Home
last modified time | relevance | path

Searched refs:params (Results 1 – 25 of 167) sorted by relevance

1234567

/system/bt/osi/test/
Dhash_map_utils_test.cc40 char params[] = ""; in TEST_F() local
41 map = hash_map_utils_new_from_string_params(params); in TEST_F()
46 char params[] = ";;;"; in TEST_F() local
47 map = hash_map_utils_new_from_string_params(params); in TEST_F()
52 char params[] = "keyOfSomething=value=OfSomething"; in TEST_F() local
55 map = hash_map_utils_new_from_string_params(params); in TEST_F()
62 char params[] = "key=valu0;key=value1"; in TEST_F() local
65 map = hash_map_utils_new_from_string_params(params); in TEST_F()
71 char params[] = "keyOfSomething=valueOfSomething"; in TEST_F() local
74 map = hash_map_utils_new_from_string_params(params); in TEST_F()
[all …]
/system/bt/btif/src/
Dbtif_gatt_test.cc177 const btgatt_test_params_t* params) { in btif_gattc_test_command_impl() argument
181 LOG_DEBUG(LOG_TAG, "%s: ENABLE - enable=%d", __func__, params->u1); in btif_gattc_test_command_impl()
182 if (params->u1) { in btif_gattc_test_command_impl()
198 __func__, params->bda1->ToString().c_str(), params->u1, in btif_gattc_test_command_impl()
199 params->u2); in btif_gattc_test_command_impl()
201 if (params->u1 == BT_DEVICE_TYPE_BLE) in btif_gattc_test_command_impl()
202 BTM_SecAddBleDevice(*params->bda1, NULL, BT_DEVICE_TYPE_BLE, in btif_gattc_test_command_impl()
203 params->u2); in btif_gattc_test_command_impl()
205 if (!GATT_Connect(test_cb.gatt_if, *params->bda1, true, BT_TRANSPORT_LE, in btif_gattc_test_command_impl()
225 if (params->u1 >= GATT_DISC_MAX) { in btif_gattc_test_command_impl()
[all …]
Dbtif_ble_advertiser.cc63 const AdvertiseParameters& params) { in parseParams() argument
64 p_params->advertising_event_properties = params.advertising_event_properties; in parseParams()
65 p_params->adv_int_min = params.min_interval; in parseParams()
66 p_params->adv_int_max = params.max_interval; in parseParams()
67 p_params->channel_map = params.channel_map; in parseParams()
69 p_params->tx_power = params.tx_power; in parseParams()
70 p_params->primary_advertising_phy = params.primary_advertising_phy; in parseParams()
71 p_params->secondary_advertising_phy = params.secondary_advertising_phy; in parseParams()
73 params.scan_request_notification_enable; in parseParams()
125 void SetParameters(uint8_t advertiser_id, AdvertiseParameters params, in SetParameters() argument
[all …]
/system/libufdt/tests/src/
Dufdt_gen_test_dts.c133 static int gen_dts(FILE *fp, const struct gen_params *params) { in gen_dts() argument
134 if (!params->no_header) { in gen_dts()
135 output_header(fp, params->plugin); in gen_dts()
138 if (params->node_num > 0) { in gen_dts()
139 output_root_begin(fp, params->depth); in gen_dts()
140 output_unused_nodes(fp, params->unused_num); in gen_dts()
141 output_nodes(fp, params->node_num, "status", "disabled"); in gen_dts()
142 output_root_end(fp, params->depth); in gen_dts()
146 output_ref_nodes(fp, start_id, params->append_num, "new_prop", "bar"); in gen_dts()
147 start_id += params->append_num; in gen_dts()
[all …]
/system/security/keystore/
