/system/core/libpixelflinger/codeflinger/ |
D | Arm64Disassembler.cpp | 95 static void get_token(const char *instr, uint32_t index, char *token) in get_token() argument 102 token[j++] = instr[i]; in get_token() 111 token[j++] = instr[i]; in get_token() 114 token[j] = '\0'; in get_token() 134 static void decode_token(uint32_t code, char *token, char *instr_part) in decode_token() argument 136 if(strcmp(token, "<imm1>") == 0) in decode_token() 138 else if(strcmp(token, "<imm2>") == 0) in decode_token() 140 else if(strcmp(token, "<shift1>") == 0) in decode_token() 142 else if(strcmp(token, "<shift2>") == 0) in decode_token() 147 else if(strcmp(token, "<shift3>") == 0) in decode_token() [all …]
|
/system/keymaster/ |
D | keymaster_enforcement_test.cpp | 54 bool auth_token_timed_out(const hw_auth_token_t& token, uint32_t timeout) const { in auth_token_timed_out() argument 55 return current_time_ > ntoh(token.timestamp) + timeout; in auth_token_timed_out() 520 hw_auth_token_t token; in TEST_F() local 521 memset(&token, 0, sizeof(token)); in TEST_F() 522 token.version = HW_AUTH_TOKEN_VERSION; in TEST_F() 523 token.challenge = 99; in TEST_F() 524 token.user_id = 9; in TEST_F() 525 token.authenticator_id = 0; in TEST_F() 526 token.authenticator_type = hton(static_cast<uint32_t>(HW_AUTH_PASSWORD)); in TEST_F() 527 token.timestamp = 0; in TEST_F() [all …]
|
/system/tools/aidl/ |
D | aidl_language_l.ll | 25 /* This happens at every call to yylex (every time we receive one token) */ 42 \"[^\"]*\" { yylval->token = new AidlToken(yytext, extra_text); 43 return yy::parser::token::C_STR; } 66 parcelable { return yy::parser::token::PARCELABLE; } 67 import { return yy::parser::token::IMPORT; } 68 package { return yy::parser::token::PACKAGE; } 69 int { return yy::parser::token::INT; } 70 in { return yy::parser::token::IN; } 71 out { return yy::parser::token::OUT; } 72 inout { return yy::parser::token::INOUT; } [all …]
|
D | aidl_language_y.yy | 21 AidlToken* token; 40 %token<token> IDENTIFIER INTERFACE ONEWAY C_STR 41 %token<integer> INTVALUE 43 %token '(' ')' ',' '=' '[' ']' '<' '>' '.' '{' '}' ';' 44 %token IN OUT INOUT PACKAGE IMPORT PARCELABLE CPP_HEADER CONST INT 45 %token ANNOTATION_NULLABLE ANNOTATION_UTF8 ANNOTATION_UTF8_CPP 63 %type<token> identifier error 73 * non-terminal, which is either an IDENTIFIER token, or one of the
|
/system/security/keystore/ |
D | operation.cpp | 31 sp<IBinder> token = new BBinder(); in addOperation() local 32 mMap[token] = Operation(handle, keyid, purpose, dev, characteristics, appToken); in addOperation() 34 mLru.push_back(token); in addOperation() 39 mAppTokenMap[appToken].push_back(token); in addOperation() 40 return token; in addOperation() 43 bool OperationMap::getOperation(sp<IBinder> token, keymaster_operation_handle_t* outHandle, in getOperation() argument 50 auto entry = mMap.find(token); in getOperation() 54 updateLru(token); in getOperation() 66 void OperationMap::updateLru(sp<IBinder> token) { in updateLru() argument 67 auto lruEntry = std::find(mLru.begin(), mLru.end(), token); in updateLru() [all …]
|
D | operation.h | 54 bool getOperation(sp<IBinder> token, keymaster_operation_handle_t* outHandle, 58 bool removeOperation(sp<IBinder> token); 62 bool getOperationAuthToken(sp<IBinder> token, const hw_auth_token_t** outToken); 63 bool setOperationAuthToken(sp<IBinder> token, const hw_auth_token_t* authToken); 68 void updateLru(sp<IBinder> token); 69 void removeOperationTracking(sp<IBinder> token, sp<IBinder> appToken);
