/system/security/keystore/tests/ |
H A D | auth_token_table_test.cpp | 105 const hw_auth_token_t* found; local 107 ASSERT_EQ(AuthTokenTable::OK, table.FindAuthorization(make_set(1), KM_PURPOSE_SIGN, 0, &found)); 108 EXPECT_EQ(1U, found->user_id); 109 EXPECT_EQ(2U, found->authenticator_id); 111 ASSERT_EQ(AuthTokenTable::OK, table.FindAuthorization(make_set(2), KM_PURPOSE_SIGN, 0, &found)); 112 EXPECT_EQ(1U, found->user_id); 113 EXPECT_EQ(2U, found->authenticator_id); 115 ASSERT_EQ(AuthTokenTable::OK, table.FindAuthorization(make_set(3), KM_PURPOSE_SIGN, 0, &found)); 116 EXPECT_EQ(3U, found->user_id); 117 EXPECT_EQ(4U, found 134 const hw_auth_token_t* found; local 153 const hw_auth_token_t* found; local 225 const hw_auth_token_t* found; local 235 const hw_auth_token_t* found; local 252 const hw_auth_token_t* found; local 262 const hw_auth_token_t* found; local 272 const hw_auth_token_t* found; local 305 const hw_auth_token_t* found; local [all...] |
/system/bt/bta/mce/ |
H A D | bta_mce_act.c | 64 int found = 0; local 93 evt_data.mas[found].scn = pe.params[0]; 98 evt_data.mas[found].p_srv_name = (char *) p_attr->attr_value.v.array; 99 evt_data.mas[found].srv_name_len= SDP_DISC_ATTR_LEN(p_attr->attr_len_type); 104 evt_data.mas[found].instance_id = p_attr->attr_value.v.u8; 109 evt_data.mas[found].msg_type = p_attr->attr_value.v.u8; 111 found++; 112 } while (p_rec != NULL && found < BTA_MCE_MAX_MAS_INSTANCES); 114 evt_data.num_mas = found;
|
/system/core/base/ |
H A D | strings.cpp | 38 size_t found; local 40 found = s.find_first_of(delimiters, base); 41 result.push_back(s.substr(base, found - base)); 42 base = found + 1; 43 } while (found != s.npos);
|
/system/bt/bta/hl/ |
H A D | bta_hl_utils.c | 94 ** Returns TRUE if found 101 BOOLEAN found=FALSE; local 113 found = TRUE; 121 found = TRUE; 125 if (!found) 127 APPL_TRACE_DEBUG("bta_hl_find_sdp_idx_using_ctrl_psm found=%d sdp_idx=%d ctrl_psm=0x%x ", 128 found, *p_sdp_idx, ctrl_psm ); 131 return found; 291 ** Returns BOOLEAN TRUE - found 292 ** FALSE - not found 300 BOOLEAN found = TRUE; local 484 BOOLEAN found = FALSE; local 593 BOOLEAN found = FALSE; local 823 BOOLEAN found=FALSE; local 862 BOOLEAN found=FALSE; local 900 BOOLEAN found=FALSE; local 938 BOOLEAN found=FALSE; local 977 BOOLEAN found=FALSE; local 1013 BOOLEAN found=FALSE; local 1049 BOOLEAN found=FALSE; local 1089 BOOLEAN found=FALSE; local 1132 BOOLEAN found=FALSE; local 1175 BOOLEAN found=FALSE; local 1269 BOOLEAN found = FALSE; local 1327 BOOLEAN found=FALSE; local 1423 BOOLEAN found=FALSE; local 1469 BOOLEAN found=FALSE, result=TRUE; local 1620 BOOLEAN found = FALSE; local 1748 BOOLEAN found =FALSE; local 1998 BOOLEAN found=FALSE; local 2037 BOOLEAN found=FALSE; local 2111 BOOLEAN found=FALSE; local 2484 BOOLEAN found=TRUE; local [all...] |
/system/security/keystore/ |
