/aosp_15_r20/external/rust/android-crates-io/crates/libz-sys/src/zlib-ng/ |
D | configure | 58 test -n "${CROSS_PREFIX}" && echo Using ${AR} | tee -a configure.log 61 test -n "${CROSS_PREFIX}" && echo Using ${AR} | tee -a configure.log 66 test -n "${CROSS_PREFIX}" && echo Using ${RANLIB} | tee -a configure.log 143 echo "** $0 aborting." | tee -a configure.log 157 echo 'usage:' | tee -a configure.log 158 echo ' configure [--prefix=PREFIX] [--eprefix=EXPREFIX]' | tee -a configure.log 159 …echo ' [--static] [--32] [--64] [--libdir=LIBDIR] [--sharedlibdir=LIBDIR]' | tee -a configure.l… 160 … echo ' [--includedir=INCLUDEDIR] [--archs="-arch i386 -arch x86_64"]' | tee -a configure.log 161 …echo ' [--sprefix=SYMBOL_PREFIX] Adds a prefix to all exported symbols' | tee -a configure.log 162 echo ' [--warn] Enables extra compiler warnings' | tee -a configure.log [all …]
|
/aosp_15_r20/external/rust/android-crates-io/crates/libz-sys/src/zlib/ |
D | configure | 51 test -n "${CROSS_PREFIX}" && echo Using ${AR} | tee -a configure.log 54 test -n "${CROSS_PREFIX}" && echo Using ${AR} | tee -a configure.log 59 test -n "${CROSS_PREFIX}" && echo Using ${RANLIB} | tee -a configure.log 65 test -n "${CROSS_PREFIX}" && echo Using ${NM} | tee -a configure.log 99 echo "** $0 aborting." | tee -a configure.log 113 echo 'usage:' | tee -a configure.log 114 …echo ' configure [--const] [--zprefix] [--prefix=PREFIX] [--eprefix=EXPREFIX]' | tee -a configur… 115 echo ' [--static] [--64] [--libdir=LIBDIR] [--sharedlibdir=LIBDIR]' | tee -a configure.log 116 … echo ' [--includedir=INCLUDEDIR] [--archs="-arch i386 -arch x86_64"]' | tee -a configure.log 135 --sysconfdir=*) echo "ignored option: --sysconfdir" | tee -a configure.log; shift ;; [all …]
|
/aosp_15_r20/external/python/cpython2/Modules/zlib/ |
D | configure | 51 test -n "${CROSS_PREFIX}" && echo Using ${AR} | tee -a configure.log 54 test -n "${CROSS_PREFIX}" && echo Using ${AR} | tee -a configure.log 59 test -n "${CROSS_PREFIX}" && echo Using ${RANLIB} | tee -a configure.log 65 test -n "${CROSS_PREFIX}" && echo Using ${NM} | tee -a configure.log 99 echo "** $0 aborting." | tee -a configure.log 113 echo 'usage:' | tee -a configure.log 114 …echo ' configure [--const] [--zprefix] [--prefix=PREFIX] [--eprefix=EXPREFIX]' | tee -a configur… 115 echo ' [--static] [--64] [--libdir=LIBDIR] [--sharedlibdir=LIBDIR]' | tee -a configure.log 116 … echo ' [--includedir=INCLUDEDIR] [--archs="-arch i386 -arch x86_64"]' | tee -a configure.log 135 --sysconfdir=*) echo "ignored option: --sysconfdir" | tee -a configure.log; shift ;; [all …]
|
/aosp_15_r20/external/libva/va/ |
H A D | va_prot.h | 92 * facilitate isolated communicaiton with TEE. 94 * to TEE direct communication to perform various TEE centric operations 96 * TEE for other usages, providing TEE capabilities etc. 99 * TEE/GPU/Display for HWDRM playback. 101 * The difference between Protected Content and Protected TEE Communication 103 * point for TEE and invokes TEE only from HWDRM perspective. 115 * Execution Environment (TEE) to prepare client platform or system for DRM 117 * instructed in DRM standard) and client system TEE. The communication between 118 * provisioning servers and client system TEE uses asymmetic cryptographic 123 * servers and TEE using asymmetic cryptographic mechanism. At end of this step, [all …]
