/system/core/include/utils/ |
H A D | Trace.h | 47 inline ScopedTrace(uint64_t tag, const char* name) argument 48 : mTag(tag) {
|
/system/core/libutils/ |
H A D | Log.cpp | 24 LogIfSlow::LogIfSlow(const char* tag, android_LogPriority priority, argument 26 mTag(tag), mPriority(priority), mTimeoutMillis(timeoutMillis), mMessage(message),
|
/system/core/init/ |
H A D | log.cpp | 26 static const char* tag = basename(getprogname()); local 29 snprintf(prefix, sizeof(prefix), "<%d>%s: ", level, tag);
|
/system/core/toolbox/ |
H A D | log.c | 82 fprintf(stderr, "USAGE: %s [-p priorityChar] [-t tag] message\n", s); 93 const char *tag = "log"; local 110 tag = optarg; 141 __android_log_print(priority, tag, "%s", buffer);
|
/system/keymaster/ |
H A D | auth_encrypted_key_blob.cpp | 33 const Buffer& nonce, const Buffer& tag, 36 encrypted_key_material.SerializedSize() + tag.SerializedSize() + 48 buf = tag.Serialize(buf, end); 61 Buffer* tag) { 66 if (!nonce->reserve(OCB_NONCE_LENGTH) || !tag->reserve(OCB_TAG_LENGTH)) 71 !copy_from_buf(buf_ptr, end, tag->peek_write(), OCB_TAG_LENGTH) || 77 if (!nonce->advance_write(OCB_NONCE_LENGTH) || !tag->advance_write(OCB_TAG_LENGTH)) 86 Buffer* tag) { 101 !tag->Deserialize(buf_ptr, end) || tag 29 SerializeAuthEncryptedBlob(const KeymasterKeyBlob& encrypted_key_material, const AuthorizationSet& hw_enforced, const AuthorizationSet& sw_enforced, const Buffer& nonce, const Buffer& tag, KeymasterKeyBlob* key_blob) argument 57 DeserializeUnversionedBlob(const KeymasterKeyBlob& key_blob, KeymasterKeyBlob* encrypted_key_material, AuthorizationSet* hw_enforced, AuthorizationSet* sw_enforced, Buffer* nonce, Buffer* tag) argument 82 DeserializeAuthEncryptedBlob(const KeymasterKeyBlob& key_blob, KeymasterKeyBlob* encrypted_key_material, AuthorizationSet* hw_enforced, AuthorizationSet* sw_enforced, Buffer* nonce, Buffer* tag) argument [all...] |
H A D | ocb_utils.cpp | 122 KeymasterKeyBlob* ciphertext, Buffer* tag) { 123 assert(ciphertext && tag); 143 tag->peek_write(), 1 /* final */); 148 if (!tag->advance_write(OCB_TAG_LENGTH)) 158 const Buffer& tag, KeymasterKeyBlob* plaintext) { 161 if (nonce.available_read() != OCB_NONCE_LENGTH || tag.available_read() != OCB_TAG_LENGTH) 179 tag.peek_read(), 1 /* final */); 184 LOG_E("Failed to validate authentication tag during key decryption", 0); 118 OcbEncryptKey(const AuthorizationSet& hw_enforced, const AuthorizationSet& sw_enforced, const AuthorizationSet& hidden, const KeymasterKeyBlob& master_key, const KeymasterKeyBlob& plaintext, const Buffer& nonce, KeymasterKeyBlob* ciphertext, Buffer* tag) argument 154 OcbDecryptKey(const AuthorizationSet& hw_enforced, const AuthorizationSet& sw_enforced, const AuthorizationSet& hidden, const KeymasterKeyBlob& master_key, const KeymasterKeyBlob& ciphertext, const Buffer& nonce, const Buffer& tag, KeymasterKeyBlob* plaintext) argument
|
/system/extras/perfprofd/tests/ |
H A D | perfprofdmockutils.cc | 65 void perfprofd_mocklog(const char *tag, const char *fmt, va_list ap) argument 68 strcpy(buffer, tag); 69 vsnprintf(buffer+strlen(tag), LMAX, fmt, ap);
|
/system/core/debuggerd/test/ |
