/external/autotest/client/site_tests/login_CryptohomeOwnerQuery/ |
H A D | login_CryptohomeOwnerQuery.py | 6 # similar ownership clearing/checking tasks. 14 from autotest_lib.client.cros import cros_ui, cryptohome, ownership namespace 24 ownership.restart_ui_to_clear_ownership_files() 45 self._listener.wait_for_signals(desc='Device ownership complete.')
|
/external/autotest/client/common_lib/cros/ |
H A D | policy.py | 10 from autotest_lib.client.cros import ownership namespace 54 ownership.assert_has_policy_data(response_proto) 58 ownership.assert_has_device_settings(data_proto) 59 if owner: ownership.assert_username(data_proto, owner) 63 if guests: ownership.assert_guest_setting(settings, guests) 64 if new_users: ownership.assert_show_users(settings, new_users) 65 if roaming: ownership.assert_roaming(settings, roaming) 67 ownership.assert_new_users(settings, False) 68 ownership.assert_users_on_whitelist(settings, whitelist) 69 if proxies: ownership [all...] |
/external/autotest/client/site_tests/login_GuestAndActualSession/ |
H A D | login_GuestAndActualSession.py | 12 from autotest_lib.client.cros import constants, cros_ui, cryptohome, ownership namespace 16 """Ensure that the session_manager correctly handles ownership when a guest 29 ownership.restart_ui_to_clear_ownership_files() 52 self._listener.wait_for_signals(desc='Device ownership complete.')
|
/external/autotest/client/site_tests/login_MultiUserPolicy/ |
H A D | login_MultiUserPolicy.py | 11 from autotest_lib.client.cros import cryptohome, ownership namespace 36 ownership.restart_ui_to_clear_ownership_files() 56 public_key = ownership.known_pubkey() 57 private_key = ownership.known_privkey()
|
/external/autotest/client/site_tests/login_MultipleSessions/ |
H A D | login_MultipleSessions.py | 11 from autotest_lib.client.cros import cros_ui, cryptohome, ownership namespace 28 ownership.restart_ui_to_clear_ownership_files() 61 self._listener.wait_for_signals(desc='Re-taking of ownership complete.')
|
/external/autotest/client/site_tests/login_OwnershipNotRetaken/ |
H A D | login_OwnershipNotRetaken.py | 11 from autotest_lib.client.cros import constants, cryptohome, ownership namespace 25 # Start clean, wrt ownership and the desired user. 26 ownership.restart_ui_to_clear_ownership_files()
|
/external/autotest/client/site_tests/login_RemoteOwnership/ |
H A D | login_RemoteOwnership.py | 11 from autotest_lib.client.cros import cros_ui, cryptohome, ownership namespace 27 # Start with a clean slate wrt ownership 28 ownership.restart_ui_to_clear_ownership_files() 39 priv = ownership.known_privkey() 40 pub = ownership.known_pubkey() 45 (priv, pub) = ownership.pairgen_as_data() 56 (new_priv, new_pub) = ownership.pairgen_as_data()
|
/external/autotest/client/site_tests/platform_SessionManagerBlockDevmodeSetting/ |
H A D | platform_SessionManagerBlockDevmodeSetting.py | 11 from autotest_lib.client.cros import constants, cros_ui, ownership namespace 35 ownership.restart_ui_to_clear_ownership_files() 54 # Test whether the flag gets reset when taking ownership. 61 "Flag not clear after ownership got established.")
