/system/bt/osi/test/ |
D | hash_map_utils_test.cc | 40 char params[] = ""; in TEST_F() local 41 map = hash_map_utils_new_from_string_params(params); in TEST_F() 46 char params[] = ";;;"; in TEST_F() local 47 map = hash_map_utils_new_from_string_params(params); in TEST_F() 52 char params[] = "keyOfSomething=value=OfSomething"; in TEST_F() local 55 map = hash_map_utils_new_from_string_params(params); in TEST_F() 62 char params[] = "key=valu0;key=value1"; in TEST_F() local 65 map = hash_map_utils_new_from_string_params(params); in TEST_F() 71 char params[] = "keyOfSomething=valueOfSomething"; in TEST_F() local 74 map = hash_map_utils_new_from_string_params(params); in TEST_F() [all …]
|
/system/bt/btif/src/ |
D | btif_gatt_test.cc | 177 const btgatt_test_params_t* params) { in btif_gattc_test_command_impl() argument 181 LOG_DEBUG(LOG_TAG, "%s: ENABLE - enable=%d", __func__, params->u1); in btif_gattc_test_command_impl() 182 if (params->u1) { in btif_gattc_test_command_impl() 198 __func__, params->bda1->ToString().c_str(), params->u1, in btif_gattc_test_command_impl() 199 params->u2); in btif_gattc_test_command_impl() 201 if (params->u1 == BT_DEVICE_TYPE_BLE) in btif_gattc_test_command_impl() 202 BTM_SecAddBleDevice(*params->bda1, NULL, BT_DEVICE_TYPE_BLE, in btif_gattc_test_command_impl() 203 params->u2); in btif_gattc_test_command_impl() 205 if (!GATT_Connect(test_cb.gatt_if, *params->bda1, true, BT_TRANSPORT_LE, in btif_gattc_test_command_impl() 225 if (params->u1 >= GATT_DISC_MAX) { in btif_gattc_test_command_impl() [all …]
|
D | btif_ble_advertiser.cc | 63 const AdvertiseParameters& params) { in parseParams() argument 64 p_params->advertising_event_properties = params.advertising_event_properties; in parseParams() 65 p_params->adv_int_min = params.min_interval; in parseParams() 66 p_params->adv_int_max = params.max_interval; in parseParams() 67 p_params->channel_map = params.channel_map; in parseParams() 69 p_params->tx_power = params.tx_power; in parseParams() 70 p_params->primary_advertising_phy = params.primary_advertising_phy; in parseParams() 71 p_params->secondary_advertising_phy = params.secondary_advertising_phy; in parseParams() 73 params.scan_request_notification_enable; in parseParams() 125 void SetParameters(uint8_t advertiser_id, AdvertiseParameters params, in SetParameters() argument [all …]
|
/system/libufdt/tests/src/ |
D | ufdt_gen_test_dts.c | 133 static int gen_dts(FILE *fp, const struct gen_params *params) { in gen_dts() argument 134 if (!params->no_header) { in gen_dts() 135 output_header(fp, params->plugin); in gen_dts() 138 if (params->node_num > 0) { in gen_dts() 139 output_root_begin(fp, params->depth); in gen_dts() 140 output_unused_nodes(fp, params->unused_num); in gen_dts() 141 output_nodes(fp, params->node_num, "status", "disabled"); in gen_dts() 142 output_root_end(fp, params->depth); in gen_dts() 146 output_ref_nodes(fp, start_id, params->append_num, "new_prop", "bar"); in gen_dts() 147 start_id += params->append_num; in gen_dts() [all …]
|
/system/security/keystore/ |
