Home
last modified time | relevance | path

Searched full:tee (Results 1 – 25 of 1005) sorted by relevance

12345678910>>...41

/external/apache-commons-io/src/test/java/org/apache/commons/io/input/
DTeeReaderTest.java46 private Reader tee; field in TeeReaderTest
52 tee = new TeeReader(input, output); in setUp()
93 assertEquals('a', tee.read()); in testMarkReset()
94 tee.mark(1); in testMarkReset()
95 assertEquals('b', tee.read()); in testMarkReset()
96 tee.reset(); in testMarkReset()
97 assertEquals('b', tee.read()); in testMarkReset()
98 assertEquals('c', tee.read()); in testMarkReset()
99 assertEquals(-1, tee.read()); in testMarkReset()
105 assertEquals('a', tee.read()); in testReadEverything()
[all …]
DTeeInputStreamTest.java45 private InputStream tee; field in TeeInputStreamTest
53 tee = new TeeInputStream(input, output); in setUp()
94 assertEquals('a', tee.read()); in testMarkReset()
95 tee.mark(1); in testMarkReset()
96 assertEquals('b', tee.read()); in testMarkReset()
97 tee.reset(); in testMarkReset()
98 assertEquals('b', tee.read()); in testMarkReset()
99 assertEquals('c', tee.read()); in testMarkReset()
100 assertEquals(-1, tee.read()); in testMarkReset()
106 assertEquals('a', tee.read()); in testReadEverything()
[all …]
/external/trusty/arm-trusted-firmware/docs/components/spd/
Doptee-dispatcher.rst1 OP-TEE Dispatcher
4 `OP-TEE OS`_ is a Trusted OS running as Secure EL1.
6 To build and execute OP-TEE follow the instructions at
7 `OP-TEE build.git`_
9 There are two different modes for loading the OP-TEE OS. The default mode will
11 platforms to use. There is also another technique that will load OP-TEE OS after
13 specifically added for ChromeOS. Loading OP-TEE via an SMC call may be insecure
18 used by the TEE become accessible. The firmware then verifies the signature of
20 dm-verity. The SMC call to load OP-TEE is then invoked immediately after the
24 OP-TEE is loaded.
[all …]
/external/libva/va/
Dva_prot.h92 * facilitate isolated communicaiton with TEE.
94 * to TEE direct communication to perform various TEE centric operations
96 * TEE for other usages, providing TEE capabilities etc.
99 * TEE/GPU/Display for HWDRM playback.
101 * The difference between Protected Content and Protected TEE Communication
103 * point for TEE and invokes TEE only from HWDRM perspective.
115 * Execution Environment (TEE) to prepare client platform or system for DRM
117 * instructed in DRM standard) and client system TEE. The communication between
118 * provisioning servers and client system TEE uses asymmetic cryptographic
123 * servers and TEE using asymmetic cryptographic mechanism. At end of this step,
[all …]
/external/v4l-utils/contrib/test/
Dtest-media211 echo "FAIL: the vivid module failed to load" | tee -a $tmp
212 echo "Grand Total for vivid: Succeeded: 0, Failed: 1, Warnings: 0" | tee -a $tmp
238 echo vivid compliance tests, contiguous planes | tee /dev/kmsg
241 …ance -m platform:vivid-000 -z platform:vivid-002 -e vivid-002-vid-cap -P -s10 -a 2>&1 | tee -a $tmp
243 echo vivid compliance tests, non-contiguous planes | tee /dev/kmsg
246 …ance -m platform:vivid-001 -z platform:vivid-002 -e vivid-002-vid-out -P -s10 -a 2>&1 | tee -a $tmp
