/system/update_engine/common/ |
H A D | action.h | 68 // that are of the same type. So, to get the input/output types of, e.g., the 185 bool HasInputObject() const { return in_pipe_.get(); } 196 return out_pipe_.get();
|
H A D | http_fetcher.cc | 48 CHECK_EQ(static_cast<Closure*>(nullptr), callback_.get()); 72 CHECK(callback_.get()) << "ProxiesResolved but none pending.";
|
/system/core/debuggerd/tombstoned/ |
H A D | intercept_manager.cpp | 40 CHECK_EQ(sockfd, intercept->sockfd.get()); 53 if (it->second.get() != intercept) { 86 CHECK_EQ(sockfd, intercept->sockfd.get()); 111 int moved_fd = fcntl(rcv_fd.get(), F_DUPFD, 512); 113 LOG(WARNING) << "failed to move received fd (" << rcv_fd.get() << ")"; 211 LOG(INFO) << "found intercept fd " << intercept->output_fd.get() << " for pid " << pid
|
/system/core/fastboot/ |
H A D | usb_windows.cpp | 127 // First get expected name length 148 usb_cleanup_handle(ret.get()); 172 usb_kick(handle_.get()); 211 usb_kick(handle_.get()); 256 usb_cleanup_handle(handle_.get()); 344 if (recognized_device(handle.get(), callback)) { 348 usb_cleanup_handle(handle.get());
|
H A D | socket_test.cpp | 83 EXPECT_TRUE(SendString(client.get(), "foo")); 84 EXPECT_TRUE(ReceiveString(server.get(), "foo")); 86 EXPECT_TRUE(SendString(server.get(), "bar baz")); 87 EXPECT_TRUE(ReceiveString(client.get(), "bar baz")); 150 EXPECT_TRUE(SendString(client.get(), message)); 151 EXPECT_TRUE(ReceiveString(server.get(), message)); 161 EXPECT_TRUE(SendString(client.get(), "1234567890")); 368 EXPECT_EQ(mock_handler, mock.Accept().get()); 371 EXPECT_EQ(nullptr, mock.Accept().get());
|
/system/extras/perfprofd/ |
H A D | perfprofd_io.cc | 49 return WriteFully(fd_.get(), buffer, size); 142 int init_result = deflateInit2(stream.get(), 214 stream_->next_in = static_cast<Bytef*>(stream_buffer_.get()); 216 *data = stream_buffer_.get(); 276 out = gzip.get(); 302 if (fd.get() == -1) {
|
/system/keymaster/km_openssl/ |
H A D | ecdsa_operation.cpp | 36 if (!ecdsa_key.InternalToEvp(pkey.get())) { 150 if (!ecdsa.get()) 153 output->Reinitialize(ECDSA_size(ecdsa.get())); 156 output->peek_write(), &siglen_tmp, ecdsa.get())) 215 if (!ecdsa.get()) 220 signature.peek_read(), signature.available_read(), ecdsa.get());
|
/system/nvram/hal/ |
H A D | fake_nvram_storage.cpp | 81 if (data_file_fd.get() < 0) { 90 if (TEMP_FAILURE_RETRY(fstat(data_file_fd.get(), &data_file_stat))) { 105 if (!android::base::ReadFully(data_file_fd.get(), blob->data(), 119 if (data_file_fd.get() < 0) { 127 if (!android::base::WriteFully(data_file_fd.get(), blob.data(), 135 if (TEMP_FAILURE_RETRY(fdatasync(data_file_fd.get()))) {
|
/system/update_engine/payload_generator/ |
H A D | ext2_filesystem_unittest.cc | 69 ASSERT_EQ(nullptr, fs.get()); 72 ASSERT_EQ(nullptr, fs.get()); 79 ASSERT_NE(nullptr, fs.get()); 109 ASSERT_NE(nullptr, fs.get()); 191 ASSERT_NE(nullptr, fs.get()); 201 ASSERT_NE(nullptr, fs.get());
|
/system/connectivity/wificond/net/ |
