/system/bt/conf/ |
H A D | bt_did.conf | 18 # Per spec DID v1.3 0xJJMN for version is interpreted as JJ.M.N 19 # JJ: major version number, M: minor version number, N: sub-minor version number 22 version = 0x1436 47 # Per spec DID v1.3 0xJJMN for version is interpreted as JJ.M.N 48 # JJ: major version number, M: minor version number, N: sub-minor version number 51 #version [all...] |
/system/core/libnativebridge/tests/ |
H A D | DummyNativeBridge2.cpp | 48 extern "C" bool native_bridge2_is_compatible_compatible_with(uint32_t version) { argument 50 return version <= 2; 67 .version = 2,
|
H A D | DummyNativeBridge.cpp | 47 .version = 1,
|
/system/core/include/cutils/ |
H A D | native_handle.h | 26 int version; /* sizeof(native_handle_t) */ member in struct:native_handle
|
/system/extras/tests/net_test/ |
H A D | multinetwork_test.py | 77 def _GetIpLayer(version): 78 return {4: scapy.IP, 6: scapy.IPv6}[version] 90 def UDP(cls, version, srcaddr, dstaddr, sport=0): 91 ip = cls._GetIpLayer(version) 95 return ("UDPv%d packet" % version, 100 def UDPWithOptions(cls, version, srcaddr, dstaddr, sport=0): 101 if version == 4: 110 return ("UDPv%d packet with options" % version, packet) 113 def SYN(cls, dport, version, srcaddr, dstaddr, sport=0, seq=TCP_SEQ): 114 ip = cls._GetIpLayer(version) [all...] |
H A D | multinetwork_base.py | 90 def MakePktInfo(version, addr, ifindex): 91 family = {4: AF_INET, 6: AF_INET6}[version] 93 addr = {4: "0.0.0.0", 6: "::"}[version] 96 if version == 6: 172 def _RouterAddress(netid, version): 173 if version == 6: 175 elif version == 4: 178 raise ValueError("Don't support IPv%s" % version) 189 def MyAddress(cls, version, netid): 191 6: cls._MyIPv6Address(netid)}[version] [all...] |
H A D | iproute.py | 398 def _AddressFamily(self, version): 399 return {4: socket.AF_INET, 6: socket.AF_INET6}[version] 420 def _Rule(self, version, is_add, rule_type, table, match_nlattr, priority): 424 version: An integer, 4 or 6. 437 family = self._AddressFamily(version) 450 def DeleteRulesAtPriority(self, version, priority): 451 family = self._AddressFamily(version) 464 def FwmarkRule(self, version, is_add, fwmark, table, priority): 466 return self._Rule(version, is_add, RTN_UNICAST, table, nlattr, priority) 468 def OifRule(self, version, is_ad [all...] |
H A D | net_test.py | 73 version = os.uname()[2].split("-")[0] 76 version = tuple(int(i) for i in version.split(".")) 77 return version 215 def GetDefaultRoute(version=6): 216 if version == 6: 225 elif version == 4: 235 raise ValueError("Don't know about IPv%s" % version) 275 GetDefaultRoute(version=4) 281 GetDefaultRoute(version [all...] |
/system/extras/tests/crypto/ |
H A D | get_dm_versions.c | 16 io->version[0] = 4; 17 io->version[1] = 0; 18 io->version[2] = 0; 48 /* Iterate over the returned versions, and print each subsystem's version */ 51 printf("%s: %d.%d.%d\n", v->name, v->version[0], v->version[1], v->version[2]);
|
/system/core/libcutils/ |
H A D | native_handle.c | 40 h->version = sizeof(native_handle_t); 50 if (h->version != sizeof(native_handle_t)) 59 if (h->version != sizeof(native_handle_t))
|
/system/bt/btif/include/ |
H A D | btif_debug_btsnoop.h | 28 uint8_t version; member in struct:btsnooz_preamble_t
|
/system/gatekeeper/include/gatekeeper/ |
H A D | password_handle.h | 35 uint8_t version; member in struct:gatekeeper::password_handle_t
|
/system/core/toolbox/ |
H A D | sendevent.c | 15 int version; local 28 if (ioctl(fd, EVIOCGVERSION, &version)) { 29 fprintf(stderr, "could not get driver version for %s, %s\n", argv[optind], strerror(errno));
|
/system/extras/sane_schedstat/ |
H A D | sane_schedstat.c | 19 Currently support version 15, modify parse() to support other 112 unsigned int version; local 115 if (sscanf(b, "version %u\n", &version) != 1) { 116 printf("Could not parse version\n"); 119 switch (version) { 135 printf("Can not handle version %u\n", version);
