/system/core/adb/ |
H A D | sysdeps_test.cpp | 207 static volatile bool flag = false; local 212 flag = true; 217 while (!flag) {
|
H A D | adb_trace.cpp | 134 const auto& flag = trace_flags.find(elem); local 135 if (flag == trace_flags.end()) { 136 LOG(ERROR) << "Unknown trace flag: " << elem; 140 if (flag->second == -1) { 146 adb_trace_mask |= 1 << flag->second;
|
/system/core/libvndksupport/ |
H A D | linker.c | 48 void* android_load_sphal_library(const char* name, int flag) { argument 56 handle = android_dlopen_ext(name, flag, &dlextinfo); 64 return dlopen(name, flag);
|
/system/extras/tests/timetest/ |
H A D | rtc_test.cpp | 29 static int hwtime(int flag, int request, struct rtc_time *tm) { argument 32 int ret = access(rtc, flag & O_WRONLY); 37 if (flag & O_WRONLY) { 48 ret = TEMP_FAILURE_RETRY(open(rtc, flag));
|
/system/nvram/core/include/nvram/core/ |
H A D | persistence.h | 40 // Check whether a flag is present. 41 bool HasFlag(Flags flag) const { 42 return (flags & flag) != 0; 45 // Set a flag. 46 void SetFlag(Flags flag) { argument 47 flags |= flag; 97 // Check whether a given flag is set. 98 bool HasFlag(Flags flag) const { 99 return (flags & flag) != 0; 102 // Set a flag 103 SetFlag(Flags flag) argument [all...] |
/system/bt/stack/smp/ |
H A D | smp_cmac.cc | 179 bool flag; local 182 /* last block is a complete block set flag to 1 */ 183 flag = 186 SMP_TRACE_WARNING("flag = %d round = %d", flag, cmac_cb.round); 188 if (flag) { /* last block is complete block */
|
/system/core/base/ |
H A D | logging_test.cpp | 72 bool flag = false; local 76 flag = true; 77 EXPECT_FALSE(flag) << "CHECK macro probably has a dangling if with no else"; 79 flag = false; 83 flag = true; 84 EXPECT_FALSE(flag) << "CHECK_STREQ probably has a dangling if with no else"; 452 bool flag = false; local 456 flag = true; 458 EXPECT_FALSE(flag) << "LOG macro probably has a dangling if with no else"; 460 flag [all...] |
/system/libfmq/ |
H A D | EventFlag.cpp | 34 status_t EventFlag::createEventFlag(int fd, off_t offset, EventFlag** flag) { argument 35 if (flag == nullptr) { 40 *flag = nullptr; 45 *flag = evFlag; 55 EventFlag** flag) { 56 if (flag == nullptr) { 61 *flag = nullptr; 66 *flag = evFlag; 88 ALOGE("Attempt to mmap event flag word failed: %s\n", strerror(errno)); 128 ALOGE("Error in event flag wak 54 createEventFlag(std::atomic<uint32_t>* fwAddr, EventFlag** flag) argument [all...] |
/system/bt/bta/hh/ |
H A D | bta_hh_utils.cc | 143 uint8_t flag) 145 UNUSED_ATTR uint8_t flag) 156 p_cb->dscp_info.flag = flag; 271 /* control key flag is set */ 140 bta_hh_update_di_info(tBTA_HH_DEV_CB* p_cb, uint16_t vendor_id, uint16_t product_id, uint16_t version, uint8_t flag) argument
|
/system/bt/stack/gatt/ |
H A D | att_protocol.cc | 71 BT_HDR* attp_build_exec_write_cmd(uint8_t op_code, uint8_t flag) { argument 83 flag &= GATT_PREP_WRITE_EXEC; 84 UINT8_TO_STREAM(p, flag);
|
H A D | gatt_cl.cc | 275 tGATT_EXEC_FLAG flag) { 281 gatt_cl_msg.exec_write = flag; 301 tGATT_EXEC_FLAG flag = GATT_PREP_WRITE_EXEC; local 312 flag = GATT_PREP_WRITE_CANCEL; 322 gatt_send_queue_write_cancel(tcb, p_clcb, flag); 274 gatt_send_queue_write_cancel(tGATT_TCB& tcb, tGATT_CLCB* p_clcb, tGATT_EXEC_FLAG flag) argument
|
H A D | gatt_db.cc | 302 uint8_t flag = 0; local 303 if (BTM_GetSecurityFlags(tcb.peer_bda, &flag)) { 306 if ((flag & (BTM_SEC_LINK_KEY_KNOWN | BTM_SEC_FLAG_ENCRYPTED)) ==
|
H A D | gatt_sr.cc | 289 uint8_t *p = p_data, flag, i = 0; local 307 if (len < sizeof(flag)) { 314 STREAM_TO_UINT8(flag, p); 316 /* mask the flag */ 317 flag &= GATT_PREP_WRITE_EXEC; 329 gatts_data.exec_write = flag;
|
H A D | gatt_api.cc | 838 tGATT_EXEC_FLAG flag = local 840 gatt_send_queue_write_cancel(*p_clcb->p_tcb, p_clcb, flag);
|
/system/connectivity/wificond/net/ |
H A D | nl80211_packet.cpp | 48 // Add NLM_F_REQUEST flag. 147 void NL80211Packet::AddFlag(uint16_t flag) { argument 149 nl_header->nlmsg_flags |= flag; 183 // We only need to append a header for flag attribute.
