/trusty/user/base/lib/trusty-sys/src/ |
D | types.rs | 4 #[cfg(not(any(target_arch = "aarch64", target_arch = "arm", target_arch = "x86_64")))] 9 #[cfg(any(target_arch = "aarch64", target_arch = "arm"))] 12 #[cfg(target_arch = "x86_64")] 26 #[cfg(target_pointer_width = "32")] 28 #[cfg(target_pointer_width = "64")] 31 #[cfg(target_pointer_width = "32")] 33 #[cfg(target_pointer_width = "64")]
|
/trusty/user/base/lib/libcompiler_builtins-rust/ |
D | rules.mk | 32 --cfg 'feature="weak-intrinsics"' \ 33 --cfg 'feature="compiler-builtins"' \ 34 --cfg 'feature="core"' \ 35 --cfg 'feature="default"' \
|
/trusty/user/base/lib/openssl-rust/ |
D | rules.mk | 35 $(call FIND_CRATE,cfg-if) \ 44 --cfg 'boringssl' \ 45 --cfg 'soong' \ 46 --cfg 'feature="unstable_boringssl"' \
|
/trusty/user/base/lib/libhashbrown-rust/ |
D | rules.mk | 31 --cfg 'feature="rustc-dep-of-std"' \ 32 --cfg 'feature="nightly"' \ 33 --cfg 'feature="rustc-internal-api"' \
|
/trusty/user/app/storage/test/storage-unittest-aidl/ |
D | lib.rs | 5 #[cfg(test)] 8 #[cfg(test)] 52 #[cfg(feature = "has_ns")] 58 #[cfg(feature = "has_ns")] 67 #[cfg(feature = "has_ns")] 69 #[cfg(feature = "has_ns")]
|
/trusty/user/base/lib/tipc/ |
D | tipc_srv.c | 42 const struct tipc_port* cfg; member 143 rc = srv->ops->on_message(chan->port->cfg, chan->handle, in chan_event_handler_proc() 160 srv->ops->on_disconnect(chan->port->cfg, chan->handle, in chan_event_handler_proc() 170 rc = srv->ops->on_send_unblocked(chan->port->cfg, chan->handle, in chan_event_handler_proc() 218 TLOGD("Incoming connection on %s\n", port->cfg->name); in handle_connect() 223 TLOGE("failed (%d) to accept on port %s\n", rc, port->cfg->name); in handle_connect() 230 TLOGE("too many channels for port %s\n", port->cfg->name); in handle_connect() 235 if (!client_is_allowed(port->cfg->acl, &peer)) { in handle_connect() 236 TLOGE("access denied on port %s\n", port->cfg->name); in handle_connect() 242 TLOGE("oom while handling port %s\n", port->cfg->name); in handle_connect() [all …]
|
/trusty/user/base/lib/tipc/rust/src/ |
D | service.rs | 164 ChannelTy::Port(cfg) => write!(f, "ChannelTy::Port({:?})", cfg), in fmt() 205 pub(crate) fn try_new_port(cfg: &PortCfg) -> Result<Rc<Self>> { in try_new_port() 210 cfg.path.as_ptr(), in try_new_port() 211 cfg.msg_queue_len, in try_new_port() 212 cfg.msg_max_size, in try_new_port() 213 cfg.flags, in try_new_port() 221 ty: ChannelTy::Port(cfg.try_clone()?), in try_new_port() 845 .position(|cfg| cfg == port) 1113 ChannelTy::Port(cfg) if event.event & (sys::IPC_HANDLE_POLL_READY as u32) != 0 => { in handler() 1114 self.handle_connect(&channel.handle, cfg) in handler() [all …]
|
/trusty/kernel/lib/trusty/include/lib/trusty/ |
D | uirq.h | 48 #define UIRQ_INITIALIZER(nm, uu, uunum, cfg) \ argument 49 { .name = nm, .uuids = uu, .uuids_num = uunum, .cfg_flags = cfg, }
