/system/security/keystore/ |
D | keystore_main.cpp | 58 static int keymaster0_device_initialize(const hw_module_t* mod, keymaster2_device_t** dev) { in keymaster0_device_initialize() argument 59 assert(mod->module_api_version < KEYMASTER_MODULE_API_VERSION_1_0); in keymaster0_device_initialize() 60 ALOGI("Found keymaster0 module %s, version %x", mod->name, mod->module_api_version); in keymaster0_device_initialize() 66 int rc = keymaster0_open(mod, &km0_device); in keymaster0_device_initialize() 81 ALOGD("Wrapping keymaster0 module %s with SoftKeymasterDevice", mod->name); in keymaster0_device_initialize() 101 static int keymaster1_device_initialize(const hw_module_t* mod, keymaster2_device_t** dev) { in keymaster1_device_initialize() argument 102 assert(mod->module_api_version >= KEYMASTER_MODULE_API_VERSION_1_0); in keymaster1_device_initialize() 103 ALOGI("Found keymaster1 module %s, version %x", mod->name, mod->module_api_version); in keymaster1_device_initialize() 109 int rc = keymaster1_open(mod, &km1_device); in keymaster1_device_initialize() 115 ALOGD("Wrapping keymaster1 module %s with SofKeymasterDevice", mod->name); in keymaster1_device_initialize() [all …]
|
/system/core/libziparchive/ |
D | zip_writer_test.cc | 188 struct tm mod; in TEST_F() local 189 ConvertZipTimeToTm(data.mod_time, &mod); in TEST_F() 190 EXPECT_EQ(tm.tm_sec, mod.tm_sec); in TEST_F() 191 EXPECT_EQ(tm.tm_min, mod.tm_min); in TEST_F() 192 EXPECT_EQ(tm.tm_hour, mod.tm_hour); in TEST_F() 193 EXPECT_EQ(tm.tm_mday, mod.tm_mday); in TEST_F() 194 EXPECT_EQ(tm.tm_mon, mod.tm_mon); in TEST_F() 195 EXPECT_EQ(tm.tm_year, mod.tm_year); in TEST_F() 239 struct tm mod; in TEST_F() local 240 ConvertZipTimeToTm(data.mod_time, &mod); in TEST_F() [all …]
|
/system/media/camera/docs/ |
D | metadata-check-dependencies | 79 local mod=$1 85 if python -c "import $mod" >& /dev/null 100 echo "Missing python module $mod, please install with '$(packager_install $pkg)'"
|
/system/core/libmincrypt/tools/ |
D | DumpPublicKey.java | 131 BigInteger RR = R.multiply(R).mod(N); // 2^4096 mod N in printRSA() 136 long n = N.mod(B).longValue(); in printRSA() 150 long rr = RR.mod(B).longValue(); in printRSA() 192 long n = X.mod(B).longValue(); in printEC() 206 long n = Y.mod(B).longValue(); in printEC()
|
/system/extras/tests/lib/testUtil/ |
D | testUtil.c | 205 uint32_t testRandMod(uint32_t mod) in testRandMod() argument 211 uint32_t val = (mod <= lrand48maxVal) ? (uint32_t) lrand48() : testRand(); in testRandMod() 221 if (mod <= 0x10000) { in testRandMod() 226 if (mod <= 0x100) { in testRandMod() 231 return val % mod; in testRandMod()
|
/system/gatekeeper/tests/ |
D | gatekeeper_device_test.cpp | 41 const hw_module_t *mod; in gatekeeper_device_initialize() local 42 ret = hw_get_module_by_class(GATEKEEPER_HARDWARE_MODULE_ID, NULL, &mod); in gatekeeper_device_initialize() 46 ret = gatekeeper_open(mod, dev); in gatekeeper_device_initialize()
|
/system/extras/perfprofd/tests/ |
D | perfprofd_test.cc | 248 …d::string encodedModuleSamplesToString(const wireless_android_play_playlog::LoadModuleSamples &mod) in encodedModuleSamplesToString() argument 252 ss << "load_module_id: " << mod.load_module_id() << "\n"; in encodedModuleSamplesToString() 253 for (size_t k = 0; k < mod.address_samples_size(); k++) { in encodedModuleSamplesToString() 254 const auto &sample = mod.address_samples(k); in encodedModuleSamplesToString() 256 for (size_t l = 0; l < mod.address_samples(k).address_size(); in encodedModuleSamplesToString() 258 auto address = mod.address_samples(k).address(l); in encodedModuleSamplesToString()
|
/system/extras/tests/include/ |
D | testUtil.h | 43 uint32_t testRandMod(uint32_t mod);
|
/system/core/logcat/ |
D | logcat.cpp | 509 for (unsigned long mod = 1UL; mod < modulo.tv_nsec; mod *= 10) { in lastLogTime() local 510 if (t.tv_nsec % (mod * 10)) { in lastLogTime() 511 modulo.tv_nsec = mod; in lastLogTime()
|
/system/tools/aidl/ |
D | ast_java.cpp | 29 void WriteModifiers(CodeWriter* to, int mod, int mask) { in WriteModifiers() argument 30 int m = mod & mask; in WriteModifiers()
|
D | ast_java.h | 55 void WriteModifiers(CodeWriter* to, int mod, int mask);
|
/system/vold/ |
D | cryptfs.c | 116 const hw_module_t* mod; in keymaster_init() local 117 rc = hw_get_module_by_class(KEYSTORE_HARDWARE_MODULE_ID, NULL, &mod); in keymaster_init() 123 SLOGI("keymaster module name is %s", mod->name); in keymaster_init() 124 SLOGI("keymaster version is %d", mod->module_api_version); in keymaster_init() 128 if (mod->module_api_version == KEYMASTER_MODULE_API_VERSION_1_0) { in keymaster_init() 130 rc = keymaster1_open(mod, keymaster1_dev); in keymaster_init() 133 rc = keymaster0_open(mod, keymaster0_dev); in keymaster_init()
|
/system/tpm/trunks/generator/ |
D | raw_commands.txt | 14918 b) if s2 is not an Empty Buffer, compute x2 ≔ HnameAlg (s2) mod p, else skip to step (e) 14924 set r ≔ r mod n 15323 // Compute x2 HnameAlg(s2) mod p 15337 // set p2.x = hash(s2) mod p
|
D | raw_commands_fixed.txt | 14929 b) if s2 is not an Empty Buffer, compute x2 ≔ HnameAlg (s2) mod p, else skip to step (e) 14935 set r ≔ r mod n 15334 // Compute x2 HnameAlg(s2) mod p 15348 // set p2.x = hash(s2) mod p
|
D | raw_structures.txt | 10718 The bit in pcrSelect [2] corresponding to PCR 19 is bit 3 (19 mod 8). If sizeofSelect is 3, then the
|
D | raw_structures_fixed.txt | 10746 The bit in pcrSelect [2] corresponding to PCR 19 is bit 3 (19 mod 8). If sizeofSelect is 3, then the
|