/frameworks/opt/telephony/src/java/com/android/internal/telephony/uicc/ |
IccIoResult.java | 37 switch(sw2) { 50 if (sw2 >> 4 == 0x0C) { 54 switch(sw2) { 60 switch(sw2) { 66 switch(sw2) { 72 switch(sw2) { 81 switch(sw2) { 87 switch(sw2) { 94 switch(sw2) { 107 switch(sw2) { 174 public int sw2; field in class:IccIoResult [all...] |
/external/annotation-tools/asmx/test/conform/org/objectweb/asm/attrs/ |
StackMapTableAttributeTest.java | 70 StringWriter sw2 = new StringWriter(); local 72 ClassVisitor cv2 = new TraceClassVisitor(new PrintWriter(sw2)); 75 assertEquals("different data", sw1.toString(), sw2.toString());
|
StackMapTableAttributeTest.class | |
/external/libese/libapdu/include/apdu/ |
apdu.h | 86 uint8_t sw2() const { return *(std::end(mData) - 1); } function in class:android::ResponseApdu 87 uint16_t status() const { return (static_cast<uint16_t>(sw1()) << 8) | sw2(); } 89 int8_t remainingBytes() const { return sw1() == BYTES_AVAILABLE ? sw2() : 0; }
|
/hardware/nxp/secure_element/1.0/ |
SecureElement.cpp | 207 uint8_t sw2 = rspApdu.p_data[rspApdu.len - 1]; local 210 if (sw1 == 0x90 && sw2 == 0x00) { 217 else if (sw1 == 0x6A && sw2 == 0x82) { 221 else if (sw1 == 0x6A && sw2 == 0x86) { 283 uint8_t sw2 = rspApdu.p_data[rspApdu.len - 1]; local 286 if ((sw1 == 0x90) && (sw2 == 0x00)) { 298 else if (sw1 == 0x6A && sw2 == 0x82) { 302 else if (sw1 == 0x6A && sw2 == 0x86) {
|
/system/keymaster/tests/ |
key_blob_test.cpp | 113 AuthorizationSet sw2; local 115 ASSERT_EQ(KM_ERROR_OK, DeserializeAuthEncryptedBlob(serialized_blob_, &ciphertext_, &hw2, &sw2, 118 OcbDecryptKey(hw2, sw2, hidden_, master_key_, ciphertext_, nonce_, tag_, &plaintext); 121 EXPECT_EQ(sw_enforced_, sw2);
|
/external/annotation-tools/asmx/test/conform/org/objectweb/asm/ |
AbstractTest.class | |
AbstractTest.java | 126 StringWriter sw2 = new StringWriter(); local 128 ClassVisitor cv2 = new TraceClassVisitor(new PrintWriter(sw2)); 132 String s2 = sw2.toString();
|
/external/apache-harmony/sql/src/test/java/org/apache/harmony/sql/tests/java/sql/ |
SQLWarningTest.java | 323 SQLWarning sw2 = new SQLWarning("reason", "SQLState", 2); local 332 sw.setNextWarning(sw2); 333 assertSame(sw2, sw1.getNextException()); 334 assertSame(sw2, sw1.getNextWarning()); 337 assertSame(sw3, sw2.getNextException()); 338 assertSame(sw3, sw2.getNextWarning());
|
/external/valgrind/coregrind/m_debuginfo/ |
d3basics.c | 516 Word sw1, sw2; local [all...] |
/frameworks/opt/telephony/src/java/com/android/internal/telephony/gsm/ |
UsimDataDownloadHandler.java | 197 * UICC SW1 and SW2 status bytes. 201 int sw2 = response.sw2; local 204 if ((sw1 == 0x90 && sw2 == 0x00) || sw1 == 0x91) { 207 } else if (sw1 == 0x93 && sw2 == 0x00) { 215 Rlog.e(TAG, "Unexpected SW1/SW2 response from UICC: " + response.toString());
|
/packages/apps/SecureElement/src/com/android/se/ |
Channel.java | 177 int sw2 = bufferSelectResponse[bufferSelectResponse.length - 1] & 0xFF; local 178 int sw = (sw1 << 8) | sw2; 263 * first data byte, ... , last data byte, sw1, sw2
|
Terminal.java | 309 int sw2 = selectResponse[selectResponse.length - 1] & 0xFF; local 310 if (sw1 != 0x90 || sw2 != 0x00) { 511 int sw2 = rsp[rsp.length - 1] & 0xFF; local 519 cmd[0], (byte) 0xC0, 0x00, 0x00, (byte) sw2 527 sw2 = rsp[rsp.length - 1] & 0xFF;
|
/system/nfc/src/nfc/include/ |
rw_api.h | 200 uint8_t sw2; member in struct:__anon3633 [all...] |
/device/google/cuttlefish_common/guest/hals/ril/ |
vsoc_ril.cpp | 1694 uint8_t sw2; member in struct:SimFileResponse [all...] |
/hardware/ril/include/telephony/ |
ril.h | 659 int sw2; member in struct:__anon52681 [all...] |
/external/annotation-tools/annotation-file-utilities/lib/ |
asm-5.0.jar | |
/external/robolectric/v3/runtime/ |
android-all-5.0.0_r2-robolectric-1.jar | |
android-all-5.1.1_r9-robolectric-1.jar | |
android-all-4.4_r1-robolectric-1.jar | |
/prebuilts/misc/common/robolectric/android-all/ |
android-all-5.0.0_r2-robolectric-1.jar | |
android-all-5.1.1_r9-robolectric-1.jar | |
android-all-6.0.0_r1-robolectric-0.jar | |
android-all-4.4_r1-robolectric-1.jar | |