/system/core/base/ |
H A D | logging_test.cpp | 108 bool flag = false; local 112 flag = true; 113 EXPECT_FALSE(flag) << "CHECK macro probably has a dangling if with no else"; 115 flag = false; 119 flag = true; 120 EXPECT_FALSE(flag) << "CHECK_STREQ probably has a dangling if with no else"; 225 bool flag = false; local 229 flag = true; 231 EXPECT_FALSE(flag) << "LOG macro probably has a dangling if with no else"; 233 flag [all...] |
/system/core/logd/ |
H A D | main.cpp | 146 static bool check_flag(const char *prop, const char *flag) { argument 147 const char *cp = strcasestr(prop, flag); 156 cp += strlen(flag); 160 bool property_get_bool(const char *key, int flag) { argument 164 if (flag & BOOL_DEFAULT_FLAG_PERSIST) { 186 flag |= BOOL_DEFAULT_FLAG_ENG; 188 // this is really a "not" flag 190 flag |= BOOL_DEFAULT_FLAG_SVELTE; 194 if (flag & (BOOL_DEFAULT_FLAG_SVELTE | BOOL_DEFAULT_FLAG_ENG)) { 195 flag [all...] |
/system/core/adb/ |
H A D | adb_trace.cpp | 138 const auto& flag = trace_flags.find(elem); local 139 if (flag == trace_flags.end()) { 140 LOG(ERROR) << "Unknown trace flag: " << elem; 144 if (flag->second == 0) { 150 adb_trace_mask |= 1 << flag->second;
|
/system/core/include/nativebridge/ |
H A D | native_bridge.h | 65 void* NativeBridgeLoadLibrary(const char* libpath, int flag); 114 // flag [IN] the stardard RTLD_XXX defined in bionic dlfcn.h 117 void* (*loadLibrary)(const char* libpath, int flag);
|
/system/core/metricsd/ |
H A D | metrics_client.cc | 146 int flag; local 147 while ((flag = getopt(argc, argv, "abcdegstv")) != -1) { 148 switch (flag) {
|
/system/core/fs_mgr/ |
H A D | fs_mgr_fstab.c | 39 unsigned flag; member in struct:flag_list 106 /* initialize flag values. If we find a relevant flag, we'll 121 /* Look for the flag "p" in the flag list "fl" 126 f |= fl[i].flag; 127 if ((fl[i].flag == MF_CRYPT) && flag_vals) { 128 /* The encryptable flag is followed by an = and the 132 } else if ((fl[i].flag == MF_VERIFY) && flag_vals) { 133 /* If the verify flag i [all...] |
/system/vold/ |
H A D | cryptfs.h | 64 key and remove this flag. */ 234 int cryptfs_enable(char *flag, int type, char *passwd, int no_ui); 236 int cryptfs_enable_default(char *flag, int no_ui);
|
/system/bt/stack/smp/ |
H A D | smp_cmac.c | 185 BOOLEAN flag; local 188 /* last block is a complete block set flag to 1 */ 189 flag = ((cmac_cb.len % BT_OCTET16_LEN) == 0 && cmac_cb.len != 0) ? TRUE : FALSE; 191 SMP_TRACE_WARNING("flag = %d round = %d", flag, cmac_cb.round); 193 if ( flag )
|
/system/extras/tests/timetest/ |
H A D | rtc_test.cpp | 27 static int hwtime(int flag, int request, struct rtc_time *tm) { argument 30 int ret = TEMP_FAILURE_RETRY(access(rtc, flag & O_WRONLY) ? W_OK : R_OK); 38 if (flag & O_WRONLY) { 52 ret = TEMP_FAILURE_RETRY(open(rtc, flag));
|
/system/connectivity/shill/net/ |
H A D | rtnl_handler.cc | 222 int flag = 0; local 237 flag = kRequestAddr; 240 flag = kRequestRoute; 243 flag = kRequestLink; 246 flag = kRequestNeighbor; 249 flag = kRequestBridgeNeighbor; 268 request_flags_ &= ~flag;
|
H A D | attribute_list.cc | 267 bool flag; local 268 if (!GetFlagAttributeValue(id, &flag)) { 271 return flag;
|
/system/bt/bta/hh/ |
H A D | bta_hh_utils.c | 157 UINT16 version, UINT8 flag) 167 p_cb->dscp_info.flag = flag; 169 UNUSED(flag); 298 /* control key flag is set */ 156 bta_hh_update_di_info(tBTA_HH_DEV_CB *p_cb, UINT16 vendor_id, UINT16 product_id, UINT16 version, UINT8 flag) argument
|
/system/extras/tests/sdcard/ |
H A D | plot_sdcard.py | 315 for flag, val in optlist: 316 if flag in ('-i', '--iteration'): 320 elif flag in ('-t', '--time'): 324 elif flag in ('-p', '--profile'):
|
/system/bt/stack/btm/ |
