/external/apache-commons-io/src/test/java/org/apache/commons/io/input/ |
D | TeeReaderTest.java | 46 private Reader tee; field in TeeReaderTest 52 tee = new TeeReader(input, output); in setUp() 93 assertEquals('a', tee.read()); in testMarkReset() 94 tee.mark(1); in testMarkReset() 95 assertEquals('b', tee.read()); in testMarkReset() 96 tee.reset(); in testMarkReset() 97 assertEquals('b', tee.read()); in testMarkReset() 98 assertEquals('c', tee.read()); in testMarkReset() 99 assertEquals(-1, tee.read()); in testMarkReset() 105 assertEquals('a', tee.read()); in testReadEverything() [all …]
|
D | TeeInputStreamTest.java | 45 private InputStream tee; field in TeeInputStreamTest 53 tee = new TeeInputStream(input, output); in setUp() 94 assertEquals('a', tee.read()); in testMarkReset() 95 tee.mark(1); in testMarkReset() 96 assertEquals('b', tee.read()); in testMarkReset() 97 tee.reset(); in testMarkReset() 98 assertEquals('b', tee.read()); in testMarkReset() 99 assertEquals('c', tee.read()); in testMarkReset() 100 assertEquals(-1, tee.read()); in testMarkReset() 106 assertEquals('a', tee.read()); in testReadEverything() [all …]
|
/external/trusty/arm-trusted-firmware/docs/components/spd/ |
D | optee-dispatcher.rst | 1 OP-TEE Dispatcher 4 `OP-TEE OS`_ is a Trusted OS running as Secure EL1. 6 To build and execute OP-TEE follow the instructions at 7 `OP-TEE build.git`_ 9 There are two different modes for loading the OP-TEE OS. The default mode will 11 platforms to use. There is also another technique that will load OP-TEE OS after 13 specifically added for ChromeOS. Loading OP-TEE via an SMC call may be insecure 18 used by the TEE become accessible. The firmware then verifies the signature of 20 dm-verity. The SMC call to load OP-TEE is then invoked immediately after the 24 OP-TEE is loaded. [all …]
|
/external/libva/va/ |
D | va_prot.h | 92 * facilitate isolated communicaiton with TEE. 94 * to TEE direct communication to perform various TEE centric operations 96 * TEE for other usages, providing TEE capabilities etc. 99 * TEE/GPU/Display for HWDRM playback. 101 * The difference between Protected Content and Protected TEE Communication 103 * point for TEE and invokes TEE only from HWDRM perspective. 115 * Execution Environment (TEE) to prepare client platform or system for DRM 117 * instructed in DRM standard) and client system TEE. The communication between 118 * provisioning servers and client system TEE uses asymmetic cryptographic 123 * servers and TEE using asymmetic cryptographic mechanism. At end of this step, [all …]
|
/external/v4l-utils/contrib/test/ |
D | test-media | 211 echo "FAIL: the vivid module failed to load" | tee -a $tmp 212 echo "Grand Total for vivid: Succeeded: 0, Failed: 1, Warnings: 0" | tee -a $tmp 238 echo vivid compliance tests, contiguous planes | tee /dev/kmsg 241 …ance -m platform:vivid-000 -z platform:vivid-002 -e vivid-002-vid-cap -P -s10 -a 2>&1 | tee -a $tmp 243 echo vivid compliance tests, non-contiguous planes | tee /dev/kmsg 246 …ance -m platform:vivid-001 -z platform:vivid-002 -e vivid-002-vid-out -P -s10 -a 2>&1 | tee -a $tmp 259 echo loading visl module | tee /dev/kmsg 265 echo visl compliance tests | tee /dev/kmsg 268 stdbuf -oL $v4l2_compliance -m platform:visl -P -s10 -a 2>&1 | tee -a $tmp 270 echo unbind visl | tee /dev/kmsg [all …]
|
/external/guice/core/test/com/google/inject/ |
