/system/netd/server/ |
D | WakeupController.cpp | 57 if (extract(payload, header) < sizeof(struct tcphdr)) { in extractIpPorts() 66 if (extract(payload, header) < sizeof(struct udphdr)) { in extractIpPorts() 82 if (extract(payload, header) < sizeof(struct iphdr)) { in extractIpHeader() 96 if (extract(payload, header) < sizeof(struct ip6_hdr)) { in extractIpHeader() 139 extract(payload, ts); in init() 149 extract(payload, args.uid); in init() 153 extract(payload, args.gid); in init() 158 extract(payload, hwaddr); in init() 166 extract(payload, packetHdr); in init()
|
D | XfrmControllerTest.cpp | 290 netdutils::extract(nlMsgSlice, userspi); in TEST_P() 372 netdutils::extract(nlMsgSlice, usersa); in testIpSecAddSecurityAssociation() 410 netdutils::extract(buf, encryptAlgo->crypt); in testIpSecAddSecurityAssociation() 412 netdutils::extract(buf, encryptAlgo->key); in testIpSecAddSecurityAssociation() 415 netdutils::extract(buf, authAlgo->auth); in testIpSecAddSecurityAssociation() 417 netdutils::extract(buf, authAlgo->key); in testIpSecAddSecurityAssociation() 420 netdutils::extract(buf, mark.mark); in testIpSecAddSecurityAssociation() 423 netdutils::extract(buf, outputmark.outputMark); in testIpSecAddSecurityAssociation() 426 netdutils::extract(buf, xfrm_if_id.if_id); in testIpSecAddSecurityAssociation() 429 netdutils::extract(buf, replay_esn->replay_state); in testIpSecAddSecurityAssociation() [all …]
|
D | NFLogListener.cpp | 35 using netdutils::extract; 151 extract(msg, nfmsg); in NFLogListener() 162 extract(msg, nfmsg); in NFLogListener()
|
/system/security/mls/mls-rs-crypto-boringssl/src/ |
D | kdf.rs | 79 async fn extract(&self, salt: &[u8], ikm: &[u8]) -> Result<Vec<u8>, KdfError> { in extract() method 88 Ok(HkdfSha256::extract(ikm, salt).as_bytes()[..self.extract_size()].to_vec()) in extract() 91 Ok(HkdfSha512::extract(ikm, salt).as_bytes()[..self.extract_size()].to_vec()) in extract() 161 let prk = kdf.extract(&salt, &ikm).unwrap(); in sha256() 177 let prk = kdf.extract(&salt, &ikm).unwrap(); in sha512() 184 assert_matches!(kdf.extract(b"salty", b""), Err(KdfError::TooShortIkm { .. })); in sha256_extract_short_ikm() 213 assert_matches!(kdf.extract(b"salty", b""), Err(KdfError::TooShortIkm { .. })); in sha512_extract_short_ikm() 233 let prk = kdf_sha512.extract(&salt, &ikm).unwrap(); in sha512_expand_long_okm() 246 Kdf::new(CipherSuite::P384_AES256).unwrap().extract(&salt, &ikm), in unsupported_cipher_suites()
|
/system/chre/util/tests/ |
D | atomic_spsc_queue_test.cc | 157 size_t extracted = q.consumer().extract(dest, kSize); in TEST() 175 size_t extracted = q.consumer().extract(dest, kSize / 4); in TEST() 183 extracted = q.consumer().extract(&dest[kSize / 4], kSize / 4); in TEST() 218 size_t extracted = c.extract(dest, kSize - 1); in TEST() 223 extracted = c.extract(&dest[kSize - 1], 2); in TEST() 269 size_t extracted = c.extract(&v); in TEST() 283 extracted = c.extract(&v); in TEST() 292 extracted = c.extract(&v); in TEST() 298 extracted = c.extract(&v); in TEST() 306 extracted = c.extract(&v); in TEST() [all …]
|
/system/update_engine/scripts/ |
D | cow_converter.py | 52 payload_path = ota_zip.extract("payload.bin", output_dir) 60 img_path = zfp.extract(fileinfo, tmp_dir)
|
D | simulate_ota.py | 181 zfp.extract(payload_entry_name, tempdir)
|
D | brillo_update_payload | 439 cros_generate_update_payload --extract \
|
/system/core/rootdir/ |
D | asan_extract.rc | 1 # When /data is available, look for /system/asan.tar.gz and potentially extract.
|
/system/apex/tools/ |
D | apex_compression_tool.py | 110 zip_obj.extract(meta_file, path=extract_dir) 116 zip_obj.extract('apex_payload.img', path= work_dir)
|
D | deapexer.py | 168 self._payload = zip_ref.extract('apex_payload.img', path=self._tempdir) 256 def extract(self, dest): member in Apex 311 apex.extract(args.dest) 376 zip_obj.extract(original_apex_info,
|
/system/extras/tools/ |
D | check_elf_alignment.sh | 69 deapexer extract "${dir}" "${tmp}" >/dev/null 2>&1
|
/system/sepolicy/private/ |
D | blkid.te | 7 # Allowed read-only access to encrypted devices to extract UUID/label
|
D | blkid_untrusted.te | 5 # Allowed read-only access to vold block devices to extract UUID/label
|
D | ueventd.te | 71 # Query device-mapper to extract name/uuid in response to uevents.
|
D | gsid.te | 111 # 2. extract its block layout with FIEMAP
|
/system/chre/util/include/chre/util/system/ |
D | atomic_spsc_queue.h | 259 size_t extract(ElementType *dest, size_t count) { in extract() function 267 size_t extract(FixedSizeVector<ElementType, kDestCapacity> *dest) { in extract() function
|
/system/authgraph/boringssl/src/ |
D | hmac.rs | 43 fn extract(&self, salt: &[u8], ikm: &EcdhSecret) -> Result<PseudoRandKey, Error> { in extract() method
|
/system/extras/simpleperf/scripts/ |
D | api_profiler.py | 92 zip_fh.extract(name, self.args.out_dir)
|
/system/authgraph/core/src/ |
D | traits.rs | 134 fn extract(&self, salt: &[u8], ikm: &EcdhSecret) -> Result<PseudoRandKey, Error>; in extract() method
|
/system/sepolicy/microdroid/system/private/ |
D | ueventd.te | 52 # Query device-mapper to extract name/uuid in response to uevents.
|
/system/keymint/common/src/crypto/ |
D | traits.rs | 445 let prk = self.extract(salt, ikm)?; in hkdf() 450 fn extract(&self, salt: &[u8], ikm: &[u8]) -> Result<OpaqueOr<hmac::Key>, Error>; in extract() method
|
/system/sepolicy/tools/ |
D | sepolicy_generate_compat.py | 138 zip_file.extract('system.img', temp_dir)
|
/system/extras/perf2cfg/ |
D | README.md | 45 The perf data files to extract information from.
|
/system/sepolicy/tools/sepolicy-analyze/ |
D | README | 101 for the parser but could also be used to extract neverallow rules from
|