/system/core/libpixelflinger/ |
H A D | pixelflinger.cpp | 358 GGLenum pname, const GGLfixed* params) 367 ggl_texEnvi(con, target, pname, params[0]); 371 const GGLclampx r = gglClampx(params[0]); 372 const GGLclampx g = gglClampx(params[1]); 373 const GGLclampx b = gglClampx(params[2]); 374 const GGLclampx a = gglClampx(params[3]); 357 ggl_texEnvxv(void* con, GGLenum target, GGLenum pname, const GGLfixed* params) argument
|
/system/bt/stack/btm/ |
H A D | btm_ble.c | 91 /* update conn params, use default value for background connection params */ 1030 tBTM_RAND_ENC params; local 1031 UINT8 *p_dest = params.param_buf; 1035 memset(¶ms, 0, sizeof(tBTM_RAND_ENC)); 1041 STREAM_TO_UINT8(params.status, p); /* command status */ 1043 if (params.status == HCI_SUCCESS) 1045 params.opcode = op_code; 1048 params.param_len = BT_OCTET8_LEN; 1050 params [all...] |
/system/core/lmkd/ |
H A D | lmkd.c | 283 static void cmd_target(int ntargets, int *params) { argument 290 lowmem_minfree[i] = ntohl(*params++); 291 lowmem_adj[i] = ntohl(*params++);
|
/system/keymaster/include/keymaster/ |
H A D | authorization_set.h | 63 Reinitialize(set.params, set.length); 122 return Reinitialize(set.params, set.length); 455 // Define elems_ and elems_size_ as aliases to params and length, respectively. This is to 457 keymaster_key_param_t*& elems_ = keymaster_key_param_set_t::params;
|
/system/extras/ANRdaemon/ |
H A D | ANRdaemon.cpp | 130 const char *params = "cpu %lu %lu %lu %lu %lu %lu %lu %*d %*d %*d\n"; local 136 if (fscanf(fp, params, &cpu->utime, &cpu->ntime,
|
/system/connectivity/shill/wifi/ |
H A D | wifi_service_unittest.cc | 593 KeyValueStore params = service->GetSupplicantConfigurationParameters(); local 595 params.ContainsString(WPASupplicant::kNetworkPropertyEapIdentity)); 596 EXPECT_TRUE(params.ContainsString(WPASupplicant::kNetworkPropertyCaPath)); 689 KeyValueStore params = local 691 EXPECT_TRUE(params.ContainsString(WPASupplicant::kPropertySecurityProtocol)); 692 EXPECT_TRUE(params.ContainsString(WPASupplicant::kPropertyPreSharedKey)); 693 EXPECT_TRUE(params.ContainsUint(WPASupplicant::kNetworkPropertyIeee80211w)); 749 KeyValueStore params = local 752 params.ContainsString(WPASupplicant::kNetworkPropertyEapIdentity)); 753 EXPECT_TRUE(params [all...] |
H A D | wifi_unittest.cc | 2921 KeyValueStore params; local 2923 AppendBgscan(service.get(), ¶ms); 2925 EXPECT_FALSE(params.ContainsString(WPASupplicant::kNetworkPropertyBgscan)); 2929 KeyValueStore params; local 2931 AppendBgscan(service.get(), ¶ms); 2934 EXPECT_TRUE(params.ContainsString(WPASupplicant::kNetworkPropertyBgscan)); 2935 config_string = params.GetString(WPASupplicant::kNetworkPropertyBgscan); 2946 KeyValueStore params; local 2948 AppendBgscan(service.get(), ¶ms); 2950 EXPECT_TRUE(params 2962 KeyValueStore params; local [all...] |
/system/bt/btif/src/ |
H A D | btif_sock_sdp.c | 122 proto_list[1].params[0] = channel;
|
H A D | btif_gatt_client.c | 2127 extern bt_status_t btif_gattc_test_command_impl(int command, btgatt_test_params_t* params); 2129 static bt_status_t btif_gattc_test_command(int command, btgatt_test_params_t* params) argument 2131 return btif_gattc_test_command_impl(command, params);
