Home
last modified time | relevance | path

Searched refs:params (Results 1 – 25 of 102) sorted by relevance

12345

/system/connectivity/shill/test-scripts/
Dconnect-vpn88 params = { "Type" : "vpn" }
92 params["Provider.Type"] = "openvpn"
93 params["Name"] = args[1]
94 params["Provider.Host"] = args[2]
95 params["VPN.Domain"] = args[3]
96 params["OpenVPN.CACert"] = args[4]
97 params["OpenVPN.Cert"] = args[5]
98 params["OpenVPN.Key"] = args[6]
101 params["OpenVPN.CompLZO"] = "true"
104 params["OpenVPN.Mgmt.Enable"] = "true"
[all …]
Dconfigure-service15 params = { "GUID" : sys.argv[1] } variable
21 params[property_key] = int(value)
24 params[property_key] = dbus.Boolean(value.lower() in ("true", "1"))
26 params[property_key] = value
30 flim.manager.ConfigureService(params)
Dget-service15 params = { "GUID" : sys.argv[1] } variable
21 params[property_key] = int(value)
24 params[property_key] = dbus.Boolean(value.lower() in ("true", "1"))
26 params[property_key] = value
30 service = flim.GetService(params)
/system/security/keystore/
Dkeystore_utils.cpp57 void add_legacy_key_authorizations(int keyType, std::vector<keymaster_key_param_t>* params) { in add_legacy_key_authorizations() argument
58 params->push_back(keymaster_param_enum(KM_TAG_PURPOSE, KM_PURPOSE_SIGN)); in add_legacy_key_authorizations()
59 params->push_back(keymaster_param_enum(KM_TAG_PURPOSE, KM_PURPOSE_VERIFY)); in add_legacy_key_authorizations()
60 params->push_back(keymaster_param_enum(KM_TAG_PURPOSE, KM_PURPOSE_ENCRYPT)); in add_legacy_key_authorizations()
61 params->push_back(keymaster_param_enum(KM_TAG_PURPOSE, KM_PURPOSE_DECRYPT)); in add_legacy_key_authorizations()
62 params->push_back(keymaster_param_enum(KM_TAG_PADDING, KM_PAD_NONE)); in add_legacy_key_authorizations()
64 params->push_back(keymaster_param_enum(KM_TAG_PADDING, KM_PAD_RSA_PKCS1_1_5_SIGN)); in add_legacy_key_authorizations()
65 params->push_back(keymaster_param_enum(KM_TAG_PADDING, KM_PAD_RSA_PKCS1_1_5_ENCRYPT)); in add_legacy_key_authorizations()
66 params->push_back(keymaster_param_enum(KM_TAG_PADDING, KM_PAD_RSA_PSS)); in add_legacy_key_authorizations()
67 params->push_back(keymaster_param_enum(KM_TAG_PADDING, KM_PAD_RSA_OAEP)); in add_legacy_key_authorizations()
[all …]
Dkey_store_service.cpp281 KeymasterArguments params; in generate() local
282 add_legacy_key_authorizations(keyType, &params.params); in generate()
286 params.params.push_back(keymaster_param_enum(KM_TAG_ALGORITHM, KM_ALGORITHM_EC)); in generate()
293 params.params.push_back(keymaster_param_int(KM_TAG_KEY_SIZE, keySize)); in generate()
297 params.params.push_back(keymaster_param_enum(KM_TAG_ALGORITHM, KM_ALGORITHM_RSA)); in generate()
304 params.params.push_back(keymaster_param_int(KM_TAG_KEY_SIZE, keySize)); in generate()
328 params.params.push_back(keymaster_param_long(KM_TAG_RSA_PUBLIC_EXPONENT, exponent)); in generate()
337 int32_t rc = generateKey(name, params, NULL, 0, targetUid, flags, in generate()
358 KeymasterArguments params; in import() local
359 add_legacy_key_authorizations(type, &params.params); in import()
[all …]
Dkey_store_service.h93 int32_t generateKey(const String16& name, const KeymasterArguments& params,
99 int32_t importKey(const String16& name, const KeymasterArguments& params,
106 bool pruneable, const KeymasterArguments& params, const uint8_t* entropy,