|
/aosp_15_r20/frameworks/av/services/audioflinger/afutils/ |
H A D | NBAIO_Tee.h | 37 * enable by ro.debuggable and af.tee properties. 55 * 2) Once a Tee dumps data, it is considered "emptied" and new data 56 * needs to be written before another Tee file is generated. 57 * 3) Tee file format is 69 * 1) MixerThreads will tee at the FastMixer output (if it has one) or at the 71 * 2) DuplicatingThreads do not tee any mixed data. Apply a tee on the downstream OutputTrack 73 * 3) DirectThreads and OffloadThreads with SpdifStreamOut will tee IEC61937 wrapped data. 78 * 1) RecordTracks and playback Tracks tee as data is being written to or 81 * playback may not show any Tee data depending on when it is released. 87 /* TEE_FLAG is used in set() and must match the flags for the af.tee property [all …]
|
/aosp_15_r20/device/linaro/poplar/sepolicy/ |
D | tee.te | 2 domain_auto_trans(shell, tee_exec, tee); 7 allow tee console_device:chr_file { getattr read write ioctl }; 8 allow tee shell:fd { use }; 10 ## allow tee tee_data_file:dir { create rmdir rename }; 11 #allow tee system_data_file:file { append }; #write open 12 allow tee system_data_file:dir { getattr }; # open write 13 allow tee vendor_data_file:dir { getattr open write add_name create}; 14 allow tee vendor_data_file:file { getattr write open read create append }; 17 allow tee tee:tcp_socket { create connect read write getopt setopt }; 18 allow tee tee:udp_socket { create connect read write getopt getattr }; [all …]
|
/aosp_15_r20/external/apache-commons-io/src/test/java/org/apache/commons/io/input/ |
H A D | TeeReaderTest.java | 46 private Reader tee; field in TeeReaderTest 52 tee = new TeeReader(input, output); in setUp() 93 assertEquals('a', tee.read()); in testMarkReset() 94 tee.mark(1); in testMarkReset() 95 assertEquals('b', tee.read()); in testMarkReset() 96 tee.reset(); in testMarkReset() 97 assertEquals('b', tee.read()); in testMarkReset() 98 assertEquals('c', tee.read()); in testMarkReset() 99 assertEquals(-1, tee.read()); in testMarkReset() 105 assertEquals('a', tee.read()); in testReadEverything() [all …]
|
H A D | TeeInputStreamTest.java | 45 private InputStream tee; field in TeeInputStreamTest 53 tee = new TeeInputStream(input, output); in setUp() 94 assertEquals('a', tee.read()); in testMarkReset() 95 tee.mark(1); in testMarkReset() 96 assertEquals('b', tee.read()); in testMarkReset() 97 tee.reset(); in testMarkReset() 98 assertEquals('b', tee.read()); in testMarkReset() 99 assertEquals('c', tee.read()); in testMarkReset() 100 assertEquals(-1, tee.read()); in testMarkReset() 106 assertEquals('a', tee.read()); in testReadEverything() [all …]
|
/aosp_15_r20/external/linux-kselftest/tools/testing/selftests/rcutorture/bin/ |