H A D | log_fake.cpp | 47 extern "C" int __android_log_buf_write(int, int, const char* tag, const char* msg) { argument 48 g_fake_log_buf += tag; 54 extern "C" int __android_log_print(int, const char* tag, const char* fmt, ...) { argument 55 g_fake_log_print += tag;
|
/system/core/include/log/ |
H A D | logprint.h | 53 const char * tag; member in struct:AndroidLogEntry_t 101 * and tag, and 0 if it should not 104 AndroidLogFormat *p_format, const char *tag, android_LogPriority pri); 120 * If "map" is non-NULL, it will be used to convert the log tag number
|
/system/core/include/private/ |
H A D | android_logger.h | 46 int32_t tag; // Little Endian Order member in struct:__anon1336
|
/system/core/liblog/ |
H A D | log_is_loggable.c | 54 static int __android_log_level(const char *tag, int def) argument 57 static const char log_namespace[] = "persist.log.tag."; 60 const size_t taglen = (tag && *tag) ? strlen(tag) : 0; 68 * log.tag.<tag> 69 * persist.log.tag.<tag> 70 * log.tag 174 __android_log_is_loggable(int prio, const char *tag, int def) argument [all...] |
H A D | event_tag_map.c | 45 /* array of event tags, sorted numerically by tag index */ 54 static int scanTagLine(char** pData, EventTag* tag, int lineNum); 61 * We create a private mapping because we want to terminate the log tag 124 * The entries are sorted by tag number, so we can do a binary search. 126 const char* android_lookupEventTag(const EventTagMap* map, int tag) argument 137 cmp = map->tagArray[mid].tagIndex - tag; 139 /* tag is bigger */ 142 /* tag is smaller */ 164 * Determine whether "c" is a valid tag char. 184 * Crunch through the file, parsing the contents and creating a tag inde 331 scanTagLine(char** pData, EventTag* tag, int lineNum) argument [all...] |
H A D | logd_write.c | 187 * uint32_t tag 216 buffer.header.tag = htole32(LIBLOG_LOG_TAG); 358 int __android_log_write(int prio, const char *tag, const char *msg) argument 360 return __android_log_buf_write(LOG_ID_MAIN, prio, tag, msg); 363 int __android_log_buf_write(int bufID, int prio, const char *tag, const char *msg) argument 368 if (!tag) 369 tag = ""; 373 (!strcmp(tag, "HTC_RIL") || 374 !strncmp(tag, "RIL", 3) || /* Any log tag wit 404 __android_log_vprint(int prio, const char *tag, const char *fmt, va_list ap) argument 413 __android_log_print(int prio, const char *tag, const char *fmt, ...) argument 425 __android_log_buf_print(int bufID, int prio, const char *tag, const char *fmt, ...) argument 437 __android_log_assert(const char *cond, const char *tag, const char *fmt, ...) argument 463 __android_log_bwrite(int32_t tag, const void *payload, size_t len) argument 480 __android_log_btwrite(int32_t tag, char type, const void *payload, size_t len) argument 499 __android_log_bswrite(int32_t tag, const char *payload) argument [all...] |
H A D | logd_write_kern.c | 140 int __android_log_write(int prio, const char *tag, const char *msg) argument 142 return __android_log_buf_write(LOG_ID_MAIN, prio, tag, msg); 145 int __android_log_buf_write(int bufID, int prio, const char *tag, const char *msg) argument 150 if (!tag) 151 tag = ""; 155 (!strcmp(tag, "HTC_RIL") || 156 !strncmp(tag, "RIL", 3) || /* Any log tag with "RIL" as the prefix */ 157 !strncmp(tag, "IMS", 3) || /* Any log tag wit 184 __android_log_vprint(int prio, const char *tag, const char *fmt, va_list ap) argument 193 __android_log_print(int prio, const char *tag, const char *fmt, ...) argument 205 __android_log_buf_print(int bufID, int prio, const char *tag, const char *fmt, ...) argument 217 __android_log_assert(const char *cond, const char *tag, const char *fmt, ...) argument 243 __android_log_bwrite(int32_t tag, const void *payload, size_t len) argument 260 __android_log_btwrite(int32_t tag, char type, const void *payload, size_t len) argument 279 __android_log_bswrite(int32_t tag, const char *payload) argument [all...] |