D | keystore_utils.cpp | 67 void add_legacy_key_authorizations(int keyType, keystore::AuthorizationSet* params) { in add_legacy_key_authorizations() argument 69 params->push_back(TAG_PURPOSE, KeyPurpose::SIGN); in add_legacy_key_authorizations() 70 params->push_back(TAG_PURPOSE, KeyPurpose::VERIFY); in add_legacy_key_authorizations() 71 params->push_back(TAG_PURPOSE, KeyPurpose::ENCRYPT); in add_legacy_key_authorizations() 72 params->push_back(TAG_PURPOSE, KeyPurpose::DECRYPT); in add_legacy_key_authorizations() 73 params->push_back(TAG_PADDING, PaddingMode::NONE); in add_legacy_key_authorizations() 75 params->push_back(TAG_PADDING, PaddingMode::RSA_PKCS1_1_5_SIGN); in add_legacy_key_authorizations() 76 params->push_back(TAG_PADDING, PaddingMode::RSA_PKCS1_1_5_ENCRYPT); in add_legacy_key_authorizations() 77 params->push_back(TAG_PADDING, PaddingMode::RSA_PSS); in add_legacy_key_authorizations() 78 params->push_back(TAG_PADDING, PaddingMode::RSA_OAEP); in add_legacy_key_authorizations() [all …]
|
D | legacy_keymaster_device_wrapper.cpp | 70 params = new keymaster_key_param_t[keyParams.size()]; in KmParamSet() 77 params[i] = keymaster_param_enum(tag, keyParams[i].f.integer); in KmParamSet() 81 params[i] = keymaster_param_int(tag, keyParams[i].f.integer); in KmParamSet() 85 params[i] = keymaster_param_long(tag, keyParams[i].f.longInteger); in KmParamSet() 88 params[i] = keymaster_param_date(tag, keyParams[i].f.dateTime); in KmParamSet() 92 params[i] = keymaster_param_bool(tag); in KmParamSet() 94 params[i].tag = KM_TAG_INVALID; in KmParamSet() 98 params[i] = in KmParamSet() 103 params[i].tag = KM_TAG_INVALID; in KmParamSet() 109 KmParamSet(KmParamSet&& other) : keymaster_key_param_set_t{other.params, other.length} { in KmParamSet() [all …]
|
/system/nfc/src/nfa/dm/ |
D | nfa_dm_main.cc | 243 p_stored = nfa_dm_cb.params.pf_rc; in nfa_dm_check_set_config() 247 p_stored = nfa_dm_cb.params.total_duration; in nfa_dm_check_set_config() 255 p_stored = nfa_dm_cb.params.la_bit_frame_sdd; in nfa_dm_check_set_config() 257 p_cur_len = &nfa_dm_cb.params.la_bit_frame_sdd_len; in nfa_dm_check_set_config() 260 p_stored = nfa_dm_cb.params.la_platform_config; in nfa_dm_check_set_config() 262 p_cur_len = &nfa_dm_cb.params.la_platform_config_len; in nfa_dm_check_set_config() 265 p_stored = nfa_dm_cb.params.la_sel_info; in nfa_dm_check_set_config() 267 p_cur_len = &nfa_dm_cb.params.la_sel_info_len; in nfa_dm_check_set_config() 270 p_stored = nfa_dm_cb.params.la_nfcid1; in nfa_dm_check_set_config() 272 p_cur_len = &nfa_dm_cb.params.la_nfcid1_len; in nfa_dm_check_set_config() [all …]
|
/system/libufdt/utils/src/ |
D | mkdtimg_cfg_create.c | 120 static int process_command_cfg_create(const struct cfg_create_params *params) { in process_command_cfg_create() argument 125 cfg_fp = fopen(params->cfg_filename, "r"); in process_command_cfg_create() 127 fprintf(stderr, "Can not open config file: %s\n", params->cfg_filename); in process_command_cfg_create() 131 printf("create image file: %s...\n", params->img_filename); in process_command_cfg_create() 133 img_fp = fopen(params->img_filename, "wb"); in process_command_cfg_create() 135 fprintf(stderr, "Can not create file: %s\n", params->img_filename); in process_command_cfg_create() 139 if (params->dtb_dir != NULL) { in process_command_cfg_create() 140 if (chdir(params->dtb_dir) != 0) { in process_command_cfg_create() 141 fprintf(stderr, "Can not switch to directory: %s\n", params->dtb_dir); in process_command_cfg_create() 169 struct cfg_create_params params; in handle_command_cfg_create() local [all …]
