/system/core/toolbox/ |
H A D | r.c | 53 bool set = false; local 56 set = true; 82 if(set) *x = value; 88 if(set) *x = value; 94 if(set) *x = value;
|
/system/bt/btif/src/ |
H A D | btif_uid.c | 43 uid_set_t* set = osi_calloc(sizeof(uid_set_t)); local 44 pthread_mutex_init(&set->lock, NULL); 45 return set; 48 void uid_set_destroy(uid_set_t* set) { argument 49 pthread_mutex_lock(&set->lock); 50 uid_set_node_t* node = set->head; 56 set->head = NULL; 57 pthread_mutex_unlock(&set->lock); 58 pthread_mutex_destroy(&set->lock); 59 osi_free(set); 63 uid_set_find_or_create_node(uid_set_t* set, int32_t app_uid) argument 78 uid_set_add_tx(uid_set_t* set, int32_t app_uid, uint64_t bytes) argument 89 uid_set_add_rx(uid_set_t* set, int32_t app_uid, uint64_t bytes) argument 100 uid_set_read_and_clear(uid_set_t* set) argument [all...] |
H A D | btif_sock_rfc.c | 110 bt_status_t btsock_rfc_init(int poll_thread_handle, uid_set_t* set) { argument 112 uid_set = set; 278 APPL_TRACE_DEBUG("BTA_JvGetChannelId: service_uuid not set AND " 279 "BTSOCK_FLAG_NO_SDP is not set - changing to SPP"); 650 APPL_TRACE_DEBUG("is_service_uuid_valid==false - don't set SDP-record, "
|
H A D | btif_sock_l2cap.c | 362 bt_status_t btsock_l2cap_init(int handle, uid_set_t* set) argument 369 uid_set = set; 524 //if we do not set a callback, this socket will be dropped */ 827 * mtu will be set below */ 844 * mtu will be set below */ 932 * mtu will be set below */
|
H A D | btif_dm.c | 298 void btif_dm_init(uid_set_t* set) argument 300 uid_set = set; 633 BTIF_TRACE_DEBUG("%s cod is again 0, set as unclassified", __func__); 721 // Try to read address type. OOB pairing might have set it earlier, but 927 BTIF_TRACE_DEBUG("%s cod is 0, set as unclassified", __func__); 1011 /* if just_works and bonding bit is not set treat this as temporary */ 1050 LOG_DEBUG(LOG_TAG, "%s cod is 0, set as unclassified", __func__); 1085 LOG_DEBUG(LOG_TAG, "%s cod is 0, set as unclassified", __func__); 1356 LOG_DEBUG(LOG_TAG, "%s cod is 0, set as unclassified", __func__); 2162 /* if remote name is available in EIR, set te [all...] |
H A D | btif_hl.c | 1291 ** Description set HL state 2077 ** Description set the channel callback state 4394 ** Description set socket state 4523 BTIF_TRACE_DEBUG("found and set socket_id=%d is_set=%d", 4689 static inline int btif_hl_select_wakeup_init(fd_set* set){ argument 4698 FD_SET(signal_fds[0], set); 4800 ** Description check whether a fd is set or not 4805 static inline int btif_hl_select_wake_signaled(fd_set* set){ argument 4807 return FD_ISSET(signal_fds[0], set); 4851 BTIF_TRACE_DEBUG("set curr_se [all...] |
/system/core/toolbox/upstream-netbsd/bin/dd/ |
H A D | args.c | 88 u_int set, noset; member in struct:arg 144 "%s: illegal argument combination or already set", 148 ddflags |= ap->set; 157 * just wanted to set both the input and output block sizes 336 u_int set, noset; member in struct:conv 377 ddflags |= cp->set;
|
/system/extras/mmap-perf/ |
H A D | mmapPerf.cpp | 24 void set(int fd) { m_fd = fd; } function in class:Fd 63 m_fileFd.set(fd);
|
/system/bt/btcore/src/ |
H A D | device_class.c | 127 void device_class_set_information(bt_device_class_t *dc, bool set) { argument 129 if (set) 140 void device_class_set_limited(bt_device_class_t *dc, bool set) { argument 142 if (set)
|
/system/bt/stack/srvc/ |
H A D | srvc_eng.c | 386 BOOLEAN set = TRUE; local 395 set = FALSE; 397 return set;
|
/system/core/libsync/tests/ |
H A D | sync_test.cpp | 281 fd_set set; local 282 FD_ZERO(&set); 283 FD_SET(fence.getFd(), &set); 287 ASSERT_EQ(select(fence.getFd() + 1, &set, nullptr, nullptr, &time), 0); 294 FD_ZERO(&set); 295 FD_SET(fence.getFd(), &set); 297 ASSERT_EQ(select(fence.getFd() + 1, &set, nullptr, nullptr, &time), 1); 298 ASSERT_TRUE(FD_ISSET(fence.getFd(), &set)); 569 // Randomly create syncpoints out of a fixed set of timelines, and merge them together.
