Searched refs:found (Results 1 - 25 of 42) sorted by relevance

12

/system/security/keystore/tests/
H A Dauth_token_table_test.cpp105 const hw_auth_token_t* found; local
107 ASSERT_EQ(AuthTokenTable::OK, table.FindAuthorization(make_set(1), KM_PURPOSE_SIGN, 0, &found));
108 EXPECT_EQ(1U, found->user_id);
109 EXPECT_EQ(2U, found->authenticator_id);
111 ASSERT_EQ(AuthTokenTable::OK, table.FindAuthorization(make_set(2), KM_PURPOSE_SIGN, 0, &found));
112 EXPECT_EQ(1U, found->user_id);
113 EXPECT_EQ(2U, found->authenticator_id);
115 ASSERT_EQ(AuthTokenTable::OK, table.FindAuthorization(make_set(3), KM_PURPOSE_SIGN, 0, &found));
116 EXPECT_EQ(3U, found->user_id);
117 EXPECT_EQ(4U, found
134 const hw_auth_token_t* found; local
153 const hw_auth_token_t* found; local
225 const hw_auth_token_t* found; local
235 const hw_auth_token_t* found; local
252 const hw_auth_token_t* found; local
262 const hw_auth_token_t* found; local
272 const hw_auth_token_t* found; local
305 const hw_auth_token_t* found; local
[all...]
/system/bt/bta/mce/
H A Dbta_mce_act.c64 int found = 0; local
93 evt_data.mas[found].scn = pe.params[0];
98 evt_data.mas[found].p_srv_name = (char *) p_attr->attr_value.v.array;
99 evt_data.mas[found].srv_name_len= SDP_DISC_ATTR_LEN(p_attr->attr_len_type);
104 evt_data.mas[found].instance_id = p_attr->attr_value.v.u8;
109 evt_data.mas[found].msg_type = p_attr->attr_value.v.u8;
111 found++;
112 } while (p_rec != NULL && found < BTA_MCE_MAX_MAS_INSTANCES);
114 evt_data.num_mas = found;
/system/core/base/
H A Dstrings.cpp38 size_t found; local
40 found = s.find_first_of(delimiters, base);
41 result.push_back(s.substr(base, found - base));
42 base = found + 1;
43 } while (found != s.npos);
/system/bt/bta/hl/
H A Dbta_hl_utils.c94 ** Returns TRUE if found
101 BOOLEAN found=FALSE; local
113 found = TRUE;
121 found = TRUE;
125 if (!found)
127 APPL_TRACE_DEBUG("bta_hl_find_sdp_idx_using_ctrl_psm found=%d sdp_idx=%d ctrl_psm=0x%x ",
128 found, *p_sdp_idx, ctrl_psm );
131 return found;
291 ** Returns BOOLEAN TRUE - found
292 ** FALSE - not found
300 BOOLEAN found = TRUE; local
484 BOOLEAN found = FALSE; local
593 BOOLEAN found = FALSE; local
823 BOOLEAN found=FALSE; local
862 BOOLEAN found=FALSE; local
900 BOOLEAN found=FALSE; local
938 BOOLEAN found=FALSE; local
977 BOOLEAN found=FALSE; local
1013 BOOLEAN found=FALSE; local
1049 BOOLEAN found=FALSE; local
1089 BOOLEAN found=FALSE; local
1132 BOOLEAN found=FALSE; local
1175 BOOLEAN found=FALSE; local
1269 BOOLEAN found = FALSE; local
1327 BOOLEAN found=FALSE; local
1423 BOOLEAN found=FALSE; local
1469 BOOLEAN found=FALSE, result=TRUE; local
1620 BOOLEAN found = FALSE; local
1748 BOOLEAN found =FALSE; local
1998 BOOLEAN found=FALSE; local
2037 BOOLEAN found=FALSE; local
2111 BOOLEAN found=FALSE; local
2484 BOOLEAN found=TRUE; local
[all...]