H A D | kvm-remote.sh | 80 echo | tee -a "$oldrun/remote-log" 81 echo " ----" kvm.sh output: "(`date`)" | tee -a "$oldrun/remote-log" 82 cat $T/kvm.sh.out | tee -a "$oldrun/remote-log" 89 echo $scriptname: kvm-again.sh failed exit code $? | tee -a "$oldrun/remote-log" 90 cat $T/kvm-again.sh.out | tee -a "$oldrun/remote-log" 107 echo $scriptname: kvm-again.sh failed exit code $? | tee -a "$oldrun/remote-log" 108 cat $T/kvm-again.sh.out | tee -a "$oldrun/remote-log" 114 echo | tee -a "$oldrun/remote-log" 115 echo " ----" kvm-again.sh output: "(`date`)" | tee -a "$oldrun/remote-log" 117 echo | tee -a "$oldrun/remote-log" [all …]
|
H A D | torture.sh | 213 echo " --- " $scriptname $args | tee -a $T/log 214 echo " --- Results directory: " $ds | tee -a $T/log 224 echo " --- Zero time for rcutorture, disabling" | tee -a $T/log 236 echo " --- Zero time for locktorture, disabling" | tee -a $T/log 248 echo " --- Zero time for scftorture, disabling" | tee -a $T/log 268 echo " --- $curflavor:" Start `date` | tee -a $T/log 279 cat $T/$curflavor.out | tee -a $T/log 280 echo retcode=$retcode | tee -a $T/log 326 echo " --- allmodconfig:" Start `date` | tee -a $T/log 423 echo " --- " Done `date` | tee -a $T/log [all …]
|
/aosp_15_r20/external/coreboot/src/security/intel/txt/ |
H A D | ramstage.c | 35 printk(BIOS_INFO, "TEE-TXT: IBB Hash 0x"); in log_ibb_measurements() 101 printk(BIOS_INFO, "TEE-TXT: Wiping TEE...\n"); in check_secrets_txt() 129 printk(BIOS_INFO, "TEE-TXT: Initializing TEE...\n"); in init_intel_txt() 141 printk(BIOS_INFO, "TEE-TXT: Validate TEE...\n"); in init_intel_txt() 144 printk(BIOS_ERR, "TEE-TXT: Failed to prepare TXT environment\n"); in init_intel_txt() 151 printk(BIOS_ERR, "TEE-TXT: Fatal BIOS ACM error reported\n"); in init_intel_txt() 156 printk(BIOS_INFO, "TEE-TXT: Testing BIOS ACM calling code...\n"); in init_intel_txt() 166 "TEE-TXT: Error calling BIOS ACM with NOP function.\n"); in init_intel_txt() 172 printk(BIOS_INFO, "TEE-TXT: Logging IBB measurements...\n"); in init_intel_txt() 178 printk(BIOS_INFO, "TEE-TXT: Scheck...\n"); in init_intel_txt() [all …]
|
H A D | common.c | 210 printk(BIOS_ERR, "TEE-TXT: BIOS ACM doesn't fit into AC execution region\n"); in validate_acm() 247 printk(BIOS_ERR, "TEE-TXT: Couldn't locate BIOS ACM in CBFS.\n"); in intel_txt_prepare_bios_acm() 257 printk(BIOS_ERR, "TEE-TXT: BIOS ACM isn't mapped at page boundary.\n"); in intel_txt_prepare_bios_acm() 268 printk(BIOS_ERR, "TEE-TXT: BIOS ACM size isn't multiple of 64.\n"); in intel_txt_prepare_bios_acm() 278 printk(BIOS_ERR, "TEE-TXT: BIOS ACM isn't aligned to its size.\n"); in intel_txt_prepare_bios_acm() 289 printk(BIOS_ERR, "TEE-TXT: Not enough MTRRs to cache this BIOS ACM's size.\n"); in intel_txt_prepare_bios_acm() 299 printk(BIOS_ERR, "TEE-TXT: Validation of ACM failed with: %d\n", ret); in intel_txt_prepare_bios_acm() 333 printk(BIOS_ALERT, "TEE-TXT: Invoking SCLEAN. This can take several minutes.\n"); in intel_txt_run_sclean() 343 printk(BIOS_CRIT, "TEE-TXT: getsec_sclean could not launch the BIOS ACM.\n"); in intel_txt_run_sclean() 369 printk(BIOS_ERR, "TEE-TXT: FATAL ACM launch error !\n"); in intel_txt_run_bios_acm() [all …]
