/system/security/keystore/tests/ |
D | auth_token_table_test.cpp | 71 AuthTokenTable table; in TEST() local 104 AuthTokenTable table; in TEST() local 106 table.AddAuthenticationToken(make_token(1, 2)); in TEST() 107 table.AddAuthenticationToken(make_token(3, 4)); in TEST() 108 EXPECT_EQ(2U, table.size()); in TEST() 112 ASSERT_EQ(AuthTokenTable::OK, table.FindAuthorization(make_set(1), 0, &found)); in TEST() 116 ASSERT_EQ(AuthTokenTable::OK, table.FindAuthorization(make_set(2), 0, &found)); in TEST() 120 ASSERT_EQ(AuthTokenTable::OK, table.FindAuthorization(make_set(3), 0, &found)); in TEST() 124 ASSERT_EQ(AuthTokenTable::OK, table.FindAuthorization(make_set(4), 0, &found)); in TEST() 129 table.FindAuthorization(make_set(5), 0, &found)); in TEST() [all …]
|
/system/netd/server/ |
D | RouteController.cpp | 149 void addTableName(uint32_t table, const std::string& name, std::string* contents) { in addTableName() argument 151 snprintf(tableString, sizeof(tableString), "%u", table); in addTableName() 257 WARN_UNUSED_RESULT int modifyIpRule(uint16_t action, uint32_t priority, uint32_t table, in modifyIpRule() argument 296 if (table == RT_TABLE_UNSPEC && rule.action == FR_ACT_TO_TBL && action != RTM_DELRULE) { in modifyIpRule() 309 { &FRATTR_TABLE, table != RT_TABLE_UNSPEC ? sizeof(FRATTR_TABLE) : 0 }, in modifyIpRule() 310 { &table, table != RT_TABLE_UNSPEC ? sizeof(table) : 0 }, in modifyIpRule() 338 WARN_UNUSED_RESULT int modifyIpRule(uint16_t action, uint32_t priority, uint32_t table, in modifyIpRule() argument 340 return modifyIpRule(action, priority, table, fwmark, mask, IIF_NONE, OIF_NONE, INVALID_UID, in modifyIpRule() 346 WARN_UNUSED_RESULT int modifyIpRoute(uint16_t action, uint32_t table, const char* interface, in modifyIpRoute() argument 418 { &table, sizeof(table) }, in modifyIpRoute() [all …]
|
D | CommandListener.cpp | 152 static void createChildChains(IptablesTarget target, const char* table, const char* parentChain, in createChildChains() argument 164 execIptablesSilently(target, "-t", table, "-D", parentChain, "-j", *childChain, NULL); in createChildChains() 165 execIptablesSilently(target, "-t", table, "-F", *childChain, NULL); in createChildChains() 166 execIptablesSilently(target, "-t", table, "-X", *childChain, NULL); in createChildChains() 167 execIptables(target, "-t", table, "-N", *childChain, NULL); in createChildChains() 168 execIptables(target, "-t", table, "-A", parentChain, "-j", *childChain, NULL); in createChildChains()
|
/system/extras/verity/ |
D | build_verity_metadata.py | 30 def sign_verity_table(table, signer_path, key_path): argument 33 table_file.write(table) 41 table = "1 %s %s %s %s %s %s sha256 %s %s" 42 table %= ( block_device, 50 return table
|
D | VerityVerifier.java | 46 private byte[] table; field in VerityVerifier 217 private void readHashTree(RandomAccessFile img, byte[] table) in readHashTree() argument 219 String tableStr = new String(table); in readHashTree() 287 table = new byte[tableSize]; in readVerityData() 288 img.readFully(table); in readVerityData() 290 readHashTree(img, table); in readVerityData() 301 return Utils.verify(key, table, signature, in verifyMetaData()
|
/system/extras/tests/net_test/ |
D | iproute.py | 420 def _Rule(self, version, is_add, rule_type, table, match_nlattr, priority): argument 443 if table: 444 rtmsg += self._NlAttrU32(FRA_TABLE, table) 464 def FwmarkRule(self, version, is_add, fwmark, table, priority): argument 466 return self._Rule(version, is_add, RTN_UNICAST, table, nlattr, priority) 468 def OifRule(self, version, is_add, oif, table, priority): argument 470 return self._Rule(version, is_add, RTN_UNICAST, table, nlattr, priority) 472 def UidRangeRule(self, version, is_add, start, end, table, priority): argument 476 return self._Rule(version, is_add, RTN_UNICAST, table, nlattr, priority) 481 def DefaultRule(self, version, is_add, table, priority): argument [all …]