Dkeystore_utils.cpp67 void add_legacy_key_authorizations(int keyType, keystore::AuthorizationSet* params) { in add_legacy_key_authorizations() argument
69 params->push_back(TAG_PURPOSE, KeyPurpose::SIGN); in add_legacy_key_authorizations()
70 params->push_back(TAG_PURPOSE, KeyPurpose::VERIFY); in add_legacy_key_authorizations()
71 params->push_back(TAG_PURPOSE, KeyPurpose::ENCRYPT); in add_legacy_key_authorizations()
72 params->push_back(TAG_PURPOSE, KeyPurpose::DECRYPT); in add_legacy_key_authorizations()
73 params->push_back(TAG_PADDING, PaddingMode::NONE); in add_legacy_key_authorizations()
75 params->push_back(TAG_PADDING, PaddingMode::RSA_PKCS1_1_5_SIGN); in add_legacy_key_authorizations()
76 params->push_back(TAG_PADDING, PaddingMode::RSA_PKCS1_1_5_ENCRYPT); in add_legacy_key_authorizations()
77 params->push_back(TAG_PADDING, PaddingMode::RSA_PSS); in add_legacy_key_authorizations()
78 params->push_back(TAG_PADDING, PaddingMode::RSA_OAEP); in add_legacy_key_authorizations()
[all …]
Dlegacy_keymaster_device_wrapper.cpp70 params = new keymaster_key_param_t[keyParams.size()]; in KmParamSet()
77 params[i] = keymaster_param_enum(tag, keyParams[i].f.integer); in KmParamSet()
81 params[i] = keymaster_param_int(tag, keyParams[i].f.integer); in KmParamSet()
85 params[i] = keymaster_param_long(tag, keyParams[i].f.longInteger); in KmParamSet()
88 params[i] = keymaster_param_date(tag, keyParams[i].f.dateTime); in KmParamSet()
92 params[i] = keymaster_param_bool(tag); in KmParamSet()
94 params[i].tag = KM_TAG_INVALID; in KmParamSet()
98 params[i] = in KmParamSet()
103 params[i].tag = KM_TAG_INVALID; in KmParamSet()
109 KmParamSet(KmParamSet&& other) : keymaster_key_param_set_t{other.params, other.length} { in KmParamSet()
[all …]
/system/nfc/src/nfa/dm/
Dnfa_dm_main.cc243 p_stored = nfa_dm_cb.params.pf_rc; in nfa_dm_check_set_config()
247 p_stored = nfa_dm_cb.params.total_duration; in nfa_dm_check_set_config()
255 p_stored = nfa_dm_cb.params.la_bit_frame_sdd; in nfa_dm_check_set_config()
257 p_cur_len = &nfa_dm_cb.params.la_bit_frame_sdd_len; in nfa_dm_check_set_config()
260 p_stored = nfa_dm_cb.params.la_platform_config; in nfa_dm_check_set_config()
262 p_cur_len = &nfa_dm_cb.params.la_platform_config_len; in nfa_dm_check_set_config()
265 p_stored = nfa_dm_cb.params.la_sel_info; in nfa_dm_check_set_config()
267 p_cur_len = &nfa_dm_cb.params.la_sel_info_len; in nfa_dm_check_set_config()
270 p_stored = nfa_dm_cb.params.la_nfcid1; in nfa_dm_check_set_config()
272 p_cur_len = &nfa_dm_cb.params.la_nfcid1_len; in nfa_dm_check_set_config()
[all …]
/system/libufdt/utils/src/
Dmkdtimg_cfg_create.c120 static int process_command_cfg_create(const struct cfg_create_params *params) { in process_command_cfg_create() argument
125 cfg_fp = fopen(params->cfg_filename, "r"); in process_command_cfg_create()
127 fprintf(stderr, "Can not open config file: %s\n", params->cfg_filename); in process_command_cfg_create()
131 printf("create image file: %s...\n", params->img_filename); in process_command_cfg_create()
133 img_fp = fopen(params->img_filename, "wb"); in process_command_cfg_create()
135 fprintf(stderr, "Can not create file: %s\n", params->img_filename); in process_command_cfg_create()
139 if (params->dtb_dir != NULL) { in process_command_cfg_create()
