/system/connectivity/shill/test-scripts/ |
D | connect-vpn | 88 params = { "Type" : "vpn" } 92 params["Provider.Type"] = "openvpn" 93 params["Name"] = args[1] 94 params["Provider.Host"] = args[2] 95 params["VPN.Domain"] = args[3] 96 params["OpenVPN.CACert"] = args[4] 97 params["OpenVPN.Cert"] = args[5] 98 params["OpenVPN.Key"] = args[6] 101 params["OpenVPN.CompLZO"] = "true" 104 params["OpenVPN.Mgmt.Enable"] = "true" [all …]
|
D | configure-service | 15 params = { "GUID" : sys.argv[1] } variable 21 params[property_key] = int(value) 24 params[property_key] = dbus.Boolean(value.lower() in ("true", "1")) 26 params[property_key] = value 30 flim.manager.ConfigureService(params)
|
D | get-service | 15 params = { "GUID" : sys.argv[1] } variable 21 params[property_key] = int(value) 24 params[property_key] = dbus.Boolean(value.lower() in ("true", "1")) 26 params[property_key] = value 30 service = flim.GetService(params)
|
/system/security/keystore/ |
D | keystore_utils.cpp | 57 void add_legacy_key_authorizations(int keyType, std::vector<keymaster_key_param_t>* params) { in add_legacy_key_authorizations() argument 58 params->push_back(keymaster_param_enum(KM_TAG_PURPOSE, KM_PURPOSE_SIGN)); in add_legacy_key_authorizations() 59 params->push_back(keymaster_param_enum(KM_TAG_PURPOSE, KM_PURPOSE_VERIFY)); in add_legacy_key_authorizations() 60 params->push_back(keymaster_param_enum(KM_TAG_PURPOSE, KM_PURPOSE_ENCRYPT)); in add_legacy_key_authorizations() 61 params->push_back(keymaster_param_enum(KM_TAG_PURPOSE, KM_PURPOSE_DECRYPT)); in add_legacy_key_authorizations() 62 params->push_back(keymaster_param_enum(KM_TAG_PADDING, KM_PAD_NONE)); in add_legacy_key_authorizations() 64 params->push_back(keymaster_param_enum(KM_TAG_PADDING, KM_PAD_RSA_PKCS1_1_5_SIGN)); in add_legacy_key_authorizations() 65 params->push_back(keymaster_param_enum(KM_TAG_PADDING, KM_PAD_RSA_PKCS1_1_5_ENCRYPT)); in add_legacy_key_authorizations() 66 params->push_back(keymaster_param_enum(KM_TAG_PADDING, KM_PAD_RSA_PSS)); in add_legacy_key_authorizations() 67 params->push_back(keymaster_param_enum(KM_TAG_PADDING, KM_PAD_RSA_OAEP)); in add_legacy_key_authorizations() [all …]
|
D | key_store_service.cpp | 281 KeymasterArguments params; in generate() local 282 add_legacy_key_authorizations(keyType, ¶ms.params); in generate() 286 params.params.push_back(keymaster_param_enum(KM_TAG_ALGORITHM, KM_ALGORITHM_EC)); in generate() 293 params.params.push_back(keymaster_param_int(KM_TAG_KEY_SIZE, keySize)); in generate() 297 params.params.push_back(keymaster_param_enum(KM_TAG_ALGORITHM, KM_ALGORITHM_RSA)); in generate() 304 params.params.push_back(keymaster_param_int(KM_TAG_KEY_SIZE, keySize)); in generate() 328 params.params.push_back(keymaster_param_long(KM_TAG_RSA_PUBLIC_EXPONENT, exponent)); in generate() 337 int32_t rc = generateKey(name, params, NULL, 0, targetUid, flags, in generate() 358 KeymasterArguments params; in import() local 359 add_legacy_key_authorizations(type, ¶ms.params); in import() [all …]
|