|
D | multinetwork_base.py | 259 table = cls._TableForNetid(netid) 264 cls.iproute.UidRangeRule(version, is_add, start, end, table, 266 cls.iproute.OifRule(version, is_add, iface, table, cls.PRIORITY_OIF) 267 cls.iproute.FwmarkRule(version, is_add, netid, table, 285 cls.iproute.AddRoute(version, table, "default", 0, router, ifindex) 287 cls.iproute.AddRoute(version, table, 291 cls.iproute.DelRoute(version, table, "default", 0, router, ifindex) 293 cls.iproute.DelRoute(version, table, 301 table = cls._TableForNetid(netid) if netid else None 303 is_add = table is not None [all …]
|
D | multinetwork_test.py | 1023 table = Random() 1027 self.iproute.UidRangeRule(version, True, start, end, table, 1036 self.assertEquals(table, attributes["FRA_TABLE"]) 1038 self.iproute.UidRangeRule(version, False, start, end, table,
|
/system/core/fs_mgr/ |
D | fs_mgr_verity.c | 111 static int verify_table(char *signature, char *table, int table_length) in verify_table() argument 118 SHA256_hash((uint8_t*)table, table_length, hash_buf); in verify_table() 208 char **table) in read_verity_metadata() argument 218 if (table) { in read_verity_metadata() 219 *table = NULL; in read_verity_metadata() 275 if (!table) { in read_verity_metadata() 288 *table = malloc(table_length + 1); in read_verity_metadata() 289 if (!*table) { in read_verity_metadata() 293 if (TEMP_FAILURE_RETRY(read(device, *table, table_length)) != in read_verity_metadata() 299 (*table)[table_length] = 0; in read_verity_metadata() [all …]
|
/system/vold/ |
D | Disk.cpp | 269 Table table = Table::kUnknown; in readPartitions() local 279 table = Table::kMbr; in readPartitions() 281 table = Table::kGpt; in readPartitions() 293 if (table == Table::kMbr) { in readPartitions() 304 } else if (table == Table::kGpt) { in readPartitions() 318 if (table == Table::kUnknown || !foundParts) { in readPartitions()
|
/system/core/libmincrypt/ |
D | p256_ec.c | 988 static void select_affine_point(felem out_x, felem out_y, const limb* table, in select_affine_point() argument 1001 for (j = 0; j < NLIMBS; j++, table++) { in select_affine_point() 1002 out_x[j] |= *table & mask; in select_affine_point() 1004 for (j = 0; j < NLIMBS; j++, table++) { in select_affine_point() 1005 out_y[j] |= *table & mask; in select_affine_point() 1013 const limb* table, limb index) { in select_jacobian_point() argument 1022 table += 3 * NLIMBS; in select_jacobian_point() 1031 for (j = 0; j < NLIMBS; j++, table++) { in select_jacobian_point() 1032 out_x[j] |= *table & mask; in select_jacobian_point() 1034 for (j = 0; j < NLIMBS; j++, table++) { in select_jacobian_point() [all …]
|
/system/media/camera/docs/ |
D | html.mako | 40 /* table column sizes */ 41 table { border-collapse:collapse; table-layout: fixed; width: 100%; word-wrap: break-word } 197 <table class="properties"> 392 </table>
|
/system/bt/doc/ |
D | power_management.md | 98 - The power mode config is looked up in the `bta_dm_pm_cfg` table. If none 103 - The power spec state table (`bta_dm_pm_spec`) is checked to see if 132 - If a timeout is specified in the power spec table, then an unused timer
|
/system/core/libutils/ |
D | README | 33 Resource values have the following precedence table, listed in
|