/system/keymaster/include/keymaster/ |
H A D | keymaster_tags.h | 25 * example, it's an error to create a keymaster_param_t with tag == KM_TAG_PURPOSE and then to 32 * TypedTag and TypedEnumTag. These classes are templated on a tag type and a tag value, and in the 34 * keymaster tag, associating the tag type with the tag, and an instance of each specialization is 35 * created, and named the same as the keymaster tag, but with the KM_ prefix omitted. Because the 40 * particular tag. This enables template functions to be written that check that the correct 41 * parameter type is used for a given tag, and that use the correct union entry for the tag typ 213 Authorization(TypedTag<KM_BOOL, Tag> tag) argument 218 Authorization(TypedTag<KM_UINT, Tag> tag, uint32_t value) argument 223 Authorization(TypedTag<KM_UINT_REP, Tag> tag, uint32_t value) argument 228 Authorization(TypedTag<KM_ULONG, Tag> tag, uint64_t value) argument 233 Authorization(TypedTag<KM_ULONG_REP, Tag> tag, uint64_t value) argument 238 Authorization(TypedTag<KM_DATE, Tag> tag, uint64_t value) argument 243 Authorization(TypedTag<KM_BYTES, Tag> tag, const void* bytes, size_t bytes_len) argument 249 Authorization(TypedTag<KM_BYTES, Tag> tag, const keymaster_blob_t& blob) argument 255 Authorization(TypedTag<KM_BIGNUM, Tag> tag, const void* bytes, size_t bytes_len) argument 261 Authorization(TypedTag<KM_BIGNUM, Tag> tag, const keymaster_blob_t& blob) argument 267 Authorization(TypedEnumTag<KM_ENUM, Tag, KeymasterEnum> tag, KeymasterEnum value) argument 273 Authorization(TypedEnumTag<KM_ENUM_REP, Tag, KeymasterEnum> tag, KeymasterEnum value) argument [all...] |
/system/core/libcutils/ |
H A D | qtaguid.c | 100 int qtaguid_tagSocket(int sockfd, int tag, uid_t uid) { argument 103 uint64_t kTag = ((uint64_t)tag << 32); 109 ALOGV("Tagging socket %d with tag %" PRIx64 "{%u,0} for uid %d", sockfd, kTag, tag, uid); 113 ALOGI("Tagging socket %d with tag %" PRIx64 "(%d) for uid %d failed errno=%d", 114 sockfd, kTag, tag, uid, res); 146 int qtaguid_deleteTagData(int tag, uid_t uid) { argument 149 uint64_t kTag = (uint64_t)tag << 32; 151 ALOGV("Deleting tag data with tag [all...] |
/system/core/logd/ |
H A D | LogBufferElement.cpp | 57 return le32toh(reinterpret_cast<android_event_header_t *>(mMsg)->tag); 107 static const char tag[] = "chatty"; local 109 if (!__android_log_is_loggable(ANDROID_LOG_INFO, tag, ANDROID_LOG_VERBOSE)) { 161 hdrLen = 1 + sizeof(tag); 175 e->header.tag = htole32(LOGD_LOG_TAG); 181 strcpy(buffer + 1, tag);
|
H A D | LogStatistics.cpp | 88 uint32_t tag = e->getTag(); local 89 if (tag) { 90 tagTable.add(tag, e); 113 uint32_t tag = e->getTag(); local 114 if (tag) { 115 tagTable.subtract(tag, e);
|