108 void update(const sp<IBinder>& token, const KeymasterArguments& params, const uint8_t* data,
110 void finish(const sp<IBinder>& token, const KeymasterArguments& params,
119 int32_t attestKey(const String16& name, const KeymasterArguments& params,
176 bool checkAllowedOperationParams(const std::vector<keymaster_key_param_t>& params);
180 const std::vector<keymaster_key_param_t>& params,
197 void addAuthToParams(std::vector<keymaster_key_param_t>* params, const hw_auth_token_t* token);
211 std::vector<keymaster_key_param_t>* params);
[all …]
Dkeystore_client_impl.cpp62 out->assign(&tmp.params[0], &tmp.params[tmp.length]); in CopyParameters()
63 free(tmp.params); in CopyParameters()
206 CopyParameters(key_parameters, &key_arguments.params); in generateKey()
239 CopyParameters(key_parameters, &key_arguments.params); in importKey()
277 CopyParameters(input_parameters, &input_arguments.params); in beginOperation()
285 if (!result.outParams.params.empty()) { in beginOperation()
286 output_parameters->Reinitialize(&*result.outParams.params.begin(), in beginOperation()
287 result.outParams.params.size()); in beginOperation()
303 CopyParameters(input_parameters, &input_arguments.params); in updateOperation()
310 if (!result.outParams.params.empty()) { in updateOperation()
[all …]
/system/bt/btif/src/
Dbtif_gatt_test.c213 bt_status_t btif_gattc_test_command_impl(uint16_t command, btgatt_test_params_t* params) in btif_gattc_test_command_impl() argument
218 LOG_DEBUG(LOG_TAG, "%s: ENABLE - enable=%d", __FUNCTION__, params->u1); in btif_gattc_test_command_impl()
219 if (params->u1) in btif_gattc_test_command_impl()
235 params->bda1->address[0], params->bda1->address[1], in btif_gattc_test_command_impl()
236 params->bda1->address[2], params->bda1->address[3], in btif_gattc_test_command_impl()
237 params->bda1->address[4], params->bda1->address[5], in btif_gattc_test_command_impl()
238 params->u1, params->u2); in btif_gattc_test_command_impl()
240 if (params->u1 == BT_DEVICE_TYPE_BLE) in btif_gattc_test_command_impl()
241 BTM_SecAddBleDevice(params->bda1->address, NULL, BT_DEVICE_TYPE_BLE, params->u2); in btif_gattc_test_command_impl()
243 if ( !GATT_Connect(test_cb.gatt_if, params->bda1->address, TRUE, BT_TRANSPORT_LE) ) in btif_gattc_test_command_impl()
[all …]
/system/bt/osi/test/
Dhash_map_utils_test.cpp45 char params[] = ""; in TEST_F() local
46 map = hash_map_utils_new_from_string_params(params); in TEST_F()
51 char params[] = ";;;"; in TEST_F() local
52 map = hash_map_utils_new_from_string_params(params); in TEST_F()
57 char params[] = "keyOfSomething=value=OfSomething"; in TEST_F() local
60 map = hash_map_utils_new_from_string_params(params); in TEST_F()
66 char params[] = "key=valu0;key=value1"; in TEST_F() local
69 map = hash_map_utils_new_from_string_params(params); in TEST_F()
75 char params[] = "keyOfSomething=valueOfSomething"; in TEST_F() local
78 map = hash_map_utils_new_from_string_params(params); in TEST_F()
[all …]
/system/netd/server/
DResolverController.cpp44 const char** servers, int numservers, const __res_params* params) { in setDnsServers() argument
48 return -_resolv_set_nameservers_for_net(netId, servers, numservers, searchDomains, params); in setDnsServers()
70 std::vector<std::string>* domains, __res_params* params, in getDnsInfo() argument
