/system/core/trusty/gatekeeper/ |
H A D | module.cpp | 28 hw_device_t **device) { 36 *device = gatekeeper->hw_device(); 27 trusty_gatekeeper_open(const hw_module_t *module, const char *name, hw_device_t **device) argument
|
/system/core/trusty/keymaster/ |
H A D | module.cpp | 27 * Generic device handling 29 static int trusty_keymaster_open(const hw_module_t* module, const char* name, hw_device_t** device) { argument 38 *device = dev->hw_device(); 39 // Do not delete dev; it will get cleaned up when the caller calls device->close(), and must
|
H A D | trusty_keymaster_main.cpp | 138 static bool do_operation(TrustyKeymasterDevice* device, keymaster_purpose_t purpose, argument 147 keymaster_error_t error = device->begin(purpose, key, ¶m_set, nullptr, &op_handle); 153 error = device->update(op_handle, nullptr, input, &input_consumed, nullptr, nullptr); 161 device->abort(op_handle); 164 error = device->finish(op_handle, nullptr, nullptr, signature, nullptr, output); 172 static bool test_import_rsa(TrustyKeymasterDevice* device) { argument 180 int error = device->import_key(&rsa_param_set, KM_KEY_FORMAT_PKCS8, &private_key, &key, nullptr); 193 if (!do_operation(device, KM_PURPOSE_SIGN, &key, &input, nullptr, &signature)) { 200 if (!do_operation(device, KM_PURPOSE_VERIFY, &key, &input, &signature, nullptr)) { 209 static bool test_rsa(TrustyKeymasterDevice* device) { argument 276 test_import_ecdsa(TrustyKeymasterDevice* device) argument 313 test_ecdsa(TrustyKeymasterDevice* device) argument [all...] |
/system/update_engine/common/ |
H A D | fake_boot_control.h | 47 std::string* device) const override { 53 *device = part_it->second; 90 const std::string& device) { 92 devices_[slot][partition_name] = device; 88 SetPartitionDevice(const std::string& partition_name, BootControlInterface::Slot slot, const std::string& device) argument
|
/system/update_engine/ |
H A D | utils_android.cc | 27 // Open the appropriate fstab file and fallback to /fstab.device if 34 fstab = fs_mgr_read_fstab("/fstab.device"); 42 bool DeviceForMountPoint(const string& mount_point, base::FilePath* device) { argument 58 *device = base::FilePath(record->blk_device);
|
H A D | boot_control_chromeos.cc | 47 // Resolve the boot device path fully, including dereferencing through 51 LOG(ERROR) << "rootdev failed to find the root device"; 54 LOG_IF(WARNING, ret > 0) << "rootdev found a device name with no device node"; 101 << "Booted from a removable device, pretending we have only one slot."; 121 << ". This device is not updateable."; 143 string* device) const { 152 *device = part_device; 256 string BootControlChromeOS::SysfsBlockDevice(const string& device) { argument 257 base::FilePath device_path(device); 265 IsRemovableDevice(const string& device) argument [all...] |
/system/core/adb/ |
H A D | transport_test.cpp | 91 ASSERT_EQ(nullptr, t.device); 98 "host::ro.product.name=foo;ro.product.model=bar;ro.product.device=baz;"; 107 ASSERT_EQ(std::string("baz"), t.device); 114 "host::ro.product.name=foo;ro.product.model=bar;ro.product.device=baz;" 126 ASSERT_EQ(std::string("baz"), t.device); 134 std::string device = "test_device"; local 141 t.device = &device[0]; 151 EXPECT_TRUE(t.MatchesTarget("device:" + device)); [all...] |
H A D | transport.h | 143 char* device = nullptr; member in class:atransport 180 // * device:<device> 212 * If serial is non-null then only the device with that serial will be chosen. 213 * If transport_id is non-zero then only the device with that transport ID will be chosen. 238 /* Connect to a network address and register it as a device */
|
/system/libvintf/include/vintf/ |
H A D | CompatibilityMatrix.h | 123 // entries only for device compatibility matrix. 132 } device; member in struct:android::vintf::CompatibilityMatrix
|
H A D | HalManifest.h | 55 // Construct a device HAL manifest. 67 // - framework manifest vs. device compat-mat 70 // - device manifest vs. framework compat-mat 82 // "android.hardware.camera.device@1.0", "android.hardware.camera.device@3.2", 93 // device.mSepolicyVersion. Assume type == device. 94 // Abort if type != device. 161 // entries for device hal manifest only 164 } device; member in struct:android::vintf::HalManifest [all...] |
/system/vold/model/ |
H A D | EmulatedVolume.cpp | 48 EmulatedVolume::EmulatedVolume(const std::string& rawPath, dev_t device, argument 50 setId(StringPrintf("emulated:%u,%u", major(device), minor(device)));
|