H A D | netlink_manager.cpp | 180 LOG(ERROR) << "Failed to get family id"; 185 LOG(ERROR) << "Failed to get family name"; 204 LOG(ERROR) << "Failed to get group name"; 208 LOG(ERROR) << "Failed to get group id"; 269 if (!SendMessageInternal(packet, async_netlink_fd_.get())) { 279 if (!SendMessageInternal(packet, sync_netlink_fd_.get())) { 285 netlink_output.fd = sync_netlink_fd_.get(); 313 ReceivePacketAndRunHandler(sync_netlink_fd_.get()); 407 if (netlink_fd->get() < 0) { 413 if (setsockopt(netlink_fd->get(), [all...] |
/system/bt/btif/src/ |
H A D | btif_config.cc | 157 config_set_string(config.get(), INFO_SECTION, FILE_SOURCE, file_source); 159 btif_config_remove_unpaired(config.get()); 162 if (!is_restricted_mode()) btif_config_remove_restricted(config.get()); 174 config_set_string(config.get(), INFO_SECTION, FILE_TIMESTAMP, 265 config_set_int(config.get(), section, key, value); 287 config_set_uint64(config.get(), section, key, value); 315 config_set_string(config.get(), section, key, value); 372 config_set_string(config.get(), section, key, str); 385 return config_remove_key(config.get(), section, key); 433 btif_config_remove_unpaired(config_paired.get()); [all...] |
/system/chre/platform/slpi/see/ |
H A D | platform_sensor.cc | 131 EventLoopManagerSingleton::get()->getSensorRequestManager() 152 EventLoopManagerSingleton::get()->getEventLoop().postEventOrFree( 163 Sensor *sensor = EventLoopManagerSingleton::get()->getSensorRequestManager() 189 EventLoopManagerSingleton::get()->getSensorRequestManager() 211 EventLoopManagerSingleton::get()->deferCallback( 220 updateLastEvent(sensorType, eventData.get()); 224 EventLoopManagerSingleton::get()->getEventLoop().postEventOrFree( 225 eventType, eventData.get(), seeSensorDataEventFree); 231 EventLoopManagerSingleton::get()->getEventLoop() 360 LOGE("Failed to get attribute [all...] |
/system/core/logd/ |
H A D | main.cpp | 126 if (cap_clear(caps.get()) < 0) return -1; 130 if (cap_set_flag(caps.get(), CAP_PERMITTED, arraysize(cap_value), cap_value, 134 if (cap_set_flag(caps.get(), CAP_EFFECTIVE, arraysize(cap_value), cap_value, 138 if (cap_set_proc(caps.get()) < 0) { 162 if (cap_set_flag(caps.get(), CAP_PERMITTED, 1, cap_value, CAP_CLEAR) < 0) { 165 if (cap_set_flag(caps.get(), CAP_EFFECTIVE, 1, cap_value, CAP_CLEAR) < 0) { 168 if (cap_set_proc(caps.get()) < 0) { 357 rc = klogctl(KLOG_READ_ALL, buf.get(), len); 368 kl->synchronize(buf.get(), len); 372 for (char *ptr = nullptr, *tok = buf.get(); [all...] |
/system/keymaster/contexts/ |
H A D | soft_keymaster_context.cpp | 74 rsa_factory_.reset(new RsaKeymaster0KeyFactory(this, km0_engine_.get())); 75 ec_factory_.reset(new EcdsaKeymaster0KeyFactory(this, km0_engine_.get())); 88 rsa_factory_.reset(new RsaKeymaster1KeyFactory(this, km1_engine_.get())); 89 ec_factory_.reset(new EcdsaKeymaster1KeyFactory(this, km1_engine_.get())); 112 return rsa_factory_.get(); 114 return ec_factory_.get(); 116 return aes_factory_.get(); 118 return tdes_factory_.get(); 120 return hmac_factory_.get(); 439 keymaster_error_t error = FakeKeyAuthorizations(tmp_key.get(), hw_enforce [all...] |