|
/external/ceres-solver/internal/ceres/ |
H A D | conditioned_cost_function.cc | 49 Ownership ownership) 52 ownership_(ownership) { 46 ConditionedCostFunction( CostFunction* wrapped_cost_function, const vector<CostFunction*>& conditioners, Ownership ownership) argument
|
/external/autotest/client/site_tests/login_OwnershipApi/ |
H A D | login_OwnershipApi.py | 11 from autotest_lib.client.cros import cros_ui, cryptohome, ownership namespace 31 # Clear existing ownership and inject known keys. 33 ownership.clear_ownership_files_no_restart() 35 # Make device already owned by ownership.TESTUSER. 36 self._cryptohome_proxy.mount(ownership.TESTUSER, 37 ownership.TESTPASS, 39 ownership.use_known_ownerkeys(ownership.TESTUSER) 54 pkey = ownership.known_privkey() 55 pubkey = ownership [all...] |
/external/autotest/client/site_tests/login_OwnershipRetaken/ |
H A D | login_OwnershipRetaken.py | 11 from autotest_lib.client.cros import constants, cros_ui, cryptohome, ownership namespace 15 """"Ensure that ownership is re-taken upon loss of owner's cryptohome.""" 29 # Start clean, wrt ownership and the desired user. 30 ownership.restart_ui_to_clear_ownership_files() 34 self._cryptohome_proxy.remove(ownership.TESTUSER) 40 pkey = ownership.known_privkey() 41 pubkey = ownership.known_pubkey() 45 owner=ownership.TESTUSER, 49 whitelist=(ownership.TESTUSER, 62 # Start a new session, which will trigger the re-taking of ownership [all...] |
/external/autotest/client/site_tests/login_OwnershipTaken/ |
H A D | login_OwnershipTaken.py | 11 from autotest_lib.client.cros import constants, ownership namespace 15 """Sign in and ensure that ownership of the device is taken.""" 26 ownership.restart_ui_to_clear_ownership_files() 42 ownership.assert_has_policy_data(response_proto) 46 ownership.assert_has_device_settings(poldata) 47 ownership.assert_username(poldata, username) 51 ownership.assert_new_users(polval, True) 52 ownership.assert_users_on_whitelist(polval, (username,))
|
/external/autotest/client/site_tests/login_UserPolicyKeys/ |
H A D | login_UserPolicyKeys.py | 11 from autotest_lib.client.cros import cros_ui, cryptohome, ownership namespace 77 ownership.restart_ui_to_clear_ownership_files() 78 self._cryptohome_proxy.remove(ownership.TESTUSER) 83 self._cryptohome_proxy.mount(ownership.TESTUSER, 84 ownership.TESTPASS, 87 if not sm.StartSession(ownership.TESTUSER, ''): 91 retrieved_policy = sm.RetrievePolicyForUser(ownership.TESTUSER, 97 key_file = ownership.get_user_policy_key_filename(ownership.TESTUSER) 105 public_key = ownership [all...] |
/external/ceres-solver/include/ceres/ |
H A D | loss_function.h | 312 // ownership of the wrapped loss function or not depending on the 313 // ownership parameter. 314 ScaledLoss(const LossFunction* rho, double a, Ownership ownership) : argument 315 rho_(rho), a_(a), ownership_(ownership) { } 368 LossFunctionWrapper(LossFunction* rho, Ownership ownership) argument 369 : rho_(rho), ownership_(ownership) { 383 void Reset(LossFunction* rho, Ownership ownership) { argument 388 ownership_ = ownership;
|
/external/skia/src/gpu/ |
H A D | GrTextureProvider.cpp | 127 GrWrapOwnership ownership) { 132 return fGpu->wrapBackendTexture(desc, ownership); 126 wrapBackendTexture(const GrBackendTextureDesc& desc, GrWrapOwnership ownership) argument
|
H A D | GrResourceProvider.cpp | 231 const GrBackendTextureDesc& desc, GrWrapOwnership ownership) { 235 return this->gpu()->wrapBackendTextureAsRenderTarget(desc, ownership); 230 wrapBackendTextureAsRenderTarget( const GrBackendTextureDesc& desc, GrWrapOwnership ownership) argument