H A D | btm_ble_gap.c | 70 static void btm_ble_update_adv_flag(UINT8 flag); 1378 *p++ = p_data->flag; 1669 ** Description Obtain updated adv flag value based on connect and discoverability mode. 1670 ** Also, setup DMT support value in the flag based on whether the controller 1673 ** Parameters: flag_value (Input / Output) - flag value 1690 /* if local controller support, mark both controller and host support in flag */ 1701 ** Description Set adv flag in adv data. 1711 UINT8 flag = 0, old_flag = 0; local 1715 flag = old_flag = *(p_adv_data->p_flags); 1717 btm_ble_update_dmt_flag_bits (&flag, connect_mod 2141 btm_ble_update_adv_flag(UINT8 flag) argument 2338 UINT8 *p_flag, flag = 0, rt = 0; local [all...] |
/system/core/fastboot/ |
H A D | udp.cpp | 73 void Set(uint8_t id, uint16_t sequence, Flag flag); 86 void Header::Set(uint8_t id, uint16_t sequence, Flag flag) { argument 88 bytes_[kIndexFlags] = flag; 219 // Set the continuation flag and truncate packet data if needed. 300 // If the response has a continuation flag we need to prompt for more data by sending
|
/system/tpm/attestation/common/ |
H A D | tpm_utility_v1.h | 97 // Retrieves a |data| attribute defined by |flag| and |sub_flag| from a TSS 102 TSS_FLAG flag,
|
/system/bt/stack/gatt/ |
H A D | att_protocol.c | 72 BT_HDR *attp_build_exec_write_cmd (UINT8 op_code, UINT8 flag) argument 85 flag &= GATT_PREP_WRITE_EXEC; 86 UINT8_TO_STREAM (p, flag);
|
H A D | gatt_cl.c | 298 void gatt_send_queue_write_cancel (tGATT_TCB *p_tcb, tGATT_CLCB *p_clcb, tGATT_EXEC_FLAG flag) argument 304 rt = attp_send_cl_msg(p_tcb, p_clcb->clcb_idx, GATT_REQ_EXEC_WRITE, (tGATT_CL_MSG *)&flag); 324 tGATT_EXEC_FLAG flag = GATT_PREP_WRITE_EXEC; local 336 flag = GATT_PREP_WRITE_CANCEL; 349 gatt_send_queue_write_cancel (p_tcb, p_clcb, flag);
|
/system/bt/btif/src/ |
H A D | btif_gatt_multi_adv_util.c | 270 p_multi_adv_data_cb->inst_cb[cbindex].data.flag = ADV_FLAGS_GENERAL; 272 p_multi_adv_data_cb->inst_cb[cbindex].data.flag = ADV_FLAGS_LIMITED; 274 p_multi_adv_data_cb->inst_cb[cbindex].data.flag &= 276 if (p_multi_adv_data_cb->inst_cb[cbindex].data.flag == 0)
|
/system/core/adf/libadf/ |
H A D | adf.c | 321 __u32 flag) 323 return !!(data->flags & flag); 326 ssize_t adf_interfaces_filter_by_flag(struct adf_device *dev, __u32 flag, argument 330 flag); 320 adf_interface_flags_filter(struct adf_interface_data *data, __u32 flag) argument
|
/system/core/adf/libadf/include/adf/ |
H A D | adf.h | 115 * Filters a list of interfaces by flag. 119 ssize_t adf_interfaces_filter_by_flag(struct adf_device *dev, __u32 flag,
|
/system/core/libnativebridge/ |
H A D | native_bridge.cc | 487 void* NativeBridgeLoadLibrary(const char* libpath, int flag) { argument 489 return callbacks->loadLibrary(libpath, flag);
|
/system/connectivity/shill/vpn/ |
H A D | openvpn_driver_unittest.cc | 243 // Used to assert that a flag appears in the options. 244 void ExpectInFlags(const vector<vector<string>>& options, const string& flag); 245 void ExpectInFlags(const vector<vector<string>>& options, const string& flag, 250 const string& flag); 299 const string& flag) { 300 ExpectInFlags(options, vector<string> { flag }); 304 const string& flag, 306 ExpectInFlags(options, vector<string> { flag, value }); 316 const string& flag) { 318 EXPECT_NE(flag, optio 298 ExpectInFlags(const vector<vector<string>>& options, const string& flag) argument 303 ExpectInFlags(const vector<vector<string>>& options, const string& flag, const string& value) argument 315 ExpectNotInFlags(const vector<vector<string>>& options, const string& flag) argument [all...] |
/system/bt/stack/include/ |
H A D | hcimsgs.h | 523 extern BOOLEAN btsnd_hcic_write_auto_accept(UINT8 flag); /* Write Auto Accept */ 526 extern BOOLEAN btsnd_hcic_write_scan_enable(UINT8 flag); /* Write Scan Enable */ 545 extern BOOLEAN btsnd_hcic_write_auth_enable(UINT8 flag); /* Write Authentication Enable */
|
/system/netd/server/ |
H A D | CommandListener.cpp | 364 char *flag = argv[i]; local 365 if (!strcmp(flag, "up")) { 373 } else if (!strcmp(flag, "down")) { 381 } else if (!strcmp(flag, "broadcast")) { 383 } else if (!strcmp(flag, "multicast")) { 385 } else if (!strcmp(flag, "running")) { 387 } else if (!strcmp(flag, "loopback")) { 389 } else if (!strcmp(flag, "point-to-point")) {
|