|
D | key_store_service.h | 108 void update(const sp<IBinder>& token, const KeymasterArguments& params, const uint8_t* data, 110 void finish(const sp<IBinder>& token, const KeymasterArguments& params, 113 int32_t abort(const sp<IBinder>& token); 115 bool isOperationAuthorized(const sp<IBinder>& token); 117 int32_t addAuthToken(const uint8_t* token, size_t length); 197 void addAuthToParams(std::vector<keymaster_key_param_t>* params, const hw_auth_token_t* token); 210 int32_t addOperationAuthTokenIfNeeded(sp<IBinder> token,
|
D | auth_token_table.cpp | 111 entries_, [&](Entry& e) { return e.token()->challenge == op_handle && !e.completed(); }); in FindAuthPerOpAuthorization() 119 *found = matching_op->token(); in FindAuthPerOpAuthorization() 142 *found = newest_match->token(); in FindTimedAuthorization() 168 auto found = find_if(entries_, [&](Entry& e) { return e.token()->challenge == op_handle; }); in MarkCompleted() 179 AuthTokenTable::Entry::Entry(const hw_auth_token_t* token, time_t current_time) in Entry() argument 180 : token_(token), time_received_(current_time), last_use_(current_time), in Entry()
|
D | key_store_service.cpp | 53 for (auto token : operations) { in binderDied() local 54 abort(token); in binderDied() 951 result->token = operationToken; in begin() 959 void KeyStoreService::update(const sp<IBinder>& token, const KeymasterArguments& params, in update() argument 970 if (!mOperationMap.getOperation(token, &handle, &keyid, &purpose, &dev, &characteristics)) { in update() 975 int32_t authResult = addOperationAuthTokenIfNeeded(token, &opParams); in update() 1008 void KeyStoreService::finish(const sp<IBinder>& token, const KeymasterArguments& params, in finish() argument 1021 if (!mOperationMap.getOperation(token, &handle, &keyid, &purpose, &dev, &characteristics)) { in finish() 1026 int32_t authResult = addOperationAuthTokenIfNeeded(token, &opParams); in finish() 1065 mOperationMap.removeOperation(token); in finish() [all …]
|
/system/tools/aidl/tests/ |
D | aidl_test_service.cpp | 105 void LogRepeatedStringToken(const String16& token) { in LogRepeatedStringToken() argument 106 ALOGI("Repeating '%s' of length=%zu", android::String8(token).string(), in LogRepeatedStringToken() 107 token.size()); in LogRepeatedStringToken() 111 void LogRepeatedToken(const T& token) { in LogRepeatedToken() argument 113 token_str << token; in LogRepeatedToken() 117 Status RepeatBoolean(bool token, bool* _aidl_return) override { in RepeatBoolean() argument 118 LogRepeatedToken(token ? 1 : 0); in RepeatBoolean() 119 *_aidl_return = token; in RepeatBoolean() 122 Status RepeatByte(int8_t token, int8_t* _aidl_return) override { in RepeatByte() argument 123 LogRepeatedToken(token); in RepeatByte() [all …]
|
/system/vold/ |
D | ScryptParameters.cpp | 24 char *token; in parse_scrypt_parameters() local 32 for (i = 0, token = strtok_r(const_cast<char *>(paramstr), ":", &saveptr); in parse_scrypt_parameters() 33 token != nullptr && i < 3; in parse_scrypt_parameters() 34 i++, token = strtok_r(nullptr, ":", &saveptr)) { in parse_scrypt_parameters() 36 params[i] = strtol(token, &endptr, 10); in parse_scrypt_parameters() 41 if ((*token == '\0') || (*endptr != '\0') || params[i] < 0 || params[i] > 255) { in parse_scrypt_parameters() 45 if (token != nullptr) { in parse_scrypt_parameters()