|
/system/bt/stack/include/ |
H A D | sdp_api.h | 148 UINT16 params[SDP_MAX_PROTOCOL_PARAMS]; member in struct:__anon1201
|
/system/update_engine/ |
H A D | update_attempter.h | 123 // Returns the current status in the out params. Returns true on success. 306 // request params. 394 // based on the content of |params|. Otherwise, retries the policy request. 397 const chromeos_update_manager::UpdateCheckParams& params);
|
H A D | payload_state.cc | 550 OmahaRequestParams* params = system_state_->request_params(); local 553 } else if (params->delta_okay()) {
|
/system/netd/server/ |
H A D | CommandListener.cpp | 844 // "resolver setnetdns <netId> <domains> <dns1> [<dns2> ...] [--params <params>]" 850 __res_params params; local 852 if (end > 6 && !strcmp(argv[end - 2], "--params")) { 855 if (sscanf(paramsStr, "%hu %hhu %hhu %hhu", ¶ms.sample_validity, 856 ¶ms.success_threshold, ¶ms.min_samples, ¶ms.max_samples) != 4) { 859 paramsPtr = ¶ms;
|
/system/bt/stack/sdp/ |
H A D | sdp_db.c | 251 UINT8_TO_BE_STREAM (p, p_elem_list->params[yy]); 258 UINT16_TO_BE_STREAM (p, p_elem_list->params[yy]);
|
H A D | sdp_api.c | 756 p_elem->params[p_elem->num_params++] = p_sattr->attr_value.v.u16; 758 p_elem->params[p_elem->num_params++] = p_sattr->attr_value.v.u8;
|
/system/bt/bta/ag/ |
H A D | bta_ag_int.h | 311 BOOLEAN param_updated; /* if params were updated to non-default */ 312 tBTM_ESCO_PARAMS params; /* ESCO parameters */ member in struct:__anon28
|
/system/core/libpixelflinger/include/pixelflinger/ |
H A D | pixelflinger.h | 256 GGLenum pname, const GGLfixed* params);
|
/system/connectivity/shill/cellular/ |
H A D | cellular.cc | 1107 void Cellular::OnPPPConnected(const map<string, string>& params) { argument 1109 string interface_name = PPPDevice::GetInterfaceName(params); 1139 ppp_device_->UpdateIPConfigFromPPP(params, kBlackholeIPv6);
|
H A D | cellular.h | 482 void OnPPPConnected(const std::map<std::string, std::string>& params);
|
/system/bt/stack/gatt/ |
H A D | gatt_utils.c | 1570 proto_elem_list[0].params[0] = BT_PSM_ATT; 1573 proto_elem_list[1].params[0] = start_hdl; 1574 proto_elem_list[1].params[1] = end_hdl;
|
/system/bt/bta/gatt/ |
H A D | bta_gattc_cache.c | 759 start_handle = (UINT16) pe.params[0]; 760 end_handle = (UINT16) pe.params[1];
|
/system/keymaster/ |
H A D | soft_keymaster_context.cpp | 297 if (set->params[index].integer > value) 300 if (set->params[index].integer != value) { 301 set->params[index].integer = value;
|
/system/bt/bta/hl/ |
H A D | bta_hl_act.c | 1724 p_hdp_rec->ctrl_psm = (UINT16) pe.params[0]; 1733 p_hdp_rec->data_psm = (UINT16) pe.params[0];
|
/system/bt/bta/jv/ |
H A D | bta_jv_act.c | 880 dcomp.scn = (UINT8) pe.params[0]; 2335 // Populate some params
|
/system/bt/bta/dm/ |
H A D | bta_dm_act.c | 1210 /* save search params */ 1621 bta_dm_search_cb.peer_scn = (UINT8) pe.params[0]; 5221 ** Description This function sets up scan filter params
|