140 if (chdir(params->dtb_dir) != 0) { in process_command_cfg_create()
141 fprintf(stderr, "Can not switch to directory: %s\n", params->dtb_dir); in process_command_cfg_create()
169 struct cfg_create_params params; in handle_command_cfg_create() local
[all …]
Dmkdtimg_dump.c150 const struct dump_params *params) { in dump_image_from_fp() argument
178 if (params->out_dtb_filename != NULL) { in dump_image_from_fp()
181 params->out_dtb_filename, i); in dump_image_from_fp()
194 static int process_command_dump(const struct dump_params *params) { in process_command_dump() argument
199 img_fp = fopen(params->img_filename, "rb"); in process_command_dump()
201 fprintf(stderr, "Can not open image file: %s\n", params->img_filename); in process_command_dump()
205 if (params->out_filename != NULL) { in process_command_dump()
206 out_fp = fopen(params->out_filename, "w"); in process_command_dump()
208 fprintf(stderr, "Can not create file: %s\n", params->out_filename); in process_command_dump()
213 ret = dump_image_from_fp(out_fp ? out_fp : stdout, img_fp, params); in process_command_dump()
[all …]
/system/core/lmkd/include/
Dlmkd.h101 struct lmk_procprio *params) { in lmkd_pack_get_procprio() argument
102 params->pid = (pid_t)ntohl(packet[1]); in lmkd_pack_get_procprio()
103 params->uid = (uid_t)ntohl(packet[2]); in lmkd_pack_get_procprio()
104 params->oomadj = ntohl(packet[3]); in lmkd_pack_get_procprio()
112 struct lmk_procprio *params) { in lmkd_pack_set_procprio() argument
114 packet[1] = htonl(params->pid); in lmkd_pack_set_procprio()
115 packet[2] = htonl(params->uid); in lmkd_pack_set_procprio()
116 packet[3] = htonl(params->oomadj); in lmkd_pack_set_procprio()
130 struct lmk_procremove *params) { in lmkd_pack_get_procremove() argument
131 params->pid = (pid_t)ntohl(packet[1]); in lmkd_pack_get_procremove()
[all …]
/system/vold/
DScryptParameters.cpp23 int params[3] = {}; in parse_scrypt_parameters() local
36 params[i] = strtol(token, &endptr, 10); in parse_scrypt_parameters()
41 if ((*token == '\0') || (*endptr != '\0') || params[i] < 0 || params[i] > 255) { in parse_scrypt_parameters()
48 *Nf = params[0]; *rf = params[1]; *pf = params[2]; in parse_scrypt_parameters()
/system/update_engine/
Dboot_control_chromeos.cc161 CgptAddParams params; in IsSlotBootable() local
162 memset(&params, '\0', sizeof(params)); in IsSlotBootable()
163 params.drive_name = const_cast<char*>(boot_disk_name_.c_str()); in IsSlotBootable()
164 params.partition = partition_num; in IsSlotBootable()
166 int retval = CgptGetPartitionDetails(&params); in IsSlotBootable()
170 return params.successful || params.tries > 0; in IsSlotBootable()
185 CgptAddParams params; in MarkSlotUnbootable() local
186 memset(&params, 0, sizeof(params)); in MarkSlotUnbootable()
188 params.drive_name = const_cast<char*>(boot_disk_name_.c_str()); in MarkSlotUnbootable()
189 params.partition = partition_num; in MarkSlotUnbootable()
[all …]
Domaha_request_params_unittest.cc116 OmahaRequestParams params(&fake_system_state_); in TEST_F() local
117 params.set_root(tempdir_.GetPath().value()); in TEST_F()
118 EXPECT_TRUE(params.Init("", "", false)); in TEST_F()
