/system/security/keystore/tests/ |
H A D | auth_token_table_test.cpp | 110 const hw_auth_token_t* found; local 112 ASSERT_EQ(AuthTokenTable::OK, table.FindAuthorization(make_set(1), 0, &found)); 113 EXPECT_EQ(1U, found->user_id); 114 EXPECT_EQ(2U, found->authenticator_id); 116 ASSERT_EQ(AuthTokenTable::OK, table.FindAuthorization(make_set(2), 0, &found)); 117 EXPECT_EQ(1U, found->user_id); 118 EXPECT_EQ(2U, found->authenticator_id); 120 ASSERT_EQ(AuthTokenTable::OK, table.FindAuthorization(make_set(3), 0, &found)); 121 EXPECT_EQ(3U, found->user_id); 122 EXPECT_EQ(4U, found 139 const hw_auth_token_t* found; local 158 const hw_auth_token_t* found; local 229 const hw_auth_token_t* found; local 238 const hw_auth_token_t* found; local 254 const hw_auth_token_t* found; local 264 const hw_auth_token_t* found; local 273 const hw_auth_token_t* found; local 301 const hw_auth_token_t* found; local [all...] |
/system/bt/bta/mce/ |
H A D | bta_mce_act.c | 64 int found = 0; local 93 evt_data.mas[found].scn = pe.params[0]; 98 evt_data.mas[found].p_srv_name = (char *) p_attr->attr_value.v.array; 99 evt_data.mas[found].srv_name_len= SDP_DISC_ATTR_LEN(p_attr->attr_len_type); 104 evt_data.mas[found].instance_id = p_attr->attr_value.v.u8; 109 evt_data.mas[found].msg_type = p_attr->attr_value.v.u8; 111 found++; 112 } while (p_rec != NULL && found < BTA_MCE_MAX_MAS_INSTANCES); 114 evt_data.num_mas = found;
|
/system/bt/btcore/test/ |
H A D | counter_test.cpp | 34 bool found; member in struct:mycounter_t 41 mycounter->found = true; 52 mycounter.found = false; 55 if (mycounter.found)
|
/system/bt/bta/hl/ |
H A D | bta_hl_utils.c | 101 BOOLEAN found=FALSE; local 113 found = TRUE; 121 found = TRUE; 125 if (!found) 127 APPL_TRACE_DEBUG("bta_hl_find_sdp_idx_using_ctrl_psm found=%d sdp_idx=%d ctrl_psm=0x%x ", 128 found, *p_sdp_idx, ctrl_psm ); 131 return found; 327 ** Returns BOOLEAN TRUE - found 328 ** FALSE - not found 336 BOOLEAN found local 520 BOOLEAN found = FALSE; local 629 BOOLEAN found = FALSE; local 859 BOOLEAN found=FALSE; local 898 BOOLEAN found=FALSE; local 936 BOOLEAN found=FALSE; local 974 BOOLEAN found=FALSE; local 1013 BOOLEAN found=FALSE; local 1049 BOOLEAN found=FALSE; local 1085 BOOLEAN found=FALSE; local 1125 BOOLEAN found=FALSE; local 1168 BOOLEAN found=FALSE; local 1213 BOOLEAN found=FALSE; local 1307 BOOLEAN found = FALSE; local 1365 BOOLEAN found=FALSE; local 1461 BOOLEAN found=FALSE; local 1507 BOOLEAN found=FALSE, result=TRUE; local 1658 BOOLEAN found = FALSE; local 1786 BOOLEAN found =FALSE; local 2036 BOOLEAN found=FALSE; local 2075 BOOLEAN found=FALSE; local 2149 BOOLEAN found=FALSE; local 2522 BOOLEAN found=TRUE; local [all...] |
/system/security/keystore/ |
H A D | auth_token_table.cpp | 88 const hw_auth_token_t** found) { 99 return FindAuthPerOpAuthorization(key_sids, auth_type, op_handle, found); 101 return FindTimedAuthorization(key_sids, auth_type, key_info, found); 106 keymaster_operation_handle_t op_handle, const hw_auth_token_t** found) { 119 *found = matching_op->token(); 126 const hw_auth_token_t** found) { 142 *found = newest_match->token(); 168 auto found = find_if(entries_, [&](Entry& e) { return e.token()->challenge == op_handle; }); local 169 if (found == entries_.end()) 172 assert(!IsSupersededBySomeEntry(*found)); 85 FindAuthorization(const AuthorizationSet& key_info, keymaster_purpose_t purpose, keymaster_operation_handle_t op_handle, const hw_auth_token_t** found) argument 104 FindAuthPerOpAuthorization( const std::vector<uint64_t>& sids, hw_authenticator_type_t auth_type, keymaster_operation_handle_t op_handle, const hw_auth_token_t** found) argument 123 FindTimedAuthorization(const std::vector<uint64_t>& sids, hw_authenticator_type_t auth_type, const AuthorizationSet& key_info, const hw_auth_token_t** found) argument [all...] |
