Home
last modified time | relevance | path

Searched full:tee (Results 1 – 25 of 2002) sorted by relevance

12345678910>>...81

/aosp_15_r20/external/rust/android-crates-io/crates/libz-sys/src/zlib-ng/
Dconfigure58 test -n "${CROSS_PREFIX}" && echo Using ${AR} | tee -a configure.log
61 test -n "${CROSS_PREFIX}" && echo Using ${AR} | tee -a configure.log
66 test -n "${CROSS_PREFIX}" && echo Using ${RANLIB} | tee -a configure.log
143 echo "** $0 aborting." | tee -a configure.log
157 echo 'usage:' | tee -a configure.log
158 echo ' configure [--prefix=PREFIX] [--eprefix=EXPREFIX]' | tee -a configure.log
159 …echo ' [--static] [--32] [--64] [--libdir=LIBDIR] [--sharedlibdir=LIBDIR]' | tee -a configure.l…
160 … echo ' [--includedir=INCLUDEDIR] [--archs="-arch i386 -arch x86_64"]' | tee -a configure.log
161 …echo ' [--sprefix=SYMBOL_PREFIX] Adds a prefix to all exported symbols' | tee -a configure.log
162 echo ' [--warn] Enables extra compiler warnings' | tee -a configure.log
[all …]
/aosp_15_r20/external/rust/android-crates-io/crates/libz-sys/src/zlib/
Dconfigure51 test -n "${CROSS_PREFIX}" && echo Using ${AR} | tee -a configure.log
54 test -n "${CROSS_PREFIX}" && echo Using ${AR} | tee -a configure.log
59 test -n "${CROSS_PREFIX}" && echo Using ${RANLIB} | tee -a configure.log
65 test -n "${CROSS_PREFIX}" && echo Using ${NM} | tee -a configure.log
99 echo "** $0 aborting." | tee -a configure.log
113 echo 'usage:' | tee -a configure.log
114 …echo ' configure [--const] [--zprefix] [--prefix=PREFIX] [--eprefix=EXPREFIX]' | tee -a configur…
115 echo ' [--static] [--64] [--libdir=LIBDIR] [--sharedlibdir=LIBDIR]' | tee -a configure.log
116 … echo ' [--includedir=INCLUDEDIR] [--archs="-arch i386 -arch x86_64"]' | tee -a configure.log
135 --sysconfdir=*) echo "ignored option: --sysconfdir" | tee -a configure.log; shift ;;
[all …]
/aosp_15_r20/external/python/cpython2/Modules/zlib/
Dconfigure51 test -n "${CROSS_PREFIX}" && echo Using ${AR} | tee -a configure.log
54 test -n "${CROSS_PREFIX}" && echo Using ${AR} | tee -a configure.log
59 test -n "${CROSS_PREFIX}" && echo Using ${RANLIB} | tee -a configure.log
65 test -n "${CROSS_PREFIX}" && echo Using ${NM} | tee -a configure.log
99 echo "** $0 aborting." | tee -a configure.log
113 echo 'usage:' | tee -a configure.log
114 …echo ' configure [--const] [--zprefix] [--prefix=PREFIX] [--eprefix=EXPREFIX]' | tee -a configur…
115 echo ' [--static] [--64] [--libdir=LIBDIR] [--sharedlibdir=LIBDIR]' | tee -a configure.log
116 … echo ' [--includedir=INCLUDEDIR] [--archs="-arch i386 -arch x86_64"]' | tee -a configure.log
135 --sysconfdir=*) echo "ignored option: --sysconfdir" | tee -a configure.log; shift ;;
[all …]
/aosp_15_r20/external/libva/va/
H A Dva_prot.h92 * facilitate isolated communicaiton with TEE.
94 * to TEE direct communication to perform various TEE centric operations
96 * TEE for other usages, providing TEE capabilities etc.
99 * TEE/GPU/Display for HWDRM playback.
101 * The difference between Protected Content and Protected TEE Communication
103 * point for TEE and invokes TEE only from HWDRM perspective.
