/system/core/tzdatacheck/ |
D | tzdatacheck.cpp | 199 enum PathStatus { ERR, NONE, IS_DIR, IS_REG, UNKNOWN }; enumerator 208 return NONE; in checkPath() 220 if (pathStatus == NONE) { in deleteFile() 250 if (pathStatus == NONE) { in deleteDir() 322 case NONE: in handleStagedUninstall() 366 case NONE: in handleStagedInstall() 411 if (dataStagedDirStatus == NONE) { in processStagedOperation() 440 if (uninstallTombStoneFileStatus != IS_REG && uninstallTombStoneFileStatus != NONE) { in processStagedOperation() 488 if (dataCurrentDirStatus == NONE) { in main()
|
/system/tools/hidl/c2hal/ |
D | Type.h | 35 NONE = 0, enumerator 81 case Qualifier::NONE: return ""; in qualifierText()
|
/system/security/keystore/ |
D | keystore_utils.cpp | 70 params->push_back(TAG_PADDING, PaddingMode::NONE); in add_legacy_key_authorizations() 77 params->push_back(TAG_DIGEST, Digest::NONE); in add_legacy_key_authorizations()
|
D | auth_token_table.cpp | 114 defaultOr(key_info.GetTagValue(TAG_USER_AUTH_TYPE), HardwareAuthenticatorType::NONE); in FindAuthorization()
|
D | keystore_cli_v2.cpp | 162 parameters.Padding(PaddingMode::NONE); in GetAESParameters()
|
D | key_store_service.cpp | 1766 params->push_back(TAG_DIGEST, Digest::NONE); in addLegacyBeginParams() 1767 params->push_back(TAG_PADDING, PaddingMode::NONE); in addLegacyBeginParams()
|
/system/vold/ |
D | Keymaster.cpp | 235 .Authorization(TAG_PADDING, PaddingMode::NONE) in keymaster_create_key_for_cryptfs_scrypt() 236 .Authorization(TAG_DIGEST, Digest::NONE) in keymaster_create_key_for_cryptfs_scrypt() 283 .Authorization(TAG_PADDING, PaddingMode::NONE) in keymaster_sign_object_for_cryptfs_scrypt() 284 .Authorization(TAG_DIGEST, Digest::NONE); in keymaster_sign_object_for_cryptfs_scrypt()
|
D | KeyStorage.cpp | 113 .Authorization(TAG_PADDING, PaddingMode::NONE) in generateKeymasterKey() 138 .Authorization(TAG_PADDING, PaddingMode::NONE) in beginParams()
|
/system/netd/server/ |
D | FirewallControllerTest.cpp | 140 mFw.setUidRule(NONE, 54321, DENY); in TEST_F() 149 mFw.setUidRule(NONE, 54321, ALLOW); in TEST_F()
|
D | FirewallController.h | 34 enum ChildChain { NONE, DOZABLE, STANDBY, POWERSAVE, INVALID_CHAIN }; enumerator
|
D | FirewallController.cpp | 224 case NONE: in getFirewallType() 256 case NONE: in setUidRule()
|
D | CommandListener.cpp | 1102 return NONE; in parseChildChain()
|
/system/security/keystore/include/keystore/ |
D | authorization_set.h | 326 Authorization(TAG_DIGEST, Digest::NONE); in NoDigestOrPadding() 327 return Authorization(TAG_PADDING, PaddingMode::NONE); in NoDigestOrPadding()
|
/system/chre/platform/shared/include/chre/platform/shared/ |
D | host_messages_generated.h | 35 NONE = 0, enumerator 43 MIN = NONE, 68 static const ChreMessage enum_value = ChreMessage::NONE; 797 ChreMessage message_type = ChreMessage::NONE, 809 case ChreMessage::NONE: {
|
/system/chre/host/common/include/chre_host/ |
D | host_messages_generated.h | 44 NONE = 0, enumerator 52 MIN = NONE, 77 static const ChreMessage enum_value = ChreMessage::NONE; 112 ChreMessageUnion() : type(ChreMessage::NONE), table(nullptr) {} 125 if (type != ChreMessage::NONE) { 1115 ChreMessage message_type = ChreMessage::NONE, 1420 case ChreMessage::NONE: { 1574 type = ChreMessage::NONE;
|