H A D | auth_token_table.cpp | 88 const hw_auth_token_t** found) { 99 return FindAuthPerOpAuthorization(key_sids, auth_type, op_handle, found); 101 return FindTimedAuthorization(key_sids, auth_type, key_info, found); 106 keymaster_operation_handle_t op_handle, const hw_auth_token_t** found) { 119 *found = matching_op->token(); 126 const hw_auth_token_t** found) { 149 *found = newest_match->token(); 179 auto found = find_if(entries_, [&](Entry& e) { return e.token()->challenge == op_handle; }); local 180 if (found == entries_.end()) 183 assert(!IsSupersededBySomeEntry(*found)); 85 FindAuthorization(const AuthorizationSet& key_info, keymaster_purpose_t purpose, keymaster_operation_handle_t op_handle, const hw_auth_token_t** found) argument 104 FindAuthPerOpAuthorization( const std::vector<uint64_t>& sids, hw_authenticator_type_t auth_type, keymaster_operation_handle_t op_handle, const hw_auth_token_t** found) argument 123 FindTimedAuthorization(const std::vector<uint64_t>& sids, hw_authenticator_type_t auth_type, const AuthorizationSet& key_info, const hw_auth_token_t** found) argument [all...] |
H A D | auth_token_table.h | 74 keymaster_operation_handle_t op_handle, const hw_auth_token_t** found); 88 const hw_auth_token_t** found) { 89 return FindAuthorization(AuthorizationSet(params, params_count), purpose, op_handle, found); 154 const hw_auth_token_t** found); 157 const AuthorizationSet& key_info, const hw_auth_token_t** found); 86 FindAuthorization(const keymaster_key_param_t* params, size_t params_count, keymaster_purpose_t purpose, keymaster_operation_handle_t op_handle, const hw_auth_token_t** found) argument
|
/system/bt/btif/co/ |
H A D | bta_gatts_co.c | 71 BOOLEAN found = FALSE; local 80 found = TRUE; 85 if (!found)
|
/system/bt/tools/scripts/ |
H A D | btsnooz.py | 149 found = False 152 if found: 159 found = True 161 if not found: 162 sys.stderr.write('No btsnooz section found in bugreport.\n')
|
/system/bt/btif/src/ |
H A D | btif_hl.c | 189 BOOLEAN found=FALSE; local 204 found = TRUE; 211 if (found) 214 BTIF_TRACE_DEBUG("%s found=%d channel_id=0x%08x", 215 __FUNCTION__, found, channel_id, *p_app_idx, *p_mcl_idx); 216 return found; 249 BTIF_TRACE_DEBUG("btif_hl_num_dchs: mcl handle found j =%d",j); 254 BTIF_TRACE_DEBUG("btif_hl_num_dchs_in_use:found x =%d",x); 337 BOOLEAN found=FALSE; local 346 found 484 BOOLEAN found = FALSE; local 915 BOOLEAN found=FALSE; local 959 BOOLEAN found=FALSE; local 1002 BOOLEAN found=FALSE; local 1040 BOOLEAN found=FALSE; local 1091 BOOLEAN found = FALSE; local 1158 BOOLEAN found =FALSE; local 1188 BOOLEAN found=FALSE; local 1326 BOOLEAN found = FALSE; local 1577 BOOLEAN found=FALSE; local 1608 BOOLEAN found=FALSE; local 1641 BOOLEAN found=FALSE; local 1680 BOOLEAN found=FALSE; local 1724 BOOLEAN found=FALSE; local 1786 BOOLEAN found=FALSE; local 1861 BOOLEAN found=FALSE; local 1890 BOOLEAN found=FALSE; local 1923 BOOLEAN found=FALSE; local 1951 BOOLEAN found=FALSE; local 1977 BOOLEAN found = FALSE; local 4415 BOOLEAN found= FALSE; local [all...] |
/system/update_engine/payload_generator/ |
H A D | cycle_breaker.cc | 158 bool found = false; // Was "f" in the original paper. local 183 found = true; 186 found = true; 193 if (found) { 208 return found;
|
/system/core/logd/ |
H A D | LogBuffer.cpp | 319 { // start of scope for uid found iterator 320 LogBufferIteratorMap::iterator found = local 322 if ((found != mLastWorstUid[id].end()) 323 && (it == found->second)) { 324 mLastWorstUid[id].erase(found); 328 { // start of scope for pid found iterator 330 LogBufferPidIteratorMap::iterator found = local 332 if ((found != mLastWorstPidOfSystem[id].end()) 333 && (it == found->second)) { 334 mLastWorstPidOfSystem[id].erase(found); 404 LogBufferElement *found = it->second; local 605 LogBufferIteratorMap::iterator found = mLastWorstUid[id].find(worst); local 614 LogBufferPidIteratorMap::iterator found local [all...] |