90 *params = __res_params{}; in getDnsInfo()
93 res_domains, params, res_stats); in getDnsInfo()
110 android_net_res_stats_get_usable_servers(params, res_stats, nscount, valid_servers); in getDnsInfo()
142 const std::vector<int32_t>& params) { in setResolverConfiguration() argument
144 if (params.size() != INetd::RESOLVER_PARAMS_COUNT) { in setResolverConfiguration()
145 ALOGE("%s: params.size()=%zu", __FUNCTION__, params.size()); in setResolverConfiguration()
164 res_params.sample_validity = params[INetd::RESOLVER_PARAMS_SAMPLE_VALIDITY]; in setResolverConfiguration()
[all …]
DResolverController.h41 int numservers, const __res_params* params);
48 std::vector<std::string>* domains, __res_params* params,
54 const std::vector<std::string>& domains, const std::vector<int32_t>& params);
57 std::vector<std::string>* domains, std::vector<int32_t>* params,
/system/vold/
DScryptParameters.cpp23 int params[3]; in parse_scrypt_parameters() local
36 params[i] = strtol(token, &endptr, 10); in parse_scrypt_parameters()
41 if ((*token == '\0') || (*endptr != '\0') || params[i] < 0 || params[i] > 255) { in parse_scrypt_parameters()
48 *Nf = params[0]; *rf = params[1]; *pf = params[2]; in parse_scrypt_parameters()
DKeymaster.h95 inline AuthorizationSetBuilder& addStringParam(AuthorizationSetBuilder&& params, in addStringParam() argument
98 return params.Authorization(tag, val.data(), val.size()); in addStringParam()
102 inline void addStringParam(AuthorizationSetBuilder* params, TypedTag<KM_BYTES, Tag> tag, in addStringParam() argument
104 params->Authorization(tag, val.data(), val.size()); in addStringParam()
/system/update_engine/
Dboot_control_chromeos.cc162 CgptAddParams params; in IsSlotBootable() local
163 memset(&params, '\0', sizeof(params)); in IsSlotBootable()
164 params.drive_name = const_cast<char*>(boot_disk_name_.c_str()); in IsSlotBootable()
165 params.partition = partition_num; in IsSlotBootable()
167 int retval = CgptGetPartitionDetails(&params); in IsSlotBootable()
171 return params.successful || params.tries > 0; in IsSlotBootable()
186 CgptAddParams params; in MarkSlotUnbootable() local
187 memset(&params, 0, sizeof(params)); in MarkSlotUnbootable()
189 params.drive_name = const_cast<char*>(boot_disk_name_.c_str()); in MarkSlotUnbootable()
190 params.partition = partition_num; in MarkSlotUnbootable()
[all …]
Domaha_request_action_unittest.cc372 void TestEvent(OmahaRequestParams params, in TestEvent() argument
382 fake_system_state.set_request_params(&params); in TestEvent()
524 OmahaRequestParams params = request_params_; in TEST_F() local
525 params.set_wall_clock_based_wait_enabled(true); in TEST_F()
526 params.set_update_check_count_wait_enabled(false); in TEST_F()
527 params.set_waiting_period(TimeDelta::FromDays(2)); in TEST_F()
530 TestUpdateCheck(&params, in TEST_F()
543 params.set_interactive(true); in TEST_F()
545 TestUpdateCheck(&params, in TEST_F()
560 OmahaRequestParams params = request_params_; in TEST_F() local
[all …]
Domaha_response_handler_action_unittest.cc345 OmahaRequestParams params(&fake_system_state_); in TEST_F() local
347 params.set_root(test_dir); in TEST_F()
348 params.Init("1.2.3.4", "", 0); in TEST_F()
349 EXPECT_EQ("canary-channel", params.current_channel()); in TEST_F()
350 EXPECT_EQ("stable-channel", params.target_channel()); in TEST_F()