D | key_store_service.h | 93 int32_t generateKey(const String16& name, const KeymasterArguments& params, 99 int32_t importKey(const String16& name, const KeymasterArguments& params, 106 bool pruneable, const KeymasterArguments& params, const uint8_t* entropy, 108 void update(const sp<IBinder>& token, const KeymasterArguments& params, const uint8_t* data, 110 void finish(const sp<IBinder>& token, const KeymasterArguments& params, 119 int32_t attestKey(const String16& name, const KeymasterArguments& params, 176 bool checkAllowedOperationParams(const std::vector<keymaster_key_param_t>& params); 180 const std::vector<keymaster_key_param_t>& params, 197 void addAuthToParams(std::vector<keymaster_key_param_t>* params, const hw_auth_token_t* token); 211 std::vector<keymaster_key_param_t>* params); [all …]
|
D | keystore_client_impl.cpp | 62 out->assign(&tmp.params[0], &tmp.params[tmp.length]); in CopyParameters() 63 free(tmp.params); in CopyParameters() 206 CopyParameters(key_parameters, &key_arguments.params); in generateKey() 239 CopyParameters(key_parameters, &key_arguments.params); in importKey() 277 CopyParameters(input_parameters, &input_arguments.params); in beginOperation() 285 if (!result.outParams.params.empty()) { in beginOperation() 286 output_parameters->Reinitialize(&*result.outParams.params.begin(), in beginOperation() 287 result.outParams.params.size()); in beginOperation() 303 CopyParameters(input_parameters, &input_arguments.params); in updateOperation() 310 if (!result.outParams.params.empty()) { in updateOperation() [all …]
|
/system/bt/btif/src/ |
D | btif_gatt_test.c | 213 bt_status_t btif_gattc_test_command_impl(uint16_t command, btgatt_test_params_t* params) in btif_gattc_test_command_impl() argument 218 LOG_DEBUG(LOG_TAG, "%s: ENABLE - enable=%d", __FUNCTION__, params->u1); in btif_gattc_test_command_impl() 219 if (params->u1) in btif_gattc_test_command_impl() 235 params->bda1->address[0], params->bda1->address[1], in btif_gattc_test_command_impl() 236 params->bda1->address[2], params->bda1->address[3], in btif_gattc_test_command_impl() 237 params->bda1->address[4], params->bda1->address[5], in btif_gattc_test_command_impl() 238 params->u1, params->u2); in btif_gattc_test_command_impl() 240 if (params->u1 == BT_DEVICE_TYPE_BLE) in btif_gattc_test_command_impl() 241 BTM_SecAddBleDevice(params->bda1->address, NULL, BT_DEVICE_TYPE_BLE, params->u2); in btif_gattc_test_command_impl() 243 if ( !GATT_Connect(test_cb.gatt_if, params->bda1->address, TRUE, BT_TRANSPORT_LE) ) in btif_gattc_test_command_impl() [all …]
|
/system/bt/osi/test/ |
D | hash_map_utils_test.cpp | 45 char params[] = ""; in TEST_F() local 46 map = hash_map_utils_new_from_string_params(params); in TEST_F() 51 char params[] = ";;;"; in TEST_F() local 52 map = hash_map_utils_new_from_string_params(params); in TEST_F() 57 char params[] = "keyOfSomething=value=OfSomething"; in TEST_F() local 60 map = hash_map_utils_new_from_string_params(params); in TEST_F() 66 char params[] = "key=valu0;key=value1"; in TEST_F() local 69 map = hash_map_utils_new_from_string_params(params); in TEST_F() 75 char params[] = "keyOfSomething=valueOfSomething"; in TEST_F() local 78 map = hash_map_utils_new_from_string_params(params); in TEST_F() [all …]
|
/system/netd/server/ |
