Home
last modified time | relevance | path

Searched refs:mod (Results 1 – 16 of 16) sorted by relevance

/system/security/keystore/
Dkeystore_main.cpp58 static int keymaster0_device_initialize(const hw_module_t* mod, keymaster2_device_t** dev) { in keymaster0_device_initialize() argument
59 assert(mod->module_api_version < KEYMASTER_MODULE_API_VERSION_1_0); in keymaster0_device_initialize()
60 ALOGI("Found keymaster0 module %s, version %x", mod->name, mod->module_api_version); in keymaster0_device_initialize()
66 int rc = keymaster0_open(mod, &km0_device); in keymaster0_device_initialize()
81 ALOGD("Wrapping keymaster0 module %s with SoftKeymasterDevice", mod->name); in keymaster0_device_initialize()
101 static int keymaster1_device_initialize(const hw_module_t* mod, keymaster2_device_t** dev) { in keymaster1_device_initialize() argument
102 assert(mod->module_api_version >= KEYMASTER_MODULE_API_VERSION_1_0); in keymaster1_device_initialize()
103 ALOGI("Found keymaster1 module %s, version %x", mod->name, mod->module_api_version); in keymaster1_device_initialize()
109 int rc = keymaster1_open(mod, &km1_device); in keymaster1_device_initialize()
115 ALOGD("Wrapping keymaster1 module %s with SofKeymasterDevice", mod->name); in keymaster1_device_initialize()
[all …]
/system/core/libziparchive/
Dzip_writer_test.cc188 struct tm mod; in TEST_F() local
189 ConvertZipTimeToTm(data.mod_time, &mod); in TEST_F()
190 EXPECT_EQ(tm.tm_sec, mod.tm_sec); in TEST_F()
191 EXPECT_EQ(tm.tm_min, mod.tm_min); in TEST_F()
192 EXPECT_EQ(tm.tm_hour, mod.tm_hour); in TEST_F()
193 EXPECT_EQ(tm.tm_mday, mod.tm_mday); in TEST_F()
194 EXPECT_EQ(tm.tm_mon, mod.tm_mon); in TEST_F()
195 EXPECT_EQ(tm.tm_year, mod.tm_year); in TEST_F()
239 struct tm mod; in TEST_F() local
240 ConvertZipTimeToTm(data.mod_time, &mod); in TEST_F()
[all …]
/system/media/camera/docs/
Dmetadata-check-dependencies79 local mod=$1
85 if python -c "import $mod" >& /dev/null
100 echo "Missing python module $mod, please install with '$(packager_install $pkg)'"
/system/core/libmincrypt/tools/
DDumpPublicKey.java131 BigInteger RR = R.multiply(R).mod(N); // 2^4096 mod N in printRSA()
136 long n = N.mod(B).longValue(); in printRSA()
150 long rr = RR.mod(B).longValue(); in printRSA()
192 long n = X.mod(B).longValue(); in printEC()
206 long n = Y.mod(B).longValue(); in printEC()
/system/extras/tests/lib/testUtil/
DtestUtil.c205 uint32_t testRandMod(uint32_t mod) in testRandMod() argument
211 uint32_t val = (mod <= lrand48maxVal) ? (uint32_t) lrand48() : testRand(); in testRandMod()
221 if (mod <= 0x10000) { in testRandMod()
226 if (mod <= 0x100) { in testRandMod()
231 return val % mod; in testRandMod()
/system/gatekeeper/tests/
Dgatekeeper_device_test.cpp41 const hw_module_t *mod; in gatekeeper_device_initialize() local
42 ret = hw_get_module_by_class(GATEKEEPER_HARDWARE_MODULE_ID, NULL, &mod); in gatekeeper_device_initialize()
46 ret = gatekeeper_open(mod, dev); in gatekeeper_device_initialize()
/system/extras/perfprofd/tests/
Dperfprofd_test.cc248 …d::string encodedModuleSamplesToString(const wireless_android_play_playlog::LoadModuleSamples &mod) in encodedModuleSamplesToString() argument
252 ss << "load_module_id: " << mod.load_module_id() << "\n"; in encodedModuleSamplesToString()
253 for (size_t k = 0; k < mod.address_samples_size(); k++) { in encodedModuleSamplesToString()
254 const auto &sample = mod.address_samples(k); in encodedModuleSamplesToString()
256 for (size_t l = 0; l < mod.address_samples(k).address_size(); in encodedModuleSamplesToString()
258 auto address = mod.address_samples(k).address(l); in encodedModuleSamplesToString()
/system/extras/tests/include/
DtestUtil.h43 uint32_t testRandMod(uint32_t mod);
/system/core/logcat/
Dlogcat.cpp509 for (unsigned long mod = 1UL; mod < modulo.tv_nsec; mod *= 10) { in lastLogTime() local
510 if (t.tv_nsec % (mod * 10)) { in lastLogTime()
511 modulo.tv_nsec = mod; in lastLogTime()
/system/tools/aidl/
Dast_java.cpp29 void WriteModifiers(CodeWriter* to, int mod, int mask) { in WriteModifiers() argument
30 int m = mod & mask; in WriteModifiers()
Dast_java.h55 void WriteModifiers(CodeWriter* to, int mod, int mask);
/system/vold/
Dcryptfs.c116 const hw_module_t* mod; in keymaster_init() local
117 rc = hw_get_module_by_class(KEYSTORE_HARDWARE_MODULE_ID, NULL, &mod); in keymaster_init()
123 SLOGI("keymaster module name is %s", mod->name); in keymaster_init()
124 SLOGI("keymaster version is %d", mod->module_api_version); in keymaster_init()
128 if (mod->module_api_version == KEYMASTER_MODULE_API_VERSION_1_0) { in keymaster_init()
130 rc = keymaster1_open(mod, keymaster1_dev); in keymaster_init()
133 rc = keymaster0_open(mod, keymaster0_dev); in keymaster_init()
/system/tpm/trunks/generator/
Draw_commands.txt14918 b) if s2 is not an Empty Buffer, compute x2 ≔ HnameAlg (s2) mod p, else skip to step (e)
14924 set r ≔ r mod n
15323 // Compute x2 HnameAlg(s2) mod p
15337 // set p2.x = hash(s2) mod p
Draw_commands_fixed.txt14929 b) if s2 is not an Empty Buffer, compute x2 ≔ HnameAlg (s2) mod p, else skip to step (e)
14935 set r ≔ r mod n
15334 // Compute x2 HnameAlg(s2) mod p
15348 // set p2.x = hash(s2) mod p
Draw_structures.txt10718 The bit in pcrSelect [2] corresponding to PCR 19 is bit 3 (19 mod 8). If sizeofSelect is 3, then the
Draw_structures_fixed.txt10746 The bit in pcrSelect [2] corresponding to PCR 19 is bit 3 (19 mod 8). If sizeofSelect is 3, then the