/system/core/libnetutils/ |
H A D | dhcptool.c | 39 int rc = do_dhcp(interface); local 40 if (rc) { 46 return rc ? EXIT_FAILURE : EXIT_SUCCESS;
|
/system/core/logwrapper/ |
H A D | android_fork_execvp_ext_benchmark.cpp | 26 int rc = android_fork_execvp_ext( local 29 CHECK_EQ(0, rc);
|
H A D | logwrapper.c | 56 int rc; local 82 rc = android_fork_execvp_ext(argc, &argv[0], &status, true, 84 if (!rc) { 86 rc = WEXITSTATUS(status); 88 rc = -ECHILD; 96 return rc;
|
/system/update_engine/payload_generator/ |
H A D | bzip.cc | 45 int rc = BZ2_bzBuffToBuffCompress( local 53 TEST_AND_RETURN_FALSE(rc == BZ_OUTBUFF_FULL || rc == BZ_OK); 54 if (rc == BZ_OK) {
|
/system/core/trusty/libtrusty/ |
H A D | trusty.c | 35 int rc; local 39 rc = -errno; 42 return rc < 0 ? rc : -1; 45 rc = ioctl(fd, TIPC_IOC_CONNECT, srv_name); 46 if (rc < 0) { 47 rc = -errno; 51 return rc < 0 ? rc : -1;
|
/system/hwservicemanager/ |
H A D | service.cpp | 66 int rc = property_set("hwservicemanager.ready", "true"); local 67 if (rc) { 69 "HAL services will not start!\n", rc);
|
/system/security/keystore/ |
H A D | keystore_aidl_hidl_marshalling_utils.h | 43 auto rc = out->writeInt32(1); local 44 if (rc != ::android::OK) return rc; 50 auto rc = out->writeInt32(1); local 51 if (rc != ::android::OK) return rc;
|
H A D | KeyAttestationApplicationId.cpp | 40 auto rc = parcel->readParcelableVector(&temp_vector); local 41 if (rc != NO_ERROR) return rc;
|
H A D | KeyAttestationPackageInfo.cpp | 34 auto rc = parcel->writeString16(packageName_); local 35 if (rc != NO_ERROR) return rc; 36 rc = parcel->writeInt64(versionCode_); 37 if (rc != NO_ERROR) return rc; 42 auto rc = parcel->readString16(&packageName_); local 43 if (rc != NO_ERROR) return rc; 44 rc [all...] |
/system/core/debuggerd/tombstoned/ |
H A D | tombstoned_client.cpp | 56 ssize_t rc = recv_fd(sockfd, &packet, sizeof(packet), &tmp_output_fd); local 57 if (rc == -1) { 61 } else if (rc != sizeof(packet)) { 65 sizeof(packet), rc);
|
/system/core/libcutils/ |
H A D | iosched_policy.cpp | 46 int rc; local 48 if ((rc = syscall(SYS_ioprio_get, IOPRIO_WHO_PROCESS, pid)) < 0) { 52 *clazz = static_cast<IoSchedClass>(rc >> IOPRIO_CLASS_SHIFT); 53 *ioprio = (rc & 0xff);
|
H A D | socket_network_client_unix.cpp | 68 int rc = connect(s, addr->ai_addr, addr->ai_addrlen); local 69 if (rc == 0) { 72 } else if (rc == -1 && errno != EINPROGRESS) { 85 if ((rc = select(s + 1, &r_set, &w_set, NULL, (timeout != 0) ? &ts : NULL)) == -1) { 89 if (rc == 0) { // we had a timeout
|
/system/bt/osi/src/ |
H A D | semaphore.cc | 88 bool rc = true; local 90 if (eventfd_read(semaphore->fd, &value) == -1) rc = false; 95 return rc;
|
/system/bt/osi/test/ |
H A D | list_test.cc | 172 list_node_t* rc = list_foreach(list, list_callback_sum, &sum); local 174 EXPECT_TRUE(rc == NULL); 189 list_node_t* rc = list_foreach(list, list_callback_find_int, &find); local 190 EXPECT_TRUE(rc != NULL); 191 int* rc_val = (int*)list_node(rc); 195 rc = list_foreach(list, list_callback_find_int, &find); 196 EXPECT_TRUE(rc != NULL); 197 rc_val = (int*)list_node(rc); 201 rc = list_foreach(list, list_callback_find_int, &find); 202 EXPECT_TRUE(rc ! [all...] |
/system/chre/platform/slpi/see/ |
H A D | island_vote_client.cc | 101 sns_rc rc = bigImage local 104 // TODO: (b/74524281) define success = (rc == SNS_RC_SUCCESS). 105 bool success = (rc != SNS_RC_FAILED); 109 LOGE("Failed to vote for bigImage %d with result %d", bigImage, rc);