/system/netd/bpfloader/ |
H A D | BpfLoader.cpp | 87 FAIL("Failed to get map from %s", (_mapPath)); \ 124 if (progCopy.get().size() != progSize) { 137 if (fstat(fd, &stat)) FAIL("Fail to get file size"); 305 ReplacePattern(COOKIE_TAG_MAP, cookieTagMap.get()), 306 ReplacePattern(UID_COUNTERSET_MAP, uidCounterSetMap.get()), 307 ReplacePattern(APP_UID_STATS_MAP, appUidStatsMap.get()), 308 ReplacePattern(UID_STATS_MAP, uidStatsMap.get()), 309 ReplacePattern(TAG_STATS_MAP, tagStatsMap.get()), 310 ReplacePattern(IFACE_STATS_MAP, ifaceStatsMap.get()), 311 ReplacePattern(DOZABLE_UID_MAP, dozableUidMap.get()), [all...] |
/system/libhwbinder/vts/performance/ |
H A D | Latency.cpp | 52 using std::get; 165 return move(get<0>(pipe_pair)); 169 serviceFx(service_name, move(get<1>(pipe_pair))); 170 // never get here 172 return move(get<0>(pipe_pair)); 244 return move(get<0>(pipe_pair)); 248 clientFx(num, no_pair, iterations, move(get<1>(pipe_pair))); 249 // never get here 251 return move(get<0>(pipe_pair));
|
/system/core/adb/ |
H A D | adb.cpp | 531 if (!_make_handle_noninheritable(pipe_read.get())) { 552 fprintf(stderr, "adb: failed to get file descriptor for %s: %s\n", output_name, 580 if (stream.get() == nullptr) { 589 if (setvbuf(stream.get(), NULL, _IONBF, 0) == -1) { 600 if (!ReadFile(read_pipe.get(), buf, sizeof(buf), &bytes_read, NULL)) { 616 const size_t bytes_written = fwrite(buf, 1, bytes_read, stream.get()); 681 if (nul_read.get() == INVALID_HANDLE_VALUE) { 706 * using read() to get its output. When this happens, the stdout/stderr 732 startup.hStdInput = nul_read.get(); 733 startup.hStdOutput = stdout_write.get(); [all...] |
/system/extras/boottime_tools/bootanalyze/ |
H A D | bootanalyze.py | 126 events = shutdown_event_all.get(k) 133 events = shutdown_timing_event_all.get(k) 261 while timing_points.get(new_name): # if the name is already taken, append #digit 351 if not logcat_event_time.get(KERNEL_TIME_KEY): 352 print "kernel time not captured in logcat, cannot get time diff" 356 if logcat_event_time.get(BOOT_ANIM_END_TIME_KEY) and dmesg_event_time.get(BOOT_ANIM_END_TIME_KEY): 360 if not dmesg_event_time.get(KERNEL_BOOT_COMPLETE): 362 ", cannot get time diff" 413 if events.get("BootComplet [all...] |
/system/update_engine/ |
H A D | update_attempter.cc | 250 if (forced_update_pending_callback_.get()) 301 if (!policy_provider_.get()) 577 postinstall_runner_action.get()); 647 BondActions(update_check_action.get(), 648 response_handler_action.get()); 649 BondActions(response_handler_action.get(), 650 download_action.get()); 651 BondActions(download_action.get(), 652 filesystem_verifier_action.get()); 653 BuildPostInstallActions(filesystem_verifier_action.get()); [all...] |
/system/core/libion/tests/ |
