/system/connectivity/shill/dbus/ |
H A D | chromeos_firewalld_proxy.cc | 44 bool success = false; local 46 if (!proxy_->RequestVpnSetup(user_names, interface, &success, &error)) { 50 return success; 60 bool success = false; local 61 if (!proxy_->RemoveVpnSetup(user_names_, interface_name_, &success, &error)) { 67 return success;
|
H A D | chromeos_permission_broker_proxy.cc | 62 bool success = false; local 64 user_names, interface, dbus_fd, &success, &error)) { 68 return success; 82 bool success = false; local 83 if (!proxy_->RemoveVpnSetup(&success, &error)) { 87 return success;
|
H A D | chromeos_supplicant_bss_proxy.cc | 70 bool success) { 73 << "success: " << success; local 74 if (!success) { 67 OnSignalConnected( const std::string& interface_name, const std::string& signal_name, bool success) argument
|
H A D | chromeos_supplicant_network_proxy.cc | 107 bool success) { 110 << "success: " << success; local 111 if (!success) { 104 OnSignalConnected( const std::string& interface_name, const std::string& signal_name, bool success) argument
|
H A D | chromeos_supplicant_bss_proxy.h | 47 bool success);
|
/system/core/libsuspend/include/suspend/ |
H A D | autosuspend.h | 33 * Returns 0 on success, -1 if autosuspend was not enabled. 43 * Returns 0 on success, -1 if autosuspend was not disabled. 51 * success is true if the suspend was sucessful and false if the suspend 54 void set_wakeup_callback(void (*func)(bool success));
|
/system/connectivity/shill/test-rpc-proxy/ |
H A D | proxy_rpc_out_data_types.cc | 25 bool success, 30 : success_(success), 42 value["success"] = success_; 24 AssociationResult( bool success, double discovery_time, double association_time, double configuration_time, const std::string& failure_reason) argument
|
H A D | proxy_rpc_out_data_types.h | 27 AssociationResult(bool success,
|
/system/connectivity/apmanager/dbus/ |
H A D | firewalld_dbus_proxy.cc | 58 bool success = false; local 60 if (!proxy_->PunchUdpHole(port, interface, &success, &error)) { 65 if (!success) { 83 bool success; local 84 if (!proxy_->PlugUdpHole(port, interface, &success, &error)) { 89 if (!success) {
|
/system/connectivity/shill/test-scripts/ |
H A D | connect-service | 25 (success, diagnostics) = flim.ConnectService(service=service) 27 print 'Success:', success
|
H A D | connect-disconnect | 108 success = 0 113 success += 1 117 (float(total - success) / total, success, total - success, total))
|
/system/core/libmincrypt/test/ |
H A D | ecdsa_test.c | 231 int success = 1; local 237 success = success && !(good ^ result); \ 244 success = success && result; \ 248 success = success && result; \ 273 success = success && result; \ 281 printf("\n%s\n\n", success [all...] |
/system/media/camera/docs/ |
H A D | metadata_validate.py | 199 success = True 216 success = False 223 success = False 225 return success 243 success = True 251 success = False 263 success = False 276 success = False 282 success = False 284 return success [all...] |
/system/core/adb/ |
H A D | remount_service.cpp | 138 bool success = true; local 142 success &= remount_partition(fd, "/"); 144 success &= remount_partition(fd, "/system"); 146 success &= remount_partition(fd, "/vendor"); 147 success &= remount_partition(fd, "/oem"); 149 WriteFdExactly(fd, success ? "remount succeeded\n" : "remount failed\n");
|
/system/extras/simpleperf/ |