|
/trusty/user/app/keymint/unauthorized_test_app/ |
D | lib.rs | 17 #[cfg(test)] 26 if !cfg!(kmr_enabled) { in test_access_policy_unauthorized()
|
D | rules.mk | 36 MODULE_RUSTFLAGS += --cfg 'kmr_enabled'
|
/trusty/user/app/sample/hwcryptohal/server/ |
D | hwcrypto_ipc_server.rs | 34 let cfg = PortCfg::new(RUST_SERVICE_PORT.to_str().expect("should not happen, valid utf-8")) in main_loop() localVariable 46 let manager = Manager::<_, _, 1, 4>::new_unbuffered(hwdk_rpc_server, cfg) in main_loop() 54 #[cfg(test)]
|
D | lib.rs | 33 #[cfg(test)]
|
/trusty/user/base/lib/keymint-rust/wire/ |
D | rules.mk | 25 --cfg 'feature="hal_v2"' \ 26 --cfg 'feature="hal_v3"' \
|
/trusty/user/base/lib/hwbcc/rust/src/ |
D | test.rs | 20 #[cfg(feature = "generic-arm-unittest")] 23 #[cfg(feature = "generic-arm-unittest")] 35 #[cfg(feature = "generic-arm-unittest")] 156 #[cfg(feature = "generic-arm-unittest")] 210 #[cfg(feature = "generic-arm-unittest")]
|
/trusty/user/base/lib/libstd_detect-rust/ |
D | rules.mk | 29 --cfg 'feature="rustc-dep-of-std"' \ 36 $(call FIND_CRATE,cfg-if) \
|
/trusty/user/app/keymint/ |
D | main.rs | 24 #[cfg(feature = "with_hwwsk_support")] 67 #[cfg(feature = "with_hwwsk_support")] in main() 69 #[cfg(not(feature = "with_hwwsk_support"))] in main() 99 #[cfg(feature = "with_hwwsk_support")] in main() 101 #[cfg(not(feature = "with_hwwsk_support"))] in main()
|
D | rules.mk | 50 --cfg 'feature="soft_attestation_fallback"' \ 51 --cfg 'feature="auto_second_imei"' \ 58 MODULE_RUSTFLAGS += --cfg 'kmr_enabled'
|
/trusty/user/base/lib/hwwsk/rust/src/ |
D | test.rs | 34 #[cfg(feature = "generic-arm-unittest")] 46 #[cfg(feature = "generic-arm-unittest")]
|
/trusty/user/app/sample/hwwsk/ |
D | main.rs | 63 let cfg = PortCfg::new("com.android.trusty.hwwsk") in main() localVariable 73 Manager::<_, _, 1, 4>::new(service, cfg, buffer) in main()
|
/trusty/user/app/sample/hwcryptokey-test/ |
D | main.rs | 19 #[cfg(test)]
|
/trusty/user/base/lib/libstd-rust/ |
D | rules.mk | 29 $(call FIND_CRATE,cfg-if) \ 40 --cfg 'backtrace_in_libstd' \
|
/trusty/user/app/secretkeeper/ |
D | tests.rs | 44 if !cfg!(secretkeeper_enabled) { in secretkeeper_connection_test() 55 if !cfg!(secretkeeper_enabled) { in bootloader_retrieve_key()
|
D | lib.rs | 34 #[cfg(test)] 235 let cfg = PortCfg::new(port_name) in add_service_port() localVariable 244 let cfg = if secure.0 { cfg.allow_ta_connect() } else { cfg }; in add_service_port() localVariable 246 dispatcher.add_service(Rc::new(service), cfg).map_err(|e| { in add_service_port()
|
/trusty/user/app/storage/test/storage-unittest-aidl/ns/ |
D | rules.mk | 26 --cfg 'feature="has_ns"' \
|
/trusty/user/base/lib/libpanic_abort-rust/ |
D | rules.mk | 29 $(call FIND_CRATE,cfg-if) \
|