|
/aosp_15_r20/external/arm-trusted-firmware/docs/plat/ |
H A D | warp7.rst | 12 BootROM --> TF-A BL2 --> BL32(OP-TEE) --> BL33(U-Boot) --> Linux 14 In the WaRP7 port we encapsulate OP-TEE, DTB and U-Boot into a FIP. This FIP is 36 OP-TEE 39 https://github.com/OP-TEE/optee_os.git 56 - tee-header_v2.bin 57 - tee-pager_v2.bin 58 - tee-pageable_v2.bin 68 cp /path/to/optee/out/arm-plat-imx/core/tee-header_v2.bin fiptool_images 69 cp /path/to/optee/out/arm-plat-imx/core/tee-pager_v2.bin fiptool_images 70 cp /path/to/optee/out/arm-plat-imx/core/tee-pageable_v2.bin fiptool_images [all …]
|
H A D | stm32mp1.rst | 44 inside the FIP binary: BL32 (SP_min or OP-TEE), U-Boot and their respective 102 or if Op-TEE is used: 104 ROM code -> BL2 (compiled with BL2_AT_EL3) -> OP-TEE -> BL33 (U-Boot) 120 You need to build BL2, BL32 (SP_min or OP-TEE) and BL33 (U-Boot) before building FIP binary. 131 OP-TEE (optional) 143 If you choose not to use OP-TEE, you can use TF-A SP_min. 163 This BL2 is independent of the BL32 used (SP_min or OP-TEE) 179 With OP-TEE: 188 BL32=<optee_directory>/tee-header_v2.bin \ 189 BL32_EXTRA1=<optee_directory>/tee-pager_v2.bin [all …]
|
/aosp_15_r20/external/trusty/arm-trusted-firmware/docs/plat/ |
D | warp7.rst | 12 BootROM --> TF-A BL2 --> BL32(OP-TEE) --> BL33(U-Boot) --> Linux 14 In the WaRP7 port we encapsulate OP-TEE, DTB and U-Boot into a FIP. This FIP is 36 OP-TEE 39 https://github.com/OP-TEE/optee_os.git 56 - tee-header_v2.bin 57 - tee-pager_v2.bin 58 - tee-pageable_v2.bin 68 cp /path/to/optee/out/arm-plat-imx/core/tee-header_v2.bin fiptool_images 69 cp /path/to/optee/out/arm-plat-imx/core/tee-pager_v2.bin fiptool_images 70 cp /path/to/optee/out/arm-plat-imx/core/tee-pageable_v2.bin fiptool_images [all …]
|
/aosp_15_r20/external/guice/core/test/com/google/inject/ |
H A D | PerformanceComparison.java | 75 RootBeanDefinition tee = new RootBeanDefinition(TeeImpl.class, true); 76 tee.setLazyInit(true); 79 tee.setConstructorArgumentValues(teeValues); 83 barValues.addGenericArgumentValue(new RuntimeBeanReference("tee")); 97 beanFactory.registerBeanDefinition("tee", tee); 118 bind(Tee.class).to(TeeImpl.class); 139 final Tee tee = new TeeImpl("test"); 146 Bar bar = new BarImpl(tee, 5); 147 Bar copy = new BarImpl(tee, 5); 254 Tee getTee(); in getTee() [all …]
|
/aosp_15_r20/external/cpuinfo/test/dmesg/ |
H A D | galaxy-a8-2018.log | 1791 [ 1.383135] [7: swapper/0: 1] Trustonic TEE: mobicore_init: MobiCore mcDrvModuleApi ver… 1792 [ 1.383316] [7: swapper/0: 1] Trustonic TEE: mobicore_probe: MobiCore t-base-EXYNOS64-A… 1793 [ 1.383649] [7: swapper/0: 1] Trustonic TEE: __mc_switch_core: <- cpu=0x00000001, activ… 1795 [ 1.383709] [0: tee_fastcall: 1733] Trustonic TEE: mc_exec_core_switch: CoreSwap ok 0 -> 1 3504 [ 3.322667] [4: kworker/4:1: 1964] Trustonic TEE: mtk|*** Trustonic TEE MTK, Build: Jul 26 2… 3505 [ 3.322689] [4: kworker/4:1: 1964] Trustonic TEE: mtk|MTK: t-base-EXYNOS64-Android-400A-V012… 3507 [ 3.323481] [5: mcDriverDaemon: 2786] Trustonic TEE: mobicore_start: 3518 [ 3.323569] [5: mcDriverDaemon: 2786] Trustonic TEE: mobicore_start: SWd uses LPAE MMU table fo… 3519 [ 3.324985] [5: mcDriverDaemon: 2786] Trustonic TEE: admin_open: daemon connection open, TGID 2… 3524 [ 3.432355] [2: kworker/2:1: 1963] Trustonic TEE: 601|TA SPT2 : Starting. [all …]