H A D | auth_token_table.h | 74 keymaster_operation_handle_t op_handle, const hw_auth_token_t** found); 88 const hw_auth_token_t** found) { 89 return FindAuthorization(AuthorizationSet(params, params_count), purpose, op_handle, found); 148 const hw_auth_token_t** found); 151 const AuthorizationSet& key_info, const hw_auth_token_t** found); 86 FindAuthorization(const keymaster_key_param_t* params, size_t params_count, keymaster_purpose_t purpose, keymaster_operation_handle_t op_handle, const hw_auth_token_t** found) argument
|
/system/bt/btif/co/ |
H A D | bta_gatts_co.c | 71 BOOLEAN found = FALSE; local 80 found = TRUE; 85 if (!found)
|
/system/core/base/ |
H A D | strings.cpp | 38 size_t found; local 40 found = s.find_first_of(delimiters, base); 41 result.push_back(s.substr(base, found - base)); 42 base = found + 1; 43 } while (found != s.npos);
|
/system/bt/btif/src/ |
H A D | btif_hl.c | 204 BOOLEAN found=FALSE; local 219 found = TRUE; 226 if (found) 229 BTIF_TRACE_DEBUG("%s found=%d channel_id=0x%08x", 230 __FUNCTION__, found, channel_id, *p_app_idx, *p_mcl_idx); 231 return found; 264 BTIF_TRACE_DEBUG("btif_hl_num_dchs: mcl handle found j =%d",j); 269 BTIF_TRACE_DEBUG("btif_hl_num_dchs_in_use:found x =%d",x); 387 BOOLEAN found=FALSE; local 396 found 584 BOOLEAN found = FALSE; local 1016 BOOLEAN found=FALSE; local 1060 BOOLEAN found=FALSE; local 1103 BOOLEAN found=FALSE; local 1142 BOOLEAN found=FALSE; local 1194 BOOLEAN found = FALSE; local 1264 BOOLEAN found =FALSE; local 1296 BOOLEAN found=FALSE; local 1433 BOOLEAN found = FALSE; local 1688 BOOLEAN found=FALSE; local 1719 BOOLEAN found=FALSE; local 1752 BOOLEAN found=FALSE; local 1791 BOOLEAN found=FALSE; local 1835 BOOLEAN found=FALSE; local 1897 BOOLEAN found=FALSE; local 1972 BOOLEAN found=FALSE; local 2001 BOOLEAN found=FALSE; local 2034 BOOLEAN found=FALSE; local 2062 BOOLEAN found=FALSE; local 2088 BOOLEAN found = FALSE; local 4550 BOOLEAN found= FALSE; local [all...] |
/system/core/logd/ |
H A D | LogReader.cpp | 148 bool found() { return startTimeSet; } function in class:LogFindStart 154 if (!logFindStart.found()) {
|
/system/extras/perfprofd/quipper/original-kernel-headers/tools/perf/util/include/linux/ |
H A D | bitops.h | 102 goto found; 112 found:
|
/system/bt/stack/include/ |
H A D | a2d_api.h | 126 typedef void (tA2D_FIND_CBACK)(BOOLEAN found, tA2D_Service * p_service); 176 ** returned for the first service record found on the
|
/system/bt/stack/a2dp/ |
H A D | a2d_api.c | 58 BOOLEAN found = FALSE; local 66 /* loop through all records we found */ 69 /* get next record; if none found, we're done */ 108 found = TRUE; 118 (*a2d_cb.find.p_cback)(found, &a2d_svc); 240 ** returned for the first service record found on the
|
/system/bt/stack/avct/ |
H A D | avct_lcb.c | 277 ** Returns pointer to the lcb, or NULL if none found. 296 /* if no lcb found */ 353 BOOLEAN found = FALSE; local 367 found = TRUE; 373 if (!found) 393 ** Returns pointer to the lcb, or NULL if none found. 426 ** Returns Pointer to CCB if PID found, NULL otherwise.