119 EXPECT_TRUE(params.SetTargetChannel("canary-channel", false, nullptr)); in TEST_F()
120 EXPECT_FALSE(params.mutable_image_props_.is_powerwash_allowed); in TEST_F()
130 OmahaRequestParams params(&fake_system_state_); in TEST_F() local
131 params.set_root(tempdir_.GetPath().value()); in TEST_F()
132 EXPECT_TRUE(params.Init("", "", false)); in TEST_F()
133 EXPECT_TRUE(params.SetTargetChannel("canary-channel", true, nullptr)); in TEST_F()
134 EXPECT_TRUE(params.mutable_image_props_.is_powerwash_allowed); in TEST_F()
[all …]
Domaha_request_action_unittest.cc421 void TestEvent(OmahaRequestParams params, in TestEvent() argument
431 fake_system_state.set_request_params(&params); in TestEvent()
863 OmahaRequestParams params = request_params_; in TEST_F() local
864 params.set_wall_clock_based_wait_enabled(true); in TEST_F()
865 params.set_update_check_count_wait_enabled(false); in TEST_F()
866 params.set_waiting_period(TimeDelta::FromDays(2)); in TEST_F()
869 TestUpdateCheck(&params, in TEST_F()
882 params.set_interactive(true); in TEST_F()
884 TestUpdateCheck(&params, in TEST_F()
899 OmahaRequestParams params = request_params_; in TEST_F() local
[all …]
/system/extras/tests/audio/alsa/
Dpcmtest.cpp129 struct pcm_params *params; in getPcmParams() local
133 params = pcm_params_get(pcmnodes[i].card, pcmnodes[i].device, in getPcmParams()
135 if (params == NULL) in getPcmParams()
138 min = pcm_params_get_min(params, PCM_PARAM_RATE); in getPcmParams()
139 max = pcm_params_get_max(params, PCM_PARAM_RATE); in getPcmParams()
142 min = pcm_params_get_min(params, PCM_PARAM_CHANNELS); in getPcmParams()
143 max = pcm_params_get_max(params, PCM_PARAM_CHANNELS); in getPcmParams()
146 min = pcm_params_get_min(params, PCM_PARAM_SAMPLE_BITS); in getPcmParams()
147 max = pcm_params_get_max(params, PCM_PARAM_SAMPLE_BITS); in getPcmParams()
150 min = pcm_params_get_min(params, PCM_PARAM_PERIOD_SIZE); in getPcmParams()
[all …]
/system/core/fs_mgr/
Dfs_mgr_verity.cpp193 const struct verity_table_params *params);
196 const struct verity_table_params *params) in format_verity_table() argument
201 if (params->mode == VERITY_MODE_RESTART) { in format_verity_table()
203 } else if (params->mode == VERITY_MODE_LOGGING) { in format_verity_table()
207 if (params->ecc.valid) { in format_verity_table()
211 params->table, 1 + VERITY_TABLE_OPT_FEC_ARGS, mode_flag, params->ecc_dev, in format_verity_table()
212 params->ecc.start / FEC_BLOCKSIZE, params->ecc.blocks, params->ecc.roots); in format_verity_table()
216 params->table, VERITY_TABLE_OPT_FEC_ARGS, params->ecc_dev, in format_verity_table()
217 params->ecc.start / FEC_BLOCKSIZE, params->ecc.blocks, params->ecc.roots); in format_verity_table()
220 res = snprintf(buf, bufsize, "%s 2 " VERITY_TABLE_OPT_IGNZERO " %s", params->table, in format_verity_table()
[all …]
/system/keymaster/ng/
DAndroidKeymaster4Device.cpp76 params = new keymaster_key_param_t[keyParams.size()]; in KmParamSet()
83 params[i] = keymaster_param_enum(tag, keyParams[i].f.integer); in KmParamSet()
87 params[i] = keymaster_param_int(tag, keyParams[i].f.integer); in KmParamSet()
91 params[i] = keymaster_param_long(tag, keyParams[i].f.longInteger); in KmParamSet()
94 params[i] = keymaster_param_date(tag, keyParams[i].f.dateTime); in KmParamSet()