115 * Execution Environment (TEE) to prepare client platform or system for DRM
117 * instructed in DRM standard) and client system TEE. The communication between
118 * provisioning servers and client system TEE uses asymmetic cryptographic
123 * servers and TEE using asymmetic cryptographic mechanism. At end of this step,
[all …]
/aosp_15_r20/frameworks/av/services/audioflinger/afutils/
H A DNBAIO_Tee.h37 * enable by ro.debuggable and af.tee properties.
55 * 2) Once a Tee dumps data, it is considered "emptied" and new data
56 * needs to be written before another Tee file is generated.
57 * 3) Tee file format is
69 * 1) MixerThreads will tee at the FastMixer output (if it has one) or at the
71 * 2) DuplicatingThreads do not tee any mixed data. Apply a tee on the downstream OutputTrack
73 * 3) DirectThreads and OffloadThreads with SpdifStreamOut will tee IEC61937 wrapped data.
78 * 1) RecordTracks and playback Tracks tee as data is being written to or
81 * playback may not show any Tee data depending on when it is released.
87 /* TEE_FLAG is used in set() and must match the flags for the af.tee property
[all …]
/aosp_15_r20/device/linaro/poplar/sepolicy/
Dtee.te2 domain_auto_trans(shell, tee_exec, tee);
7 allow tee console_device:chr_file { getattr read write ioctl };
8 allow tee shell:fd { use };
10 ## allow tee tee_data_file:dir { create rmdir rename };
11 #allow tee system_data_file:file { append }; #write open
12 allow tee system_data_file:dir { getattr }; # open write
13 allow tee vendor_data_file:dir { getattr open write add_name create};
14 allow tee vendor_data_file:file { getattr write open read create append };
17 allow tee tee:tcp_socket { create connect read write getopt setopt };
18 allow tee tee:udp_socket { create connect read write getopt getattr };
[all …]
/aosp_15_r20/external/apache-commons-io/src/test/java/org/apache/commons/io/input/
H A DTeeReaderTest.java46 private Reader tee; field in TeeReaderTest
52 tee = new TeeReader(input, output); in setUp()
93 assertEquals('a', tee.read()); in testMarkReset()
94 tee.mark(1); in testMarkReset()
95 assertEquals('b', tee.read()); in testMarkReset()
96 tee.reset(); in testMarkReset()
97 assertEquals('b', tee.read()); in testMarkReset()
98 assertEquals('c', tee.read()); in testMarkReset()
99 assertEquals(-1, tee.read()); in testMarkReset()
105 assertEquals('a', tee.read()); in testReadEverything()
[all …]
H A DTeeInputStreamTest.java45 private InputStream tee; field in TeeInputStreamTest
53 tee = new TeeInputStream(input, output); in setUp()
94 assertEquals('a', tee.read()); in testMarkReset()
95 tee.mark(1); in testMarkReset()
96 assertEquals('b', tee.read()); in testMarkReset()
97 tee.reset(); in testMarkReset()
98 assertEquals('b', tee.read()); in testMarkReset()
99 assertEquals('c', tee.read()); in testMarkReset()
100 assertEquals(-1, tee.read()); in testMarkReset()
106 assertEquals('a', tee.read()); in testReadEverything()
[all …]
/aosp_15_r20/external/linux-kselftest/tools/testing/selftests/rcutorture/bin/
H A Dkvm-remote.sh80 echo | tee -a "$oldrun/remote-log"
81 echo " ----" kvm.sh output: "(`date`)" | tee -a "$oldrun/remote-log"
82 cat $T/kvm.sh.out | tee -a "$oldrun/remote-log"
89 echo $scriptname: kvm-again.sh failed exit code $? | tee -a "$oldrun/remote-log"
90 cat $T/kvm-again.sh.out | tee -a "$oldrun/remote-log"
107 echo $scriptname: kvm-again.sh failed exit code $? | tee -a "$oldrun/remote-log"