|
/system/core/libutils/ |
H A D | BlobCache.cpp | 57 void BlobCache::set(const void* key, size_t keySize, const void* value, function in class:android::BlobCache 60 ALOGV("set: not caching because the key is too large: %zu (limit: %zu)", 65 ALOGV("set: not caching because the value is too large: %zu (limit: %zu)", 70 ALOGV("set: not caching because the combined key/value size is too " 75 ALOGW("set: not caching because keySize is 0"); 79 ALOGW("set: not caching because valueSize is 0"); 99 ALOGV("set: not caching new key/value pair because the " 108 ALOGV("set: created new cache entry with %zu byte key and %zu byte value", 121 ALOGV("set: not caching new value because the total cache " 129 ALOGV("set [all...] |
/system/extras/tests/binder/benchmarks/ |
H A D | binderAddInts.cpp | 85 static ostream &operator<<(ostream &stream, const cpu_set_t& set); 234 static ostream &operator<<(ostream &stream, const cpu_set_t& set) argument 237 if (CPU_ISSET(n1, &set)) {
|
/system/keymaster/include/keymaster/ |
H A D | authorization_set.h | 54 * set, if allocations might fail. 61 explicit AuthorizationSet(const keymaster_key_param_set_t& set) : indirect_data_(nullptr) { argument 63 Reinitialize(set.params, set.length); 79 AuthorizationSet(const AuthorizationSet& set) : Serializable(), indirect_data_(nullptr) { argument 81 Reinitialize(set.elems_, set.elems_size_); 82 error_ = set.error_; 86 AuthorizationSet(AuthorizationSet&& set) : Serializable() { argument 87 MoveFrom(set); 91 operator =(const AuthorizationSet& set) argument 98 operator =(AuthorizationSet&& set) argument 117 Reinitialize(const AuthorizationSet& set) argument 121 Reinitialize(const keymaster_key_param_set_t& set) argument 545 AuthorizationSet set; member in class:keymaster::AuthorizationSetBuilder [all...] |
/system/keymaster/ |
H A D | android_keymaster_test_utils.h | 53 std::ostream& operator<<(std::ostream& os, const AuthorizationSet& set); 58 bool contains(const AuthorizationSet& set, TypedEnumTag<KM_ENUM, Tag, KeymasterEnum> tag, argument 60 int pos = set.find(tag); 61 return pos != -1 && set[pos].enumerated == val; 65 bool contains(const AuthorizationSet& set, TypedEnumTag<KM_ENUM_REP, Tag, KeymasterEnum> tag, argument 68 while ((pos = set.find(tag, pos)) != -1) 69 if (set[pos].enumerated == val) 75 bool contains(const AuthorizationSet& set, TypedTag<KM_UINT, Tag> tag, uint32_t val) { argument 76 int pos = set.find(tag); 77 return pos != -1 && set[po 81 contains(const AuthorizationSet& set, TypedTag<KM_UINT_REP, Tag> tag, uint32_t val) argument 90 contains(const AuthorizationSet& set, TypedTag<KM_ULONG, Tag> tag, uint64_t val) argument 96 contains(const AuthorizationSet& set, TypedTag<KM_BYTES, Tag> tag, const std::string& val) argument 104 contains(const AuthorizationSet& set, TypedTag<KM_BIGNUM, Tag> tag, const std::string& val) argument 111 contains(const AuthorizationSet& set, keymaster_tag_t tag) argument [all...] |
