/external/tpm2/ |
Sign.c | 20 // TPM_RC_TICKET validation is not a valid ticket 30 TPMT_TK_HASHCHECK ticket; local 48 // If validation is provided, or the key is restricted, check the ticket 52 // Compute and compare ticket 55 &in->digest, &ticket); 57 if(!Memory2BEqual(&in->validation.digest.b, &ticket.digest.b)) 61 // If we don't have a ticket, at least verify that the provided 'digest'
|
CertifyCreation.c | 31 TPMT_TK_CREATION ticket; local 39 // Re-compute ticket 41 &in->creationHash, &ticket); 42 // Compare ticket 43 if(!Memory2BEqual(&ticket.digest.b, &in->creationTicket.digest.b))
|
PolicyAuthorize.c | 28 TPMT_TK_VERIFIED ticket; local 58 // Validate ticket TPMT_TK_VERIFIED 75 &in->keySign, &ticket); 77 // Compare ticket digest. If not match, return error 78 if(!Memory2BEqual(&in->checkTicket.digest.b, &ticket.digest.b))
|
PolicyTicket_fp.h | 18 TPMT_TK_AUTH ticket; member in struct:__anon35460
|
/packages/apps/Camera2/src/com/android/camera/one/v2/sharedimagereader/ |
TicketRequiredFilter.java | 21 import com.android.camera.one.v2.sharedimagereader.ticketpool.Ticket; 28 * Decorates a BufferQueueController by attaching incoming images with a ticket 29 * from a TicketPool. If no ticket can be acquired, the incoming image is 44 Ticket ticket = mTicketProvider.tryAcquire(); local 45 if (ticket == null) { 48 mImageSequence.update(new TicketImageProxy(image, ticket));
|
/external/valgrind/coregrind/m_scheduler/ |
ticket-lock-linux.c | 3 /*--- Linux ticket lock implementation ticket-lock-linux.c ---*/ 73 return "ticket lock"; 104 * Acquire ticket lock. Increment the tail of the queue and use the original 105 * value as the ticket value. Wait until the head of the queue equals the 106 * ticket value. The futex used to wait depends on the ticket value in order 107 * to avoid that all threads get woken up every time a ticket lock is 111 * See also Nick Piggin, x86: FIFO ticket spinlocks, Linux kernel mailing list 116 unsigned ticket, futex_value local [all...] |
/packages/apps/Camera2/src/com/android/camera/one/v2/sharedimagereader/ringbuffer/ |
DynamicRingBuffer.java | 25 import com.android.camera.one.v2.sharedimagereader.ticketpool.Ticket; 70 * @param parentTickets The parent ticket pool which implicitly determines 85 // Try to acquire a ticket to expand the ring-buffer and save the image. 86 Ticket ticket = null; local 90 // mQueue. However, for a brief moment, we acquire a ticket from 98 ticket = tryAcquireLowPriorityTicket(); 99 if (ticket == null) { 104 ticket = tryAcquireLowPriorityTicket(); 106 if (ticket != null) [all...] |
/packages/apps/Camera2/src/com/android/camera/one/v2/sharedimagereader/ticketpool/ |
ReservableTicketPool.java | 47 * as soon as possible, which may depend on consumers of this ticket pool 71 * Wraps tickets from the parent ticket pool with logic to either release 75 private class TicketImpl implements Ticket { 76 private final Ticket mParentTicket; 79 private TicketImpl(Ticket parentTicket) { 93 // and return the ticket to the parent by closing it. 134 private final ArrayDeque<Ticket> mParentTickets; 172 public Collection<Ticket> acquire(int tickets) throws InterruptedException, 174 Collection<Ticket> acquiredParentTickets = acquireParentTickets(tickets); 176 List<Ticket> wrappedTicketList = new ArrayList<>() [all...] |
/external/boringssl/src/ssl/ |
tls13_client.cc | 716 CBS cbs, ticket, extensions; local 720 !CBS_get_u16_length_prefixed(&cbs, &ticket) || 721 !CBS_stow(&ticket, &session->tlsext_tick, &session->tlsext_ticklen) ||
|
tls13_server.cc | 164 /* Rebase the session timestamp so that it is measured from ticket 174 CBB body, ticket, extensions; local 179 !CBB_add_u16_length_prefixed(&body, &ticket) || 180 !ssl_encrypt_ticket(ssl, &ticket, session) || 267 /* Decode the ticket if we agreed on a PSK key exchange mode. */ 284 CBS ticket, binders; local 286 if (!ssl_ext_pre_shared_key_parse_clienthello(hs, &ticket, &binders, 297 ssl_process_ticket(ssl, &session, &unused_renew, CBS_data(&ticket), 298 CBS_len(&ticket), NULL, 0); 316 /* Recover the client ticket age and convert to seconds. * [all...] |
handshake_client.cc | 1870 CBS new_session_ticket, ticket; local [all...] |
handshake_server.cc | 1691 CBB cbb, body, ticket; local [all...] |
ssl_session.cc | 294 /* Copy the ticket. */ 606 static const char kTicketPlaceholder[] = "TICKET TOO LARGE"; 699 /* Serialize the SSL_SESSION to be encoded into the ticket. */ 848 const uint8_t *ticket = NULL; local 854 client_hello, TLSEXT_TYPE_session_ticket, &ticket, &ticket_len); 856 switch (ssl_process_ticket(ssl, &session, &renew_ticket, ticket, ticket_len, 870 /* The client didn't send a ticket, so the session ID is a real ID. */ [all...] |
t1_lib.cc | 966 /* TLS 1.3 uses a different ticket extension. */ 982 /* Don't send TLS 1.3 session tickets in the ticket extension. */ 988 CBB ticket; local 990 !CBB_add_u16_length_prefixed(out, &ticket) || 991 !CBB_add_bytes(&ticket, ticket_data, ticket_len) || 1896 CBB contents, identity, ticket, binders, binder; local [all...] |
/prebuilts/tools/common/m2/repository/org/bouncycastle/bcprov-jdk15on/1.50/ |
bcprov-jdk15on-1.50.jar | |
/prebuilts/tools/common/m2/repository/org/bouncycastle/bcprov-jdk15on/1.56/ |
bcprov-jdk15on-1.56.jar | |