108 cat $T/kvm-again.sh.out | tee -a "$oldrun/remote-log"
114 echo | tee -a "$oldrun/remote-log"
115 echo " ----" kvm-again.sh output: "(`date`)" | tee -a "$oldrun/remote-log"
117 echo | tee -a "$oldrun/remote-log"
[all …]
H A Dtorture.sh213 echo " --- " $scriptname $args | tee -a $T/log
214 echo " --- Results directory: " $ds | tee -a $T/log
224 echo " --- Zero time for rcutorture, disabling" | tee -a $T/log
236 echo " --- Zero time for locktorture, disabling" | tee -a $T/log
248 echo " --- Zero time for scftorture, disabling" | tee -a $T/log
268 echo " --- $curflavor:" Start `date` | tee -a $T/log
279 cat $T/$curflavor.out | tee -a $T/log
280 echo retcode=$retcode | tee -a $T/log
326 echo " --- allmodconfig:" Start `date` | tee -a $T/log
423 echo " --- " Done `date` | tee -a $T/log
[all …]
/aosp_15_r20/external/coreboot/src/security/intel/txt/
H A Dramstage.c35 printk(BIOS_INFO, "TEE-TXT: IBB Hash 0x"); in log_ibb_measurements()
101 printk(BIOS_INFO, "TEE-TXT: Wiping TEE...\n"); in check_secrets_txt()
129 printk(BIOS_INFO, "TEE-TXT: Initializing TEE...\n"); in init_intel_txt()
141 printk(BIOS_INFO, "TEE-TXT: Validate TEE...\n"); in init_intel_txt()
144 printk(BIOS_ERR, "TEE-TXT: Failed to prepare TXT environment\n"); in init_intel_txt()
151 printk(BIOS_ERR, "TEE-TXT: Fatal BIOS ACM error reported\n"); in init_intel_txt()
156 printk(BIOS_INFO, "TEE-TXT: Testing BIOS ACM calling code...\n"); in init_intel_txt()
166 "TEE-TXT: Error calling BIOS ACM with NOP function.\n"); in init_intel_txt()
172 printk(BIOS_INFO, "TEE-TXT: Logging IBB measurements...\n"); in init_intel_txt()
178 printk(BIOS_INFO, "TEE-TXT: Scheck...\n"); in init_intel_txt()
[all …]
H A Dcommon.c210 printk(BIOS_ERR, "TEE-TXT: BIOS ACM doesn't fit into AC execution region\n"); in validate_acm()
247 printk(BIOS_ERR, "TEE-TXT: Couldn't locate BIOS ACM in CBFS.\n"); in intel_txt_prepare_bios_acm()
257 printk(BIOS_ERR, "TEE-TXT: BIOS ACM isn't mapped at page boundary.\n"); in intel_txt_prepare_bios_acm()
268 printk(BIOS_ERR, "TEE-TXT: BIOS ACM size isn't multiple of 64.\n"); in intel_txt_prepare_bios_acm()
278 printk(BIOS_ERR, "TEE-TXT: BIOS ACM isn't aligned to its size.\n"); in intel_txt_prepare_bios_acm()
289 printk(BIOS_ERR, "TEE-TXT: Not enough MTRRs to cache this BIOS ACM's size.\n"); in intel_txt_prepare_bios_acm()
299 printk(BIOS_ERR, "TEE-TXT: Validation of ACM failed with: %d\n", ret); in intel_txt_prepare_bios_acm()
333 printk(BIOS_ALERT, "TEE-TXT: Invoking SCLEAN. This can take several minutes.\n"); in intel_txt_run_sclean()
343 printk(BIOS_CRIT, "TEE-TXT: getsec_sclean could not launch the BIOS ACM.\n"); in intel_txt_run_sclean()
369 printk(BIOS_ERR, "TEE-TXT: FATAL ACM launch error !\n"); in intel_txt_run_bios_acm()
[all …]
/aosp_15_r20/external/arm-trusted-firmware/docs/plat/
H A Dwarp7.rst12 BootROM --> TF-A BL2 --> BL32(OP-TEE) --> BL33(U-Boot) --> Linux
14 In the WaRP7 port we encapsulate OP-TEE, DTB and U-Boot into a FIP. This FIP is
36 OP-TEE
39 https://github.com/OP-TEE/optee_os.git
56 - tee-header_v2.bin
57 - tee-pager_v2.bin
58 - tee-pageable_v2.bin
68 cp /path/to/optee/out/arm-plat-imx/core/tee-header_v2.bin fiptool_images
69 cp /path/to/optee/out/arm-plat-imx/core/tee-pager_v2.bin fiptool_images
70 cp /path/to/optee/out/arm-plat-imx/core/tee-pageable_v2.bin fiptool_images
[all …]
H A Dstm32mp1.rst44 inside the FIP binary: BL32 (SP_min or OP-TEE), U-Boot and their respective
102 or if Op-TEE is used:
