/system/bt/vendor_libs/test_vendor_lib/ |
D | Android.bp | 1 // simulation library for testing virtual devices 14 "model/devices/beacon.cc", 15 "model/devices/beacon_swarm.cc", 16 "model/devices/broken_adv.cc", 17 "model/devices/car_kit.cc", 18 "model/devices/classic.cc", 19 "model/devices/device.cc", 20 "model/devices/device_properties.cc", 21 "model/devices/h4_packetizer.cc", 22 "model/devices/h4_protocol.cc", [all …]
|
/system/bt/stack/hid/ |
D | hidh_api.cc | 277 hh_cb.devices[i].conn.process_repage_timer = in HID_HostRegister() 299 alarm_free(hh_cb.devices[i].conn.process_repage_timer); in HID_HostDeregister() 324 if ((hh_cb.devices[i].in_use) && addr == hh_cb.devices[i].addr) break; in HID_HostAddDev() 329 if (!hh_cb.devices[i].in_use) break; in HID_HostAddDev() 335 if (!hh_cb.devices[i].in_use) { in HID_HostAddDev() 336 hh_cb.devices[i].in_use = true; in HID_HostAddDev() 337 hh_cb.devices[i].addr = addr; in HID_HostAddDev() 338 hh_cb.devices[i].state = HID_DEV_NO_CONN; in HID_HostAddDev() 339 hh_cb.devices[i].conn_tries = 0; in HID_HostAddDev() 342 if (attr_mask != HID_ATTR_MASK_IGNORE) hh_cb.devices[i].attr_mask = attr_mask; in HID_HostAddDev() [all …]
|
D | hidh_conn.cc | 113 hh_cb.devices[xx].in_use = false; in hidh_conn_reg() 114 hh_cb.devices[xx].conn.conn_state = HID_CONN_STATE_UNUSED; in hidh_conn_reg() 130 tHID_CONN* p_hcon = &hh_cb.devices[dhandle].conn; in hidh_conn_disconnect() 139 L2CA_SetIdleTimeoutByBdAddr(hh_cb.devices[dhandle].addr, 0, in hidh_conn_disconnect() 221 p_hcon = &hh_cb.devices[i].conn; in hidh_l2cif_connect_ind() 222 p_dev = &hh_cb.devices[i]; in hidh_l2cif_connect_ind() 310 device = &hh_cb.devices[dhandle]; in hidh_try_repage() 335 dhandle = (PTR_TO_UINT(p_dev) - PTR_TO_UINT(&(hh_cb.devices[0]))) / in hidh_sec_check_complete_orig() 386 p_dev = &hh_cb.devices[dhandle]; in hidh_l2cif_connect_cfm() 387 p_hcon = &hh_cb.devices[dhandle].conn; in hidh_l2cif_connect_cfm() [all …]
|
/system/bt/test/suite/rfcomm/ |
D | rfcomm_test.cc | 44 RawAddress* devices = (RawAddress*)bonded_devices_prop->val; in SetUp() local 49 bt_interface()->get_remote_device_property(&devices[i], BT_PROPERTY_UUIDS); in SetUp() 53 GetRemoteDeviceProperty(&devices[i], BT_PROPERTY_UUIDS); in SetUp() 60 bt_remote_bdaddr_ = *(devices + i); in SetUp()
|
/system/sepolicy/prebuilts/api/29.0/public/ |
D | device.te | 57 # All devices have a uart for the hci 63 # All devices have a rpmsg device for 74 # Documented at https://source.android.com/devices/bootloader/partitions-images 78 # Documented at https://source.android.com/devices/bootloader/partitions-images 82 # Documented at https://source.android.com/devices/bootloader/partitions-images 86 # Documented at https://source.android.com/devices/bootloader/partitions-images 90 # Documented at https://source.android.com/devices/bootloader/partitions-images 99 # Documented at https://source.android.com/devices/bootloader/partitions-images 103 # Documented at https://source.android.com/devices/bootloader/partitions-images 109 # sdcard devices; normally vold uses the vold_block_device label and creates a
|
D | fsck_untrusted.te | 1 # Any fsck program run on untrusted block devices 11 # Run fsck on vold block devices 20 # block devices. With that information, it runs stat() on each block 24 # Allow stat access to all block devices so that fsck can compare 32 # Untrusted fsck should never be run on block devices holding sensitive data
|
D | fsck.te | 16 # Run fsck on certain block devices 25 # For the block devices where we have ioctl access, 35 # block devices. With that information, it runs stat() on each block 39 # Allow stat access to all block devices so that fsck can compare 53 # fsck should never be run on these block devices
|
/system/sepolicy/public/ |
D | device.te | 57 # All devices have a uart for the hci 63 # All devices have a rpmsg device for 74 # Documented at https://source.android.com/devices/bootloader/partitions-images 78 # Documented at https://source.android.com/devices/bootloader/partitions-images 82 # Documented at https://source.android.com/devices/bootloader/partitions-images 86 # Documented at https://source.android.com/devices/bootloader/partitions-images 90 # Documented at https://source.android.com/devices/bootloader/partitions-images 99 # Documented at https://source.android.com/devices/bootloader/partitions-images 103 # Documented at https://source.android.com/devices/bootloader/partitions-images 109 # sdcard devices; normally vold uses the vold_block_device label and creates a
|
D | fsck_untrusted.te | 1 # Any fsck program run on untrusted block devices 11 # Run fsck on vold block devices 20 # block devices. With that information, it runs stat() on each block 24 # Allow stat access to all block devices so that fsck can compare 32 # Untrusted fsck should never be run on block devices holding sensitive data