|
D | mkdtimg_dump.c | 150 const struct dump_params *params) { in dump_image_from_fp() argument 178 if (params->out_dtb_filename != NULL) { in dump_image_from_fp() 181 params->out_dtb_filename, i); in dump_image_from_fp() 194 static int process_command_dump(const struct dump_params *params) { in process_command_dump() argument 199 img_fp = fopen(params->img_filename, "rb"); in process_command_dump() 201 fprintf(stderr, "Can not open image file: %s\n", params->img_filename); in process_command_dump() 205 if (params->out_filename != NULL) { in process_command_dump() 206 out_fp = fopen(params->out_filename, "w"); in process_command_dump() 208 fprintf(stderr, "Can not create file: %s\n", params->out_filename); in process_command_dump() 213 ret = dump_image_from_fp(out_fp ? out_fp : stdout, img_fp, params); in process_command_dump() [all …]
|
/system/core/lmkd/include/ |
D | lmkd.h | 101 struct lmk_procprio *params) { in lmkd_pack_get_procprio() argument 102 params->pid = (pid_t)ntohl(packet[1]); in lmkd_pack_get_procprio() 103 params->uid = (uid_t)ntohl(packet[2]); in lmkd_pack_get_procprio() 104 params->oomadj = ntohl(packet[3]); in lmkd_pack_get_procprio() 112 struct lmk_procprio *params) { in lmkd_pack_set_procprio() argument 114 packet[1] = htonl(params->pid); in lmkd_pack_set_procprio() 115 packet[2] = htonl(params->uid); in lmkd_pack_set_procprio() 116 packet[3] = htonl(params->oomadj); in lmkd_pack_set_procprio() 130 struct lmk_procremove *params) { in lmkd_pack_get_procremove() argument 131 params->pid = (pid_t)ntohl(packet[1]); in lmkd_pack_get_procremove() [all …]
|
/system/vold/ |
D | ScryptParameters.cpp | 23 int params[3] = {}; in parse_scrypt_parameters() local 36 params[i] = strtol(token, &endptr, 10); in parse_scrypt_parameters() 41 if ((*token == '\0') || (*endptr != '\0') || params[i] < 0 || params[i] > 255) { in parse_scrypt_parameters() 48 *Nf = params[0]; *rf = params[1]; *pf = params[2]; in parse_scrypt_parameters()
|
/system/update_engine/ |
D | boot_control_chromeos.cc | 161 CgptAddParams params; in IsSlotBootable() local 162 memset(¶ms, '\0', sizeof(params)); in IsSlotBootable() 163 params.drive_name = const_cast<char*>(boot_disk_name_.c_str()); in IsSlotBootable() 164 params.partition = partition_num; in IsSlotBootable() 166 int retval = CgptGetPartitionDetails(¶ms); in IsSlotBootable() 170 return params.successful || params.tries > 0; in IsSlotBootable() 185 CgptAddParams params; in MarkSlotUnbootable() local 186 memset(¶ms, 0, sizeof(params)); in MarkSlotUnbootable() 188 params.drive_name = const_cast<char*>(boot_disk_name_.c_str()); in MarkSlotUnbootable() 189 params.partition = partition_num; in MarkSlotUnbootable() [all …]
|