|
/system/core/fs_mgr/ |
H A D | fs_mgr_format.cpp | 59 int rc = 0; local 62 rc = get_dev_sz(fs_blkdev, &dev_sz); 63 if (rc) { 64 return rc; 76 rc = android_fork_execvp_ext(arraysize(mke2fs_args), const_cast<char**>(mke2fs_args), NULL, 78 if (rc) { 79 LERROR << "mke2fs returned " << rc; local 80 return rc; 91 rc = android_fork_execvp_ext(arraysize(e2fsdroid_args), const_cast<char**>(e2fsdroid_args), 93 if (rc) { 94 LERROR << "e2fsdroid returned " << rc; local 105 int rc = get_dev_sz(fs_blkdev, &dev_sz); local 138 int rc = -EINVAL; local [all...] |
/system/core/trusty/gatekeeper/ |
H A D | trusty_gatekeeper_ipc.c | 36 int rc = tipc_connect(TRUSTY_DEVICE_NAME, GATEKEEPER_PORT); local 37 if (rc < 0) { 38 return rc; 41 handle_ = rc; 57 ssize_t rc = write(handle_, msg, msg_size); local 60 if (rc < 0) { 66 rc = read(handle_, out, *out_size); 67 if (rc < 0) { 73 if ((size_t) rc < sizeof(struct gatekeeper_message)) { 74 ALOGE("invalid response size (%d)\n", (int) rc); [all...] |
/system/extras/libfec/test/ |
H A D | test_rs.c | 39 int i, rc, neras, errors; local 65 rc = decode_rs_char(rs, corr, NULL, 0); 67 printf("\tno erasures: %d\n", rc); 78 rc = decode_rs_char(rs, dupl, erasures, neras); 80 printf("\terasures: %d\n", rc);
|
/system/keymaster/legacy_support/ |
H A D | keymaster_passthrough_operation.cpp | 33 keymaster_error_t rc; local 40 rc = km_device_->update(km_device_, operation_handle_, &mutable_input_params, &in, &consumed, &out_params, &out); 41 if (rc == KM_ERROR_OK) { 49 return rc; 69 rc = km_device_->finish(km_device_, operation_handle_, &mutable_input_params, &sig, &out_params, &out); 70 if (rc != KM_ERROR_OK) return rc; 102 keymaster_error_t rc; local 103 rc = km_device_->finish(km_device_, operation_handle_, &input_params, &in, &sig, &out_params, &out); 104 if (rc [all...] |
/system/sepolicy/tools/sepolicy-analyze/ |
H A D | sepolicy-analyze.c | 47 int rc; local 57 rc = analyze_components[i].func(argc - 2, argv + 2, &policydb); 58 if (rc && USAGE_ERROR) { 61 return rc;
|
/system/update_engine/payload_consumer/ |
H A D | bzip_extent_writer.cc | 31 int rc = BZ2_bzDecompressInit(&stream_, local 35 TEST_AND_RETURN_FALSE(rc == BZ_OK); 60 int rc = BZ2_bzDecompress(&stream_); local 61 TEST_AND_RETURN_FALSE(rc == BZ_OK || rc == BZ_STREAM_END); 70 if (rc == BZ_STREAM_END)
|
H A D | file_writer.cc | 37 ssize_t rc = write(fd_, char_bytes + bytes_written, local 39 if (rc < 0) 41 bytes_written += rc; 49 int rc = close(fd_); local 55 if (rc < 0) 57 return rc;
|
/system/update_engine/ |
H A D | test_subprocess.cc | 49 int rc = fstat(fd, &buf); local 50 if (rc < 0) {
|
/system/core/adb/sysdeps/posix/ |
H A D | network.cpp | 81 int rc = _network_loopback_client(false, port, type, error); local 82 if (rc == -1) { 85 return rc; 118 int rc = _network_loopback_server(false, port, type, error); local 122 if (rc == -1 && (errno == EADDRNOTAVAIL || errno == EAFNOSUPPORT)) { 125 return rc;
|
/system/core/trusty/keymaster/ |
H A D | trusty_keymaster_ipc.cpp | 40 int rc = tipc_connect(TRUSTY_DEVICE_NAME, KEYMASTER_PORT); local 41 if (rc < 0) { 42 return rc; 45 handle_ = rc; 66 ssize_t rc = write(handle_, msg, msg_size); local 69 if (rc < 0) { 82 rc = readv(handle_, iov, 2); 83 if (rc < 0) { 89 if ((size_t)rc < sizeof(struct keymaster_message)) { 90 ALOGE("invalid response size (%d)\n", (int)rc); [all...] |