D | PerformanceComparison.java | 75 RootBeanDefinition tee = new RootBeanDefinition(TeeImpl.class, true); 76 tee.setLazyInit(true); 79 tee.setConstructorArgumentValues(teeValues); 83 barValues.addGenericArgumentValue(new RuntimeBeanReference("tee")); 97 beanFactory.registerBeanDefinition("tee", tee); 118 bind(Tee.class).to(TeeImpl.class); 139 final Tee tee = new TeeImpl("test"); 146 Bar bar = new BarImpl(tee, 5); 147 Bar copy = new BarImpl(tee, 5); 254 Tee getTee(); in getTee() [all …]
|
/external/linux-kselftest/tools/testing/selftests/rcutorture/bin/ |
D | kvm-remote.sh | 80 echo | tee -a "$oldrun/remote-log" 81 echo " ----" kvm.sh output: "(`date`)" | tee -a "$oldrun/remote-log" 82 cat $T/kvm.sh.out | tee -a "$oldrun/remote-log" 89 echo $scriptname: kvm-again.sh failed exit code $? | tee -a "$oldrun/remote-log" 90 cat $T/kvm-again.sh.out | tee -a "$oldrun/remote-log" 107 echo $scriptname: kvm-again.sh failed exit code $? | tee -a "$oldrun/remote-log" 108 cat $T/kvm-again.sh.out | tee -a "$oldrun/remote-log" 114 echo | tee -a "$oldrun/remote-log" 115 echo " ----" kvm-again.sh output: "(`date`)" | tee -a "$oldrun/remote-log" 117 echo | tee -a "$oldrun/remote-log" [all …]
|
D | kvm-end-run-stats.sh | 31 echo | tee -a "$rundir/log" 32 echo | tee -a "$rundir/log" 33 echo " --- `date` Test summary:" | tee -a "$rundir/log" 34 echo Results directory: $rundir | tee -a "$rundir/log" 35 kcsan-collapse.sh "$rundir" | tee -a "$rundir/log" 38 cat $T/kvm-recheck.sh.out | tee -a "$rundir/log" 39 echo " --- Done at `date` (`get_starttime_duration $starttime`) exitcode $ret" | tee -a "$rundir/lo…
|
D | torture.sh | 213 echo " --- " $scriptname $args | tee -a $T/log 214 echo " --- Results directory: " $ds | tee -a $T/log 224 echo " --- Zero time for rcutorture, disabling" | tee -a $T/log 236 echo " --- Zero time for locktorture, disabling" | tee -a $T/log 248 echo " --- Zero time for scftorture, disabling" | tee -a $T/log 268 echo " --- $curflavor:" Start `date` | tee -a $T/log 279 cat $T/$curflavor.out | tee -a $T/log 280 echo retcode=$retcode | tee -a $T/log 326 echo " --- allmodconfig:" Start `date` | tee -a $T/log 423 echo " --- " Done `date` | tee -a $T/log [all …]
|
/external/arm-trusted-firmware/docs/plat/ |
D | warp7.rst | 12 BootROM --> TF-A BL2 --> BL32(OP-TEE) --> BL33(U-Boot) --> Linux 14 In the WaRP7 port we encapsulate OP-TEE, DTB and U-Boot into a FIP. This FIP is 36 OP-TEE 39 https://github.com/OP-TEE/optee_os.git 56 - tee-header_v2.bin 57 - tee-pager_v2.bin 58 - tee-pageable_v2.bin 68 cp /path/to/optee/out/arm-plat-imx/core/tee-header_v2.bin fiptool_images 69 cp /path/to/optee/out/arm-plat-imx/core/tee-pager_v2.bin fiptool_images 70 cp /path/to/optee/out/arm-plat-imx/core/tee-pageable_v2.bin fiptool_images [all …]
|
D | stm32mp1.rst | 44 inside the FIP binary: BL32 (SP_min or OP-TEE), U-Boot and their respective 102 or if Op-TEE is used: 104 ROM code -> BL2 (compiled with BL2_AT_EL3) -> OP-TEE -> BL33 (U-Boot) 120 You need to build BL2, BL32 (SP_min or OP-TEE) and BL33 (U-Boot) before building FIP binary. 131 OP-TEE (optional) 143 If you choose not to use OP-TEE, you can use TF-A SP_min. 163 This BL2 is independent of the BL32 used (SP_min or OP-TEE) 179 With OP-TEE: 188 BL32=<optee_directory>/tee-header_v2.bin \ 189 BL32_EXTRA1=<optee_directory>/tee-pager_v2.bin [all …]
|
/external/trusty/arm-trusted-firmware/docs/plat/ |
