/system/tools/hidl/ |
H A D | Method.cpp | 41 size_t serial, 45 mSerial = serial; 160 void Method::setSerialId(size_t serial) { argument 162 mSerial = serial; 40 fillImplementation( size_t serial, MethodImpl cppImpl, MethodImpl javaImpl) argument
|
H A D | Interface.cpp | 505 size_t serial = FIRST_CALL_TRANSACTION; local 507 serial += ancestor->mUserMethods.size(); 511 if (serial > LAST_CALL_TRANSACTION) { 518 method->setSerialId(serial); 519 serial++; 603 // use a sorted map to insert them in serial ID order. 624 std::cerr << "ERROR: hidl-gen uses duplicated serial id for " << method->name()
|
/system/core/fastboot/ |
H A D | fastboot.cpp | 78 static const char* serial = nullptr; variable 205 // require matching serial number or device path if requested 213 return match_fastboot_with_serial(info, serial); 218 std::string serial = info->serial_number; local 220 serial = UsbNoPermissionsShortHelpText(); 222 if (!serial[0]) { 223 serial = "????????????"; 227 printf("%s\tfastboot", serial.c_str()); 229 printf("%-22s fastboot", serial.c_str()); 238 // Opens a new Transport connected to a device. If |serial| i [all...] |
/system/iot/attestation/at-factory-tool/ |
H A D | atft.py | 298 # List of serial numbers for the devices in auto provisioning mode. 448 self.SORT_BY_SERIAL_TEXT = ['Sort by serial', '按照序列号排序'][index] 1597 selected_serials: The list of serial numbers for the selected devices. 1600 for serial in selected_serials: 1601 target = self.atft_manager.GetTargetDevice(serial) 1625 serial = target.serial_number 1675 target = self.atft_manager.GetTargetDevice(serial) 1708 selected_serials: The list of serial numbers for the selected devices. 1711 for serial in selected_serials: 1712 target = self.atft_manager.GetTargetDevice(serial) [all...] |
H A D | atftman_unittest.py | 416 for serial in serial_map: 417 self.serial_map[serial.lower()] = serial_map[serial] 419 def mockGetLocation(self, serial): 420 serial_lower = serial.lower()
|
H A D | atft_unittest.py | 647 def MockGetTargetDevice(self, serial): 648 return self.device_map.get(serial)
|
/system/core/adb/client/ |
H A D | usb_linux.cpp | 558 // Read the device's serial number. 560 "/sys/bus/usb/devices/%s/serial", dev_path + 4); 561 std::string serial; local 562 if (!android::base::ReadFileToString(serial_path, &serial)) { 564 // We don't actually want to treat an unknown serial as an error because 565 // devices aren't able to communicate a serial number in early bringup. 567 serial = ""; 569 serial = android::base::Trim(serial); 577 register_usb_transport(done_usb, serial [all...] |
H A D | usb_libusb.cpp | 92 usb_handle(const std::string& device_address, const std::string& serial, argument 96 serial(serial), 135 std::string serial; member in struct:libusb::usb_handle 172 path += "/serial"; 318 LOG(WARNING) << "received empty serial from device at " << device_address; 321 LOG(WARNING) << "failed to get serial from device at " << device_address 359 // write access to, but Linux at least lets us get the serial number anyway. 361 // We don't actually want to treat an unknown serial as an error because 362 // devices aren't able to communicate a serial numbe [all...] |
/system/extras/boottime_tools/bootanalyze/ |
H A D | bootanalyze.py | 68 if args.serial: 69 ADB_CMD = "%s %s" % ("adb -s", args.serial) 302 t = threading.Thread(target = lambda : (time.sleep(2), reboot(args.serial, args.stressfs != '',\ 497 parser.add_argument('-p', '--serial', dest='serial', action='store', 498 help='android device serial number') 736 def do_reboot(serial, use_adb_reboot): 749 if not serial or (serial and current_devices.find(serial) < [all...] |
/system/vold/ |
H A D | Ext4Crypt.cpp | 395 bool e4crypt_vold_create_user_key(userid_t user_id, int serial, bool ephemeral) { argument 396 LOG(DEBUG) << "e4crypt_vold_create_user_key for " << user_id << " serial " << serial; local 403 << " serial " << serial; local 550 bool e4crypt_add_user_key_auth(userid_t user_id, int serial, const std::string& token_hex, argument 552 LOG(DEBUG) << "e4crypt_add_user_key_auth " << user_id << " serial=" << serial 590 bool e4crypt_unlock_user_key(userid_t user_id, int serial, const std::string& token_hex, argument 592 LOG(DEBUG) << "e4crypt_unlock_user_key " << user_id << " serial 652 e4crypt_prepare_user_storage(const std::string& volume_uuid, userid_t user_id, int serial, int flags) argument [all...] |
/system/core/adb/ |
H A D | adb_listeners.cpp | 137 // <device-serial> " " <local-name> " " <remote-name> "\n" 138 // Entries from "adb reverse" have no serial. 140 l->transport->serial ? l->transport->serial : "(reverse)",
|
H A D | socket_test.cpp | 304 // Checks that skip_host_serial(serial) returns a pointer to the part of |serial| which matches 306 void VerifySkipHostSerial(std::string serial, const char* expected) { argument 307 char* result = internal::skip_host_serial(&serial[0]); 315 // Check [tcp:|udp:]<serial>[:<port>]:<command> format. 336 // If we can't find both [] then treat it as a normal serial with [ in it. 345 // Check <prefix>:<serial>:<command> format.