|
/system/core/fastboot/ |
H A D | udp.cpp | 73 void Set(uint8_t id, uint16_t sequence, Flag flag); 86 void Header::Set(uint8_t id, uint16_t sequence, Flag flag) { argument 88 bytes_[kIndexFlags] = flag; 219 // Set the continuation flag and truncate packet data if needed. 300 // If the response has a continuation flag we need to prompt for more data by sending
|
/system/core/logd/ |
H A D | main.cpp | 177 static bool check_flag(const char* prop, const char* flag) { argument 178 const char* cp = strcasestr(prop, flag); 187 cp += strlen(flag);
|
/system/netd/bpfloader/ |
H A D | bpf_kern.h | 107 uint16_t flag; local 115 ret = bpf_skb_load_bytes(skb, ihl * 4 + TCP_FLAG_OFF, &flag, 1); 116 if (ret == 0 && (flag >> RST_OFFSET & 1)) { 129 uint16_t flag; local 130 ret = bpf_skb_load_bytes(skb, sizeof(struct ipv6hdr) + TCP_FLAG_OFF, &flag, 1); 131 if (ret == 0 && (flag >> RST_OFFSET & 1)) {
|
/system/netd/libbpf/ |
H A D | BpfUtils.cpp | 168 int mapRetrieve(const char* pathname, uint32_t flag) { argument 172 attr.file_flags = flag;
|
/system/extras/ioshark/ |
H A D | compile_ioshark.c | 37 int flag; member in struct:flags_map_s 451 int found = 0, flag = 0; local 458 flag = flags_map[i].flag; 468 return flag;
|
/system/libhidl/ |
H A D | test_main.cpp | 324 bool flag = false; local 326 flag = true; 333 EXPECT_TRUE(cv.wait_for(lock, 1s, [&]{return flag;})); 334 EXPECT_TRUE(flag);
|
/system/security/keystore/ |
H A D | blob.cpp | 184 inline uint8_t setFlag(uint8_t flags, bool set, KeyStoreFlag flag) { argument 185 return set ? (flags | flag) : (flags & ~flag);
|
/system/core/adf/libadf/ |
H A D | adf.cpp | 290 __u32 flag) 292 return !!(data->flags & flag); 295 ssize_t adf_interfaces_filter_by_flag(struct adf_device *dev, __u32 flag, argument 299 flag); 289 adf_interface_flags_filter(struct adf_interface_data *data, __u32 flag) argument
|
/system/core/liblog/ |
H A D | properties.c | 406 static bool check_flag(const char* prop, const char* flag) { argument 407 const char* cp = strcasestr(prop, flag); 416 cp += strlen(flag); 440 int flag) { 442 if (flag & BOOL_DEFAULT_FLAG_PERSIST) { 463 flag &= ~(BOOL_DEFAULT_FLAG_ENG | BOOL_DEFAULT_FLAG_SVELTE); 466 flag |= BOOL_DEFAULT_FLAG_ENG; 468 /* this is really a "not" flag */ 470 flag |= BOOL_DEFAULT_FLAG_SVELTE; 474 if (flag 439 __android_logger_property_get_bool(const char* key, int flag) argument [all...] |
/system/core/libnativebridge/ |
H A D | native_bridge.cc | 489 void* NativeBridgeLoadLibrary(const char* libpath, int flag) { argument 491 return callbacks->loadLibrary(libpath, flag); 618 void* NativeBridgeLoadLibraryExt(const char* libpath, int flag, native_bridge_namespace_t* ns) { argument 621 return callbacks->loadLibraryExt(libpath, flag, ns);
|