259 echo loading visl module | tee /dev/kmsg
265 echo visl compliance tests | tee /dev/kmsg
268 stdbuf -oL $v4l2_compliance -m platform:visl -P -s10 -a 2>&1 | tee -a $tmp
270 echo unbind visl | tee /dev/kmsg
[all …]
/external/guice/core/test/com/google/inject/
DPerformanceComparison.java75 RootBeanDefinition tee = new RootBeanDefinition(TeeImpl.class, true);
76 tee.setLazyInit(true);
79 tee.setConstructorArgumentValues(teeValues);
83 barValues.addGenericArgumentValue(new RuntimeBeanReference("tee"));
97 beanFactory.registerBeanDefinition("tee", tee);
118 bind(Tee.class).to(TeeImpl.class);
139 final Tee tee = new TeeImpl("test");
146 Bar bar = new BarImpl(tee, 5);
147 Bar copy = new BarImpl(tee, 5);
254 Tee getTee(); in getTee()
[all …]
/external/linux-kselftest/tools/testing/selftests/rcutorture/bin/
Dkvm-remote.sh80 echo | tee -a "$oldrun/remote-log"
81 echo " ----" kvm.sh output: "(`date`)" | tee -a "$oldrun/remote-log"
82 cat $T/kvm.sh.out | tee -a "$oldrun/remote-log"
89 echo $scriptname: kvm-again.sh failed exit code $? | tee -a "$oldrun/remote-log"
90 cat $T/kvm-again.sh.out | tee -a "$oldrun/remote-log"
107 echo $scriptname: kvm-again.sh failed exit code $? | tee -a "$oldrun/remote-log"
108 cat $T/kvm-again.sh.out | tee -a "$oldrun/remote-log"
114 echo | tee -a "$oldrun/remote-log"
115 echo " ----" kvm-again.sh output: "(`date`)" | tee -a "$oldrun/remote-log"
117 echo | tee -a "$oldrun/remote-log"
[all …]
Dkvm-end-run-stats.sh31 echo | tee -a "$rundir/log"
32 echo | tee -a "$rundir/log"
33 echo " --- `date` Test summary:" | tee -a "$rundir/log"
34 echo Results directory: $rundir | tee -a "$rundir/log"
35 kcsan-collapse.sh "$rundir" | tee -a "$rundir/log"
38 cat $T/kvm-recheck.sh.out | tee -a "$rundir/log"
39 echo " --- Done at `date` (`get_starttime_duration $starttime`) exitcode $ret" | tee -a "$rundir/lo…
Dtorture.sh213 echo " --- " $scriptname $args | tee -a $T/log
214 echo " --- Results directory: " $ds | tee -a $T/log
224 echo " --- Zero time for rcutorture, disabling" | tee -a $T/log
236 echo " --- Zero time for locktorture, disabling" | tee -a $T/log
248 echo " --- Zero time for scftorture, disabling" | tee -a $T/log
268 echo " --- $curflavor:" Start `date` | tee -a $T/log
279 cat $T/$curflavor.out | tee -a $T/log
280 echo retcode=$retcode | tee -a $T/log
326 echo " --- allmodconfig:" Start `date` | tee -a $T/log
423 echo " --- " Done `date` | tee -a $T/log
[all …]
/external/arm-trusted-firmware/docs/plat/
Dwarp7.rst12 BootROM --> TF-A BL2 --> BL32(OP-TEE) --> BL33(U-Boot) --> Linux
14 In the WaRP7 port we encapsulate OP-TEE, DTB and U-Boot into a FIP. This FIP is
36 OP-TEE
39 https://github.com/OP-TEE/optee_os.git
56 - tee-header_v2.bin
57 - tee-pager_v2.bin
58 - tee-pageable_v2.bin
68 cp /path/to/optee/out/arm-plat-imx/core/tee-header_v2.bin fiptool_images
69 cp /path/to/optee/out/arm-plat-imx/core/tee-pager_v2.bin fiptool_images
70 cp /path/to/optee/out/arm-plat-imx/core/tee-pageable_v2.bin fiptool_images
[all …]
Dstm32mp1.rst44 inside the FIP binary: BL32 (SP_min or OP-TEE), U-Boot and their respective
102 or if Op-TEE is used:
104 ROM code -> BL2 (compiled with BL2_AT_EL3) -> OP-TEE -> BL33 (U-Boot)
120 You need to build BL2, BL32 (SP_min or OP-TEE) and BL33 (U-Boot) before building FIP binary.
131 OP-TEE (optional)
143 If you choose not to use OP-TEE, you can use TF-A SP_min.
163 This BL2 is independent of the BL32 used (SP_min or OP-TEE)
179 With OP-TEE:
188 BL32=<optee_directory>/tee-header_v2.bin \
189 BL32_EXTRA1=<optee_directory>/tee-pager_v2.bin
[all …]
/external/trusty/arm-trusted-firmware/docs/plat/
Dwarp7.rst12 BootROM --> TF-A BL2 --> BL32(OP-TEE) --> BL33(U-Boot) --> Linux
14 In the WaRP7 port we encapsulate OP-TEE, DTB and U-Boot into a FIP. This FIP is
36 OP-TEE
39 https://github.com/OP-TEE/optee_os.git
56 - tee-header_v2.bin
57 - tee-pager_v2.bin
58 - tee-pageable_v2.bin
68 cp /path/to/optee/out/arm-plat-imx/core/tee-header_v2.bin fiptool_images
69 cp /path/to/optee/out/arm-plat-imx/core/tee-pager_v2.bin fiptool_images
70 cp /path/to/optee/out/arm-plat-imx/core/tee-pageable_v2.bin fiptool_images
[all …]
/external/coreboot/src/security/intel/txt/
Dramstage.c35 printk(BIOS_INFO, "TEE-TXT: IBB Hash 0x"); in log_ibb_measurements()
101 printk(BIOS_INFO, "TEE-TXT: Wiping TEE...\n"); in check_secrets_txt()
129 printk(BIOS_INFO, "TEE-TXT: Initializing TEE...\n"); in init_intel_txt()
141 printk(BIOS_INFO, "TEE-TXT: Validate TEE...\n"); in init_intel_txt()
144 printk(BIOS_ERR, "TEE-TXT: Failed to prepare TXT environment\n"); in init_intel_txt()
151 printk(BIOS_ERR, "TEE-TXT: Fatal BIOS ACM error reported\n"); in init_intel_txt()
156 printk(BIOS_INFO, "TEE-TXT: Testing BIOS ACM calling code...\n"); in init_intel_txt()
166 "TEE-TXT: Error calling BIOS ACM with NOP function.\n"); in init_intel_txt()
172 printk(BIOS_INFO, "TEE-TXT: Logging IBB measurements...\n"); in init_intel_txt()
178 printk(BIOS_INFO, "TEE-TXT: Scheck...\n"); in init_intel_txt()
[all …]
Dlogging.c64 printk(BIOS_INFO, "TEE-TXT: State of ACM and ucode update:\n"); in intel_txt_log_bios_acm_error()
179 printk(BIOS_INFO, "TEE-TXT: Chipset Key Hash 0x"); in txt_dump_chipset_info()
186 printk(BIOS_INFO, "TEE-TXT: DIDVID 0x%x\n", read32p(TXT_DIDVID)); in txt_dump_chipset_info()
187 printk(BIOS_INFO, "TEE-TXT: production fused chipset: %s\n", in txt_dump_chipset_info()
207 printk(BIOS_DEBUG, "TEE-TXT: TSEG 0x%lx, size %zu MiB\n", tseg_base, tseg_size / MiB); in txt_dump_regions()
208 printk(BIOS_DEBUG, "TEE-TXT: TXT.HEAP.BASE 0x%llx\n", read64p(TXT_HEAP_BASE)); in txt_dump_regions()
209 printk(BIOS_DEBUG, "TEE-TXT: TXT.HEAP.SIZE 0x%llx\n", read64p(TXT_HEAP_SIZE)); in txt_dump_regions()
210 printk(BIOS_DEBUG, "TEE-TXT: TXT.SINIT.BASE 0x%llx\n", read64p(TXT_SINIT_BASE)); in txt_dump_regions()
211 printk(BIOS_DEBUG, "TEE-TXT: TXT.SINIT.SIZE 0x%llx\n", read64p(TXT_SINIT_SIZE)); in txt_dump_regions()
212 printk(BIOS_DEBUG, "TEE-TXT: TXT.MSEG.BASE 0x%llx\n", read64p(TXT_MSEG_BASE)); in txt_dump_regions()
[all …]
Dcommon.c210 printk(BIOS_ERR, "TEE-TXT: BIOS ACM doesn't fit into AC execution region\n"); in validate_acm()
247 printk(BIOS_ERR, "TEE-TXT: Couldn't locate BIOS ACM in CBFS.\n"); in intel_txt_prepare_bios_acm()
257 printk(BIOS_ERR, "TEE-TXT: BIOS ACM isn't mapped at page boundary.\n"); in intel_txt_prepare_bios_acm()
268 printk(BIOS_ERR, "TEE-TXT: BIOS ACM size isn't multiple of 64.\n"); in intel_txt_prepare_bios_acm()
278 printk(BIOS_ERR, "TEE-TXT: BIOS ACM isn't aligned to its size.\n"); in intel_txt_prepare_bios_acm()
289 printk(BIOS_ERR, "TEE-TXT: Not enough MTRRs to cache this BIOS ACM's size.\n"); in intel_txt_prepare_bios_acm()
299 printk(BIOS_ERR, "TEE-TXT: Validation of ACM failed with: %d\n", ret); in intel_txt_prepare_bios_acm()
333 printk(BIOS_ALERT, "TEE-TXT: Invoking SCLEAN. This can take several minutes.\n"); in intel_txt_run_sclean()
343 printk(BIOS_CRIT, "TEE-TXT: getsec_sclean could not launch the BIOS ACM.\n"); in intel_txt_run_sclean()
369 printk(BIOS_ERR, "TEE-TXT: FATAL ACM launch error !\n"); in intel_txt_run_bios_acm()
[all …]
/external/arm-trusted-firmware/docs/components/spd/
Doptee-dispatcher.rst1 OP-TEE Dispatcher
4 `OP-TEE OS`_ is a Trusted OS running as Secure EL1.
