Searched refs:id (Results 26 - 50 of 283) sorted by relevance

1234567891011>>

/system/connectivity/shill/net/
H A Dnetlink_attribute.h40 // An attribute has an id (which is really an enumerated value), a data type,
58 NetlinkAttribute(int id, const char* id_string,
64 static NetlinkAttribute* NewControlAttributeFromId(int id);
66 NetlinkMessage::MessageContext context, int id);
70 // Accessors for the attribute's id and datatype information.
71 int id() const { return id_; } function in class:shill::NetlinkAttribute
150 NetlinkU8Attribute(int id, const char* id_string) argument
151 : NetlinkAttribute(id, id_string, kType, kMyTypeString) {}
168 NetlinkU16Attribute(int id, const char* id_string) argument
169 : NetlinkAttribute(id, id_strin
187 NetlinkU32Attribute(int id, const char* id_string) argument
205 NetlinkU64Attribute(int id, const char* id_string) argument
223 NetlinkFlagAttribute(int id, const char* id_string) argument
242 NetlinkStringAttribute(int id, const char* id_string) argument
260 NetlinkSsidAttribute(int id, const char* id_string) argument
366 NetlinkRawAttribute(int id, const char* id_string) argument
[all...]
/system/vold/
H A DLoop.h29 static int lookupActive(const char *id, char *buffer, size_t len);
31 static int create(const char *id, const char *loopFile, char *loopDeviceBuffer, size_t len);
H A DVolumeManager.cpp220 char *VolumeManager::asecHash(const char *id, char *buffer, size_t len) { argument
229 } else if (id == NULL) {
240 MD5(reinterpret_cast<const unsigned char*>(id), strlen(id), sig);
356 std::shared_ptr<android::vold::Disk> VolumeManager::findDisk(const std::string& id) { argument
358 if (disk->getId() == id) {
365 std::shared_ptr<android::vold::VolumeBase> VolumeManager::findVolume(const std::string& id) { argument
366 if (mInternalEmulated->getId() == id) {
370 auto vol = disk->findVolume(id);
386 nsecs_t VolumeManager::benchmarkPrivate(const std::string& id) { argument
705 getAsecMountPath(const char *id, char *buffer, int maxlen) argument
735 getAsecFilesystemPath(const char *id, char *buffer, int maxlen) argument
764 createAsec(const char *id, unsigned long numSectors, const char *fstype, const char *key, const int ownerUid, bool isExternal) argument
958 resizeAsec(const char *id, unsigned long numSectors, const char *key) argument
1101 finalizeAsec(const char *id) argument
1161 fixupAsecPermissions(const char *id, gid_t gid, const char* filename) argument
1360 unmountAsec(const char *id, bool force) argument
1408 unmountLoopImage(const char *id, const char *idHash, const char *fileName, const char *mountPoint, bool force) argument
1496 destroyAsec(const char *id, bool force) argument
1586 findAsec(const char *id, char *asecPath, size_t asecPathLen, const char **directory) const argument
1628 mountAsec(const char *id, const char *key, int ownerUid, bool readOnly) argument
[all...]
/system/bt/btif/src/
H A Dbtif_sock_rfc.c74 uint32_t id; // Non-zero indicates a valid (in-use) slot. member in struct:__anon689
135 if (rfc_slots[i].id)
150 static rfc_slot_t *find_rfc_slot_by_id(uint32_t id) { argument
151 assert(id != 0);
154 if (rfc_slots[i].id == id)
157 LOG_ERROR(LOG_TAG, "%s unable to find RFCOMM slot id: %d", __func__, id);
165 if (rfc_slots[i].id && rfc_slots[i].f.pending_sdp_request && rfc_slots[i].id < min_i
454 on_cl_rfc_init(tBTA_JV_RFCOMM_CL_INIT *p_init, uint32_t id) argument
470 on_srv_rfc_listen_started(tBTA_JV_RFCOMM_START *p_start, uint32_t id) argument
486 on_srv_rfc_connect(tBTA_JV_RFCOMM_SRV_OPEN *p_open, uint32_t id) argument
510 on_cli_rfc_connect(tBTA_JV_RFCOMM_OPEN *p_open, uint32_t id) argument
534 on_rfc_close(UNUSED_ATTR tBTA_JV_RFCOMM_CLOSE *p_close, uint32_t id) argument
545 on_rfc_write_done(UNUSED_ATTR tBTA_JV_RFCOMM_WRITE *p, uint32_t id) argument
562 on_rfc_outgoing_congest(tBTA_JV_RFCOMM_CONG *p, uint32_t id) argument
622 uint32_t id = PTR_TO_UINT(user_data); local
840 uint32_t id = (uintptr_t)user_data; local
881 uint32_t id = (uintptr_t)user_data; local
903 uint32_t id = (uintptr_t)user_data; local
[all...]
