/system/bt/stack/hid/ |
H A D | hidh_api.c | 245 hh_cb.devices[i].conn.process_repage_timer = 344 /* Find an entry for this device in hh_cb.devices array */ 350 if((hh_cb.devices[i].in_use) && 351 (!memcmp(addr, hh_cb.devices[i].addr, BD_ADDR_LEN))) 359 if( !hh_cb.devices[i].in_use) 367 if (!hh_cb.devices[i].in_use) 369 hh_cb.devices[i].in_use = TRUE; 370 memcpy( hh_cb.devices[i].addr, addr, sizeof( BD_ADDR ) ) ; 371 hh_cb.devices[i].state = HID_DEV_NO_CONN; 372 hh_cb.devices[ [all...] |
H A D | hidh_conn.c | 118 hh_cb.devices[xx].in_use = FALSE ; 119 hh_cb.devices[xx].conn.conn_state = HID_CONN_STATE_UNUSED; 136 tHID_CONN *p_hcon = &hh_cb.devices[dhandle].conn; 146 L2CA_SetIdleTimeoutByBdAddr(hh_cb.devices[dhandle].addr, 0, BT_TRANSPORT_BR_EDR); 226 p_hcon = &hh_cb.devices[i].conn; 227 p_dev = &hh_cb.devices[i]; 319 device = &hh_cb.devices[dhandle]; 345 dhandle = (PTR_TO_UINT(p_dev) - PTR_TO_UINT(&(hh_cb.devices[0])))/ sizeof(tHID_HOST_DEV_CTB); 397 p_dev = &hh_cb.devices[dhandle]; 398 p_hcon = &hh_cb.devices[dhandl [all...] |
H A D | hidh_int.h | 52 tHID_HOST_DEV_CTB devices[HID_HOST_MAX_DEVICES]; member in struct:host_ctb
|
/system/connectivity/shill/dbus/ |
H A D | chromeos_wimax_manager_proxy.cc | 52 RegisterProperty(kPropertyDevices, &devices); 113 if (!properties_->devices.GetAndBlock()) { 118 KeyValueStore::ConvertPathsToRpcIdentifiers(properties_->devices.value(), 164 const vector<dbus::ObjectPath>& devices) { 165 SLOG(DBus, nullptr, 2) << __func__ << "(" << devices.size() << ")"; 170 KeyValueStore::ConvertPathsToRpcIdentifiers(devices, &rpc_devices); 163 DevicesChanged( const vector<dbus::ObjectPath>& devices) argument
|
H A D | chromeos_wimax_manager_proxy.h | 52 brillo::dbus_utils::Property<std::vector<dbus::ObjectPath>> devices; member in class:shill::ChromeosWiMaxManagerProxy::PropertySet 68 void DevicesChanged(const std::vector<dbus::ObjectPath>& devices);
|
/system/core/adb/ |
H A D | console.cpp | 64 // No specific device was given, so get the list of connected devices and 67 std::string devices; local 69 if (!adb_query("host:devices", &devices, &error)) { 76 for (const auto& device : android::base::Split(devices, "\n")) {
|
/system/extras/tests/workloads/ |
H A D | capture.sh | 7 adb devices -l 2>&1 >/dev/null 21 devInfo=$(adb devices -l | grep -v ^List | head -1)
|
H A D | defs.sh | 86 adb devices -l 2>&1 >/dev/null 89 devInfo=$(adb devices -l | grep -v ^List | head -1) 91 devInfo=$(adb devices -l | grep $deviceName) 246 # Note: no awk or sed on devices so have to do this
|
H A D | pwrtest.sh | 162 echo enabled Cores $(adb shell "cat /sys/devices/system/cpu/online") 181 adb devices 247 adb devices 2>/dev/null
|
/system/connectivity/shill/cellular/ |
H A D | modem_manager.cc | 128 vector<string> devices = proxy_->EnumerateDevices(); local 130 for (vector<string>::const_iterator it = devices.begin(); 131 it != devices.end(); ++it) {
|
/system/bt/btif/include/ |
H A D | btif_hh.h | 74 /* Control block to maintain properties of devices */ 83 * BTIF-HH control block to maintain added devices and currently 84 * connected hid devices 89 btif_hh_device_t devices[BTIF_HH_MAX_HID]; member in struct:__anon592
|
/system/bt/btif/src/ |
H A D | btif_hh.c | 117 * turned ON by default. Add devices to this list to apply the 338 if (btif_hh_cb.devices[i].dev_status == BTHH_CONN_STATE_CONNECTED && 339 btif_hh_cb.devices[i].dev_handle == handle) 341 return &btif_hh_cb.devices[i]; 359 if (btif_hh_cb.devices[i].dev_status != BTHH_CONN_STATE_UNKNOWN && 360 memcmp(&(btif_hh_cb.devices[i].bd_addr), bd_addr, BD_ADDR_LEN) == 0) 362 return &btif_hh_cb.devices[i]; 380 if (btif_hh_cb.devices[i].dev_status == BTHH_CONN_STATE_CONNECTED && 381 memcmp(&(btif_hh_cb.devices[i].bd_addr), bd_addr, BD_ADDR_LEN) == 0) 383 return &btif_hh_cb.devices[ [all...] |
H A D | btif_storage.c | 147 bt_bdaddr_t devices[BTM_SEC_MAX_DEVICE_RECORDS]; member in struct:__anon694 385 ** Description Internal helper function to fetch the bonded devices 430 ** Description Internal helper function to fetch the bonded devices 474 memcpy(&p_bonded_devices->devices[p_bonded_devices->num_devices++], &bd_addr, sizeof(bt_bdaddr_t)); 597 BTIF_TRACE_DEBUG("%s: Number of bonded devices: %d Property:BT_PROPERTY_ADAPTER_BONDED_DEVICES", __FUNCTION__, bonded_devices.num_devices); 602 memcpy(property->val, bonded_devices.devices, property->len); 836 ** Description BTIF storage API - Loads all the bonded devices from NVRAM 839 ** and remote_device_properties_cb for each of the bonded devices. 899 memcpy(devices_list + i, &bonded_devices.devices[i], sizeof(bt_bdaddr_t)); 914 BTIF_TRACE_EVENT("%s: %d bonded devices foun [all...] |