|
/system/vold/ |
H A D | MoveTask.cpp | 68 bool found = false; local 75 found = true; 78 return found ? OK : -1;
|
/system/bt/stack/gatt/ |
H A D | gatt_main.c | 201 ** Returns TRUE: if connection found and to be disconnected; otherwise 255 BOOLEAN found=FALSE; local 268 found = TRUE; 277 if (!found && is_add) 284 found = TRUE; 290 GATT_TRACE_DEBUG("gatt_update_app_hold_link_status found=%d[1-found] idx=%d gatt_if=%d is_add=%d", found, i, gatt_if, is_add);
|
H A D | gatt_db.c | 1028 BOOLEAN found = FALSE; local 1031 return found; 1042 found = TRUE; 1048 found = TRUE; 1050 /* else attr not found */ 1051 if ( found) 1054 return found;
|
H A D | gatt_utils.c | 162 GATT_TRACE_DEBUG ("found a srv_chg clt"); 181 ** Returns Pointer to the found new service changed item othwerwise NULL 705 ** Returns TRUE if found 712 BOOLEAN found = FALSE; local 722 found = TRUE; 728 GATT_TRACE_DEBUG("gatt_find_the_connected_bda found=%d found_idx=%d", found, i); 729 return found; 779 ** Returns pointer to the found elemenet otherwise NULL 809 ** Returns GATT_INDEX_INVALID if not found 1988 BOOLEAN found= FALSE; local [all...] |
/system/bt/stack/btm/ |
H A D | btm_dev.c | 68 BOOLEAN found = FALSE; local 126 found = TRUE; 130 if (found) 183 ** Returns TRUE if removed OK, FALSE if not found or ACL link is active 255 BTM_TRACE_EVENT ("btm_sec_alloc_dev old device found"); 380 BTM_TRACE_DEBUG("btm_dev_support_switch return TRUE (feature found)");
|
/system/bt/bta/gatt/ |
H A D | bta_gattc_utils.c | 228 APPL_TRACE_DEBUG("bta_gattc_clcb_alloc: found clcb[%d] available",i_clcb); 261 ** Description find or allocate CLCB if not found. 392 BOOLEAN found = FALSE; local 399 found = TRUE; 408 /* if not found, try to recycle one known device */ 409 if (!found && !p_recycle) 411 else if (!found && p_recycle) 827 APPL_TRACE_DEBUG("bta_gattc_conn_alloc: found conn_track[%d] available",i_conn); 856 APPL_TRACE_DEBUG("bta_gattc_conn_find: found conn_track[%d] matched",i_conn);
|
/system/core/adf/libadf/ |
H A D | adf.c | 796 bool found = false; local 799 found = adf_find_simple_post_overlay_engine(dev, formats, n_formats, 801 if (found) { 808 if (!found)
|
/system/extras/f2fs_utils/ |
H A D | f2fs_sparseblock.c | 308 SLOGE("Valid Checkpoint not found!!"); 490 unsigned int used, found, started = 0, i; local 505 found = 0; 509 found = 1; 515 if (!found) {
|
/system/core/logcat/ |
H A D | logcat.cpp | 423 bool found = false; local 443 found = true; 447 if (!dp->d_name[len] && found) { 682 /* on the kernel command line. If something is found, it extracts a log filter */ 683 /* and uses it to run the program. If nothing is found, the program should */ 716 /* if nothing found or invalid filters, exit quietly */
|
/system/extras/perfprofd/tests/ |
H A D | perfprofd_test.cc | 104 auto found = s.find_last_of("/"); local 105 test_dir = s.substr(0,found); 287 std::cerr << testpoint << ": expected result not found\n"; 475 W: line 10: line malformed (no '=' found)
|
/system/bt/doc/ |
H A D | power_management.md | 99 are found for the given profile ID and app ID, the function simply
|