H A Dbtif_sock_l2cap.c70 uint32_t id; //just a tag to find this struct member in struct:l2cap_socket
225 static l2cap_socket *btsock_l2cap_find_by_id_l(uint32_t id) argument
229 while (sock && sock->id != id)
259 APPL_TRACE_ERROR("SOCK_LIST: free(id = %d) - NO app_fd!", sock->id);
293 APPL_TRACE_DEBUG("%s: free(id = %d)", __func__, sock->id);
339 sock->id = (socks ? socks->id
413 on_srv_l2cap_listen_started(tBTA_JV_L2CAP_START *p_start, uint32_t id) argument
442 on_cl_l2cap_init(tBTA_JV_L2CAP_CL_INIT *p_init, uint32_t id) argument
579 on_l2cap_connect(tBTA_JV *p_data, uint32_t id) argument
607 on_l2cap_close(tBTA_JV_L2CAP_CLOSE * p_close, uint32_t id) argument
627 on_l2cap_outgoing_congest(tBTA_JV_L2CAP_CONG *p, uint32_t id) argument
645 on_l2cap_write_done(void* req_id, uint16_t len, uint32_t id) argument
670 on_l2cap_write_fixed_done(void* req_id, uint16_t len, uint32_t id) argument
693 on_l2cap_data_ind(tBTA_JV *evt, uint32_t id) argument
824 on_l2cap_psm_assigned(int id, int psm) argument
[all...]
/system/bt/service/
H A Dgatt_server_old.h89 bool AddCharacteristic(const UUID &id, int properties, int permissions);
93 bool AddBlob(const UUID &id, const UUID &control_id, int properties,
98 bool SetCharacteristicValue(const UUID &id, const std::vector<uint8_t> &value);
101 bool GetCharacteristicValue(const UUID &id, std::vector<uint8_t> *value);
/system/bt/service/hal/
H A Dgatt_helpers.h33 void GetHALServiceId(const GattIdentifier& id, btgatt_srvc_id_t* hal_id);
/system/connectivity/shill/
H A Dadaptor_stub.h28 explicit AdaptorStub(const std::string& id);
H A Dmock_icmp.h37 uint16_t id, uint16_t seq_num));
H A Drpc_task_adaptor_stub.h31 explicit RPCTaskAdaptorStub(const std::string& id);
H A Dthird_party_vpn_adaptor_stub.h32 explicit ThirdPartyVpnAdaptorStub(const std::string& id);
H A Dmock_service.cc46 const string& id = unique_name(); local
47 EXPECT_CALL(*this, GetRpcIdentifier()).WillRepeatedly(Return(id));
48 EXPECT_CALL(*this, GetStorageIdentifier()).WillRepeatedly(Return(id));
/system/core/logd/
H A DLogUtils.h56 static inline bool worstUidEnabledForLogid(log_id_t id) { argument
57 return (id == LOG_ID_MAIN) || (id == LOG_ID_SYSTEM) || (id == LOG_ID_RADIO);
H A DLogStatistics.cpp27 log_id_for_each(id) {
28 mSizes[id] = 0;
29 mElements[id] = 0;
30 mDroppedElements[id] = 0;
31 mSizesTotal[id] = 0;
32 mElementsTotal[id] = 0;
205 std::string UidEntry::formatHeader(const std::string &name, log_id_t id) const {
206 bool isprune = worstUidEnabledForLogid(id);
208 name.c_str(), android_log_id_to_name(id)),
216 std::string UidEntry::format(const LogStatistics &stat, log_id_t id) cons
[all...]