6 To build and execute OP-TEE follow the instructions at
7 `OP-TEE build.git`_
13 .. _OP-TEE OS: https://github.com/OP-TEE/build
14 .. _OP-TEE build.git: https://github.com/OP-TEE/build
/external/rust/android-crates-io/crates/itertools/src/
Dtee.rs7 /// Common buffer object for the two tee halves
18 /// See [`.tee()`](crate::Itertools::tee) for more information.
21 pub struct Tee<I> struct
29 pub fn new<I>(iter: I) -> (Tee<I>, Tee<I>) in new() argument
38 let t1 = Tee { in new()
42 let t2 = Tee { in new()
49 impl<I> Iterator for Tee<I> implementation
88 impl<I> ExactSizeIterator for Tee<I> implementation
/external/cronet/stable/third_party/rust/chromium_crates_io/vendor/itertools-0.11.0/src/
Dtee.rs7 /// Common buffer object for the two tee halves
18 /// See [`.tee()`](crate::Itertools::tee) for more information.
21 pub struct Tee<I> struct
28 pub fn new<I>(iter: I) -> (Tee<I>, Tee<I>) in new() argument
32 let t1 = Tee{rcbuffer: Rc::new(RefCell::new(buffer)), id: true}; in new()
33 let t2 = Tee{rcbuffer: t1.rcbuffer.clone(), id: false}; in new()
37 impl<I> Iterator for Tee<I> implementation
75 impl<I> ExactSizeIterator for Tee<I> implementation
/external/cronet/tot/third_party/rust/chromium_crates_io/vendor/itertools-0.11.0/src/
Dtee.rs7 /// Common buffer object for the two tee halves
18 /// See [`.tee()`](crate::Itertools::tee) for more information.
21 pub struct Tee<I> struct
28 pub fn new<I>(iter: I) -> (Tee<I>, Tee<I>) in new() argument
32 let t1 = Tee{rcbuffer: Rc::new(RefCell::new(buffer)), id: true}; in new()
33 let t2 = Tee{rcbuffer: t1.rcbuffer.clone(), id: false}; in new()
37 impl<I> Iterator for Tee<I> implementation
75 impl<I> ExactSizeIterator for Tee<I> implementation
/external/ltp/testcases/realtime/perf/latency/
Drun_auto.sh11 echo "Logging to: " | tee -a $LOG_FILE
12 echo "$LOG_FILE " | tee -a $LOG_FILE
13 echo "and to local individual .out files " | tee -a $LOG_FILE
29 echo "pthread_cond_many configuration:" | tee -a $LOG_FILE
30 echo "number of threads = $nthread " | tee -a $LOG_FILE
31 echo "number of iterations = $iter " | tee -a $LOG_FILE
32 echo "number of processes = $nproc " | tee -a $LOG_FILE
/external/kernel-headers/original/uapi/linux/
Dtee.h35 * This file describes the API provided by a TEE driver to user space.
37 * Each TEE driver defines a TEE specific protocol which is used for the
47 #define TEE_GEN_CAP_GP (1 << 0)/* GlobalPlatform compliant TEE */
55 * TEE Implementation ID
62 * OP-TEE specific capabilities
67 * struct tee_ioctl_version_data - TEE version
68 * @impl_id: [out] TEE implementation id
72 * Identifies the TEE implementation, @impl_id is one of TEE_IMPL_ID_* above.
83 * TEE_IOC_VERSION - query version of TEE
85 * Takes a tee_ioctl_version_data struct and returns with the TEE version
[all …]
/external/trusty/arm-trusted-firmware/docs/plat/st/
Dstm32mp1.rst107 You need to build BL2, BL32 (SP_min or OP-TEE) and BL33 (U-Boot) before building FIP binary.