H A D | cmd_report_test.cpp | 46 success = false; 62 success = true; 68 bool success; member in class:ReportCommandTest 73 ASSERT_TRUE(success); 79 ASSERT_TRUE(success); 89 ASSERT_TRUE(success); 104 ASSERT_TRUE(success); 150 ASSERT_TRUE(success); 153 ASSERT_TRUE(success); 156 ASSERT_TRUE(success); [all...] |
/system/tools/aidl/ |
H A D | code_writer.cpp | 63 bool success; variable 66 success = vfprintf(output_, format, ap) >= 0; 68 no_error_ = no_error_ && success; 69 return success;
|
/system/vold/ |
H A D | CryptCommandListener.h | 31 static int sendGenericOkFailOnBool(SocketClient *cli, bool success);
|
/system/bt/btif/co/ |
H A D | bta_hl_co.c | 68 ** Returns Bloolean - TRUE success 74 BOOLEAN success = FALSE; local 79 success = TRUE; 83 BTIF_TRACE_DEBUG("%s success=%d num_mdeps=%d", 84 __FUNCTION__, success, *p_num_of_mdep ); 85 return success; 131 ** Returns Bloolean - TRUE success 141 BOOLEAN success = FALSE; local 154 success = TRUE; 157 BTIF_TRACE_DEBUG("%s success 181 BOOLEAN success = FALSE; local [all...] |
/system/core/base/ |
H A D | utf8_test.cpp | 64 // UTF8ToWide() and WideToUTF8() that don't return success/failure, so these are 140 bool success; member in struct:android::base::UTF8ToWideCase 169 const bool success = UTF8ToWide(convert_cases[i].utf8, local 172 EXPECT_EQ(convert_cases[i].success, success); 176 if (success) { 204 bool success; member in struct:android::base::WideToUTF8Case 238 const bool success = WideToUTF8(convert_cases[i].utf16, local 241 EXPECT_EQ(convert_cases[i].success, success); 260 bool success; member in struct:android::base::WideToUTF8Case [all...] |
/system/connectivity/shill/wifi/ |
H A D | tdls_manager.cc | 64 bool success = false; local 66 success = DiscoverPeer(peer_mac_address); 68 success = SetupPeer(peer_mac_address); 93 success = TearDownPeer(peer_mac_address); 99 if (!success) {
|
/system/core/libsuspend/ |
H A D | autosuspend_wakeup_count.c | 42 static void (*wakeup_func)(bool success) = NULL; 50 bool success; local 77 success = true; 87 success = false; 89 void (*func)(bool success) = wakeup_func; 91 (*func)(success); 143 void set_wakeup_callback(void (*func)(bool success)) argument
|
/system/netd/server/ |
H A D | DnsProxyListener.cpp | 101 // Returns true on success. 106 // Returns true on success 108 bool success = true; local 111 success &= sendLenAndData(c, strlen(hp->h_name)+1, hp->h_name); 113 success &= sendLenAndData(c, 0, "") == 0; 117 success &= sendLenAndData(c, strlen(hp->h_aliases[i])+1, hp->h_aliases[i]); 119 success &= sendLenAndData(c, 0, ""); // null to indicate we're done 122 success &= c->sendData(&buf, sizeof(buf)) == 0; 125 success &= c->sendData(&buf, sizeof(buf)) == 0; 128 success 148 bool success = local 187 bool success = !mClient->sendCode(ResponseCode::DnsProxyQueryResult); local 420 bool success = true; local 576 bool success = true; local [all...] |
/system/firewalld/ |
H A D | iptables.cc | 86 bool success = true; local 92 success = false; 97 return success; 266 bool success = true; local 274 success = false; 282 success = false; 291 success = false; 298 return success; 390 bool success = ExecvNonRoot(argv, kIpTablesCapMask) == 0; local 392 if (!success) { 418 bool success = ExecvNonRoot(argv, kIpTablesCapMask) == 0; local 441 bool success = ip.Run() == 0; local [all...] |
/system/bt/service/ |
H A D | gatt_client.cpp | 97 bool success = (status == BT_STATUS_SUCCESS); local 98 BLEStatus result = success ? BLE_STATUS_SUCCESS : BLE_STATUS_FAILURE; 102 if (success)
|
/system/connectivity/shill/supplicant/ |
H A D | supplicant_event_delegate_interface.h | 51 virtual void ScanDone(const bool& success) = 0;
|