351 EXPECT_TRUE(params.to_more_stable_channel()); in TEST_F()
352 EXPECT_TRUE(params.is_powerwash_allowed()); in TEST_F()
354 fake_system_state_.set_request_params(&params); in TEST_F()
386 OmahaRequestParams params(&fake_system_state_); in TEST_F() local
388 params.set_root(test_dir); in TEST_F()
[all …]
Domaha_request_params_unittest.cc353 OmahaRequestParams params(&fake_system_state_); in TEST_F() local
354 params.set_root(test_dir_); in TEST_F()
355 EXPECT_TRUE(params.Init("", "", false)); in TEST_F()
356 params.SetTargetChannel("canary-channel", false, nullptr); in TEST_F()
357 EXPECT_FALSE(params.is_powerwash_allowed()); in TEST_F()
375 OmahaRequestParams params(&fake_system_state_); in TEST_F() local
376 params.set_root(test_dir_); in TEST_F()
377 EXPECT_TRUE(params.Init("", "", false)); in TEST_F()
378 params.SetTargetChannel("canary-channel", true, nullptr); in TEST_F()
379 EXPECT_TRUE(params.is_powerwash_allowed()); in TEST_F()
[all …]
Domaha_request_action.cc107 OmahaRequestParams* params, in GetAppBody() argument
121 XmlEncodeWithDefault(params->target_version_prefix(), "").c_str()); in GetAppBody()
202 OmahaRequestParams* params, in GetAppXml() argument
209 string app_body = GetAppBody(event, params, ping_only, include_ping, in GetAppXml()
217 if (params->to_more_stable_channel() && params->is_powerwash_allowed()) { in GetAppXml()
221 XmlEncodeWithDefault(params->app_version(), "0.0.0.0") + "\" "; in GetAppXml()
224 XmlEncodeWithDefault(params->app_version(), "0.0.0.0") + "\" "; in GetAppXml()
227 string download_channel = params->download_channel(); in GetAppXml()
230 if (params->current_channel() != download_channel) { in GetAppXml()
232 params->current_channel(), "") + "\" "; in GetAppXml()
[all …]
/system/extras/tests/audio/alsa/
Dpcmtest.cpp132 struct pcm_params *params; in getPcmParams() local
136 params = pcm_params_get(pcmnodes[i].card, pcmnodes[i].device, in getPcmParams()
138 if (params == NULL) in getPcmParams()
141 min = pcm_params_get_min(params, PCM_PARAM_RATE); in getPcmParams()
142 max = pcm_params_get_max(params, PCM_PARAM_RATE); in getPcmParams()
145 min = pcm_params_get_min(params, PCM_PARAM_CHANNELS); in getPcmParams()
146 max = pcm_params_get_max(params, PCM_PARAM_CHANNELS); in getPcmParams()
149 min = pcm_params_get_min(params, PCM_PARAM_SAMPLE_BITS); in getPcmParams()
150 max = pcm_params_get_max(params, PCM_PARAM_SAMPLE_BITS); in getPcmParams()
153 min = pcm_params_get_min(params, PCM_PARAM_PERIOD_SIZE); in getPcmParams()
[all …]
/system/core/fs_mgr/
Dfs_mgr_verity.cpp239 const struct verity_table_params *params);
242 const struct verity_table_params *params) in format_verity_table() argument
247 if (params->mode == VERITY_MODE_RESTART) { in format_verity_table()
249 } else if (params->mode == VERITY_MODE_LOGGING) { in format_verity_table()
253 if (params->ecc.valid) { in format_verity_table()
257 params->table, 1 + VERITY_TABLE_OPT_FEC_ARGS, mode_flag, params->ecc_dev, in format_verity_table()
258 params->ecc.start / FEC_BLOCKSIZE, params->ecc.blocks, params->ecc.roots); in format_verity_table()
262 params->table, VERITY_TABLE_OPT_FEC_ARGS, params->ecc_dev, in format_verity_table()
263 params->ecc.start / FEC_BLOCKSIZE, params->ecc.blocks, params->ecc.roots); in format_verity_table()