D | warp7.rst | 12 BootROM --> TF-A BL2 --> BL32(OP-TEE) --> BL33(U-Boot) --> Linux 14 In the WaRP7 port we encapsulate OP-TEE, DTB and U-Boot into a FIP. This FIP is 36 OP-TEE 39 https://github.com/OP-TEE/optee_os.git 56 - tee-header_v2.bin 57 - tee-pager_v2.bin 58 - tee-pageable_v2.bin 68 cp /path/to/optee/out/arm-plat-imx/core/tee-header_v2.bin fiptool_images 69 cp /path/to/optee/out/arm-plat-imx/core/tee-pager_v2.bin fiptool_images 70 cp /path/to/optee/out/arm-plat-imx/core/tee-pageable_v2.bin fiptool_images [all …]
|
/external/coreboot/src/security/intel/txt/ |
D | ramstage.c | 35 printk(BIOS_INFO, "TEE-TXT: IBB Hash 0x"); in log_ibb_measurements() 101 printk(BIOS_INFO, "TEE-TXT: Wiping TEE...\n"); in check_secrets_txt() 129 printk(BIOS_INFO, "TEE-TXT: Initializing TEE...\n"); in init_intel_txt() 141 printk(BIOS_INFO, "TEE-TXT: Validate TEE...\n"); in init_intel_txt() 144 printk(BIOS_ERR, "TEE-TXT: Failed to prepare TXT environment\n"); in init_intel_txt() 151 printk(BIOS_ERR, "TEE-TXT: Fatal BIOS ACM error reported\n"); in init_intel_txt() 156 printk(BIOS_INFO, "TEE-TXT: Testing BIOS ACM calling code...\n"); in init_intel_txt() 166 "TEE-TXT: Error calling BIOS ACM with NOP function.\n"); in init_intel_txt() 172 printk(BIOS_INFO, "TEE-TXT: Logging IBB measurements...\n"); in init_intel_txt() 178 printk(BIOS_INFO, "TEE-TXT: Scheck...\n"); in init_intel_txt() [all …]
|
D | logging.c | 64 printk(BIOS_INFO, "TEE-TXT: State of ACM and ucode update:\n"); in intel_txt_log_bios_acm_error() 179 printk(BIOS_INFO, "TEE-TXT: Chipset Key Hash 0x"); in txt_dump_chipset_info() 186 printk(BIOS_INFO, "TEE-TXT: DIDVID 0x%x\n", read32p(TXT_DIDVID)); in txt_dump_chipset_info() 187 printk(BIOS_INFO, "TEE-TXT: production fused chipset: %s\n", in txt_dump_chipset_info() 207 printk(BIOS_DEBUG, "TEE-TXT: TSEG 0x%lx, size %zu MiB\n", tseg_base, tseg_size / MiB); in txt_dump_regions() 208 printk(BIOS_DEBUG, "TEE-TXT: TXT.HEAP.BASE 0x%llx\n", read64p(TXT_HEAP_BASE)); in txt_dump_regions() 209 printk(BIOS_DEBUG, "TEE-TXT: TXT.HEAP.SIZE 0x%llx\n", read64p(TXT_HEAP_SIZE)); in txt_dump_regions() 210 printk(BIOS_DEBUG, "TEE-TXT: TXT.SINIT.BASE 0x%llx\n", read64p(TXT_SINIT_BASE)); in txt_dump_regions() 211 printk(BIOS_DEBUG, "TEE-TXT: TXT.SINIT.SIZE 0x%llx\n", read64p(TXT_SINIT_SIZE)); in txt_dump_regions() 212 printk(BIOS_DEBUG, "TEE-TXT: TXT.MSEG.BASE 0x%llx\n", read64p(TXT_MSEG_BASE)); in txt_dump_regions() [all …]
|
D | common.c | 210 printk(BIOS_ERR, "TEE-TXT: BIOS ACM doesn't fit into AC execution region\n"); in validate_acm() 247 printk(BIOS_ERR, "TEE-TXT: Couldn't locate BIOS ACM in CBFS.\n"); in intel_txt_prepare_bios_acm() 257 printk(BIOS_ERR, "TEE-TXT: BIOS ACM isn't mapped at page boundary.\n"); in intel_txt_prepare_bios_acm() 268 printk(BIOS_ERR, "TEE-TXT: BIOS ACM size isn't multiple of 64.\n"); in intel_txt_prepare_bios_acm() 278 printk(BIOS_ERR, "TEE-TXT: BIOS ACM isn't aligned to its size.\n"); in intel_txt_prepare_bios_acm() 289 printk(BIOS_ERR, "TEE-TXT: Not enough MTRRs to cache this BIOS ACM's size.\n"); in intel_txt_prepare_bios_acm() 299 printk(BIOS_ERR, "TEE-TXT: Validation of ACM failed with: %d\n", ret); in intel_txt_prepare_bios_acm() 333 printk(BIOS_ALERT, "TEE-TXT: Invoking SCLEAN. This can take several minutes.\n"); in intel_txt_run_sclean() 343 printk(BIOS_CRIT, "TEE-TXT: getsec_sclean could not launch the BIOS ACM.\n"); in intel_txt_run_sclean() 369 printk(BIOS_ERR, "TEE-TXT: FATAL ACM launch error !\n"); in intel_txt_run_bios_acm() [all …]