D | omaha_request_params_unittest.cc | 116 OmahaRequestParams params(&fake_system_state_); in TEST_F() local 117 params.set_root(tempdir_.GetPath().value()); in TEST_F() 118 EXPECT_TRUE(params.Init("", "", false)); in TEST_F() 119 EXPECT_TRUE(params.SetTargetChannel("canary-channel", false, nullptr)); in TEST_F() 120 EXPECT_FALSE(params.mutable_image_props_.is_powerwash_allowed); in TEST_F() 130 OmahaRequestParams params(&fake_system_state_); in TEST_F() local 131 params.set_root(tempdir_.GetPath().value()); in TEST_F() 132 EXPECT_TRUE(params.Init("", "", false)); in TEST_F() 133 EXPECT_TRUE(params.SetTargetChannel("canary-channel", true, nullptr)); in TEST_F() 134 EXPECT_TRUE(params.mutable_image_props_.is_powerwash_allowed); in TEST_F() [all …]
|
D | omaha_request_action_unittest.cc | 421 void TestEvent(OmahaRequestParams params, in TestEvent() argument 431 fake_system_state.set_request_params(¶ms); in TestEvent() 863 OmahaRequestParams params = request_params_; in TEST_F() local 864 params.set_wall_clock_based_wait_enabled(true); in TEST_F() 865 params.set_update_check_count_wait_enabled(false); in TEST_F() 866 params.set_waiting_period(TimeDelta::FromDays(2)); in TEST_F() 869 TestUpdateCheck(¶ms, in TEST_F() 882 params.set_interactive(true); in TEST_F() 884 TestUpdateCheck(¶ms, in TEST_F() 899 OmahaRequestParams params = request_params_; in TEST_F() local [all …]
|
/system/extras/tests/audio/alsa/ |
D | pcmtest.cpp | 129 struct pcm_params *params; in getPcmParams() local 133 params = pcm_params_get(pcmnodes[i].card, pcmnodes[i].device, in getPcmParams() 135 if (params == NULL) in getPcmParams() 138 min = pcm_params_get_min(params, PCM_PARAM_RATE); in getPcmParams() 139 max = pcm_params_get_max(params, PCM_PARAM_RATE); in getPcmParams() 142 min = pcm_params_get_min(params, PCM_PARAM_CHANNELS); in getPcmParams() 143 max = pcm_params_get_max(params, PCM_PARAM_CHANNELS); in getPcmParams() 146 min = pcm_params_get_min(params, PCM_PARAM_SAMPLE_BITS); in getPcmParams() 147 max = pcm_params_get_max(params, PCM_PARAM_SAMPLE_BITS); in getPcmParams() 150 min = pcm_params_get_min(params, PCM_PARAM_PERIOD_SIZE); in getPcmParams() [all …]
|
/system/core/fs_mgr/ |
D | fs_mgr_verity.cpp | 193 const struct verity_table_params *params); 196 const struct verity_table_params *params) in format_verity_table() argument 201 if (params->mode == VERITY_MODE_RESTART) { in format_verity_table() 203 } else if (params->mode == VERITY_MODE_LOGGING) { in format_verity_table() 207 if (params->ecc.valid) { in format_verity_table() 211 params->table, 1 + VERITY_TABLE_OPT_FEC_ARGS, mode_flag, params->ecc_dev, in format_verity_table() 212 params->ecc.start / FEC_BLOCKSIZE, params->ecc.blocks, params->ecc.roots); in format_verity_table() 216 params->table, VERITY_TABLE_OPT_FEC_ARGS, params->ecc_dev, in format_verity_table() 217 params->ecc.start / FEC_BLOCKSIZE, params->ecc.blocks, params->ecc.roots); in format_verity_table() 220 res = snprintf(buf, bufsize, "%s 2 " VERITY_TABLE_OPT_IGNZERO " %s", params->table, in format_verity_table() [all …]
|
/system/keymaster/ng/ |
D | AndroidKeymaster4Device.cpp | 76 params = new keymaster_key_param_t[keyParams.size()]; in KmParamSet() 83 params[i] = keymaster_param_enum(tag, keyParams[i].f.integer); in KmParamSet() 87 params[i] = keymaster_param_int(tag, keyParams[i].f.integer); in KmParamSet() 91 params[i] = keymaster_param_long(tag, keyParams[i].f.longInteger); in KmParamSet() 94 params[i] = keymaster_param_date(tag, keyParams[i].f.dateTime); in KmParamSet() 98 params[i] = keymaster_param_bool(tag); in KmParamSet() 100 params[i].tag = KM_TAG_INVALID; in KmParamSet() 104 params[i] = in KmParamSet() 109 params[i].tag = KM_TAG_INVALID; in KmParamSet() 115 KmParamSet(KmParamSet&& other) : keymaster_key_param_set_t{other.params, other.length} { in KmParamSet() [all …]