D | ResolverController.cpp | 44 const char** servers, int numservers, const __res_params* params) { in setDnsServers() argument 48 return -_resolv_set_nameservers_for_net(netId, servers, numservers, searchDomains, params); in setDnsServers() 70 std::vector<std::string>* domains, __res_params* params, in getDnsInfo() argument 90 *params = __res_params{}; in getDnsInfo() 93 res_domains, params, res_stats); in getDnsInfo() 110 android_net_res_stats_get_usable_servers(params, res_stats, nscount, valid_servers); in getDnsInfo() 142 const std::vector<int32_t>& params) { in setResolverConfiguration() argument 144 if (params.size() != INetd::RESOLVER_PARAMS_COUNT) { in setResolverConfiguration() 145 ALOGE("%s: params.size()=%zu", __FUNCTION__, params.size()); in setResolverConfiguration() 164 res_params.sample_validity = params[INetd::RESOLVER_PARAMS_SAMPLE_VALIDITY]; in setResolverConfiguration() [all …]
|
D | ResolverController.h | 41 int numservers, const __res_params* params); 48 std::vector<std::string>* domains, __res_params* params, 54 const std::vector<std::string>& domains, const std::vector<int32_t>& params); 57 std::vector<std::string>* domains, std::vector<int32_t>* params,
|
/system/vold/ |
D | ScryptParameters.cpp | 23 int params[3]; in parse_scrypt_parameters() local 36 params[i] = strtol(token, &endptr, 10); in parse_scrypt_parameters() 41 if ((*token == '\0') || (*endptr != '\0') || params[i] < 0 || params[i] > 255) { in parse_scrypt_parameters() 48 *Nf = params[0]; *rf = params[1]; *pf = params[2]; in parse_scrypt_parameters()
|
D | Keymaster.h | 95 inline AuthorizationSetBuilder& addStringParam(AuthorizationSetBuilder&& params, in addStringParam() argument 98 return params.Authorization(tag, val.data(), val.size()); in addStringParam() 102 inline void addStringParam(AuthorizationSetBuilder* params, TypedTag<KM_BYTES, Tag> tag, in addStringParam() argument 104 params->Authorization(tag, val.data(), val.size()); in addStringParam()
|
/system/update_engine/ |
D | boot_control_chromeos.cc | 162 CgptAddParams params; in IsSlotBootable() local 163 memset(¶ms, '\0', sizeof(params)); in IsSlotBootable() 164 params.drive_name = const_cast<char*>(boot_disk_name_.c_str()); in IsSlotBootable() 165 params.partition = partition_num; in IsSlotBootable() 167 int retval = CgptGetPartitionDetails(¶ms); in IsSlotBootable() 171 return params.successful || params.tries > 0; in IsSlotBootable() 186 CgptAddParams params; in MarkSlotUnbootable() local 187 memset(¶ms, 0, sizeof(params)); in MarkSlotUnbootable() 189 params.drive_name = const_cast<char*>(boot_disk_name_.c_str()); in MarkSlotUnbootable() 190 params.partition = partition_num; in MarkSlotUnbootable() [all …]
|
D | omaha_request_action_unittest.cc | 372 void TestEvent(OmahaRequestParams params, in TestEvent() argument 382 fake_system_state.set_request_params(¶ms); in TestEvent() 524 OmahaRequestParams params = request_params_; in TEST_F() local 525 params.set_wall_clock_based_wait_enabled(true); in TEST_F() 526 params.set_update_check_count_wait_enabled(false); in TEST_F() 527 params.set_waiting_period(TimeDelta::FromDays(2)); in TEST_F() 530 TestUpdateCheck(¶ms, in TEST_F() 543 params.set_interactive(true); in TEST_F() 545 TestUpdateCheck(¶ms, in TEST_F() 560 OmahaRequestParams params = request_params_; in TEST_F() local [all …]
|
D | omaha_response_handler_action_unittest.cc | 345 OmahaRequestParams params(&fake_system_state_); in TEST_F() local 347 params.set_root(test_dir); in TEST_F() 348 params.Init("1.2.3.4", "", 0); in TEST_F() 349 EXPECT_EQ("canary-channel", params.current_channel()); in TEST_F() 350 EXPECT_EQ("stable-channel", params.target_channel()); in TEST_F() 351 EXPECT_TRUE(params.to_more_stable_channel()); in TEST_F() 352 EXPECT_TRUE(params.is_powerwash_allowed()); in TEST_F() 354 fake_system_state_.set_request_params(¶ms); in TEST_F() 386 OmahaRequestParams params(&fake_system_state_); in TEST_F() local 388 params.set_root(test_dir); in TEST_F() [all …]