H A D | authorization_set.cpp | 38 elems_ = builder.set.elems_; 39 builder.set.elems_ = NULL; 41 elems_size_ = builder.set.elems_size_; 42 builder.set.elems_size_ = 0; 44 elems_capacity_ = builder.set.elems_capacity_; 45 builder.set.elems_capacity_ = 0; 47 indirect_data_ = builder.set.indirect_data_; 48 builder.set.indirect_data_ = NULL; 50 indirect_data_capacity_ = builder.set.indirect_data_capacity_; 51 builder.set 106 MoveFrom(AuthorizationSet& set) argument 182 Union(const keymaster_key_param_set_t& set) argument 190 Difference(const keymaster_key_param_set_t& set) argument 269 push_back(const keymaster_key_param_set_t& set) argument [all...] |
H A D | soft_keymaster_context.cpp | 285 bool UpgradeIntegerTag(keymaster_tag_t tag, uint32_t value, AuthorizationSet* set, argument 287 int index = set->find(tag); 292 set->push_back(param); 297 if (set->params[index].integer > value) 300 if (set->params[index].integer != value) { 301 set->params[index].integer = value;
|
H A D | android_keymaster_test_utils.cpp | 159 std::ostream& operator<<(std::ostream& os, const AuthorizationSet& set) { argument 160 if (set.size() == 0) 164 for (size_t i = 0; i < set.size(); ++i) 165 os << set[i] << std::endl; 219 AuthorizationSet set; local 220 set.push_back(TAG_USER_ID, 7); 221 set.push_back(TAG_USER_AUTH_TYPE, HW_AUTH_PASSWORD); 222 set.push_back(TAG_AUTH_TIMEOUT, 300); 223 return set; 227 AuthorizationSet set; local [all...] |
/system/sepolicy/tools/ |
H A D | checkfc.c | 43 const char * const *attrs; /* for the original set to print on error */ 44 ebitmap_t set; /* the ebitmap representation of the attrs */ member in struct:__anon1907::__anon1910 118 /* Take the intersection, if the set is empty, then its a failure */ 166 uint32_t len = ebitmap_length(&global_state.assert.set); 169 &global_state.assert.set); 171 fprintf(stderr, "Error: type \"%s\" is not of set: ", type_name); 174 /* The calls above did not affect rc, so set error before going to out */ 179 /* Success: Although it should be 0, we explicitly set rc to 0 for clarity */ 218 ebitmap_destroy(&global_state.assert.set); 301 bool ret = ebitmap_attribute_assertion_init(&global_state.assert.set, global_stat [all...] |
/system/core/adb/ |
H A D | shell_service.cpp | 391 "failed to set non-blocking mode for fd %d", fd); 507 inline bool ValidAndInSet(const ScopedFd& sfd, fd_set* set) { argument 508 return sfd.valid() && FD_ISSET(sfd.fd(), set);
|
/system/core/libnetutils/ |
H A D | ifc_utils.c | 206 static int ifc_set_flags(const char *name, unsigned set, unsigned clr) argument 212 ifr.ifr_flags = (ifr.ifr_flags & (~clr)) | set; 708 printerr("failed to set ipaddr %s: %s\n", ipaddr_to_string(address), strerror(errno)); 713 printerr("failed to set prefixLength %d: %s\n", prefixLength, strerror(errno)); 718 printerr("failed to set default route %s: %s\n", ipaddr_to_string(gateway), strerror(errno));
|