118 OP-TEE (recommended)
120 OP-TEE is the default BL32 supported for STMicroelectronics platforms.
131 If you choose not to use OP-TEE, you can use TF-A SP_min.
152 This BL2 is independent of the BL32 used (SP_min or OP-TEE)
168 With OP-TEE:
177 BL32=<optee_directory>/tee-header_v2.bin \
178 BL32_EXTRA1=<optee_directory>/tee-pager_v2.bin
179 BL32_EXTRA2=<optee_directory>/tee-pageable_v2.bin
192 --tos-fw <optee_directory>/tee-header_v2.bin \
[all …]
/external/compiler-rt/test/sanitizer_common/TestCases/
Doptions-include.cc11 // RUN: %env_tool_opts=help=0:include='"%t.options1.txt"' %run %t 2>&1 | tee %t.out
14 // RUN: %env_tool_opts=include='"%t.options1.txt"',help=0 %run %t 2>&1 | tee %t.out
17 // RUN: %env_tool_opts=include='"%t.options-not-found.txt"',help=1 not %run %t 2>&1 | tee %t.out
21 // RUN: %env_tool_opts=include_if_exists='"%t.options-not-found.txt"',help=1 %run %t 2>&1 | tee %t.…
25 // RUN: %env_tool_opts=include='"%t.options.%b"' %run %t 2>&1 | tee %t.out
28 // RUN: %env_tool_opts=include='"%t.options-not-found.%b"' not %run %t 2>&1 | tee %t.out
31 // RUN: %env_tool_opts=include_if_exists='"%t.options.%b"' %run %t 2>&1 | tee %t.out
34 // RUN: %env_tool_opts=include_if_exists='"%t.options-not-found.%b"' %run %t 2>&1 | tee %t.out
/external/grpc-grpc/tools/interop_matrix/patches/csharp_v1.0.1/
Dgit_repo.patch45 -RUN echo "deb http://download.mono-project.com/repo/debian wheezy main" | tee /etc/apt/sources.lis…
47 +RUN echo "deb http://download.mono-project.com/repo/debian wheezy/snapshots/4.6 main" | tee /etc/a…
48 …RUN echo "deb http://download.mono-project.com/repo/debian wheezy-apache24-compat main" | tee -a /…
49 …RUN echo "deb http://download.mono-project.com/repo/debian wheezy-libjpeg62-compat main" | tee -a …
50 -RUN echo "deb http://download.mono-project.com/repo/debian wheezy-libtiff-compat main" | tee -a /e…
63 -RUN echo "deb http://download.mono-project.com/repo/debian wheezy main" | tee /etc/apt/sources.lis…
65 +RUN echo "deb http://download.mono-project.com/repo/debian jessie main" | tee /etc/apt/sources.lis…
66 …RUN echo "deb http://download.mono-project.com/repo/debian wheezy-apache24-compat main" | tee -a /…
67 …RUN echo "deb http://download.mono-project.com/repo/debian wheezy-libjpeg62-compat main" | tee -a …
68 -RUN echo "deb http://download.mono-project.com/repo/debian wheezy-libtiff-compat main" | tee -a /e…
/external/rust/android-crates-io/crates/grpcio-sys/grpc/tools/interop_matrix/patches/csharp_v1.0.1/
Dgit_repo.patch45 -RUN echo "deb http://download.mono-project.com/repo/debian wheezy main" | tee /etc/apt/sources.lis…
47 +RUN echo "deb http://download.mono-project.com/repo/debian wheezy/snapshots/4.6 main" | tee /etc/a…
48 …RUN echo "deb http://download.mono-project.com/repo/debian wheezy-apache24-compat main" | tee -a /…
49 …RUN echo "deb http://download.mono-project.com/repo/debian wheezy-libjpeg62-compat main" | tee -a …
50 -RUN echo "deb http://download.mono-project.com/repo/debian wheezy-libtiff-compat main" | tee -a /e…
63 -RUN echo "deb http://download.mono-project.com/repo/debian wheezy main" | tee /etc/apt/sources.lis…
65 +RUN echo "deb http://download.mono-project.com/repo/debian jessie main" | tee /etc/apt/sources.lis…
66 …RUN echo "deb http://download.mono-project.com/repo/debian wheezy-apache24-compat main" | tee -a /…
67 …RUN echo "deb http://download.mono-project.com/repo/debian wheezy-libjpeg62-compat main" | tee -a …
68 -RUN echo "deb http://download.mono-project.com/repo/debian wheezy-libtiff-compat main" | tee -a /e…

12345678910>>...41