|
H A D | sockets.cpp | 382 static asocket* create_host_service_socket(const char* name, const char* serial, argument 386 s = host_service_to_socket(name, serial, transport_id); 558 // Returns the position in |service| following the target serial parameter. Serial format can be 560 // * [tcp:|udp:]<serial>[:<port>]:<command> 561 // * <prefix>:<serial>:<command> 580 // Check for an IPv6 address. `adb connect` creates the serial number from the canonical 618 char* serial = nullptr; local 655 if (!strncmp(service, "host-serial:", strlen("host-serial:"))) { 657 service += strlen("host-serial [all...] |
H A D | commandline.cpp | 93 " -s SERIAL use device with given serial (overrides $ANDROID_SERIAL)\n" 191 " get-serialno print <serial-number>\n" 217 " $ANDROID_SERIAL serial number to connect to (see -s)\n" 1351 const char* serial = nullptr; local 1374 serial = argv[0] + 2; 1377 serial = argv[1]; 1473 if (transport_type == kTransportAny && serial == nullptr) { 1474 serial = getenv("ANDROID_SERIAL"); 1477 adb_set_transport(transport_type, serial, transport_id); 1548 return adb_send_emulator_command(argc, argv, serial); [all...] |
/system/core/base/ |
H A D | properties.cpp | 98 static void WaitForPropertyCallback(void* data_ptr, const char*, const char* value, unsigned serial) { argument 103 data->last_read_serial = serial;
|
/system/tpm/trunks/ftdi/ |
H A D | mpsse.h | 186 const char* serial); 194 const char* serial,
|
H A D | mpsse.c | 84 * @serial - Device serial number (set to NULL if not needed). 95 const char* serial) { 97 serial, 0); 110 * @serial - Device serial number (set to NULL if not needed). 124 const char* serial, 148 if (!ftdi_usb_open_desc_index(&mpsse->ftdi, vid, pid, description, serial, 682 * Send data out via the selected serial protocol. 780 * Reads data over the selected serial protoco 88 Open(int vid, int pid, enum modes mode, int freq, int endianess, int interface, const char* description, const char* serial) argument 117 OpenIndex(int vid, int pid, enum modes mode, int freq, int endianess, int interface, const char* description, const char* serial, int index) argument [all...] |
/system/extras/pagecache/ |
H A D | pagecache.py | 221 def do_preprocess_adb_cmd(command, serial): 223 dump, ret_code = AdbUtils.run_adb_shell(args, serial) 360 parser.add_option('-s', '--serial', dest='device_serial', type='string', 361 help='adb device serial number')
|
/system/core/init/ |
H A D | persistent_properties.cpp | 130 [](void* cookie, const char* name, const char* value, unsigned serial) {
|
H A D | perfboot.py | 407 parser.add_argument('-s', '--serial', default=os.getenv('ANDROID_SERIAL'), 408 help='Adb device serial number.') 432 device = adb.get_device(args.serial)
|
/system/iot/attestation/partner-tools/ |
H A D | provision-test.py | 341 '--serial', 344 dest='serial', 345 help='Fastboot serial device', 357 fastboot_device = results.serial
|
/system/sepolicy/prebuilts/api/26.0/private/ |
H A D | system_server.te | 458 # Read device's serial number from system properties
|
/system/sepolicy/prebuilts/api/27.0/private/ |
H A D | system_server.te | 486 # Read device's serial number from system properties
|