104 ROM code -> BL2 (compiled with BL2_AT_EL3) -> OP-TEE -> BL33 (U-Boot)
120 You need to build BL2, BL32 (SP_min or OP-TEE) and BL33 (U-Boot) before building FIP binary.
131 OP-TEE (optional)
143 If you choose not to use OP-TEE, you can use TF-A SP_min.
163 This BL2 is independent of the BL32 used (SP_min or OP-TEE)
179 With OP-TEE:
188 BL32=<optee_directory>/tee-header_v2.bin \
189 BL32_EXTRA1=<optee_directory>/tee-pager_v2.bin
[all …]
/aosp_15_r20/external/trusty/arm-trusted-firmware/docs/plat/
Dwarp7.rst12 BootROM --> TF-A BL2 --> BL32(OP-TEE) --> BL33(U-Boot) --> Linux
14 In the WaRP7 port we encapsulate OP-TEE, DTB and U-Boot into a FIP. This FIP is
36 OP-TEE
39 https://github.com/OP-TEE/optee_os.git
56 - tee-header_v2.bin
57 - tee-pager_v2.bin
58 - tee-pageable_v2.bin
68 cp /path/to/optee/out/arm-plat-imx/core/tee-header_v2.bin fiptool_images
69 cp /path/to/optee/out/arm-plat-imx/core/tee-pager_v2.bin fiptool_images
70 cp /path/to/optee/out/arm-plat-imx/core/tee-pageable_v2.bin fiptool_images
[all …]
/aosp_15_r20/external/guice/core/test/com/google/inject/
H A DPerformanceComparison.java75 RootBeanDefinition tee = new RootBeanDefinition(TeeImpl.class, true);
76 tee.setLazyInit(true);
79 tee.setConstructorArgumentValues(teeValues);
83 barValues.addGenericArgumentValue(new RuntimeBeanReference("tee"));
97 beanFactory.registerBeanDefinition("tee", tee);
118 bind(Tee.class).to(TeeImpl.class);
139 final Tee tee = new TeeImpl("test");
146 Bar bar = new BarImpl(tee, 5);
147 Bar copy = new BarImpl(tee, 5);
254 Tee getTee(); in getTee()
[all …]
/aosp_15_r20/external/cpuinfo/test/dmesg/
H A Dgalaxy-a8-2018.log1791 [ 1.383135] [7: swapper/0: 1] Trustonic TEE: mobicore_init: MobiCore mcDrvModuleApi ver…
1792 [ 1.383316] [7: swapper/0: 1] Trustonic TEE: mobicore_probe: MobiCore t-base-EXYNOS64-A…
1793 [ 1.383649] [7: swapper/0: 1] Trustonic TEE: __mc_switch_core: <- cpu=0x00000001, activ…
1795 [ 1.383709] [0: tee_fastcall: 1733] Trustonic TEE: mc_exec_core_switch: CoreSwap ok 0 -> 1
3504 [ 3.322667] [4: kworker/4:1: 1964] Trustonic TEE: mtk|*** Trustonic TEE MTK, Build: Jul 26 2…
3505 [ 3.322689] [4: kworker/4:1: 1964] Trustonic TEE: mtk|MTK: t-base-EXYNOS64-Android-400A-V012…
3507 [ 3.323481] [5: mcDriverDaemon: 2786] Trustonic TEE: mobicore_start:
3518 [ 3.323569] [5: mcDriverDaemon: 2786] Trustonic TEE: mobicore_start: SWd uses LPAE MMU table fo…
3519 [ 3.324985] [5: mcDriverDaemon: 2786] Trustonic TEE: admin_open: daemon connection open, TGID 2…
3524 [ 3.432355] [2: kworker/2:1: 1963] Trustonic TEE: 601|TA SPT2 : Starting.