H A D | LogReader.cpp | 165 bool found() { return startTimeSet; } function in class:LogFindStart 173 if (!logFindStart.found()) {
|
/system/netd/tests/ |
H A D | netd_test.cpp | 203 size_t found = 0; local 206 ++found; 209 return found; 215 size_t found = 0; local 218 ++found; 221 return found; 396 size_t found = GetNumQueries(dns, host_name); local 397 EXPECT_LE(1U, found); 409 size_t old_found = found; 411 found [all...] |
/system/extras/simpleperf/ |
H A D | cmd_report_test.cpp | 123 bool found = false; local 128 found = true; 132 return found; 136 bool found = false; local 141 found = true; 145 return found;
|
H A D | read_apk.cpp | 77 bool found = false; local 84 found = true; 89 if (!found) { 93 // We found something in the zip file at the right spot. Is it an ELF? 107 // Elf found: add EmbeddedElf to vector, update cache.
|
/system/extras/perfprofd/quipper/original-kernel-headers/tools/perf/util/include/linux/ |
H A D | bitops.h | 102 goto found; 112 found:
|
/system/bt/stack/include/ |
H A D | a2d_api.h | 125 typedef void (tA2D_FIND_CBACK)(BOOLEAN found, tA2D_Service * p_service); 175 ** returned for the first service record found on the
|
/system/bt/stack/a2dp/ |
H A D | a2d_api.c | 59 BOOLEAN found = FALSE; local 67 /* loop through all records we found */ 70 /* get next record; if none found, we're done */ 109 found = TRUE; 120 (*a2d_cb.find.p_cback)(found, &a2d_svc); 242 ** returned for the first service record found on the
|
/system/vold/ |
H A D | MoveTask.cpp | 68 bool found = false; local 75 found = true; 78 return found ? OK : -1;
|
/system/bt/service/example/heart_rate/ |
H A D | heart_rate_server.cpp | 150 bool found = false; local 157 found = true; 172 if (found) {
|
/system/bt/stack/btm/ |
H A D | btm_dev.c | 107 BOOLEAN found = FALSE; local 109 for (int i = HCI_EXT_FEATURES_PAGE_MAX; !found && i >= 0; i--) 115 found = TRUE; 168 ** Returns TRUE if removed OK, FALSE if not found or ACL link is active 333 BTM_TRACE_DEBUG("btm_dev_support_switch return TRUE (feature found)");
|
/system/core/init/ |
H A D | action.cpp | 137 *err = "property trigger found without matching '='"; 146 *err = "multiple property triggers found for same property"; 200 bool found = name.empty(); local 208 found = true; 218 return found;
|
/system/bt/bta/gatt/ |
H A D | bta_gattc_utils.c | 227 APPL_TRACE_DEBUG("bta_gattc_clcb_alloc: found clcb[%d] available",i_clcb); 260 ** Description find or allocate CLCB if not found. 394 BOOLEAN found = FALSE; local 401 found = TRUE; 410 /* if not found, try to recycle one known device */ 411 if (!found && !p_recycle) 413 else if (!found && p_recycle) 677 APPL_TRACE_DEBUG("bta_gattc_conn_alloc: found conn_track[%d] available",i_conn); 706 APPL_TRACE_DEBUG("bta_gattc_conn_find: found conn_track[%d] matched",i_conn);
|
/system/core/adf/libadf/ |
H A D | adf.c | 795 bool found = false; local 798 found = adf_find_simple_post_overlay_engine(dev, formats, n_formats, 800 if (found) { 807 if (!found)
|
/system/extras/f2fs_utils/ |
H A D | f2fs_sparseblock.c | 308 SLOGE("Valid Checkpoint not found!!"); 490 unsigned int used, found, started = 0, i; local 505 found = 0; 509 found = 1; 515 if (!found) {
|