Searched refs:serial (Results 26 - 48 of 48) sorted by relevance

12

/system/tools/hidl/
H A DMethod.cpp41 size_t serial,
45 mSerial = serial;
160 void Method::setSerialId(size_t serial) { argument
162 mSerial = serial;
40 fillImplementation( size_t serial, MethodImpl cppImpl, MethodImpl javaImpl) argument
H A DInterface.cpp505 size_t serial = FIRST_CALL_TRANSACTION; local
507 serial += ancestor->mUserMethods.size();
511 if (serial > LAST_CALL_TRANSACTION) {
518 method->setSerialId(serial);
519 serial++;
603 // use a sorted map to insert them in serial ID order.
624 std::cerr << "ERROR: hidl-gen uses duplicated serial id for " << method->name()
/system/core/fastboot/
H A Dfastboot.cpp78 static const char* serial = nullptr; variable
205 // require matching serial number or device path if requested
213 return match_fastboot_with_serial(info, serial);
218 std::string serial = info->serial_number; local
220 serial = UsbNoPermissionsShortHelpText();
222 if (!serial[0]) {
223 serial = "????????????";
227 printf("%s\tfastboot", serial.c_str());
229 printf("%-22s fastboot", serial.c_str());
238 // Opens a new Transport connected to a device. If |serial| i
[all...]
/system/iot/attestation/at-factory-tool/
H A Datft.py298 # List of serial numbers for the devices in auto provisioning mode.
448 self.SORT_BY_SERIAL_TEXT = ['Sort by serial', '按照序列号排序'][index]
1597 selected_serials: The list of serial numbers for the selected devices.
1600 for serial in selected_serials:
1601 target = self.atft_manager.GetTargetDevice(serial)
1625 serial = target.serial_number
1675 target = self.atft_manager.GetTargetDevice(serial)
1708 selected_serials: The list of serial numbers for the selected devices.
1711 for serial in selected_serials:
1712 target = self.atft_manager.GetTargetDevice(serial)
[all...]
H A Datftman_unittest.py416 for serial in serial_map:
417 self.serial_map[serial.lower()] = serial_map[serial]
419 def mockGetLocation(self, serial):
420 serial_lower = serial.lower()
H A Datft_unittest.py647 def MockGetTargetDevice(self, serial):
648 return self.device_map.get(serial)
/system/core/adb/client/
H A Dusb_linux.cpp558 // Read the device's serial number.
560 "/sys/bus/usb/devices/%s/serial", dev_path + 4);
561 std::string serial; local
562 if (!android::base::ReadFileToString(serial_path, &serial)) {
564 // We don't actually want to treat an unknown serial as an error because
565 // devices aren't able to communicate a serial number in early bringup.
567 serial = "";
569 serial = android::base::Trim(serial);
577 register_usb_transport(done_usb, serial
[all...]
H A Dusb_libusb.cpp92 usb_handle(const std::string& device_address, const std::string& serial, argument
96 serial(serial),
135 std::string serial; member in struct:libusb::usb_handle
172 path += "/serial";
318 LOG(WARNING) << "received empty serial from device at " << device_address;
321 LOG(WARNING) << "failed to get serial from device at " << device_address
359 // write access to, but Linux at least lets us get the serial number anyway.
361 // We don't actually want to treat an unknown serial as an error because
362 // devices aren't able to communicate a serial numbe
[all...]
/system/extras/boottime_tools/bootanalyze/
H A Dbootanalyze.py68 if args.serial:
69 ADB_CMD = "%s %s" % ("adb -s", args.serial)
302 t = threading.Thread(target = lambda : (time.sleep(2), reboot(args.serial, args.stressfs != '',\
497 parser.add_argument('-p', '--serial', dest='serial', action='store',
498 help='android device serial number')
736 def do_reboot(serial, use_adb_reboot):
749 if not serial or (serial and current_devices.find(serial) <
[all...]
/system/vold/
H A DExt4Crypt.cpp395 bool e4crypt_vold_create_user_key(userid_t user_id, int serial, bool ephemeral) { argument
396 LOG(DEBUG) << "e4crypt_vold_create_user_key for " << user_id << " serial " << serial; local
403 << " serial " << serial; local
550 bool e4crypt_add_user_key_auth(userid_t user_id, int serial, const std::string& token_hex, argument
552 LOG(DEBUG) << "e4crypt_add_user_key_auth " << user_id << " serial=" << serial