H A D | PrivateVolume.cpp | 46 PrivateVolume::PrivateVolume(dev_t device, const std::string& keyRaw) : argument 47 VolumeBase(Type::kPrivate), mRawDevice(device), mKeyRaw(keyRaw) { 48 setId(StringPrintf("private:%u,%u", major(device), minor(device)));
|
H A D | PublicVolume.cpp | 46 PublicVolume::PublicVolume(dev_t device) : argument 47 VolumeBase(Type::kPublic), mDevice(device), mFusePid(0) { 48 setId(StringPrintf("public:%u,%u", major(device), minor(device)));
|
/system/core/trusty/storage/proxy/ |
H A D | ipc.c | 35 int ipc_connect(const char *device, const char *port) argument 43 rc = tipc_connect(device, port);
|
/system/keymaster/include/keymaster/legacy_support/ |
H A D | keymaster0_engine.h | 41 * ownership of the device, and will close it during destruction. 63 const keymaster0_device_t* device() { return keymaster0_device_; } function in class:keymaster::Keymaster0Engine
|
H A D | keymaster1_engine.h | 41 * ownership of the device, and will close it during destruction. 80 const keymaster1_device_t* device() const { return keymaster1_device_; } function in class:keymaster::Keymaster1Engine
|
/system/media/alsa_utils/include/ |
H A D | alsa_device_profile.h | 40 int device; member in struct:__anon1982 52 /* read from the hardware device */ 65 bool profile_is_cached_for(const alsa_device_profile* profile, int card, int device);
|
/system/tools/hidl/c2hal/test/ |
H A D | simple.h | 36 * Common methods of the simple device. 73 struct simple_t** device) { 75 FORGROUND_COLOR, (struct simple_t**)device); 78 static inline int hideColor(struct simple_t* device) { argument 79 return device->common.close(&device->common); 72 showColor(const struct hw_module_t* module, struct simple_t** device) argument
|
/system/bt/stack/hid/ |
H A D | hidd_int.h | 49 tHID_DEV_DEV_CTB device; member in struct:dev_ctb
|
H A D | hidh_conn.cc | 212 /* always add incoming connection device into HID database by default */ 297 * Description This function processes timeout (to page device). 303 tHID_HOST_DEV_CTB* device; local 307 device = &hh_cb.devices[dhandle]; 308 device->conn_tries++; 310 hh_cb.callback(dhandle, device->addr, HID_HDEV_EVT_RETRYING, 311 device->conn_tries, NULL); 330 // TODO(armansito): This kind of math to determine a device handle is way 940 /* If report ID required for this device */
|
/system/gatekeeper/tests/ |
H A D | gatekeeper_device_test.cpp | 32 gatekeeper_device_initialize(&device); 36 gatekeeper_close(device); 51 gatekeeper_device_t *device; member in class:GateKeeperDeviceTest 63 ret = device->enroll(device, 400, NULL, 0, NULL, 0, password_payload, password_len, 70 ret = device->verify(device, 400, 0, password_handle, password_handle_length, 87 ret = device->enroll(device, 400, NULL, 0, NULL, 0, password_payload, password_len, 93 ret = device [all...] |
/system/security/keystore/ |
H A D | operation_struct.h | 39 : handle(handle_), keyid(keyid_), purpose(purpose_), device(device_), 49 sp<Keymaster> device; member in struct:keystore::Operation
|
/system/extras/tests/audio/alsa/ |
H A D | pcmtest.cpp | 42 unsigned int device; member in struct:PCM_NODE 96 &(pcmnodes[pcms].device)); 133 params = pcm_params_get(pcmnodes[i].card, pcmnodes[i].device,
|
/system/nvram/hal/tests/ |
H A D | nvram_hal_test.cc | 86 ScopedNvramSpace(SafeScopedNvramDevice* device, uint32_t index, uint32_t size) argument 87 : ScopedNvramSpace(device, 95 ScopedNvramSpace(SafeScopedNvramDevice* device, argument 99 : ScopedNvramSpace(device, 105 ScopedNvramSpace(SafeScopedNvramDevice* device, argument 110 : device_(device), 137 bool CleanBurnSpaces(SafeScopedNvramDevice* device) { argument 147 if (device->GetSpaceList(&space_index_list) != NV_RESULT_SUCCESS) { 153 if (device->IsSpaceLocked(index, &write_lock, &read_lock) != 159 nvram_result_t result = device 175 GetNextBurnSpace(SafeScopedNvramDevice* device, uint32_t* index) argument [all...] |
/system/core/fastboot/ |
H A D | usb_osx.cpp | 55 /** An open usb device */ 101 // Get an iterator for the interfaces on the device 105 ERR("Couldn't create a device interface iterator: (%08x)\n", kr); 263 /** Try out the given device and see if there's a match. Returns 0 on 266 static int try_device(io_service_t device, usb_handle *handle) { argument 276 kr = IOCreatePlugInInterfaceForService(device, 285 // Now create the device interface. 289 ERR("Couldn't create a device interface (%08x)\n", (int) result); 294 * We don't need the intermediate interface after the device interface 299 // So, we have a device, finall 427 io_service_t device = IOIteratorNext(iterator); local [all...] |