Home
last modified time | relevance | path

Searched refs:extract (Results 1 – 25 of 39) sorted by relevance

12

/system/netd/server/
DWakeupController.cpp57 if (extract(payload, header) < sizeof(struct tcphdr)) { in extractIpPorts()
66 if (extract(payload, header) < sizeof(struct udphdr)) { in extractIpPorts()
82 if (extract(payload, header) < sizeof(struct iphdr)) { in extractIpHeader()
96 if (extract(payload, header) < sizeof(struct ip6_hdr)) { in extractIpHeader()
139 extract(payload, ts); in init()
149 extract(payload, args.uid); in init()
153 extract(payload, args.gid); in init()
158 extract(payload, hwaddr); in init()
166 extract(payload, packetHdr); in init()
DXfrmControllerTest.cpp290 netdutils::extract(nlMsgSlice, userspi); in TEST_P()
372 netdutils::extract(nlMsgSlice, usersa); in testIpSecAddSecurityAssociation()
410 netdutils::extract(buf, encryptAlgo->crypt); in testIpSecAddSecurityAssociation()
412 netdutils::extract(buf, encryptAlgo->key); in testIpSecAddSecurityAssociation()
415 netdutils::extract(buf, authAlgo->auth); in testIpSecAddSecurityAssociation()
417 netdutils::extract(buf, authAlgo->key); in testIpSecAddSecurityAssociation()
420 netdutils::extract(buf, mark.mark); in testIpSecAddSecurityAssociation()
423 netdutils::extract(buf, outputmark.outputMark); in testIpSecAddSecurityAssociation()
426 netdutils::extract(buf, xfrm_if_id.if_id); in testIpSecAddSecurityAssociation()
429 netdutils::extract(buf, replay_esn->replay_state); in testIpSecAddSecurityAssociation()
[all …]
DNFLogListener.cpp35 using netdutils::extract;
151 extract(msg, nfmsg); in NFLogListener()
162 extract(msg, nfmsg); in NFLogListener()
/system/security/mls/mls-rs-crypto-boringssl/src/
Dkdf.rs79 async fn extract(&self, salt: &[u8], ikm: &[u8]) -> Result<Vec<u8>, KdfError> { in extract() method
88 Ok(HkdfSha256::extract(ikm, salt).as_bytes()[..self.extract_size()].to_vec()) in extract()
91 Ok(HkdfSha512::extract(ikm, salt).as_bytes()[..self.extract_size()].to_vec()) in extract()
161 let prk = kdf.extract(&salt, &ikm).unwrap(); in sha256()
177 let prk = kdf.extract(&salt, &ikm).unwrap(); in sha512()
184 assert_matches!(kdf.extract(b"salty", b""), Err(KdfError::TooShortIkm { .. })); in sha256_extract_short_ikm()
213 assert_matches!(kdf.extract(b"salty", b""), Err(KdfError::TooShortIkm { .. })); in sha512_extract_short_ikm()
233 let prk = kdf_sha512.extract(&salt, &ikm).unwrap(); in sha512_expand_long_okm()
246 Kdf::new(CipherSuite::P384_AES256).unwrap().extract(&salt, &ikm), in unsupported_cipher_suites()
/system/chre/util/tests/
Datomic_spsc_queue_test.cc157 size_t extracted = q.consumer().extract(dest, kSize); in TEST()
175 size_t extracted = q.consumer().extract(dest, kSize / 4); in TEST()
183 extracted = q.consumer().extract(&dest[kSize / 4], kSize / 4); in TEST()
218 size_t extracted = c.extract(dest, kSize - 1); in TEST()
223 extracted = c.extract(&dest[kSize - 1], 2); in TEST()
269 size_t extracted = c.extract(&v); in TEST()
283 extracted = c.extract(&v); in TEST()
292 extracted = c.extract(&v); in TEST()
298 extracted = c.extract(&v); in TEST()
306 extracted = c.extract(&v); in TEST()
[all …]
/system/update_engine/scripts/
Dcow_converter.py52 payload_path = ota_zip.extract("payload.bin", output_dir)
60 img_path = zfp.extract(fileinfo, tmp_dir)
Dsimulate_ota.py181 zfp.extract(payload_entry_name, tempdir)
Dbrillo_update_payload439 cros_generate_update_payload --extract \
/system/core/rootdir/
Dasan_extract.rc1 # When /data is available, look for /system/asan.tar.gz and potentially extract.
/system/apex/tools/
Dapex_compression_tool.py110 zip_obj.extract(meta_file, path=extract_dir)
116 zip_obj.extract('apex_payload.img', path= work_dir)
Ddeapexer.py168 self._payload = zip_ref.extract('apex_payload.img', path=self._tempdir)
256 def extract(self, dest): member in Apex
311 apex.extract(args.dest)
376 zip_obj.extract(original_apex_info,
/system/extras/tools/
Dcheck_elf_alignment.sh69 deapexer extract "${dir}" "${tmp}" >/dev/null 2>&1
/system/sepolicy/private/
Dblkid.te7 # Allowed read-only access to encrypted devices to extract UUID/label
Dblkid_untrusted.te5 # Allowed read-only access to vold block devices to extract UUID/label
Dueventd.te71 # Query device-mapper to extract name/uuid in response to uevents.
Dgsid.te111 # 2. extract its block layout with FIEMAP
/system/chre/util/include/chre/util/system/
Datomic_spsc_queue.h259 size_t extract(ElementType *dest, size_t count) { in extract() function
267 size_t extract(FixedSizeVector<ElementType, kDestCapacity> *dest) { in extract() function
/system/authgraph/boringssl/src/
Dhmac.rs43 fn extract(&self, salt: &[u8], ikm: &EcdhSecret) -> Result<PseudoRandKey, Error> { in extract() method
/system/extras/simpleperf/scripts/
Dapi_profiler.py92 zip_fh.extract(name, self.args.out_dir)
/system/authgraph/core/src/
Dtraits.rs134 fn extract(&self, salt: &[u8], ikm: &EcdhSecret) -> Result<PseudoRandKey, Error>; in extract() method
/system/sepolicy/microdroid/system/private/
Dueventd.te52 # Query device-mapper to extract name/uuid in response to uevents.
/system/keymint/common/src/crypto/
Dtraits.rs445 let prk = self.extract(salt, ikm)?; in hkdf()
450 fn extract(&self, salt: &[u8], ikm: &[u8]) -> Result<OpaqueOr<hmac::Key>, Error>; in extract() method
/system/sepolicy/tools/
Dsepolicy_generate_compat.py138 zip_file.extract('system.img', temp_dir)
/system/extras/perf2cfg/
DREADME.md45 The perf data files to extract information from.
/system/sepolicy/tools/sepolicy-analyze/
DREADME101 for the parser but could also be used to extract neverallow rules from

12