H A D | device_test.cpp | 138 void *buf = (void *)(ALIGN((unsigned long)alloc_ptr.get(), 4096) + 1024); 170 void *buf = (void *)(ALIGN((unsigned long)alloc_ptr.get(), 4096) + 1024); 202 void *buf = (void *)(ALIGN((unsigned long)alloc_ptr.get(), 4096) + 1024); 232 void *buf = (void *)(ALIGN((unsigned long)alloc_ptr.get(), 4096) + 1024); 264 void *buf = (void *)(ALIGN((unsigned long)alloc_ptr.get(), 4096) + 1024); 296 void *buf = (void *)(ALIGN((unsigned long)alloc_ptr.get(), 4096) + 1024); 328 void *buf = (void *)(ALIGN((unsigned long)alloc_ptr.get(), 4096) + 1024); 360 void *buf = (void *)(ALIGN((unsigned long)alloc_ptr.get(), 4096) + 1024); 393 void *buf = (void *)(ALIGN((unsigned long)alloc_ptr.get(), 4096) + 1024); 425 void *buf = (void *)(ALIGN((unsigned long)alloc_ptr.get(), 409 [all...] |
/system/timezone/tzlookup_generator/src/test/java/com/android/libcore/timezone/tzlookup/ |
H A D | TzLookupGeneratorTest.java | 91 Path outputFilePath = Paths.get(outputFile); 111 Path outputFilePath = Paths.get(outputFile); 136 Path outputFilePath = Paths.get(outputFile); 159 Path outputFilePath = Paths.get(outputFile); 181 Path outputFilePath = Paths.get(outputFile); 238 Path outputFilePath = Paths.get(outputFile); 260 Path outputFilePath = Paths.get(outputFile); 280 Path outputFilePath = Paths.get(outputFile); 302 Path outputFilePath = Paths.get(outputFile); 321 Path outputFilePath = Paths.get(outputFil [all...] |
/system/tools/aidl/ |
H A D | aidl.cpp | 236 method_names[m->GetName()] = m.get(); 288 write_common_dep_file(output_file_name, source_aidl, writer.get(), 318 write_common_dep_file(options.OutputCppFilePath(), source_aidl, writer.get(), 622 if (!check_filenames(import->GetFilename(), document.get())) 624 docs[import.get()] = std::move(document); 631 if (!types->AddBinderType(*interface.get(), input_file_name)) { 642 const auto import_itr = docs.find(import.get()); 647 if (!gather_types(import->GetFilename(), import_itr->second.get(), types)) { 653 if (check_types(input_file_name, interface.get(), types) != 0) { 693 types.get(), [all...] |
/system/bt/service/ipc/binder/ |
H A D | remote_callback_map.h | 51 // removed. This won't get called if the callback was removed as a result of 138 sp<IBinder> binder = IInterface::asBinder(callback.get()); 200 if (IInterface::asBinder(dr->get_callback().get())->unlinkToDeath(dr) != 220 CHECK(callback_.get()); 228 sp<IBinder> binder = IInterface::asBinder(callback_.get()); 229 CHECK(who.unsafe_get() == binder.get());
|
/system/core/trusty/gatekeeper/ |
H A D | trusty_gatekeeper.cpp | 93 memcpy(desired_password_buffer.buffer.get(), desired_password, desired_password_length); 97 memcpy(current_password_handle_buffer.buffer.get(), current_password_handle, 103 memcpy(current_password_buffer.buffer.get(), current_password, current_password_length); 134 memcpy(password_handle_buffer.buffer.get(), enrolled_password_handle, 137 memcpy(provided_password_buffer.buffer.get(), provided_password, provided_password_length);
|
/system/extras/simpleperf/scripts/ |
H A D | binary_cache_builder.py | 44 self.perf_data_path = config.get('perf_data_path') 47 self.symfs_dirs = config.get('symfs_dirs') 108 paths = filename_dict.get(filename) 117 paths = filename_dict.get(file) 123 expected_build_id = self.binaries.get(binary)
|