[all …]
H A Dgalaxy-s8-global.log302 [ 1.088975] [5: swapper/0: 1] Trustonic TEE: mobicore_init: MobiCore mcDrvModuleApi ver…
303 [ 1.089096] [5: swapper/0: 1] Trustonic TEE: mobicore_probe: MobiCore t-base-EXYNOS64-A…
304 [ 1.089281] [5: swapper/0: 1] Trustonic TEE: __mc_switch_core: <- cpu=0x00000001, activ…
306 [ 1.089346] [0: tee_fastcall: 1730] Trustonic TEE: mc_exec_core_switch: CoreSwap ok 0 -> 1
2574 [ 2.419006] [6: kworker/6:1: 1254] Trustonic TEE: mtk|*** Trustonic TEE MTK, Build: Feb 3 2…
2575 [ 2.419018] [6: kworker/6:1: 1254] Trustonic TEE: mtk|MTK: t-base-EXYNOS64-Android-400A-V011…
2576 [ 2.421585] [5: mcDriverDaemon: 3130] Trustonic TEE: mobicore_start:
2587 [ 2.421655] [5: mcDriverDaemon: 3130] Trustonic TEE: mobicore_start: SWd uses LPAE MMU table fo…
2588 [ 2.422124] [3: mcDriverDaemon: 3130] Trustonic TEE: admin_open: daemon connection open, TGID 3…
2589 [ 2.527368] [0: kworker/0:1: 1275] Trustonic TEE: 601|TA SPT2 : Starting.
[all …]
H A Dgalaxy-j7-prime.log452 [ 4.564337] [6: mcDriverDaemon: 2117] [c6] Trustonic TEE: admin_open: opened by PID(2117), name…
453 [ 4.564551] [0: kworker/0:2: 1239] [c0] Trustonic TEE: *** <t MTK, Build: May 5 2016, 21:33…
454 [ 4.564568] [0: kworker/0:2: 1239] [c0] Trustonic TEE: t-base-EXYNOS64-Android-310B-V007-201…
455 [ 4.565875] [1: mcDriverDaemon: 2117] [c1] Trustonic TEE: mobicore_start:
465 [ 4.565999] [1: mcDriverDaemon: 2117] [c1] Trustonic TEE: mobicore_start: SWd uses LPAE MMU tab…
466 [ 4.567271] [7: mcDriverDaemon: 2117] [c7] Trustonic TEE: admin_open: admin connection open, PI…
488 [ 4.678027] [3: kworker/3:1: 1479] [c3] Trustonic TEE: 501|SEC_DRIVER_2.0_2016.03.10
489 [ 4.703853] [3: kworker/3:1: 1479] [c3] Trustonic TEE: 601|drTima: starting main driver thre…
490 [ 4.703873] [3: kworker/3:1: 1479] [c3] Trustonic TEE: 601|SCRYPTO DRV [INFO]: OpenSSL prema…
491 [ 4.703887] [3: kworker/3:1: 1479] [c3] Trustonic TEE: 601|SCRYPTO DRV [INFO]: Embedded …
[all …]
/aosp_15_r20/hardware/interfaces/security/keymint/aidl/vts/functional/
H A DSecureElementProvisioningTest.cpp175 // TEE is required in TEST_F()
183 GTEST_SKIP() << "Test not applicable to device with no TEE KeyMint device"; in TEST_F()
185 auto tee = keymints_.find(SecurityLevel::TRUSTED_ENVIRONMENT)->second; in TEST_F() local
187 if (AidlVersion(tee) < 2) { in TEST_F()
188 GTEST_SKIP() << "Test not applicable to TEE KeyMint device before v2"; in TEST_F()
195 Status result = tee->getRootOfTrust(challenge1, &rootOfTrust1); in TEST_F()
200 result = tee->getRootOfTrust(challenge2, &rootOfTrust2); in TEST_F()
206 result = tee->getRootOfTrust(challenge1, &rootOfTrust3); in TEST_F()
213 GTEST_SKIP() << "Test not applicable to device with no TEE KeyMint device"; in TEST_F()
215 auto tee = keymints_.find(SecurityLevel::TRUSTED_ENVIRONMENT)->second; in TEST_F() local
[all …]
/aosp_15_r20/external/trusty/arm-trusted-firmware/docs/components/spd/
Doptee-dispatcher.rst1 OP-TEE Dispatcher
4 `OP-TEE OS`_ is a Trusted OS running as Secure EL1.