/system/security/keystore/
H A Dauth_token_table.cpp88 const hw_auth_token_t** found) {
99 return FindAuthPerOpAuthorization(key_sids, auth_type, op_handle, found);
101 return FindTimedAuthorization(key_sids, auth_type, key_info, found);
106 keymaster_operation_handle_t op_handle, const hw_auth_token_t** found) {
119 *found = matching_op->token();
126 const hw_auth_token_t** found) {
149 *found = newest_match->token();
179 auto found = find_if(entries_, [&](Entry& e) { return e.token()->challenge == op_handle; }); local
180 if (found == entries_.end())
183 assert(!IsSupersededBySomeEntry(*found));
85 FindAuthorization(const AuthorizationSet& key_info, keymaster_purpose_t purpose, keymaster_operation_handle_t op_handle, const hw_auth_token_t** found) argument
104 FindAuthPerOpAuthorization( const std::vector<uint64_t>& sids, hw_authenticator_type_t auth_type, keymaster_operation_handle_t op_handle, const hw_auth_token_t** found) argument
123 FindTimedAuthorization(const std::vector<uint64_t>& sids, hw_authenticator_type_t auth_type, const AuthorizationSet& key_info, const hw_auth_token_t** found) argument
[all...]
H A Dauth_token_table.h74 keymaster_operation_handle_t op_handle, const hw_auth_token_t** found);
88 const hw_auth_token_t** found) {
89 return FindAuthorization(AuthorizationSet(params, params_count), purpose, op_handle, found);
154 const hw_auth_token_t** found);
157 const AuthorizationSet& key_info, const hw_auth_token_t** found);
86 FindAuthorization(const keymaster_key_param_t* params, size_t params_count, keymaster_purpose_t purpose, keymaster_operation_handle_t op_handle, const hw_auth_token_t** found) argument
/system/bt/btif/co/
H A Dbta_gatts_co.c71 BOOLEAN found = FALSE; local
80 found = TRUE;
85 if (!found)
/system/bt/tools/scripts/
H A Dbtsnooz.py149 found = False
152 if found:
159 found = True
161 if not found:
162 sys.stderr.write('No btsnooz section found in bugreport.\n')
/system/bt/btif/src/
H A Dbtif_hl.c189 BOOLEAN found=FALSE; local
204 found = TRUE;
211 if (found)
214 BTIF_TRACE_DEBUG("%s found=%d channel_id=0x%08x",
215 __FUNCTION__, found, channel_id, *p_app_idx, *p_mcl_idx);
216 return found;
249 BTIF_TRACE_DEBUG("btif_hl_num_dchs: mcl handle found j =%d",j);
254 BTIF_TRACE_DEBUG("btif_hl_num_dchs_in_use:found x =%d",x);
337 BOOLEAN found=FALSE; local
346 found
484 BOOLEAN found = FALSE; local
915 BOOLEAN found=FALSE; local
959 BOOLEAN found=FALSE; local
1002 BOOLEAN found=FALSE; local
1040 BOOLEAN found=FALSE; local
1091 BOOLEAN found = FALSE; local
1158 BOOLEAN found =FALSE; local
1188 BOOLEAN found=FALSE; local
1326 BOOLEAN found = FALSE; local
1577 BOOLEAN found=FALSE; local
1608 BOOLEAN found=FALSE; local
1641 BOOLEAN found=FALSE; local
1680 BOOLEAN found=FALSE; local
1724 BOOLEAN found=FALSE; local
1786 BOOLEAN found=FALSE; local
1861 BOOLEAN found=FALSE; local
1890 BOOLEAN found=FALSE; local
1923 BOOLEAN found=FALSE; local
1951 BOOLEAN found=FALSE; local
1977 BOOLEAN found = FALSE; local
4415 BOOLEAN found= FALSE; local
[all...]