|
/system/core/libmincrypt/tools/ |
H A D | DumpPublicKey.java | 41 * @return version number of key. Supported versions are: 51 int version; 54 version = useSHA256 ? 3 : 1; 56 version = useSHA256 ? 4 : 2; 67 return version; 72 * @return version number of key. Supported versions are: 103 * version 1 key, the string will be a C initializer; this is 107 int version = check(key, useSHA256); 115 if (version > 1) { 117 result.append(Integer.toString(version)); [all...] |
/system/extras/perfprofd/quipper/kernel-headers/tools/perf/util/ |
H A D | header.h | 83 char * version; member in struct:perf_session_env 108 enum perf_header_version version; member in struct:perf_header
|
/system/extras/tests/sdcard/ |
H A D | profile_sdcard.sh | 19 adb shell cat /proc/version
|
/system/extras/ext4_utils/ |
H A D | ext4_crypt.cpp | 31 char version; member in struct:ext4_encryption_policy 107 eep.version = 0;
|
/system/core/logd/tests/ |
H A D | logd_test.cpp | 190 log_msg *msg, unsigned int version, int lid) { 193 version = 1; 197 if (version == 0) { 198 version = 2; 203 fprintf(stderr, "%s: v%u[%u] ", prefix, version, msg->len()); 204 if (version != 1) { 209 switch(version) { 189 dump_log_msg(const char *prefix, log_msg *msg, unsigned int version, int lid) argument
|
/system/gatekeeper/ |
H A D | gatekeeper.cpp | 41 if (pw_handle->version > HANDLE_VERSION) { 51 bool throttle = (pw_handle->version >= HANDLE_VERSION_THROTTLE); 113 if (password_handle->version > HANDLE_VERSION) { 125 bool throttle = (password_handle->version >= HANDLE_VERSION_THROTTLE); 175 password_handle->version = handle_version; 204 expected_handle->flags, expected_handle->version, 223 token->version = HW_AUTH_TOKEN_VERSION;
|
/system/bt/main/ |
H A D | bte_conf.c | 79 record.version = config_get_int(config, section_name, "version", 0); 95 LOG_DEBUG(" version = %04x", record.version);
|
/system/core/include/system/ |
H A D | radio.h | 34 * Current version of the framework only supports RADIO_CLASS_AM_FM. 137 char version[RADIO_STRING_LEN_MAX]; /* product version */ member in struct:radio_hal_properties 153 char version[RADIO_STRING_LEN_MAX]; member in struct:radio_properties
|
/system/keymaster/ |
H A D | auth_encrypted_key_blob.cpp | 35 size_t size = 1 /* version byte */ + nonce.SerializedSize() + 97 uint8_t version = *(*buf_ptr)++; 98 if (version != CURRENT_BLOB_VERSION || // 105 // version of keymaster using a previous blob format which did not include the version byte 106 // or the nonce or tag length fields. So we try to parse it as that previous version. 114 // version with the new format would destroy the user's data. 116 // What is the probability that an unversioned key could be successfully parsed as a version 118 // keymaster version released with unversioned keys, is chosen randomly. In order for an 119 // unversioned key to parse as a version [all...] |
/system/core/include/nativebridge/ |
H A D | native_bridge.h | 73 // Returns the version number of the native bridge. This information is available after a 79 // bridge supporting the version 2 interface. Will return null if the bridge does not support 80 // version 2, or if it doesn't have a signal handler it wants to be known. 97 uint32_t version; member in struct:android::NativeBridgeCallbacks 148 // Added callbacks in version 2. 150 // Check whether the bridge is compatible with the given version. A bridge may decide not to be 154 // bridge_version [IN] the version of libnativebridge. 156 // true iff the native bridge supports the given version of libnativebridge.
|
/system/core/include/private/ |
H A D | android_filesystem_capability.h | 38 __u32 version; member in struct:__user_cap_header_struct
|