|
H A D | galaxy-s8-global.log | 302 [ 1.088975] [5: swapper/0: 1] Trustonic TEE: mobicore_init: MobiCore mcDrvModuleApi ver… 303 [ 1.089096] [5: swapper/0: 1] Trustonic TEE: mobicore_probe: MobiCore t-base-EXYNOS64-A… 304 [ 1.089281] [5: swapper/0: 1] Trustonic TEE: __mc_switch_core: <- cpu=0x00000001, activ… 306 [ 1.089346] [0: tee_fastcall: 1730] Trustonic TEE: mc_exec_core_switch: CoreSwap ok 0 -> 1 2574 [ 2.419006] [6: kworker/6:1: 1254] Trustonic TEE: mtk|*** Trustonic TEE MTK, Build: Feb 3 2… 2575 [ 2.419018] [6: kworker/6:1: 1254] Trustonic TEE: mtk|MTK: t-base-EXYNOS64-Android-400A-V011… 2576 [ 2.421585] [5: mcDriverDaemon: 3130] Trustonic TEE: mobicore_start: 2587 [ 2.421655] [5: mcDriverDaemon: 3130] Trustonic TEE: mobicore_start: SWd uses LPAE MMU table fo… 2588 [ 2.422124] [3: mcDriverDaemon: 3130] Trustonic TEE: admin_open: daemon connection open, TGID 3… 2589 [ 2.527368] [0: kworker/0:1: 1275] Trustonic TEE: 601|TA SPT2 : Starting. [all …]
|
H A D | galaxy-j7-prime.log | 452 [ 4.564337] [6: mcDriverDaemon: 2117] [c6] Trustonic TEE: admin_open: opened by PID(2117), name… 453 [ 4.564551] [0: kworker/0:2: 1239] [c0] Trustonic TEE: *** <t MTK, Build: May 5 2016, 21:33… 454 [ 4.564568] [0: kworker/0:2: 1239] [c0] Trustonic TEE: t-base-EXYNOS64-Android-310B-V007-201… 455 [ 4.565875] [1: mcDriverDaemon: 2117] [c1] Trustonic TEE: mobicore_start: 465 [ 4.565999] [1: mcDriverDaemon: 2117] [c1] Trustonic TEE: mobicore_start: SWd uses LPAE MMU tab… 466 [ 4.567271] [7: mcDriverDaemon: 2117] [c7] Trustonic TEE: admin_open: admin connection open, PI… 488 [ 4.678027] [3: kworker/3:1: 1479] [c3] Trustonic TEE: 501|SEC_DRIVER_2.0_2016.03.10 489 [ 4.703853] [3: kworker/3:1: 1479] [c3] Trustonic TEE: 601|drTima: starting main driver thre… 490 [ 4.703873] [3: kworker/3:1: 1479] [c3] Trustonic TEE: 601|SCRYPTO DRV [INFO]: OpenSSL prema… 491 [ 4.703887] [3: kworker/3:1: 1479] [c3] Trustonic TEE: 601|SCRYPTO DRV [INFO]: Embedded … [all …]
|
/aosp_15_r20/hardware/interfaces/security/keymint/aidl/vts/functional/ |
H A D | SecureElementProvisioningTest.cpp | 175 // TEE is required in TEST_F() 183 GTEST_SKIP() << "Test not applicable to device with no TEE KeyMint device"; in TEST_F() 185 auto tee = keymints_.find(SecurityLevel::TRUSTED_ENVIRONMENT)->second; in TEST_F() local 187 if (AidlVersion(tee) < 2) { in TEST_F() 188 GTEST_SKIP() << "Test not applicable to TEE KeyMint device before v2"; in TEST_F() 195 Status result = tee->getRootOfTrust(challenge1, &rootOfTrust1); in TEST_F() 200 result = tee->getRootOfTrust(challenge2, &rootOfTrust2); in TEST_F() 206 result = tee->getRootOfTrust(challenge1, &rootOfTrust3); in TEST_F() 213 GTEST_SKIP() << "Test not applicable to device with no TEE KeyMint device"; in TEST_F() 215 auto tee = keymints_.find(SecurityLevel::TRUSTED_ENVIRONMENT)->second; in TEST_F() local [all …]
