 11 1. [Secretkeeper][sk_project] is the critical piece of solution. It provides secure storage for VM's
|
/packages/modules/Bluetooth/tools/rootcanal/ |
D | README.md | 11 of HCI commands and events is thus critical to RootCanal's goal, while accurate
|