98 params[i] = keymaster_param_bool(tag); in KmParamSet()
100 params[i].tag = KM_TAG_INVALID; in KmParamSet()
104 params[i] = in KmParamSet()
109 params[i].tag = KM_TAG_INVALID; in KmParamSet()
115 KmParamSet(KmParamSet&& other) : keymaster_key_param_set_t{other.params, other.length} { in KmParamSet()
[all …]
DAndroidKeymaster3Device.cpp89 params = new keymaster_key_param_t[keyParams.size()]; in KmParamSet()
96 params[i] = keymaster_param_enum(tag, keyParams[i].f.integer); in KmParamSet()
100 params[i] = keymaster_param_int(tag, keyParams[i].f.integer); in KmParamSet()
104 params[i] = keymaster_param_long(tag, keyParams[i].f.longInteger); in KmParamSet()
107 params[i] = keymaster_param_date(tag, keyParams[i].f.dateTime); in KmParamSet()
111 params[i] = keymaster_param_bool(tag); in KmParamSet()
113 params[i].tag = KM_TAG_INVALID; in KmParamSet()
117 params[i] = in KmParamSet()
122 params[i].tag = KM_TAG_INVALID; in KmParamSet()
128 KmParamSet(KmParamSet&& other) : keymaster_key_param_set_t{other.params, other.length} { in KmParamSet()
[all …]
/system/nfc/src/nfa/rw/
Dnfa_rw_api.cc163 p_msg->params.write_ndef.len = len; in NFA_RwWriteNDef()
164 p_msg->params.write_ndef.p_data = p_data; in NFA_RwWriteNDef()
198 p_msg->params.option = option; in NFA_RwPresenceCheck()
287 p_msg->params.set_readonly.b_hard_lock = b_hard_lock; in NFA_RwSetTagReadOnly()
447 p_msg->params.t1t_read.block_number = block_number; in NFA_RwT1tRead()
448 p_msg->params.t1t_read.index = index; in NFA_RwT1tRead()
480 p_msg->params.t1t_write.b_erase = b_erase; in NFA_RwT1tWrite()
482 p_msg->params.t1t_write.block_number = block_number; in NFA_RwT1tWrite()
483 p_msg->params.t1t_write.index = index; in NFA_RwT1tWrite()
484 p_msg->params.t1t_write.p_block_data[0] = data; in NFA_RwT1tWrite()
[all …]
/system/chre/platform/shared/
Dchre_api_wifi.cc38 const struct chreWifiScanParams *params, const void *cookie) { in chreWifiRequestScanAsync() argument
40 return (params == nullptr) ? false : in chreWifiRequestScanAsync()
42 .requestScan(nanoapp, params, cookie); in chreWifiRequestScanAsync()
46 const struct chreWifiRangingParams *params, const void *cookie) { in chreWifiRequestRangingAsync() argument
48 return (params == nullptr) ? false : in chreWifiRequestRangingAsync()
50 .requestRanging(nanoapp, params, cookie); in chreWifiRequestRangingAsync()
/system/core/trusty/keymaster/
Dtrusty_keymaster_device_test.cpp128 size_t dsa_message_len(const keymaster_dsa_keygen_params_t& params) { in dsa_message_len() argument
129 switch (params.key_size) { in dsa_message_len()
156 keymaster_rsa_keygen_params_t params = build_rsa_params(); in TEST_F() local
159 ASSERT_EQ(0, device.generate_keypair(TYPE_RSA, &params, &ptr, &size)); in TEST_F()
175 keymaster_rsa_keygen_params_t params = build_rsa_params(); in TEST_F() local
178 ASSERT_EQ(0, device.generate_keypair(TYPE_RSA, &params, &ptr, &size)); in TEST_F()
183 size_t message_len = params.modulus_size / 8; in TEST_F()
194 keymaster_rsa_keygen_params_t params = build_rsa_params(); in TEST_F() local
197 ASSERT_EQ(0, device.generate_keypair(TYPE_RSA, &params, &ptr, &size)); in TEST_F()
202 size_t message_len = params.modulus_size / 8 - 1; in TEST_F()
