Searched defs:device (Results 1 - 25 of 53) sorted by relevance

123

/system/core/trusty/gatekeeper/
H A Dmodule.cpp28 hw_device_t **device) {
36 *device = gatekeeper->hw_device();
27 trusty_gatekeeper_open(const hw_module_t *module, const char *name, hw_device_t **device) argument
/system/core/trusty/keymaster/
H A Dmodule.cpp27 * Generic device handling
29 static int trusty_keymaster_open(const hw_module_t* module, const char* name, hw_device_t** device) { argument
38 *device = dev->hw_device();
39 // Do not delete dev; it will get cleaned up when the caller calls device->close(), and must
H A Dtrusty_keymaster_main.cpp138 static bool do_operation(TrustyKeymasterDevice* device, keymaster_purpose_t purpose, argument
147 keymaster_error_t error = device->begin(purpose, key, &param_set, nullptr, &op_handle);
153 error = device->update(op_handle, nullptr, input, &input_consumed, nullptr, nullptr);
161 device->abort(op_handle);
164 error = device->finish(op_handle, nullptr, nullptr, signature, nullptr, output);
172 static bool test_import_rsa(TrustyKeymasterDevice* device) { argument
180 int error = device->import_key(&rsa_param_set, KM_KEY_FORMAT_PKCS8, &private_key, &key, nullptr);
193 if (!do_operation(device, KM_PURPOSE_SIGN, &key, &input, nullptr, &signature)) {
200 if (!do_operation(device, KM_PURPOSE_VERIFY, &key, &input, &signature, nullptr)) {
209 static bool test_rsa(TrustyKeymasterDevice* device) { argument
276 test_import_ecdsa(TrustyKeymasterDevice* device) argument
313 test_ecdsa(TrustyKeymasterDevice* device) argument
[all...]
/system/update_engine/common/
H A Dfake_boot_control.h47 std::string* device) const override {
53 *device = part_it->second;
90 const std::string& device) {
92 devices_[slot][partition_name] = device;
88 SetPartitionDevice(const std::string& partition_name, BootControlInterface::Slot slot, const std::string& device) argument
/system/update_engine/
H A Dutils_android.cc27 // Open the appropriate fstab file and fallback to /fstab.device if
34 fstab = fs_mgr_read_fstab("/fstab.device");
42 bool DeviceForMountPoint(const string& mount_point, base::FilePath* device) { argument
58 *device = base::FilePath(record->blk_device);
H A Dboot_control_chromeos.cc47 // Resolve the boot device path fully, including dereferencing through
51 LOG(ERROR) << "rootdev failed to find the root device";
54 LOG_IF(WARNING, ret > 0) << "rootdev found a device name with no device node";
101 << "Booted from a removable device, pretending we have only one slot.";
121 << ". This device is not updateable.";
143 string* device) const {
152 *device = part_device;
256 string BootControlChromeOS::SysfsBlockDevice(const string& device) { argument
257 base::FilePath device_path(device);
265 IsRemovableDevice(const string& device) argument
[all...]
/system/core/adb/
H A Dtransport_test.cpp91 ASSERT_EQ(nullptr, t.device);
98 "host::ro.product.name=foo;ro.product.model=bar;ro.product.device=baz;";
107 ASSERT_EQ(std::string("baz"), t.device);
114 "host::ro.product.name=foo;ro.product.model=bar;ro.product.device=baz;"
126 ASSERT_EQ(std::string("baz"), t.device);
134 std::string device = "test_device"; local
141 t.device = &device[0];
151 EXPECT_TRUE(t.MatchesTarget("device:" + device));
[all...]
H A Dtransport.h143 char* device = nullptr; member in class:atransport
180 // * device:<device>
212 * If serial is non-null then only the device with that serial will be chosen.
213 * If transport_id is non-zero then only the device with that transport ID will be chosen.
238 /* Connect to a network address and register it as a device */
/system/libvintf/include/vintf/
H A DCompatibilityMatrix.h123 // entries only for device compatibility matrix.
132 } device; member in struct:android::vintf::CompatibilityMatrix
H A DHalManifest.h55 // Construct a device HAL manifest.
67 // - framework manifest vs. device compat-mat
70 // - device manifest vs. framework compat-mat
82 // "android.hardware.camera.device@1.0", "android.hardware.camera.device@3.2",
93 // device.mSepolicyVersion. Assume type == device.
94 // Abort if type != device.
161 // entries for device hal manifest only
164 } device; member in struct:android::vintf::HalManifest
[all...]
/system/vold/model/
H A DEmulatedVolume.cpp48 EmulatedVolume::EmulatedVolume(const std::string& rawPath, dev_t device, argument
50 setId(StringPrintf("emulated:%u,%u", major(device), minor(device)));