|
/external/arm-trusted-firmware/docs/components/spd/ |
D | optee-dispatcher.rst | 1 OP-TEE Dispatcher 4 `OP-TEE OS`_ is a Trusted OS running as Secure EL1. 6 To build and execute OP-TEE follow the instructions at 7 `OP-TEE build.git`_ 13 .. _OP-TEE OS: https://github.com/OP-TEE/build 14 .. _OP-TEE build.git: https://github.com/OP-TEE/build
|
/external/rust/android-crates-io/crates/itertools/src/ |
D | tee.rs | 7 /// Common buffer object for the two tee halves 18 /// See [`.tee()`](crate::Itertools::tee) for more information. 21 pub struct Tee<I> struct 29 pub fn new<I>(iter: I) -> (Tee<I>, Tee<I>) in new() argument 38 let t1 = Tee { in new() 42 let t2 = Tee { in new() 49 impl<I> Iterator for Tee<I> implementation 88 impl<I> ExactSizeIterator for Tee<I> implementation
|
/external/cronet/stable/third_party/rust/chromium_crates_io/vendor/itertools-0.11.0/src/ |
D | tee.rs | 7 /// Common buffer object for the two tee halves 18 /// See [`.tee()`](crate::Itertools::tee) for more information. 21 pub struct Tee<I> struct 28 pub fn new<I>(iter: I) -> (Tee<I>, Tee<I>) in new() argument 32 let t1 = Tee{rcbuffer: Rc::new(RefCell::new(buffer)), id: true}; in new() 33 let t2 = Tee{rcbuffer: t1.rcbuffer.clone(), id: false}; in new() 37 impl<I> Iterator for Tee<I> implementation 75 impl<I> ExactSizeIterator for Tee<I> implementation
|
/external/cronet/tot/third_party/rust/chromium_crates_io/vendor/itertools-0.11.0/src/ |
D | tee.rs | 7 /// Common buffer object for the two tee halves 18 /// See [`.tee()`](crate::Itertools::tee) for more information. 21 pub struct Tee<I> struct 28 pub fn new<I>(iter: I) -> (Tee<I>, Tee<I>) in new() argument 32 let t1 = Tee{rcbuffer: Rc::new(RefCell::new(buffer)), id: true}; in new() 33 let t2 = Tee{rcbuffer: t1.rcbuffer.clone(), id: false}; in new() 37 impl<I> Iterator for Tee<I> implementation 75 impl<I> ExactSizeIterator for Tee<I> implementation
|
/external/ltp/testcases/realtime/perf/latency/ |
D | run_auto.sh | 11 echo "Logging to: " | tee -a $LOG_FILE 12 echo "$LOG_FILE " | tee -a $LOG_FILE 13 echo "and to local individual .out files " | tee -a $LOG_FILE 29 echo "pthread_cond_many configuration:" | tee -a $LOG_FILE 30 echo "number of threads = $nthread " | tee -a $LOG_FILE 31 echo "number of iterations = $iter " | tee -a $LOG_FILE 32 echo "number of processes = $nproc " | tee -a $LOG_FILE
|
/external/kernel-headers/original/uapi/linux/ |
D | tee.h | 35 * This file describes the API provided by a TEE driver to user space. 37 * Each TEE driver defines a TEE specific protocol which is used for the 47 #define TEE_GEN_CAP_GP (1 << 0)/* GlobalPlatform compliant TEE */ 55 * TEE Implementation ID 62 * OP-TEE specific capabilities 67 * struct tee_ioctl_version_data - TEE version 68 * @impl_id: [out] TEE implementation id 72 * Identifies the TEE implementation, @impl_id is one of TEE_IMPL_ID_* above. 83 * TEE_IOC_VERSION - query version of TEE 85 * Takes a tee_ioctl_version_data struct and returns with the TEE version [all …]
|
/external/trusty/arm-trusted-firmware/docs/plat/st/ |