|
D | omaha_request_params_unittest.cc | 353 OmahaRequestParams params(&fake_system_state_); in TEST_F() local 354 params.set_root(test_dir_); in TEST_F() 355 EXPECT_TRUE(params.Init("", "", false)); in TEST_F() 356 params.SetTargetChannel("canary-channel", false, nullptr); in TEST_F() 357 EXPECT_FALSE(params.is_powerwash_allowed()); in TEST_F() 375 OmahaRequestParams params(&fake_system_state_); in TEST_F() local 376 params.set_root(test_dir_); in TEST_F() 377 EXPECT_TRUE(params.Init("", "", false)); in TEST_F() 378 params.SetTargetChannel("canary-channel", true, nullptr); in TEST_F() 379 EXPECT_TRUE(params.is_powerwash_allowed()); in TEST_F() [all …]
|
D | omaha_request_action.cc | 107 OmahaRequestParams* params, in GetAppBody() argument 121 XmlEncodeWithDefault(params->target_version_prefix(), "").c_str()); in GetAppBody() 202 OmahaRequestParams* params, in GetAppXml() argument 209 string app_body = GetAppBody(event, params, ping_only, include_ping, in GetAppXml() 217 if (params->to_more_stable_channel() && params->is_powerwash_allowed()) { in GetAppXml() 221 XmlEncodeWithDefault(params->app_version(), "0.0.0.0") + "\" "; in GetAppXml() 224 XmlEncodeWithDefault(params->app_version(), "0.0.0.0") + "\" "; in GetAppXml() 227 string download_channel = params->download_channel(); in GetAppXml() 230 if (params->current_channel() != download_channel) { in GetAppXml() 232 params->current_channel(), "") + "\" "; in GetAppXml() [all …]
|
/system/extras/tests/audio/alsa/ |
D | pcmtest.cpp | 132 struct pcm_params *params; in getPcmParams() local 136 params = pcm_params_get(pcmnodes[i].card, pcmnodes[i].device, in getPcmParams() 138 if (params == NULL) in getPcmParams() 141 min = pcm_params_get_min(params, PCM_PARAM_RATE); in getPcmParams() 142 max = pcm_params_get_max(params, PCM_PARAM_RATE); in getPcmParams() 145 min = pcm_params_get_min(params, PCM_PARAM_CHANNELS); in getPcmParams() 146 max = pcm_params_get_max(params, PCM_PARAM_CHANNELS); in getPcmParams() 149 min = pcm_params_get_min(params, PCM_PARAM_SAMPLE_BITS); in getPcmParams() 150 max = pcm_params_get_max(params, PCM_PARAM_SAMPLE_BITS); in getPcmParams() 153 min = pcm_params_get_min(params, PCM_PARAM_PERIOD_SIZE); in getPcmParams() [all …]
|
/system/core/fs_mgr/ |
D | fs_mgr_verity.cpp | 239 const struct verity_table_params *params); 242 const struct verity_table_params *params) in format_verity_table() argument 247 if (params->mode == VERITY_MODE_RESTART) { in format_verity_table() 249 } else if (params->mode == VERITY_MODE_LOGGING) { in format_verity_table() 253 if (params->ecc.valid) { in format_verity_table() 257 params->table, 1 + VERITY_TABLE_OPT_FEC_ARGS, mode_flag, params->ecc_dev, in format_verity_table() 258 params->ecc.start / FEC_BLOCKSIZE, params->ecc.blocks, params->ecc.roots); in format_verity_table() 262 params->table, VERITY_TABLE_OPT_FEC_ARGS, params->ecc_dev, in format_verity_table() 263 params->ecc.start / FEC_BLOCKSIZE, params->ecc.blocks, params->ecc.roots); in format_verity_table() 266 res = snprintf(buf, bufsize, "%s 2 " VERITY_TABLE_OPT_IGNZERO " %s", params->table, in format_verity_table() [all …]
