Home
last modified time | relevance | path

Searched refs:controls (Results 1 – 25 of 34) sorted by relevance

12

/system/nvram/core/tests/
Dnvram_manager_test.cpp61 static uint32_t GetControlsMask(const Vector<nvram_control_t>& controls) { in GetControlsMask() argument
63 for (nvram_control_t control : controls) { in GetControlsMask()
249 ASSERT_TRUE(create_space_request.controls.Resize(5)); in TEST_F()
250 create_space_request.controls[0] = NV_CONTROL_BOOT_WRITE_LOCK; in TEST_F()
251 create_space_request.controls[1] = NV_CONTROL_BOOT_READ_LOCK; in TEST_F()
252 create_space_request.controls[2] = NV_CONTROL_WRITE_AUTHORIZATION; in TEST_F()
253 create_space_request.controls[3] = NV_CONTROL_READ_AUTHORIZATION; in TEST_F()
254 create_space_request.controls[4] = NV_CONTROL_WRITE_EXTEND; in TEST_F()
268 EXPECT_EQ(GetControlsMask(create_space_request.controls), in TEST_F()
269 GetControlsMask(get_space_info_response.controls)); in TEST_F()
[all …]
/system/nvram/core/
Dnvram_manager.cpp51 Vector<nvram_control_t>* controls) { in GetControlsVector() argument
54 if (!controls->Resize(controls->size() + 1)) { in GetControlsVector()
58 (*controls)[controls->size() - 1] = static_cast<nvram_control_t>(control); in GetControlsVector()
225 uint32_t controls = 0; in CreateSpace() local
226 for (uint32_t control : request.controls) { in CreateSpace()
227 controls |= (1 << control); in CreateSpace()
229 if ((controls & ~kSupportedControlsMask) != 0) { in CreateSpace()
233 if ((controls & (1 << NV_CONTROL_PERSISTENT_WRITE_LOCK)) != 0 && in CreateSpace()
234 (controls & (1 << NV_CONTROL_BOOT_WRITE_LOCK)) != 0) { in CreateSpace()
238 if ((controls & (1 << NV_CONTROL_WRITE_EXTEND)) != 0 && in CreateSpace()
[all …]
Dpersistence.cpp92 MakeField(2, &NvramSpace::controls),
/system/nvram/messages/tests/
Dnvram_messages_test.cpp92 ASSERT_TRUE(request_payload.controls.Append(NV_CONTROL_BOOT_WRITE_LOCK)); in TEST()
93 ASSERT_TRUE(request_payload.controls.Append(NV_CONTROL_WRITE_EXTEND)); in TEST()
108 ASSERT_EQ(2UL, decoded_payload->controls.size()); in TEST()
109 EXPECT_EQ(NV_CONTROL_BOOT_WRITE_LOCK, decoded_payload->controls[0]); in TEST()
110 EXPECT_EQ(NV_CONTROL_WRITE_EXTEND, decoded_payload->controls[1]); in TEST()
153 ASSERT_TRUE(response_payload.controls.Append(NV_CONTROL_BOOT_WRITE_LOCK)); in TEST()
154 ASSERT_TRUE(response_payload.controls.Append(NV_CONTROL_BOOT_READ_LOCK)); in TEST()
155 ASSERT_TRUE(response_payload.controls.Append(NV_CONTROL_WRITE_EXTEND)); in TEST()
169 ASSERT_EQ(3U, decoded_payload->controls.size()); in TEST()
170 EXPECT_EQ(NV_CONTROL_BOOT_WRITE_LOCK, decoded_payload->controls[0]); in TEST()
[all …]
/system/nvram/core/include/nvram/core/
Dpersistence.h109 return (controls & (1 << control)) != 0; in HasControl()
117 uint32_t controls = 0; member
/system/sepolicy/prebuilts/api/26.0/private/
Dpolicy_capabilities1 # Enable new networking controls.
/system/sepolicy/prebuilts/api/28.0/private/
Dpolicy_capabilities1 # Enable new networking controls.
Dtraced.te14 # the privileged process that controls it.
/system/sepolicy/prebuilts/api/27.0/private/
Dpolicy_capabilities1 # Enable new networking controls.
/system/nvram/hal/
Dnvram_device_adapter.cpp147 *list_size = std::min(get_space_info_response.controls.size(), in device_get_space_controls()
150 control_list[i] = get_space_info_response.controls[i]; in device_get_space_controls()
153 *list_size = get_space_info_response.controls.size(); in device_get_space_controls()
183 if (!create_space_request.controls.Resize(list_size)) { in device_create_space()
187 create_space_request.controls[i] = control_list[i]; in device_create_space()
/system/nvram/messages/include/nvram/messages/
Dnvram_messages.h66 Vector<nvram_control_t> controls; member
79 Vector<nvram_control_t> controls; member
/system/sepolicy/prebuilts/api/29.0/private/
Dpolicy_capabilities1 # Enable new networking controls.
Dtraced.te18 # the privileged process that controls it.
/system/sepolicy/private/
Dpolicy_capabilities1 # Enable new networking controls.
Dtraced.te18 # the privileged process that controls it.
/system/sepolicy/prebuilts/api/30.0/private/
Dpolicy_capabilities1 # Enable new networking controls.
/system/media/camera/docs/
DCaptureRequestKeys.mako17 <%include file="CameraMetadataKeys.mako" args="java_class='CaptureRequest', xml_kind='controls'" />
DACameraMetadata.mako60 ${single_kind_keys("controls")}\
DCameraMetadataEnums.mako92 ${single_kind_keys('controls','CaptureRequest')}\
DCameraMetadataKeys.mako102 ##${single_kind_keys('CaptureRequestKeys', 'controls')}
/system/nvram/messages/
Dnvram_messages.cpp48 MakeField(3, &CreateSpaceRequest::controls),
64 MakeField(2, &GetSpaceInfoResponse::controls),
/system/sepolicy/prebuilts/api/30.0/public/
Diorap_prefetcherd.te18 # Allow reading most files under / ignoring usual access controls.
Diorap_inode2filename.te12 # Allow reading most files under / ignoring usual access controls.
/system/sepolicy/public/
Diorap_prefetcherd.te18 # Allow reading most files under / ignoring usual access controls.
Diorap_inode2filename.te12 # Allow reading most files under / ignoring usual access controls.

12