|
D | Ext4Crypt.h | 31 bool e4crypt_add_user_key_auth(userid_t user_id, int serial, const char* token, 35 bool e4crypt_unlock_user_key(userid_t user_id, int serial, const char* token, const char* secret);
|
D | KeyStorage.h | 31 KeyAuthentication(std::string t, std::string s) : token{t}, secret{s} {}; in KeyAuthentication() 32 const std::string token; variable
|
/system/core/adb/ |
D | adb_auth.h | 28 void send_auth_response(uint8_t *token, size_t token_size, atransport *t); 41 int adb_auth_sign(void *key, const unsigned char* token, size_t token_size, 46 static inline int adb_auth_generate_token(void *token, size_t token_size) { return 0; } in adb_auth_generate_token() argument 47 static inline int adb_auth_verify(void *token, void *sig, int siglen) { return 0; } in adb_auth_verify() argument 52 static inline int adb_auth_sign(void* key, const unsigned char* token, in adb_auth_sign() argument 61 int adb_auth_generate_token(void *token, size_t token_size); 62 int adb_auth_verify(uint8_t* token, uint8_t* sig, int siglen);
|
D | adb_auth.cpp | 39 ret = adb_auth_generate_token(t->token, sizeof(t->token)); in send_auth_request() 40 if (ret != sizeof(t->token)) { in send_auth_request() 46 memcpy(p->data, t->token, ret); in send_auth_request() 53 void send_auth_response(uint8_t *token, size_t token_size, atransport *t) in send_auth_response() argument 59 ret = adb_auth_sign(t->key, token, token_size, p->data); in send_auth_response()
|
D | console.cpp | 40 std::string token; in adb_construct_auth_command() local 41 if (!android::base::ReadFileToString(auth_token_path, &token) in adb_construct_auth_command() 42 || token.empty()) { in adb_construct_auth_command() 50 command += token; in adb_construct_auth_command()
|
/system/tools/aidl/tests/android/aidl/tests/ |
D | ITestService.aidl | 35 boolean RepeatBoolean(boolean token); in RepeatBoolean() argument 36 byte RepeatByte(byte token); in RepeatByte() argument 37 char RepeatChar(char token); in RepeatChar() argument 38 int RepeatInt(int token); in RepeatInt() argument 39 long RepeatLong(long token); in RepeatLong() argument 40 float RepeatFloat(float token); in RepeatFloat() argument 41 double RepeatDouble(double token); in RepeatDouble() argument 42 String RepeatString(String token); in RepeatString() argument 87 @utf8InCpp String RepeatUtf8CppString(@utf8InCpp String token); in RepeatUtf8CppString() argument 89 @nullable @utf8InCpp String token); in RepeatNullableUtf8CppString()
|
/system/gatekeeper/ |
D | gatekeeper.cpp | 222 hw_auth_token_t *token = new hw_auth_token_t; in MintAuthToken() local 225 token->version = HW_AUTH_TOKEN_VERSION; in MintAuthToken() 226 token->challenge = challenge; in MintAuthToken() 227 token->user_id = user_id; in MintAuthToken() 228 token->authenticator_id = authenticator_id; in MintAuthToken() 229 token->authenticator_type = htonl(HW_AUTH_PASSWORD); in MintAuthToken() 230 token->timestamp = htobe64(timestamp); in MintAuthToken() 235 uint32_t hash_len = (uint32_t)((uint8_t *)&token->hmac - (uint8_t *)token); in MintAuthToken() 236 ComputeSignature(token->hmac, sizeof(token->hmac), auth_token_key, key_len, in MintAuthToken() 237 reinterpret_cast<uint8_t *>(token), hash_len); in MintAuthToken() [all …]
|
/system/update_engine/ |