H A D | main.cpp | 256 // tagToName converts an events tag into a name 257 const char *android::tagToName(uint32_t tag) { argument 270 return android_lookupEventTag(map, tag);
|
/system/media/camera/include/system/ |
H A D | camera_metadata.h | 83 uint32_t tag; member in struct:camera_metadata_entry 102 uint32_t tag; member in struct:camera_metadata_ro_entry 134 * an integer tag to identify its meaning, 'type' and 'count' field, and the 142 * entries with the same tag are allowed. The packet will not dynamically resize 330 * left to add the entry, or if the tag is unknown. data_count is the number of 331 * entries in the data array of the tag's type, not a count of 341 uint32_t tag, 380 * Find an entry with given tag value. If not found, returns -ENOENT. Otherwise, 383 * If multiple entries with the same tag exist, does not have any guarantees on 389 uint32_t tag, [all...] |
/system/media/camera/src/ |
H A D | camera_metadata_tag_info.c | 21 * maintaining the tag info. 694 int camera_metadata_enum_snprint(uint32_t tag, argument 701 switch(tag) {
|
/system/core/base/ |
H A D | logging.cpp | 105 void LogdLogger::operator()(LogId id, LogSeverity severity, const char* tag, argument 116 __android_log_buf_print(lg_id, priority, tag, "%s:%u] %s", file, line, 119 __android_log_buf_print(lg_id, priority, tag, "%s", message); 150 // "tag-pattern:[vdiwefs]" 289 const char* tag = ProgramInvocationName(); local 291 gLogger(id, severity, tag, file, line, message);
|
/system/core/include/cutils/ |
H A D | trace.h | 36 * following ATRACE_TAG_* macros. The trace tag is used to filter tracing in 51 #define ATRACE_TAG_NEVER 0 // This tag is never enabled. 52 #define ATRACE_TAG_ALWAYS (1<<0) // This tag is always enabled. 157 * Test if a given tag is currently enabled. 158 * Returns nonzero if the tag is enabled, otherwise zero. 162 static inline uint64_t atrace_is_tag_enabled(uint64_t tag) argument 164 return atrace_get_enabled_tags() & tag; 172 static inline void atrace_begin(uint64_t tag, const char* name) argument 174 if (CC_UNLIKELY(atrace_is_tag_enabled(tag))) { 185 static inline void atrace_end(uint64_t tag) argument 202 atrace_async_begin(uint64_t tag, const char* name, int32_t cookie) argument 216 atrace_async_end(uint64_t tag, const char* name, int32_t cookie) argument 229 atrace_int(uint64_t tag, const char* name, int32_t value) argument 242 atrace_int64(uint64_t tag, const char* name, int64_t value) argument [all...] |
/system/extras/tests/iptables/qtaguid/ |
H A D | socketTag.cpp | 43 int setup(uint64_t tag); 44 bool checkTag(uint64_t tag, uid_t uid); 101 int SockInfo::setup(uint64_t tag) { argument 107 if (doCtrlCommand("t %d %" PRIu64, fd, tag) < 0) { 108 testPrintE("socket setup: failed to tag"); 112 if (!checkTag(tag, getuid())) { 113 testPrintE("socket setup: Unexpected results: tag not found"); 128 * tag + uid. But it is not fool proof. 129 * Without the kernel reporting more info on who setup the socket tag, it is 131 * Returns: true if tag foun 267 uint64_t tag = valid_tag2 + ((uint64_t)cnt << 32); local [all...] |
/system/extras/tests/lib/testUtil/ |
H A D | testUtil.c | 162 // Set tag used while logging to the logcat error interface 163 void testSetLogCatTag(const char *tag) argument 165 logCatTag = tag; 168 // Obtain pointer to current log to logcat error interface tag
|