/system/media/camera/docs/ |
H A D | metadata-validate | 20 $thisdir/metadata-check-dependencies || exit 1
|
H A D | metadata-parser-sanity-check | 20 # Sanity check the XML parser by making sure it's generating the same data 26 $thisdir/metadata-check-dependencies || exit 1 60 echo "ERROR: Files differ, please check parser logic" 1>&2
|
H A D | ACameraMetadata.mako | 54 // Skip check for vendor keys
|
H A D | metadata-generate | 194 $thisdir/metadata-check-dependencies || exit 1 196 $thisdir/metadata-parser-sanity-check || exit 1
|
/system/extras/libfec/ |
H A D | fec_open.cpp | 46 check(offset); 47 check(get_appr_size); 48 check(get_real_size); 91 check(f); 92 check(offset); 101 check(f); 102 check(f->ecc.rsn > 0 && f->ecc.rsn < FEC_RSM); 103 check(f->size > sizeof(fec_header)); 200 check(f); 201 check(offse 202 check(offset < UINT64_MAX - FEC_BLOCKSIZE); function [all...] |
H A D | fec_verity.cpp | 41 check(dst); 42 check(src); 43 check(2 * size == strlen(src)); 49 check(l >= 0); 50 check(h >= 0); 66 check(src); 67 check(dst); 126 check(f); 127 check(f->verity.salt); 130 check(bloc [all...] |
H A D | fec_process.cpp | 46 check(f); 47 check(buf) 48 check(func); 83 check(left > 0); 112 check(left == 0);
|
H A D | fec_read.cpp | 84 /* check if `offset' is within a block expected to contain zeros */ 108 check(offset % FEC_BLOCKSIZE == 0); 119 /* verity is required to check for erasures */ 120 check(!use_erasures || f->verity.hash); 154 check(data_index >= 0); 190 check(rc <= (use_erasures ? e->roots : e->roots / 2)); 209 check(f); 235 check(f); 236 check(dest); 237 check(offse [all...] |
H A D | fec_private.h | 49 #define VERITY_MIN_TABLE_SIZE (VERITY_TABLE_ARGS * 2) /* for a sanity check */ 167 #define check(p) \ macro
|
/system/sepolicy/tools/ |
H A D | Android.mk | 45 LOCAL_MODULE := sepolicy-check 49 LOCAL_SRC_FILES := sepolicy-check.c
|
H A D | sepolicy-check.c | 43 int check(int op, uint16_t arg1, uint16_t arg2) { function 86 match &= check(s_op, source_type, cur->key.source_type); 87 match &= check(t_op, target_type, cur->key.target_type); 88 match &= check(c_op, target_class, cur->key.target_class);
|
H A D | check_seapp.c | 319 static bool match_regex(key_map *assert, const key_map *check) { argument 321 char *tomatch = check->data; 377 * No policy file present means we cannot check 395 * No policy file present means we cannot check 417 * The key map to check 489 * a rule map to check 491 * a rule map to check 618 * The rule map to check for validity. 638 // mark that nrule->name is for a null check 656 * the nrule was marked in a null check an [all...] |
/system/core/libnetutils/ |
H A D | packet.c | 109 ip.check = 0; 112 ip.check = finish_sum(checksum(&ip, sizeof(ip), 0)); 117 udp.check = 0; 132 udp.check = finish_sum(udpsum); 213 ALOGW("IP header checksum failure (0x%x)", packet.ip.check); 230 temp = packet.udp.check; 231 packet.udp.check = 0; 233 packet.udp.check = temp;
|
/system/keymaster/include/keymaster/ |
H A D | keymaster_tags.h | 40 * particular tag. This enables template functions to be written that check that the correct 66 static void check() {} function in struct:keymaster::StaticAssert 105 StaticAssert<(tag & tag_type) == tag_type>::check(); 106 StaticAssert<(tag_type != KM_ENUM) && (tag_type != KM_ENUM_REP)>::check(); 121 StaticAssert<(tag & tag_type) == tag_type>::check(); 122 StaticAssert<(tag_type == KM_ENUM) || (tag_type == KM_ENUM_REP)>::check();
|
/system/core/fastboot/ |
H A D | usb_linux.cpp | 122 static int check(void *_desc, int len, unsigned type, int size) function 149 if (check(ptr, len, USB_DT_DEVICE, USB_DT_DEVICE_SIZE)) 155 if (check(ptr, len, USB_DT_CONFIG, USB_DT_CONFIG_SIZE)) 204 if (check(hdr, len, USB_DT_INTERFACE, USB_DT_INTERFACE_SIZE) == 0) 226 if (check(hdr, len, USB_DT_ENDPOINT, USB_DT_ENDPOINT_SIZE) == 0) 249 if (check((struct usb_descriptor_hdr *)ptr, len,
|
/system/core/libmincrypt/tools/ |
H A D | DumpPublicKey.java | 85 * Perform sanity check on public key. 87 static int check(PublicKey key, boolean useSHA256) throws Exception { method in class:DumpPublicKey 107 int version = check(key, useSHA256); 260 check(key, useSHA256);
|
/system/security/keystore/tests/ |
H A D | Makefile | 94 MEMCHECK_OPTS=--leak-check=full \
|
/system/media/radio/src/ |
H A D | radio_metadata.c | 136 bool check) 141 if (check) { 302 /* sanity check on entry count versus buffer size */ 312 /* sanity check on each entry */ 326 /* do not request check because next entry can be the free slot */ 133 get_entry_at_index( const radio_metadata_buffer_t *metadata, const unsigned index, bool check) argument
|
/system/bt/doc/ |
H A D | power_management.md | 126 the same check is done against the second action and it is used
|
/system/core/logd/tests/ |
H A D | logd_test.cpp | 86 bool check = ret <= len; local 88 if (check) { 304 // check if we can read any logs from logd 334 // check if we can read any logs from kernel logger 383 // thresholds are tuned on a per-target basis. Here we check if the values 388 // being the worst) and check to make sure the logger can deal with it 401 " false OK for prune by worst UID check\n");
|
/system/connectivity/dhcp_client/ |
H A D | dhcpv4.cc | 280 ip->check = htons(DHCPMessage::ComputeChecksum(
|
/system/core/libbacktrace/ |
H A D | backtrace_test.cpp | 252 bool check = (cur_proc == nullptr); local 254 if (check) { 263 if (!check && bt_ign2->GetFrame(i)->func_name == cur_proc) { 264 check = true;
|
/system/keymaster/ |
H A D | Makefile | 173 MEMCHECK_OPTS=--leak-check=full \
|