590 bool e4crypt_unlock_user_key(userid_t user_id, int serial, const std::string& token_hex, argument
592 LOG(DEBUG) << "e4crypt_unlock_user_key " << user_id << " serial
652 e4crypt_prepare_user_storage(const std::string& volume_uuid, userid_t user_id, int serial, int flags) argument
[all...]
/system/core/adb/
H A Dadb_listeners.cpp137 // <device-serial> " " <local-name> " " <remote-name> "\n"
138 // Entries from "adb reverse" have no serial.
140 l->transport->serial ? l->transport->serial : "(reverse)",
H A Dsocket_test.cpp304 // Checks that skip_host_serial(serial) returns a pointer to the part of |serial| which matches
306 void VerifySkipHostSerial(std::string serial, const char* expected) { argument
307 char* result = internal::skip_host_serial(&serial[0]);
315 // Check [tcp:|udp:]<serial>[:<port>]:<command> format.
336 // If we can't find both [] then treat it as a normal serial with [ in it.
345 // Check <prefix>:<serial>:<command> format.
H A Dsockets.cpp382 static asocket* create_host_service_socket(const char* name, const char* serial, argument
386 s = host_service_to_socket(name, serial, transport_id);
558 // Returns the position in |service| following the target serial parameter. Serial format can be
560 // * [tcp:|udp:]<serial>[:<port>]:<command>
561 // * <prefix>:<serial>:<command>
580 // Check for an IPv6 address. `adb connect` creates the serial number from the canonical
618 char* serial = nullptr; local
655 if (!strncmp(service, "host-serial:", strlen("host-serial:"))) {
657 service += strlen("host-serial
[all...]
H A Dcommandline.cpp93 " -s SERIAL use device with given serial (overrides $ANDROID_SERIAL)\n"
191 " get-serialno print <serial-number>\n"
217 " $ANDROID_SERIAL serial number to connect to (see -s)\n"
1351 const char* serial = nullptr; local
1374 serial = argv[0] + 2;
1377 serial = argv[1];
1473 if (transport_type == kTransportAny && serial == nullptr) {
1474 serial = getenv("ANDROID_SERIAL");
1477 adb_set_transport(transport_type, serial, transport_id);
1548 return adb_send_emulator_command(argc, argv, serial);
[all...]
/system/core/base/
H A Dproperties.cpp98 static void WaitForPropertyCallback(void* data_ptr, const char*, const char* value, unsigned serial) { argument
103 data->last_read_serial = serial;
/system/tpm/trunks/ftdi/
H A Dmpsse.h186 const char* serial);
194 const char* serial,
H A Dmpsse.c84 * @serial - Device serial number (set to NULL if not needed).
95 const char* serial) {
97 serial, 0);
110 * @serial - Device serial number (set to NULL if not needed).
124 const char* serial,
148 if (!ftdi_usb_open_desc_index(&mpsse->ftdi, vid, pid, description, serial,
682 * Send data out via the selected serial protocol.
780 * Reads data over the selected serial protoco
88 Open(int vid, int pid, enum modes mode, int freq, int endianess, int interface, const char* description, const char* serial) argument
117 OpenIndex(int vid, int pid, enum modes mode, int freq, int endianess, int interface, const char* description, const char* serial, int index) argument
[all...]
/system/extras/pagecache/
H A Dpagecache.py221 def do_preprocess_adb_cmd(command, serial):
223 dump, ret_code = AdbUtils.run_adb_shell(args, serial)
360 parser.add_option('-s', '--serial', dest='device_serial', type='string',
361 help='adb device serial number')
/system/core/init/
H A Dpersistent_properties.cpp130 [](void* cookie, const char* name, const char* value, unsigned serial) {
H A Dperfboot.py407 parser.add_argument('-s', '--serial', default=os.getenv('ANDROID_SERIAL'),
408 help='Adb device serial number.')
432 device = adb.get_device(args.serial)
/system/iot/attestation/partner-tools/
H A Dprovision-test.py341 '--serial',
344 dest='serial',
345 help='Fastboot serial device',
357 fastboot_device = results.serial
/system/sepolicy/prebuilts/api/26.0/private/
H A Dsystem_server.te458 # Read device's serial number from system properties
/system/sepolicy/prebuilts/api/27.0/private/
H A Dsystem_server.te486 # Read device's serial number from system properties

Completed in 390 milliseconds

12