6 To build and execute OP-TEE follow the instructions at
7 `OP-TEE build.git`_
9 There are two different modes for loading the OP-TEE OS. The default mode will
11 platforms to use. There is also another technique that will load OP-TEE OS after
13 specifically added for ChromeOS. Loading OP-TEE via an SMC call may be insecure
18 used by the TEE become accessible. The firmware then verifies the signature of
20 dm-verity. The SMC call to load OP-TEE is then invoked immediately after the
24 OP-TEE is loaded.
[all …]
/aosp_15_r20/tools/test/connectivity/acts/framework/tests/controllers/monsoon_lib/sampling/engine/
Dtransformers_test.py24 from acts.controllers.monsoon_lib.sampling.engine.transformers import Tee
32 """Unit tests the transformers.Tee class."""
38 Tee(expected_filename).on_begin()
44 tee = Tee('foo')
45 tee.on_begin()
47 tee.on_end()
53 tee = Tee('foo')
54 tee.on_begin()
61 tee._transform_buffer([
85 tee = PerfgateTee('foo')
[all …]
/aosp_15_r20/system/sepolicy/vendor/
H A Dtee.te2 # trusted execution environment (tee) daemon
5 init_daemon_domain(tee)
7 allow tee self:global_capability_class_set { dac_override };
8 allow tee tee_device:chr_file rw_file_perms;
9 allow tee tee_data_file:dir create_dir_perms;
10 allow tee tee_data_file:file create_file_perms;
11 allow tee self:netlink_socket create_socket_perms_no_ioctl;
12 allow tee self:netlink_generic_socket create_socket_perms_no_ioctl;
13 allow tee ion_device:chr_file r_file_perms;
14 r_dir_file(tee, sysfs_type)
[all …]
/aosp_15_r20/device/google/zuma-sepolicy/vendor/
Dtee.te2 wakelock_use(tee)
4 allow tee persist_ss_file:file create_file_perms;
5 allow tee persist_ss_file:dir create_dir_perms;
6 allow tee persist_file:dir r_dir_perms;
7 allow tee mnt_vendor_file:dir r_dir_perms;
8 allow tee tee_data_file:dir rw_dir_perms;
9 allow tee tee_data_file:lnk_file r_file_perms;
10 allow tee tee_persist_block_device:blk_file rw_file_perms;
11 allow tee block_device:dir search;
16 allow tee persist_ss_file:lnk_file read;
[all …]
/aosp_15_r20/external/kernel-headers/original/uapi/linux/
H A Dtee.h35 * This file describes the API provided by a TEE driver to user space.
37 * Each TEE driver defines a TEE specific protocol which is used for the
47 #define TEE_GEN_CAP_GP (1 << 0)/* GlobalPlatform compliant TEE */
55 * TEE Implementation ID
62 * OP-TEE specific capabilities
67 * struct tee_ioctl_version_data - TEE version
68 * @impl_id: [out] TEE implementation id
72 * Identifies the TEE implementation, @impl_id is one of TEE_IMPL_ID_* above.
83 * TEE_IOC_VERSION - query version of TEE
85 * Takes a tee_ioctl_version_data struct and returns with the TEE version
[all …]

12345678910>>...81