D | chrome_browser_proxy_resolver.cc | 159 string token = entry_tok.token(); in ParseProxyString() local 160 base::TrimWhitespaceASCII(token, base::TRIM_ALL, &token); in ParseProxyString() 164 for (space = token.begin(); space != token.end(); ++space) { in ParseProxyString() 170 string scheme = base::ToLowerASCII(string(token.begin(), space)); in ParseProxyString() 182 string host_and_port = string(space, token.end()); in ParseProxyString()
|
/system/core/libcutils/ |
D | canned_fs_config.c | 63 char* token = NULL; in load_canned_fs_config() local 65 token = strtok(NULL, " "); in load_canned_fs_config() 66 if (token && strncmp(token, "capabilities=", 13) == 0) { in load_canned_fs_config() 67 p->capabilities = strtoll(token+13, NULL, 0); in load_canned_fs_config() 70 } while (token); in load_canned_fs_config()
|
/system/core/crash_reporter/ |
D | list_proxies.cc | 72 std::string token = entry_tok.token(); in ParseProxyString() local 73 base::TrimWhitespaceASCII(token, base::TRIM_ALL, &token); in ParseProxyString() 77 for (space = token.begin(); space != token.end(); ++space) { in ParseProxyString() 83 std::string scheme = base::ToLowerASCII(std::string(token.begin(), space)); in ParseProxyString() 95 std::string host_and_port = std::string(space, token.end()); in ParseProxyString()
|
/system/bt/service/common/bluetooth/util/ |
D | address_helper.cpp | 44 const auto& token = byte_tokens[i]; in BdAddrFromString() local 46 if (token.length() != 2) in BdAddrFromString() 50 out_addr->address[i] = strtol(token.c_str(), &temp, 16); in BdAddrFromString()
|
/system/extras/libfec/ |
D | fec_verity.cpp | 352 for (const auto token : tokens) { in parse_table() local 355 if (token != stringify(VERITY_TABLE_VERSION)) { in parse_table() 356 error("unsupported verity table version: %s", token.c_str()); in parse_table() 363 if (token != stringify(FEC_BLOCKSIZE)) { in parse_table() 364 error("unsupported verity block size: %s", token.c_str()); in parse_table() 369 if (parse_uint64(token.c_str(), f->data_size / FEC_BLOCKSIZE, in parse_table() 372 token.c_str()); in parse_table() 377 if (parse_uint64(token.c_str(), f->data_size / FEC_BLOCKSIZE, in parse_table() 379 error("invalid verity hash start block: %s", token.c_str()); in parse_table() 386 if (token != "sha256") { in parse_table() [all …]
|
/system/connectivity/shill/ |
D | scope_logger.cc | 137 enable_scope = (tokenizer.token() == "+"); in EnableScopesByName() 141 if (tokenizer.token().empty()) in EnableScopesByName() 146 if (tokenizer.token() == kScopeNames[i]) { in EnableScopesByName() 152 << "Unknown scope '" << tokenizer.token() << "'"; in EnableScopesByName()
|
/system/core/sdcard/ |
D | sdcard.c | 248 int token; member 806 TRACE("[%d] LOOKUP %s @ %"PRIx64" (%s)\n", handler->token, name, hdr->nodeid, in handle_lookup() 828 TRACE("[%d] FORGET #%"PRIu64" @ %"PRIx64" (%s)\n", handler->token, req->nlookup, in handle_forget() 848 TRACE("[%d] GETATTR flags=%x fh=%"PRIx64" @ %"PRIx64" (%s)\n", handler->token, in handle_getattr() 871 TRACE("[%d] SETATTR fh=%"PRIx64" valid=%x @ %"PRIx64" (%s)\n", handler->token, in handle_setattr() 917 handler->token, path, times[0].tv_sec, times[1].tv_sec); in handle_setattr() 936 TRACE("[%d] MKNOD %s 0%o @ %"PRIx64" (%s)\n", handler->token, in handle_mknod() 965 TRACE("[%d] MKDIR %s 0%o @ %"PRIx64" (%s)\n", handler->token, in handle_mkdir() 1013 TRACE("[%d] UNLINK %s @ %"PRIx64" (%s)\n", handler->token, in handle_unlink() 1036 handler->token, (uint64_t) parent_node->nid, (uint64_t) child_node->nid, name); in handle_unlink() [all …]
|