|
/system/keymaster/ |
D | keymaster_enforcement_test.cpp | 97 keymaster_key_param_t params[] = { in TEST_F() local 100 AuthorizationSet single_auth_set(params, array_length(params)); in TEST_F() 107 keymaster_key_param_t params[] = { in TEST_F() local 112 AuthorizationSet auth_set(params, array_length(params)); in TEST_F() 122 keymaster_key_param_t params[] = { in TEST_F() local 126 AuthorizationSet auth_set(params, array_length(params)); in TEST_F() 133 keymaster_key_param_t params[] = { in TEST_F() local 138 AuthorizationSet auth_set(params, array_length(params)); in TEST_F() 147 keymaster_key_param_t params[] = { in TEST_F() local 152 AuthorizationSet auth_set(params, array_length(params)); in TEST_F() [all …]
|
D | android_keymaster_messages_test.cpp | 119 static keymaster_key_param_t params[] = { variable 133 req.key_description.Reinitialize(params, array_length(params)); in TEST() 145 rsp.enforced.Reinitialize(params, array_length(params)); in TEST() 160 rsp.enforced.Reinitialize(params, array_length(params)); in TEST() 173 req.additional_params.Reinitialize(params, array_length(params)); in TEST() 187 msg.enforced.Reinitialize(params, array_length(params)); in TEST() 188 msg.unenforced.Reinitialize(params, array_length(params)); in TEST() 201 msg.additional_params.Reinitialize(params, array_length(params)); in TEST() 387 msg.key_description.Reinitialize(params, array_length(params)); in TEST() 404 msg.enforced.Reinitialize(params, array_length(params)); in TEST() [all …]
|
D | android_keymaster_test_utils.cpp | 191 AuthorizationSet params(builder.build()); in GenerateKey() local 192 params.push_back(UserAuthParams()); in GenerateKey() 193 params.push_back(ClientParams()); in GenerateKey() 197 return device()->generate_key(device(), ¶ms, &blob_, &characteristics_); in GenerateKey() 207 AuthorizationSet params(builder.build()); in ImportKey() local 208 params.push_back(UserAuthParams()); in ImportKey() 209 params.push_back(ClientParams()); in ImportKey() 215 return device()->import_key(device(), ¶ms, format, &key, &blob_, &characteristics_); in ImportKey() 238 EXPECT_TRUE(out_params.params == nullptr); in BeginOperation() 253 EXPECT_TRUE(out_params.params == nullptr); in BeginOperation() [all …]
|
/system/bt/stack/avrc/ |
D | avrc_sdp.c | 225 avrc_proto_desc_list[0].params[0] = AVCT_PSM; in AVRC_AddRecord() 226 avrc_proto_desc_list[0].params[1] = 0; in AVRC_AddRecord() 231 avrc_proto_desc_list[index].params[0] = AVCT_REV_1_4; in AVRC_AddRecord() 232 avrc_proto_desc_list[index].params[1] = 0; in AVRC_AddRecord() 244 avrc_add_proto_desc_list.list_elem[0].params[0] = AVCT_BR_PSM; in AVRC_AddRecord() 245 avrc_add_proto_desc_list.list_elem[0].params[1] = 0; in AVRC_AddRecord() 248 avrc_add_proto_desc_list.list_elem[1].params[0] = AVCT_REV_1_4; in AVRC_AddRecord() 249 avrc_add_proto_desc_list.list_elem[1].params[1] = 0; in AVRC_AddRecord()
|
/system/webservd/webservd/ |
D | dbus_request_handler.cc | 64 std::vector<std::tuple<bool, std::string, std::string>> params; in HandleRequest() local 66 params.emplace_back(false, pair.first, pair.second); in HandleRequest() 69 params.emplace_back(true, pair.first, pair.second); in HandleRequest() 85 request_id, headers, params, files, body_data_pipe, in HandleRequest()
|