|
D | AndroidKeymaster3Device.cpp | 89 params = new keymaster_key_param_t[keyParams.size()]; in KmParamSet() 96 params[i] = keymaster_param_enum(tag, keyParams[i].f.integer); in KmParamSet() 100 params[i] = keymaster_param_int(tag, keyParams[i].f.integer); in KmParamSet() 104 params[i] = keymaster_param_long(tag, keyParams[i].f.longInteger); in KmParamSet() 107 params[i] = keymaster_param_date(tag, keyParams[i].f.dateTime); in KmParamSet() 111 params[i] = keymaster_param_bool(tag); in KmParamSet() 113 params[i].tag = KM_TAG_INVALID; in KmParamSet() 117 params[i] = in KmParamSet() 122 params[i].tag = KM_TAG_INVALID; in KmParamSet() 128 KmParamSet(KmParamSet&& other) : keymaster_key_param_set_t{other.params, other.length} { in KmParamSet() [all …]
|
/system/nfc/src/nfa/rw/ |
D | nfa_rw_api.cc | 163 p_msg->params.write_ndef.len = len; in NFA_RwWriteNDef() 164 p_msg->params.write_ndef.p_data = p_data; in NFA_RwWriteNDef() 198 p_msg->params.option = option; in NFA_RwPresenceCheck() 287 p_msg->params.set_readonly.b_hard_lock = b_hard_lock; in NFA_RwSetTagReadOnly() 447 p_msg->params.t1t_read.block_number = block_number; in NFA_RwT1tRead() 448 p_msg->params.t1t_read.index = index; in NFA_RwT1tRead() 480 p_msg->params.t1t_write.b_erase = b_erase; in NFA_RwT1tWrite() 482 p_msg->params.t1t_write.block_number = block_number; in NFA_RwT1tWrite() 483 p_msg->params.t1t_write.index = index; in NFA_RwT1tWrite() 484 p_msg->params.t1t_write.p_block_data[0] = data; in NFA_RwT1tWrite() [all …]
|
/system/chre/platform/shared/ |
D | chre_api_wifi.cc | 38 const struct chreWifiScanParams *params, const void *cookie) { in chreWifiRequestScanAsync() argument 40 return (params == nullptr) ? false : in chreWifiRequestScanAsync() 42 .requestScan(nanoapp, params, cookie); in chreWifiRequestScanAsync() 46 const struct chreWifiRangingParams *params, const void *cookie) { in chreWifiRequestRangingAsync() argument 48 return (params == nullptr) ? false : in chreWifiRequestRangingAsync() 50 .requestRanging(nanoapp, params, cookie); in chreWifiRequestRangingAsync()
|
/system/core/trusty/keymaster/ |
D | trusty_keymaster_device_test.cpp | 128 size_t dsa_message_len(const keymaster_dsa_keygen_params_t& params) { in dsa_message_len() argument 129 switch (params.key_size) { in dsa_message_len() 156 keymaster_rsa_keygen_params_t params = build_rsa_params(); in TEST_F() local 159 ASSERT_EQ(0, device.generate_keypair(TYPE_RSA, ¶ms, &ptr, &size)); in TEST_F() 175 keymaster_rsa_keygen_params_t params = build_rsa_params(); in TEST_F() local 178 ASSERT_EQ(0, device.generate_keypair(TYPE_RSA, ¶ms, &ptr, &size)); in TEST_F() 183 size_t message_len = params.modulus_size / 8; in TEST_F() 194 keymaster_rsa_keygen_params_t params = build_rsa_params(); in TEST_F() local 197 ASSERT_EQ(0, device.generate_keypair(TYPE_RSA, ¶ms, &ptr, &size)); in TEST_F() 202 size_t message_len = params.modulus_size / 8 - 1; in TEST_F() [all …]