/system/bt/btif/co/ |
H A D | bta_hh_co.c | 290 p_dev = &btif_hh_cb.devices[i]; 323 if (btif_hh_cb.devices[i].dev_status == BTHH_CONN_STATE_UNKNOWN) { 324 p_dev = &btif_hh_cb.devices[i]; 351 APPL_TRACE_ERROR("%s: Error: too many HID devices are connected", __FUNCTION__); 384 p_dev = &btif_hh_cb.devices[i];
|
/system/core/init/ |
H A D | Android.mk | 66 devices.cpp \
|
/system/core/logcat/ |
H A D | logcat.cpp | 552 log_device_t* devices = NULL; local 798 for (dev = devices; dev; dev = dev->next) { 819 devices = dev = d; 953 if (!devices) { 954 dev = devices = new log_device_t("main", false); 1014 dev = devices; 1220 for (d = devices; d; d = d->next) {
|
/system/connectivity/apmanager/ |
H A D | device_info_unittest.cc | 124 void VerifyDeviceList(const vector<scoped_refptr<Device>>& devices) { argument 126 EXPECT_EQ(devices.size(), device_info_.devices_.size()); 127 for (const auto& device : devices) {
|
/system/connectivity/shill/wimax/ |
H A D | wimax_provider.h | 109 void OnDevicesChanged(const RpcIdentifiers& devices);
|
H A D | wimax_provider.cc | 121 // Collects a set of live networks from all devices. 306 LOG(ERROR) << "No WiMAX devices available."; 314 void WiMaxProvider::OnDevicesChanged(const RpcIdentifiers& devices) { argument 316 DestroyDeadDevices(devices); 317 for (const auto& path : devices) {
|
/system/sepolicy/ |
H A D | file_contexts | 332 # coredump directory for userdebug/eng devices 376 /sys/devices/platform/nfc-power/nfc_power -- u:object_r:sysfs_nfc_power_writable:s0 377 /sys/devices/system/cpu(/.*)? u:object_r:sysfs_devices_system_cpu:s0 378 /sys/devices/virtual/block/zram\d+(/.*)? u:object_r:sysfs_zram:s0 379 /sys/devices/virtual/block/zram\d+/uevent u:object_r:sysfs_zram_uevent:s0 380 /sys/devices/virtual/misc/hw_random(/.*)? u:object_r:sysfs_hwrandom:s0
|
/system/bt/audio_a2dp_hw/ |
H A D | audio_a2dp_hw.c | 1084 audio_devices_t devices, 1096 UNUSED(devices); 1288 audio_devices_t devices, 1300 UNUSED(devices); 1082 adev_open_output_stream(struct audio_hw_device *dev, audio_io_handle_t handle, audio_devices_t devices, audio_output_flags_t flags, struct audio_config *config, struct audio_stream_out **stream_out, const char *address) argument 1286 adev_open_input_stream(struct audio_hw_device *dev, audio_io_handle_t handle, audio_devices_t devices, struct audio_config *config, struct audio_stream_in **stream_in, audio_input_flags_t flags, const char *address, audio_source_t source) argument
|
/system/core/adf/libadf/tests/ |
H A D | adf_test.cpp | 169 TEST(adf, devices) { 174 ASSERT_GE(n_devs, 0) << "enumerating ADF devices failed: " <<
|
/system/connectivity/shill/ |
H A D | manager.cc | 102 const char Manager::kErrorNoDevice[] = "no wifi devices available"; 676 // If no whitelist is specified, all devices are considered whitelisted. 772 // Reset claimer if this is not the default claimer and no more devices are 1160 // Create a default device claimer to claim devices from shill as they're 1162 // the default claimer to specify the devices for shill to manage. 1223 // means devices are being managed by remote application. Only manage the 1290 const auto& devices = device_claimer_->claimed_device_names(); local 1291 results.resize(devices.size()); 1292 std::copy(devices.begin(), devices [all...] |
H A D | manager_unittest.cc | 202 auto devices = manager()->FilterByTechnology(tech); local 203 return (devices.size() == 1 && devices[0].get() == device.get()); 809 vector <dbus::ObjectPath> devices = local 811 EXPECT_EQ(2, devices.size()); 3982 // Add devices 4034 // Add service for multiple devices 4786 // Registered devices of prohibited technology types should be disabled. 4799 // Newly registered devices should be disabled. 4857 // Set blacklisted devices [all...] |
/system/update_engine/ |
H A D | Android.mk | 363 $(error USE_BINDER is disabled but is required in non-Brillo devices.)
|