/system/tools/hidl/test/ |
H A D | test.sh | 29 function check() { function 66 check package="tests.errors.syntax@1.0" filename="errors/syntax.output" 68 check package="tests.errors.versioning@2.2" \ 71 check package="tests.errors.versioning@3.3" \
|
/system/libfmq/ |
H A D | FmqInternal.cpp | 24 void check(bool exp) { function in namespace:android::hardware::details
|
/system/media/camera/docs/ |
H A D | metadata-validate | 20 $thisdir/metadata-check-dependencies || exit 1
|
H A D | metadata-parser-sanity-check | 20 # Sanity check the XML parser by making sure it's generating the same data 26 $thisdir/metadata-check-dependencies || exit 1 60 echo "ERROR: Files differ, please check parser logic" 1>&2
|
H A D | ACameraMetadata.mako | 54 // Skip check for vendor keys
|
H A D | metadata-generate | 194 $thisdir/metadata-check-dependencies || exit 1 196 $thisdir/metadata-parser-sanity-check || exit 1
|
/system/extras/libfec/ |
H A D | fec_open.cpp | 47 check(offset); 48 check(get_appr_size); 49 check(get_real_size); 92 check(f); 93 check(offset); 102 check(f); 103 check(f->ecc.rsn > 0 && f->ecc.rsn < FEC_RSM); 104 check(f->size > sizeof(fec_header)); 201 check(f); 202 check(offse 203 check(offset < UINT64_MAX - FEC_BLOCKSIZE); function [all...] |
H A D | fec_verity.cpp | 41 check(dst); 42 check(src); 43 check(2 * size == strlen(src)); 49 check(l >= 0); 50 check(h >= 0); 66 check(src); 67 check(dst); 126 check(f); 127 check(f->verity.salt); 130 check(bloc [all...] |
H A D | fec_read.cpp | 86 /* check if `offset' is within a block expected to contain zeros */ 110 check(offset % FEC_BLOCKSIZE == 0); 121 /* verity is required to check for erasures */ 122 check(!use_erasures || f->verity.hash); 156 check(data_index >= 0); 192 check(rc <= (use_erasures ? e->roots : e->roots / 2)); 211 check(f); 237 check(f); 238 check(dest); 239 check(offse [all...] |
H A D | fec_process.cpp | 46 check(f); 47 check(buf) 48 check(func); 85 check(left > 0); 114 check(left == 0);
|
H A D | fec_private.h | 49 #define VERITY_MIN_TABLE_SIZE (VERITY_TABLE_ARGS * 2) /* for a sanity check */ 167 #define check(p) \ macro
|
/system/sepolicy/tools/ |
H A D | Android.mk | 40 LOCAL_MODULE := sepolicy-check 43 LOCAL_SRC_FILES := sepolicy-check.c
|
H A D | sepolicy-check.c | 43 int check(int op, uint16_t arg1, uint16_t arg2) { function 86 match &= check(s_op, source_type, cur->key.source_type); 87 match &= check(t_op, target_type, cur->key.target_type); 88 match &= check(c_op, target_class, cur->key.target_class);
|
/system/core/libnetutils/ |
H A D | packet.c | 108 ip.check = 0; 111 ip.check = finish_sum(checksum(&ip, sizeof(ip), 0)); 116 udp.check = 0; 131 udp.check = finish_sum(udpsum); 212 ALOGW("IP header checksum failure (0x%x)", packet.ip.check); 229 temp = packet.udp.check; 230 packet.udp.check = 0; 232 packet.udp.check = temp;
|
/system/update_engine/scripts/ |
H A D | paycheck.py | 50 'Update Engine. Use --check to verify a payload prior to ' 54 check_opts.add_option('-c', '--check', action='store_true', default=False, 55 help=('force payload integrity check (e.g. before ' 124 # There are several options that imply --check. 125 opts.check = (opts.check or opts.report or opts.assert_type or 143 # integrity check. 145 opts.check = True 154 # of the payload we are checking. We only do it if check was triggered. 155 if opts.check an [all...] |
/system/keymaster/include/keymaster/ |
H A D | keymaster_tags.h | 40 * particular tag. This enables template functions to be written that check that the correct 66 static void check() {} function in struct:keymaster::StaticAssert 105 StaticAssert<(tag & tag_type) == tag_type>::check(); 106 StaticAssert<(tag_type != KM_ENUM) && (tag_type != KM_ENUM_REP)>::check(); 121 StaticAssert<(tag & tag_type) == tag_type>::check(); 122 StaticAssert<(tag_type == KM_ENUM) || (tag_type == KM_ENUM_REP)>::check();
|
/system/core/fastboot/ |
H A D | usb_linux.cpp | 126 static int check(void *_desc, int len, unsigned type, int size) function 153 if (check(ptr, len, USB_DT_DEVICE, USB_DT_DEVICE_SIZE)) 159 if (check(ptr, len, USB_DT_CONFIG, USB_DT_CONFIG_SIZE)) 208 if (check(hdr, len, USB_DT_INTERFACE, USB_DT_INTERFACE_SIZE) == 0) 230 if (check(hdr, len, USB_DT_ENDPOINT, USB_DT_ENDPOINT_SIZE) == 0) 253 if (check((struct usb_descriptor_hdr *)ptr, len,
|
/system/security/keystore/tests/ |
H A D | Makefile | 94 MEMCHECK_OPTS=--leak-check=full \
|
/system/media/radio/src/ |
H A D | radio_metadata.c | 141 bool check) 148 if (check) { 314 /* sanity check on entry count versus buffer size */ 324 /* sanity check on each entry */ 338 /* do not request check because next entry can be the free slot */ 138 get_entry_at_index( const radio_metadata_buffer_t *metadata, const unsigned index, bool check) argument
|
/system/core/trusty/keymaster/ |
H A D | Makefile | 132 MEMCHECK_OPTS=--leak-check=full \
|
/system/libfmq/include/fmq/ |
H A D | MessageQueue.h | 33 void check(bool exp); 600 details::check(mReadPtr != nullptr); 604 details::check(mWritePtr != nullptr); 615 details::check(mRing != nullptr); 873 * after a single write operation. This check would fail to clear a pending
|
/system/bt/doc/ |
H A D | power_management.md | 126 the same check is done against the second action and it is used
|
/system/core/libbacktrace/ |
H A D | backtrace_test.cpp | 260 bool check = (cur_proc == nullptr); local 262 if (check) { 271 if (!check && bt_ign2->GetFrame(i)->func_name == cur_proc) { 272 check = true;
|
/system/keymaster/ |
H A D | Makefile | 173 MEMCHECK_OPTS=--leak-check=full \
|
/system/core/logd/tests/ |
H A D | logd_test.cpp | 90 bool check = ret <= len; local 92 if (check) { 322 // check if we can read any logs from logd 351 // check if we can read any logs from kernel logger 398 // thresholds are tuned on a per-target basis. Here we check if the values 403 // being the worst) and check to make sure the logger can deal with it 417 " false OK for prune by worst UID check\n"); 1141 // cool down, and check unspammy rate still works
|