H A DLogBuffer.h85 // watermark for last per log id
118 bool clear(log_id_t id, uid_t uid = AID_ROOT);
119 unsigned long getSize(log_id_t id);
120 int setSize(log_id_t id, unsigned long size);
121 unsigned long getSizeUsed(log_id_t id);
144 void maybePrune(log_id_t id);
145 bool prune(log_id_t id, unsigned long pruneRows, uid_t uid = AID_ROOT);
H A DLogTimes.h75 void triggerSkip_Locked(log_id_t id, unsigned int skip) { skipAhead[id] = skip; } argument
114 bool isWatching(log_id_t id) { return (mLogMask & (1<<id)) != 0; } argument
/system/extras/ext4_utils/
H A Dkey_control.cpp31 long keyctl_revoke(key_serial_t id) argument
33 return keyctl(KEYCTL_REVOKE, id);
36 long keyctl_setperm(key_serial_t id, int permissions) argument
38 return keyctl(KEYCTL_SETPERM, id, permissions);
/system/core/adb/
H A Dsockets.cpp57 // Parse the global list of sockets to find one with id |local_id|.
59 // with id |peer_id|. Returns an asocket handle on success, NULL on failure.
66 if (s->id != local_id) {
69 if (peer_id == 0 || (s->peer && s->peer->id == peer_id)) {
88 s->id = local_socket_next_id++;
92 fatal("local socket id overflow");
105 s->id = 0;
126 D("LS(%d): enqueue %d", s->id, p->len);
149 D("LS(%d): not ready, errno=%d: %s", s->id, errno, strerror(errno));
190 D("LS(%d): destroying fde.fd=%d", s->id,
233 int id = s->id; local
499 create_remote_socket(unsigned id, atransport* t) argument
[all...]
H A Dfile_sync_service.cpp84 msg.stat.id = ID_STAT;
101 msg.dent.id = ID_DENT;
125 msg.dent.id = ID_DONE;
140 msg.data.id = ID_FAIL;
188 if (msg.data.id != ID_DATA) {
189 if (msg.data.id == ID_DONE) {
217 msg.status.id = ID_OKAY;
231 if (msg.data.id == ID_DONE) {
233 } else if (msg.data.id != ID_DATA) {
234 char id[ local
403 const char* id = reinterpret_cast<const char*>(&request.id); local
[all...]
H A Dshell_service_protocol.cpp56 bool ShellProtocol::Write(Id id, size_t length) { argument
57 buffer_[0] = id;
H A Dsocket.h40 unsigned id; member in struct:asocket
113 asocket *create_remote_socket(unsigned id, atransport *t);
/system/sepolicy/tools/sepolicy-analyze/
H A Dneverallow.c27 char *start, *id; local
107 id = calloc(1, len + 1);
108 if (!id)
110 memcpy(id, start, len);
112 printf(" %s", id);
113 type = hashtab_search(policydb->p_types.table, id);
116 fprintf(stderr, "Warning! Type or attribute %s used in neverallow undefined in policy being checked.\n", id);
120 free(id);
190 char *id, *start; local
244 id
[all...]
/system/connectivity/shill/binder/
H A Dbinder_adaptor.h41 explicit BinderAdaptor(const std::string& id);
58 const std::string& id() { return id_; } function in class:shill::BinderAdaptor
/system/bt/btif/include/
H A Dbtif_sock_l2cap.h22 void on_l2cap_psm_assigned(int id, int psm);
/system/connectivity/shill/pppoe/
H A Dpppoe_service.cc157 const string id = GetStorageIdentifier(); local
158 storage->GetString(id, kPPPoEUsernameProperty, &username_);
159 storage->GetString(id, kPPPoEPasswordProperty, &password_);
160 storage->GetInt(id, kPPPoELCPEchoIntervalProperty, &lcp_echo_interval_);
161 storage->GetInt(id, kPPPoELCPEchoFailureProperty, &lcp_echo_failure_);
162 storage->GetInt(id, kPPPoEMaxAuthFailureProperty, &max_auth_failure_);
172 const string id = GetStorageIdentifier(); local
173 storage->SetString(id, kPPPoEUsernameProperty, username_);
174 storage->SetString(id, kPPPoEPasswordProperty, password_);
175 storage->SetInt(id, kPPPoELCPEchoIntervalPropert
[all...]

Completed in 534 milliseconds

1234567891011>>