[all …]
/system/vold/tests/
DCryptfsScryptHidlizationEquivalence_test.cpp158 keymaster_key_param_t params[] = { in keymaster_create_key_old() local
180 keymaster_key_param_set_t param_set = { params, sizeof(params)/sizeof(*params) }; in keymaster_create_key_old()
195 keymaster_rsa_keygen_params_t params; in keymaster_create_key_old() local
196 memset(&params, '\0', sizeof(params)); in keymaster_create_key_old()
197 params.public_exponent = RSA_EXPONENT; in keymaster_create_key_old()
198 params.modulus_size = RSA_KEY_SIZE; in keymaster_create_key_old()
200 if (keymaster0_dev->generate_keypair(keymaster0_dev, TYPE_RSA, &params, in keymaster_create_key_old()
283 keymaster_rsa_sign_params_t params; in keymaster_sign_object_old() local
284 params.digest_type = DIGEST_NONE; in keymaster_sign_object_old()
285 params.padding_type = PADDING_NONE; in keymaster_sign_object_old()
[all …]
/system/chre/chre_api/legacy/v1_1/chre/
Dwifi.h509 bool chreWifiRequestScanAsync(const struct chreWifiScanParams *params,
524 struct chreWifiScanParams params = {}; in chreWifiRequestScanAsyncDefault() local
525 params.scanType = CHRE_WIFI_SCAN_TYPE_ACTIVE; in chreWifiRequestScanAsyncDefault()
526 params.maxScanAgeMs = 5000; // 5 seconds in chreWifiRequestScanAsyncDefault()
527 params.frequencyListLen = 0; in chreWifiRequestScanAsyncDefault()
528 params.ssidListLen = 0; in chreWifiRequestScanAsyncDefault()
529 return chreWifiRequestScanAsync(&params, cookie); in chreWifiRequestScanAsyncDefault()
/system/keymaster/tests/
Dkeymaster_enforcement_test.cpp98 keymaster_key_param_t params[] = { in TEST_F() local
101 AuthorizationSet single_auth_set(params, array_length(params)); in TEST_F()
109 keymaster_key_param_t params[] = { in TEST_F() local
114 AuthorizationSet auth_set(params, array_length(params)); in TEST_F()
125 keymaster_key_param_t params[] = { in TEST_F() local
129 AuthorizationSet auth_set(params, array_length(params)); in TEST_F()
137 keymaster_key_param_t params[] = { in TEST_F() local
142 AuthorizationSet auth_set(params, array_length(params)); in TEST_F()
153 keymaster_key_param_t params[] = { in TEST_F() local
158 AuthorizationSet auth_set(params, array_length(params)); in TEST_F()
[all …]
/system/netd/server/
DResolverController.cpp376 const char** servers, int numservers, const __res_params* params) { in setDnsServers() argument
380 return -_resolv_set_nameservers_for_net(netId, servers, numservers, searchDomains, params); in setDnsServers()
408 std::vector<std::string>* domains, __res_params* params, in getDnsInfo() argument
428 *params = __res_params{}; in getDnsInfo()
431 res_domains, params, res_stats); in getDnsInfo()
448 android_net_res_stats_get_usable_servers(params, res_stats, nscount, valid_servers); in getDnsInfo()
480 const std::vector<int32_t>& params, const std::string& tlsName, in setResolverConfiguration() argument
484 if (params.size() != INetd::RESOLVER_PARAMS_COUNT) { in setResolverConfiguration()
485 ALOGE("%s: params.size()=%zu", __FUNCTION__, params.size()); in setResolverConfiguration()
510 res_params.sample_validity = params[INetd::RESOLVER_PARAMS_SAMPLE_VALIDITY]; in setResolverConfiguration()
[all …]

1234567