/system/update_engine/payload_generator/
H A Dcycle_breaker.cc158 bool found = false; // Was "f" in the original paper. local
183 found = true;
186 found = true;
193 if (found) {
208 return found;
/system/core/logd/
H A DLogBuffer.cpp319 { // start of scope for uid found iterator
320 LogBufferIteratorMap::iterator found = local
322 if ((found != mLastWorstUid[id].end())
323 && (it == found->second)) {
324 mLastWorstUid[id].erase(found);
328 { // start of scope for pid found iterator
330 LogBufferPidIteratorMap::iterator found = local
332 if ((found != mLastWorstPidOfSystem[id].end())
333 && (it == found->second)) {
334 mLastWorstPidOfSystem[id].erase(found);
404 LogBufferElement *found = it->second; local
605 LogBufferIteratorMap::iterator found = mLastWorstUid[id].find(worst); local
614 LogBufferPidIteratorMap::iterator found local
[all...]
H A DLogReader.cpp165 bool found() { return startTimeSet; } function in class:LogFindStart
173 if (!logFindStart.found()) {
/system/netd/tests/
H A Dnetd_test.cpp203 size_t found = 0; local
206 ++found;
209 return found;
215 size_t found = 0; local
218 ++found;
221 return found;
396 size_t found = GetNumQueries(dns, host_name); local
397 EXPECT_LE(1U, found);
409 size_t old_found = found;
411 found
[all...]
/system/extras/simpleperf/
H A Dcmd_report_test.cpp123 bool found = false; local
128 found = true;
132 return found;
136 bool found = false; local
141 found = true;
145 return found;
H A Dread_apk.cpp77 bool found = false; local
84 found = true;
89 if (!found) {
93 // We found something in the zip file at the right spot. Is it an ELF?
107 // Elf found: add EmbeddedElf to vector, update cache.
/system/extras/perfprofd/quipper/original-kernel-headers/tools/perf/util/include/linux/
H A Dbitops.h102 goto found;
112 found:
/system/bt/stack/include/
H A Da2d_api.h125 typedef void (tA2D_FIND_CBACK)(BOOLEAN found, tA2D_Service * p_service);
175 ** returned for the first service record found on the
/system/bt/stack/a2dp/
H A Da2d_api.c59 BOOLEAN found = FALSE; local
67 /* loop through all records we found */
70 /* get next record; if none found, we're done */
109 found = TRUE;
120 (*a2d_cb.find.p_cback)(found, &a2d_svc);
242 ** returned for the first service record found on the
/system/vold/
H A DMoveTask.cpp68 bool found = false; local
75 found = true;
78 return found ? OK : -1;
/system/bt/service/example/heart_rate/
H A Dheart_rate_server.cpp150 bool found = false; local
157 found = true;
172 if (found) {
/system/bt/stack/btm/
H A Dbtm_dev.c107 BOOLEAN found = FALSE; local
109 for (int i = HCI_EXT_FEATURES_PAGE_MAX; !found && i >= 0; i--)
115 found = TRUE;
168 ** Returns TRUE if removed OK, FALSE if not found or ACL link is active
333 BTM_TRACE_DEBUG("btm_dev_support_switch return TRUE (feature found)");
/system/core/init/
H A Daction.cpp137 *err = "property trigger found without matching '='";
146 *err = "multiple property triggers found for same property";
200 bool found = name.empty(); local
208 found = true;
218 return found;
/system/bt/bta/gatt/
H A Dbta_gattc_utils.c227 APPL_TRACE_DEBUG("bta_gattc_clcb_alloc: found clcb[%d] available",i_clcb);
260 ** Description find or allocate CLCB if not found.
394 BOOLEAN found = FALSE; local
401 found = TRUE;
410 /* if not found, try to recycle one known device */
411 if (!found && !p_recycle)
413 else if (!found && p_recycle)
677 APPL_TRACE_DEBUG("bta_gattc_conn_alloc: found conn_track[%d] available",i_conn);
706 APPL_TRACE_DEBUG("bta_gattc_conn_find: found conn_track[%d] matched",i_conn);
/system/core/adf/libadf/
H A Dadf.c795 bool found = false; local
798 found = adf_find_simple_post_overlay_engine(dev, formats, n_formats,
800 if (found) {
807 if (!found)
/system/extras/f2fs_utils/
H A Df2fs_sparseblock.c308 SLOGE("Valid Checkpoint not found!!");
490 unsigned int used, found, started = 0, i; local
505 found = 0;
509 found = 1;
515 if (!found) {

Completed in 6442 milliseconds

12