D | stm32mp1.rst | 107 You need to build BL2, BL32 (SP_min or OP-TEE) and BL33 (U-Boot) before building FIP binary. 118 OP-TEE (recommended) 120 OP-TEE is the default BL32 supported for STMicroelectronics platforms. 131 If you choose not to use OP-TEE, you can use TF-A SP_min. 152 This BL2 is independent of the BL32 used (SP_min or OP-TEE) 168 With OP-TEE: 177 BL32=<optee_directory>/tee-header_v2.bin \ 178 BL32_EXTRA1=<optee_directory>/tee-pager_v2.bin 179 BL32_EXTRA2=<optee_directory>/tee-pageable_v2.bin 192 --tos-fw <optee_directory>/tee-header_v2.bin \ [all …]
|
/external/compiler-rt/test/sanitizer_common/TestCases/ |
D | options-include.cc | 11 // RUN: %env_tool_opts=help=0:include='"%t.options1.txt"' %run %t 2>&1 | tee %t.out 14 // RUN: %env_tool_opts=include='"%t.options1.txt"',help=0 %run %t 2>&1 | tee %t.out 17 // RUN: %env_tool_opts=include='"%t.options-not-found.txt"',help=1 not %run %t 2>&1 | tee %t.out 21 // RUN: %env_tool_opts=include_if_exists='"%t.options-not-found.txt"',help=1 %run %t 2>&1 | tee %t.… 25 // RUN: %env_tool_opts=include='"%t.options.%b"' %run %t 2>&1 | tee %t.out 28 // RUN: %env_tool_opts=include='"%t.options-not-found.%b"' not %run %t 2>&1 | tee %t.out 31 // RUN: %env_tool_opts=include_if_exists='"%t.options.%b"' %run %t 2>&1 | tee %t.out 34 // RUN: %env_tool_opts=include_if_exists='"%t.options-not-found.%b"' %run %t 2>&1 | tee %t.out
|
/external/grpc-grpc/tools/interop_matrix/patches/csharp_v1.0.1/ |
D | git_repo.patch | 45 -RUN echo "deb http://download.mono-project.com/repo/debian wheezy main" | tee /etc/apt/sources.lis… 47 +RUN echo "deb http://download.mono-project.com/repo/debian wheezy/snapshots/4.6 main" | tee /etc/a… 48 …RUN echo "deb http://download.mono-project.com/repo/debian wheezy-apache24-compat main" | tee -a /… 49 …RUN echo "deb http://download.mono-project.com/repo/debian wheezy-libjpeg62-compat main" | tee -a … 50 -RUN echo "deb http://download.mono-project.com/repo/debian wheezy-libtiff-compat main" | tee -a /e… 63 -RUN echo "deb http://download.mono-project.com/repo/debian wheezy main" | tee /etc/apt/sources.lis… 65 +RUN echo "deb http://download.mono-project.com/repo/debian jessie main" | tee /etc/apt/sources.lis… 66 …RUN echo "deb http://download.mono-project.com/repo/debian wheezy-apache24-compat main" | tee -a /… 67 …RUN echo "deb http://download.mono-project.com/repo/debian wheezy-libjpeg62-compat main" | tee -a … 68 -RUN echo "deb http://download.mono-project.com/repo/debian wheezy-libtiff-compat main" | tee -a /e…
|
/external/rust/android-crates-io/crates/grpcio-sys/grpc/tools/interop_matrix/patches/csharp_v1.0.1/ |
D | git_repo.patch | 45 -RUN echo "deb http://download.mono-project.com/repo/debian wheezy main" | tee /etc/apt/sources.lis… 47 +RUN echo "deb http://download.mono-project.com/repo/debian wheezy/snapshots/4.6 main" | tee /etc/a… 48 …RUN echo "deb http://download.mono-project.com/repo/debian wheezy-apache24-compat main" | tee -a /… 49 …RUN echo "deb http://download.mono-project.com/repo/debian wheezy-libjpeg62-compat main" | tee -a … 50 -RUN echo "deb http://download.mono-project.com/repo/debian wheezy-libtiff-compat main" | tee -a /e… 63 -RUN echo "deb http://download.mono-project.com/repo/debian wheezy main" | tee /etc/apt/sources.lis… 65 +RUN echo "deb http://download.mono-project.com/repo/debian jessie main" | tee /etc/apt/sources.lis… 66 …RUN echo "deb http://download.mono-project.com/repo/debian wheezy-apache24-compat main" | tee -a /… 67 …RUN echo "deb http://download.mono-project.com/repo/debian wheezy-libjpeg62-compat main" | tee -a … 68 -RUN echo "deb http://download.mono-project.com/repo/debian wheezy-libtiff-compat main" | tee -a /e…
|