|
/aosp_15_r20/external/trusty/arm-trusted-firmware/docs/components/spd/ |
D | optee-dispatcher.rst | 1 OP-TEE Dispatcher 4 `OP-TEE OS`_ is a Trusted OS running as Secure EL1. 6 To build and execute OP-TEE follow the instructions at 7 `OP-TEE build.git`_ 9 There are two different modes for loading the OP-TEE OS. The default mode will 11 platforms to use. There is also another technique that will load OP-TEE OS after 13 specifically added for ChromeOS. Loading OP-TEE via an SMC call may be insecure 18 used by the TEE become accessible. The firmware then verifies the signature of 20 dm-verity. The SMC call to load OP-TEE is then invoked immediately after the 24 OP-TEE is loaded. [all …]
|
/aosp_15_r20/tools/test/connectivity/acts/framework/tests/controllers/monsoon_lib/sampling/engine/ |
D | transformers_test.py | 24 from acts.controllers.monsoon_lib.sampling.engine.transformers import Tee 32 """Unit tests the transformers.Tee class.""" 38 Tee(expected_filename).on_begin() 44 tee = Tee('foo') 45 tee.on_begin() 47 tee.on_end() 53 tee = Tee('foo') 54 tee.on_begin() 61 tee._transform_buffer([ 85 tee = PerfgateTee('foo') [all …]
|
/aosp_15_r20/system/sepolicy/vendor/ |
H A D | tee.te | 2 # trusted execution environment (tee) daemon 5 init_daemon_domain(tee) 7 allow tee self:global_capability_class_set { dac_override }; 8 allow tee tee_device:chr_file rw_file_perms; 9 allow tee tee_data_file:dir create_dir_perms; 10 allow tee tee_data_file:file create_file_perms; 11 allow tee self:netlink_socket create_socket_perms_no_ioctl; 12 allow tee self:netlink_generic_socket create_socket_perms_no_ioctl; 13 allow tee ion_device:chr_file r_file_perms; 14 r_dir_file(tee, sysfs_type) [all …]
|
/aosp_15_r20/device/google/zuma-sepolicy/vendor/ |
D | tee.te | 2 wakelock_use(tee) 4 allow tee persist_ss_file:file create_file_perms; 5 allow tee persist_ss_file:dir create_dir_perms; 6 allow tee persist_file:dir r_dir_perms; 7 allow tee mnt_vendor_file:dir r_dir_perms; 8 allow tee tee_data_file:dir rw_dir_perms; 9 allow tee tee_data_file:lnk_file r_file_perms; 10 allow tee tee_persist_block_device:blk_file rw_file_perms; 11 allow tee block_device:dir search; 16 allow tee persist_ss_file:lnk_file read; [all …]
|
/aosp_15_r20/external/kernel-headers/original/uapi/linux/ |
H A D | tee.h | 35 * This file describes the API provided by a TEE driver to user space. 37 * Each TEE driver defines a TEE specific protocol which is used for the 47 #define TEE_GEN_CAP_GP (1 << 0)/* GlobalPlatform compliant TEE */ 55 * TEE Implementation ID 62 * OP-TEE specific capabilities 67 * struct tee_ioctl_version_data - TEE version 68 * @impl_id: [out] TEE implementation id 72 * Identifies the TEE implementation, @impl_id is one of TEE_IMPL_ID_* above. 83 * TEE_IOC_VERSION - query version of TEE 85 * Takes a tee_ioctl_version_data struct and returns with the TEE version [all …]
|