|
H A D | GrGpu.cpp | 161 GrTexture* GrGpu::wrapBackendTexture(const GrBackendTextureDesc& desc, GrWrapOwnership ownership) { argument 174 GrTexture* tex = this->onWrapBackendTexture(desc, ownership); 189 GrWrapOwnership ownership) { 194 return this->onWrapBackendRenderTarget(desc, ownership); 198 GrWrapOwnership ownership) { 210 return this->onWrapBackendTextureAsRenderTarget(desc, ownership); 188 wrapBackendRenderTarget(const GrBackendRenderTargetDesc& desc, GrWrapOwnership ownership) argument 197 wrapBackendTextureAsRenderTarget(const GrBackendTextureDesc& desc, GrWrapOwnership ownership) argument
|
/external/skia/src/image/ |
H A D | SkImage_Gpu.cpp | 155 SkAlphaType at, GrWrapOwnership ownership, 161 SkAutoTUnref<GrTexture> tex(ctx->textureProvider()->wrapBackendTexture(desc, ownership)); 154 new_wrapped_texture_common(GrContext* ctx, const GrBackendTextureDesc& desc, SkAlphaType at, GrWrapOwnership ownership, SkImage::TextureReleaseProc releaseProc, SkImage::ReleaseContext releaseCtx) argument
|
/external/vboot_reference/firmware/include/ |
H A D | tss_constants.h | 66 TSS_BOOL ownership; member in struct:tdTPM_PERMANENT_FLAGS
|
/external/skia/src/core/ |
H A D | SkStream.cpp | 187 SkFILEStream::SkFILEStream(FILE* file, Ownership ownership) argument 189 , fOwnership(ownership) {
|
/external/skia/src/gpu/vk/ |
H A D | GrVkGpu.cpp | 554 GrWrapOwnership ownership) { 573 switch (ownership) { 610 GrWrapOwnership ownership) { 617 switch (ownership) { 553 onWrapBackendTexture(const GrBackendTextureDesc& desc, GrWrapOwnership ownership) argument 609 onWrapBackendRenderTarget(const GrBackendRenderTargetDesc& wrapDesc, GrWrapOwnership ownership) argument
|
/external/skia/src/gpu/gl/ |
H A D | GrGLGpu.cpp | 538 GrWrapOwnership ownership) { 586 switch (ownership) { 629 GrWrapOwnership ownership) { 634 switch (ownership) { 656 GrWrapOwnership ownership) { 687 switch (ownership) { 537 onWrapBackendTexture(const GrBackendTextureDesc& desc, GrWrapOwnership ownership) argument 628 onWrapBackendRenderTarget(const GrBackendRenderTargetDesc& wrapDesc, GrWrapOwnership ownership) argument 655 onWrapBackendTextureAsRenderTarget(const GrBackendTextureDesc& desc, GrWrapOwnership ownership) argument
|
/external/clang/lib/CodeGen/ |
H A D | CGExpr.cpp | 201 // If we are binding a reference to a temporary that has ownership, we 355 auto ownership = M->getType().getObjCLifetime(); local 356 if (ownership != Qualifiers::OCL_None && 357 ownership != Qualifiers::OCL_ExplicitNone) {
|
/external/clang/lib/Sema/ |
H A D | SemaType.cpp | 395 // But don't move an ARC ownership attribute to the return type 2346 Qualifiers::ObjCLifetime ownership, 3830 // Objective-C ARC ownership qualifiers are ignored on the function 3857 // The ownership attributes are almost always written via 4316 Qualifiers::ObjCLifetime ownership) { 4320 qs.addObjCLifetime(ownership); 4326 Qualifiers::ObjCLifetime ownership, 4339 switch (ownership) { 4340 case Qualifiers::OCL_None: llvm_unreachable("no ownership!"); 4364 /// \brief Used for transferring ownership i 4314 transferARCOwnershipToDeclSpec(Sema &S, QualType &declSpecTy, Qualifiers::ObjCLifetime ownership) argument 4325 transferARCOwnershipToDeclaratorChunk(TypeProcessingState &state, Qualifiers::ObjCLifetime ownership, unsigned chunkIndex) argument 4365 transferARCOwnership(TypeProcessingState &state, QualType &declSpecTy, Qualifiers::ObjCLifetime ownership) argument 4422 Qualifiers::ObjCLifetime ownership = Context.getInnerObjCOwnership(FromTy); local [all...] |