266 res = snprintf(buf, bufsize, "%s 2 " VERITY_TABLE_OPT_IGNZERO " %s", params->table, in format_verity_table()
[all …]
/system/keymaster/
Dkeymaster_enforcement_test.cpp97 keymaster_key_param_t params[] = { in TEST_F() local
100 AuthorizationSet single_auth_set(params, array_length(params)); in TEST_F()
107 keymaster_key_param_t params[] = { in TEST_F() local
112 AuthorizationSet auth_set(params, array_length(params)); in TEST_F()
122 keymaster_key_param_t params[] = { in TEST_F() local
126 AuthorizationSet auth_set(params, array_length(params)); in TEST_F()
133 keymaster_key_param_t params[] = { in TEST_F() local
138 AuthorizationSet auth_set(params, array_length(params)); in TEST_F()
147 keymaster_key_param_t params[] = { in TEST_F() local
152 AuthorizationSet auth_set(params, array_length(params)); in TEST_F()
[all …]
Dandroid_keymaster_messages_test.cpp119 static keymaster_key_param_t params[] = { variable
133 req.key_description.Reinitialize(params, array_length(params)); in TEST()
145 rsp.enforced.Reinitialize(params, array_length(params)); in TEST()
160 rsp.enforced.Reinitialize(params, array_length(params)); in TEST()
173 req.additional_params.Reinitialize(params, array_length(params)); in TEST()
187 msg.enforced.Reinitialize(params, array_length(params)); in TEST()
188 msg.unenforced.Reinitialize(params, array_length(params)); in TEST()
201 msg.additional_params.Reinitialize(params, array_length(params)); in TEST()
387 msg.key_description.Reinitialize(params, array_length(params)); in TEST()
404 msg.enforced.Reinitialize(params, array_length(params)); in TEST()
[all …]
Dandroid_keymaster_test_utils.cpp191 AuthorizationSet params(builder.build()); in GenerateKey() local
192 params.push_back(UserAuthParams()); in GenerateKey()
193 params.push_back(ClientParams()); in GenerateKey()
197 return device()->generate_key(device(), &params, &blob_, &characteristics_); in GenerateKey()
207 AuthorizationSet params(builder.build()); in ImportKey() local
208 params.push_back(UserAuthParams()); in ImportKey()
209 params.push_back(ClientParams()); in ImportKey()
215 return device()->import_key(device(), &params, format, &key, &blob_, &characteristics_); in ImportKey()
238 EXPECT_TRUE(out_params.params == nullptr); in BeginOperation()
253 EXPECT_TRUE(out_params.params == nullptr); in BeginOperation()
[all …]
/system/bt/stack/avrc/
Davrc_sdp.c225 avrc_proto_desc_list[0].params[0] = AVCT_PSM; in AVRC_AddRecord()
226 avrc_proto_desc_list[0].params[1] = 0; in AVRC_AddRecord()
231 avrc_proto_desc_list[index].params[0] = AVCT_REV_1_4; in AVRC_AddRecord()
232 avrc_proto_desc_list[index].params[1] = 0; in AVRC_AddRecord()
244 avrc_add_proto_desc_list.list_elem[0].params[0] = AVCT_BR_PSM; in AVRC_AddRecord()
245 avrc_add_proto_desc_list.list_elem[0].params[1] = 0; in AVRC_AddRecord()
248 avrc_add_proto_desc_list.list_elem[1].params[0] = AVCT_REV_1_4; in AVRC_AddRecord()
249 avrc_add_proto_desc_list.list_elem[1].params[1] = 0; in AVRC_AddRecord()
/system/webservd/webservd/
Ddbus_request_handler.cc64 std::vector<std::tuple<bool, std::string, std::string>> params; in HandleRequest() local
66 params.emplace_back(false, pair.first, pair.second); in HandleRequest()
69 params.emplace_back(true, pair.first, pair.second); in HandleRequest()
85 request_id, headers, params, files, body_data_pipe, in HandleRequest()

12345