H A DPrivateVolume.cpp46 PrivateVolume::PrivateVolume(dev_t device, const std::string& keyRaw) : argument
47 VolumeBase(Type::kPrivate), mRawDevice(device), mKeyRaw(keyRaw) {
48 setId(StringPrintf("private:%u,%u", major(device), minor(device)));
H A DPublicVolume.cpp46 PublicVolume::PublicVolume(dev_t device) : argument
47 VolumeBase(Type::kPublic), mDevice(device), mFusePid(0) {
48 setId(StringPrintf("public:%u,%u", major(device), minor(device)));
/system/core/trusty/storage/proxy/
H A Dipc.c35 int ipc_connect(const char *device, const char *port) argument
43 rc = tipc_connect(device, port);
/system/keymaster/include/keymaster/legacy_support/
H A Dkeymaster0_engine.h41 * ownership of the device, and will close it during destruction.
63 const keymaster0_device_t* device() { return keymaster0_device_; } function in class:keymaster::Keymaster0Engine
H A Dkeymaster1_engine.h41 * ownership of the device, and will close it during destruction.
80 const keymaster1_device_t* device() const { return keymaster1_device_; } function in class:keymaster::Keymaster1Engine
/system/media/alsa_utils/include/
H A Dalsa_device_profile.h40 int device; member in struct:__anon1982
52 /* read from the hardware device */
65 bool profile_is_cached_for(const alsa_device_profile* profile, int card, int device);
/system/tools/hidl/c2hal/test/
H A Dsimple.h36 * Common methods of the simple device.
73 struct simple_t** device) {
75 FORGROUND_COLOR, (struct simple_t**)device);
78 static inline int hideColor(struct simple_t* device) { argument
79 return device->common.close(&device->common);
72 showColor(const struct hw_module_t* module, struct simple_t** device) argument
/system/bt/stack/hid/
H A Dhidd_int.h49 tHID_DEV_DEV_CTB device; member in struct:dev_ctb
H A Dhidh_conn.cc212 /* always add incoming connection device into HID database by default */
297 * Description This function processes timeout (to page device).
303 tHID_HOST_DEV_CTB* device; local
307 device = &hh_cb.devices[dhandle];
308 device->conn_tries++;
310 hh_cb.callback(dhandle, device->addr, HID_HDEV_EVT_RETRYING,
311 device->conn_tries, NULL);
330 // TODO(armansito): This kind of math to determine a device handle is way
940 /* If report ID required for this device */
/system/gatekeeper/tests/
H A Dgatekeeper_device_test.cpp32 gatekeeper_device_initialize(&device);
36 gatekeeper_close(device);
51 gatekeeper_device_t *device; member in class:GateKeeperDeviceTest
63 ret = device->enroll(device, 400, NULL, 0, NULL, 0, password_payload, password_len,
70 ret = device->verify(device, 400, 0, password_handle, password_handle_length,
87 ret = device->enroll(device, 400, NULL, 0, NULL, 0, password_payload, password_len,
93 ret = device
[all...]
/system/security/keystore/
H A Doperation_struct.h39 : handle(handle_), keyid(keyid_), purpose(purpose_), device(device_),
49 sp<Keymaster> device; member in struct:keystore::Operation
/system/extras/tests/audio/alsa/
H A Dpcmtest.cpp42 unsigned int device; member in struct:PCM_NODE
96 &(pcmnodes[pcms].device));
133 params = pcm_params_get(pcmnodes[i].card, pcmnodes[i].device,
/system/nvram/hal/tests/
H A Dnvram_hal_test.cc86 ScopedNvramSpace(SafeScopedNvramDevice* device, uint32_t index, uint32_t size) argument
87 : ScopedNvramSpace(device,
95 ScopedNvramSpace(SafeScopedNvramDevice* device, argument
99 : ScopedNvramSpace(device,
105 ScopedNvramSpace(SafeScopedNvramDevice* device, argument
110 : device_(device),
137 bool CleanBurnSpaces(SafeScopedNvramDevice* device) { argument
147 if (device->GetSpaceList(&space_index_list) != NV_RESULT_SUCCESS) {
153 if (device->IsSpaceLocked(index, &write_lock, &read_lock) !=
159 nvram_result_t result = device
175 GetNextBurnSpace(SafeScopedNvramDevice* device, uint32_t* index) argument
[all...]
/system/core/fastboot/
H A Dusb_osx.cpp55 /** An open usb device */
101 // Get an iterator for the interfaces on the device
105 ERR("Couldn't create a device interface iterator: (%08x)\n", kr);
263 /** Try out the given device and see if there's a match. Returns 0 on
266 static int try_device(io_service_t device, usb_handle *handle) { argument
276 kr = IOCreatePlugInInterfaceForService(device,
285 // Now create the device interface.
289 ERR("Couldn't create a device interface (%08x)\n", (int) result);
294 * We don't need the intermediate interface after the device interface
299 // So, we have a device, finall
427 io_service_t device = IOIteratorNext(iterator); local
[all...]

Completed in 751 milliseconds

123