|
D | fsck.te | 16 # Run fsck on certain block devices 25 # For the block devices where we have ioctl access, 35 # block devices. With that information, it runs stat() on each block 39 # Allow stat access to all block devices so that fsck can compare 53 # fsck should never be run on these block devices
|
/system/sepolicy/prebuilts/api/27.0/public/ |
D | fsck_untrusted.te | 1 # Any fsck program run on untrusted block devices 11 # Run fsck on vold block devices 20 # block devices. With that information, it runs stat() on each block 24 # Allow stat access to all block devices so that fsck can compare 32 # Untrusted fsck should never be run on block devices holding sensitive data
|
D | fsck.te | 16 # Run fsck on certain block devices 25 # block devices. With that information, it runs stat() on each block 29 # Allow stat access to all block devices so that fsck can compare 40 # fsck should never be run on these block devices
|
/system/sepolicy/prebuilts/api/26.0/public/ |
D | fsck_untrusted.te | 1 # Any fsck program run on untrusted block devices 11 # Run fsck on vold block devices 20 # block devices. With that information, it runs stat() on each block 24 # Allow stat access to all block devices so that fsck can compare 32 # Untrusted fsck should never be run on block devices holding sensitive data
|
D | fsck.te | 16 # Run fsck on certain block devices 25 # block devices. With that information, it runs stat() on each block 29 # Allow stat access to all block devices so that fsck can compare 40 # fsck should never be run on these block devices
|
/system/sepolicy/prebuilts/api/28.0/public/ |
D | fsck_untrusted.te | 1 # Any fsck program run on untrusted block devices 11 # Run fsck on vold block devices 20 # block devices. With that information, it runs stat() on each block 24 # Allow stat access to all block devices so that fsck can compare 32 # Untrusted fsck should never be run on block devices holding sensitive data
|
D | fsck.te | 16 # Run fsck on certain block devices 25 # block devices. With that information, it runs stat() on each block 29 # Allow stat access to all block devices so that fsck can compare 43 # fsck should never be run on these block devices
|
/system/core/rootdir/ |
D | ueventd.rc | 64 /sys/devices/platform/trusty.* trusty_version 0440 root log 65 /sys/devices/virtual/input/input* enable 0660 root input 66 /sys/devices/virtual/input/input* poll_delay 0660 root input 67 /sys/devices/virtual/usb_composite/* enable 0664 root system 68 /sys/devices/system/cpu/cpu* cpufreq/scaling_max_freq 0664 system system 69 /sys/devices/system/cpu/cpu* cpufreq/scaling_min_freq 0664 system system
|
/system/sepolicy/prebuilts/api/28.0/private/ |
D | blkid_untrusted.te | 1 # blkid for untrusted block devices 5 # Allowed read-only access to vold block devices to extract UUID/label 20 # Untrusted blkid should never be run on block devices holding sensitive data
|
/system/sepolicy/prebuilts/api/27.0/private/ |
D | blkid_untrusted.te | 1 # blkid for untrusted block devices 5 # Allowed read-only access to vold block devices to extract UUID/label 20 # Untrusted blkid should never be run on block devices holding sensitive data
|
/system/sepolicy/prebuilts/api/29.0/private/ |
D | blkid_untrusted.te | 1 # blkid for untrusted block devices 5 # Allowed read-only access to vold block devices to extract UUID/label 20 # Untrusted blkid should never be run on block devices holding sensitive data
|
/system/sepolicy/private/ |
D | blkid_untrusted.te | 1 # blkid for untrusted block devices 5 # Allowed read-only access to vold block devices to extract UUID/label 20 # Untrusted blkid should never be run on block devices holding sensitive data
|
/system/sepolicy/prebuilts/api/26.0/private/ |
D | blkid_untrusted.te | 1 # blkid for untrusted block devices 5 # Allowed read-only access to vold block devices to extract UUID/label 20 # Untrusted blkid should never be run on block devices holding sensitive data
|
/system/core/adb/client/ |
D | console.cpp | 67 std::string devices; in adb_get_emulator_console_port() local 69 if (!adb_query("host:devices", &devices, &error)) { in adb_get_emulator_console_port() 76 for (const auto& device : android::base::Split(devices, "\n")) { in adb_get_emulator_console_port()
|
/system/extras/partition_tools/ |
D | lpdumpd.rc | 23 # On Launch devices, assume "super". On virtual devices, ${ro.boot.super_partition} 26 # On retrofit devices, ${ro.boot.super_partition} is slot-suffixed.
|
/system/extras/tests/workloads/ |
D | capture.sh | 7 adb devices -l 2>&1 >/dev/null 21 devInfo=$(adb devices -l | grep -v ^List | head -1)
|