|
/system/vold/tests/ |
D | CryptfsScryptHidlizationEquivalence_test.cpp | 158 keymaster_key_param_t params[] = { in keymaster_create_key_old() local 180 keymaster_key_param_set_t param_set = { params, sizeof(params)/sizeof(*params) }; in keymaster_create_key_old() 195 keymaster_rsa_keygen_params_t params; in keymaster_create_key_old() local 196 memset(¶ms, '\0', sizeof(params)); in keymaster_create_key_old() 197 params.public_exponent = RSA_EXPONENT; in keymaster_create_key_old() 198 params.modulus_size = RSA_KEY_SIZE; in keymaster_create_key_old() 200 if (keymaster0_dev->generate_keypair(keymaster0_dev, TYPE_RSA, ¶ms, in keymaster_create_key_old() 283 keymaster_rsa_sign_params_t params; in keymaster_sign_object_old() local 284 params.digest_type = DIGEST_NONE; in keymaster_sign_object_old() 285 params.padding_type = PADDING_NONE; in keymaster_sign_object_old() [all …]
|
/system/chre/chre_api/legacy/v1_1/chre/ |
D | wifi.h | 509 bool chreWifiRequestScanAsync(const struct chreWifiScanParams *params, 524 struct chreWifiScanParams params = {}; in chreWifiRequestScanAsyncDefault() local 525 params.scanType = CHRE_WIFI_SCAN_TYPE_ACTIVE; in chreWifiRequestScanAsyncDefault() 526 params.maxScanAgeMs = 5000; // 5 seconds in chreWifiRequestScanAsyncDefault() 527 params.frequencyListLen = 0; in chreWifiRequestScanAsyncDefault() 528 params.ssidListLen = 0; in chreWifiRequestScanAsyncDefault() 529 return chreWifiRequestScanAsync(¶ms, cookie); in chreWifiRequestScanAsyncDefault()
|
/system/keymaster/tests/ |
D | keymaster_enforcement_test.cpp | 98 keymaster_key_param_t params[] = { in TEST_F() local 101 AuthorizationSet single_auth_set(params, array_length(params)); in TEST_F() 109 keymaster_key_param_t params[] = { in TEST_F() local 114 AuthorizationSet auth_set(params, array_length(params)); in TEST_F() 125 keymaster_key_param_t params[] = { in TEST_F() local 129 AuthorizationSet auth_set(params, array_length(params)); in TEST_F() 137 keymaster_key_param_t params[] = { in TEST_F() local 142 AuthorizationSet auth_set(params, array_length(params)); in TEST_F() 153 keymaster_key_param_t params[] = { in TEST_F() local 158 AuthorizationSet auth_set(params, array_length(params)); in TEST_F() [all …]
|
/system/netd/server/ |
D | ResolverController.cpp | 376 const char** servers, int numservers, const __res_params* params) { in setDnsServers() argument 380 return -_resolv_set_nameservers_for_net(netId, servers, numservers, searchDomains, params); in setDnsServers() 408 std::vector<std::string>* domains, __res_params* params, in getDnsInfo() argument 428 *params = __res_params{}; in getDnsInfo() 431 res_domains, params, res_stats); in getDnsInfo() 448 android_net_res_stats_get_usable_servers(params, res_stats, nscount, valid_servers); in getDnsInfo() 480 const std::vector<int32_t>& params, const std::string& tlsName, in setResolverConfiguration() argument 484 if (params.size() != INetd::RESOLVER_PARAMS_COUNT) { in setResolverConfiguration() 485 ALOGE("%s: params.size()=%zu", __FUNCTION__, params.size()); in setResolverConfiguration() 510 res_params.sample_validity = params[INetd::RESOLVER_PARAMS_SAMPLE_VALIDITY]; in setResolverConfiguration() [all …]
|