/system/bt/main/ |
H A D | bte_conf.cc | 51 tBTA_DI_RECORD record; local 52 record.vendor = 54 record.vendor_id_source = config_get_int( 56 record.product = config_get_int(*config, section_name, "productId", 0); 57 record.version = config_get_int(*config, section_name, "version", 0); 58 record.primary_record = 62 record.client_executable_url, 65 sizeof(record.client_executable_url)); 67 record.service_description, 70 sizeof(record [all...] |
/system/keymaster/km_openssl/ |
H A D | attestation_record.cpp | 96 // Put the contents of the keymaster AuthorizationSet auth_list in to the ASN.1 record structure, 97 // record. 98 keymaster_error_t build_auth_list(const AuthorizationSet& auth_list, KM_AUTH_LIST* record) { argument 99 assert(record); 148 integer_ptr = &record->algorithm; 151 integer_ptr = &record->ec_curve; 154 integer_ptr = &record->user_auth_type; 157 integer_ptr = &record->origin; 162 integer_set = &record->purpose; 165 integer_set = &record 543 extract_auth_list(const KM_AUTH_LIST* record, AuthorizationSet* auth_list) argument [all...] |
H A D | wrapped_key.cpp | 93 UniquePtr<KM_WRAPPED_KEY, KM_WRAPPED_KEY_Delete> record( 95 if (!record.get()) return TranslateLastOpenSslError(); 97 *iv = KeymasterBlob(record->iv->data, record->iv->length); 98 if (record->iv->data && !iv->data) { 102 *transit_key = KeymasterKeyBlob(record->transit_key->data, record->transit_key->length); 103 if (record->transit_key->data && !transit_key->key_material) { 107 *secure_key = KeymasterKeyBlob(record->secure_key->data, record [all...] |
/system/bt/bta/sdp/ |
H A D | bta_sdp_act.cc | 51 static void bta_create_mns_sdp_record(bluetooth_sdp_record* record, argument 56 record->mns.hdr.type = SDP_TYPE_MAP_MNS; 57 record->mns.hdr.service_name_length = 0; 58 record->mns.hdr.service_name = NULL; 59 record->mns.hdr.rfcomm_channel_number = 0; 60 record->mns.hdr.l2cap_psm = -1; 61 record->mns.hdr.profile_version = 0; 62 record->mns.supported_features = 0x0000001F; // default value if not found 66 record->mns.supported_features = p_attr->attr_value.v.u32; 71 record 91 bta_create_mas_sdp_record(bluetooth_sdp_record* record, tSDP_DISC_REC* p_rec) argument 144 bta_create_pse_sdp_record(bluetooth_sdp_record* record, tSDP_DISC_REC* p_rec) argument 190 bta_create_ops_sdp_record(bluetooth_sdp_record* record, tSDP_DISC_REC* p_rec) argument 275 bta_create_sap_sdp_record(bluetooth_sdp_record* record, tSDP_DISC_REC* p_rec) argument 304 bta_create_raw_sdp_record(bluetooth_sdp_record* record, tSDP_DISC_REC* p_rec) argument [all...] |
H A D | bta_sdp_int.h | 77 tBTA_SDP_API_RECORD_USER record; member in union:__anon474
|
/system/update_engine/ |
H A D | utils_android.cc | 44 struct fstab_rec* record; local 51 record = fs_mgr_get_entry_for_mount_point(fstab, mount_point.c_str()); 52 if (record == nullptr) { 58 *device = base::FilePath(record->blk_device);
|
/system/update_engine/common/ |
H A D | subprocess.cc | 117 void Subprocess::OnStdoutReady(SubprocessRecord* record) { argument 124 record->stdout_fd, buf, arraysize(buf), &bytes_read, &eof); 125 record->stdout.append(buf, bytes_read); 129 MessageLoop::current()->CancelTask(record->stdout_task_id); 130 record->stdout_task_id = MessageLoop::kTaskIdNull; 140 SubprocessRecord* record = pid_record->second.get(); 143 OnStdoutReady(record); 145 MessageLoop::current()->CancelTask(record->stdout_task_id); 146 record->stdout_task_id = MessageLoop::kTaskIdNull; 155 if (!record [all...] |
/system/gatekeeper/ |
H A D | gatekeeper.cpp | 56 failure_record_t record; local 57 if (!GetFailureRecord(uid, user_id, &record, throttle_secure)) { 62 if (ThrottleRequest(uid, timestamp, &record, throttle_secure, response)) return; 64 if (!IncrementFailureRecord(uid, user_id, timestamp, &record, throttle_secure)) { 69 timeout = ComputeRetryTimeout(&record); 130 failure_record_t record; local 131 if (!GetFailureRecord(uid, user_id, &record, throttle_secure)) { 136 if (ThrottleRequest(uid, timestamp, &record, throttle_secure, response)) return; 138 if (!IncrementFailureRecord(uid, user_id, timestamp, &record, throttle_secure)) { 143 timeout = ComputeRetryTimeout(&record); 265 ComputeRetryTimeout(const failure_record_t *record) argument 284 ThrottleRequest(uint32_t uid, uint64_t timestamp, failure_record_t *record, bool secure, GateKeeperMessage *response) argument 312 IncrementFailureRecord(uint32_t uid, secure_id_t user_id, uint64_t timestamp, failure_record_t *record, bool secure) argument [all...] |
/system/extras/boot_control_copy/ |
H A D | bootinfo.cpp | 55 struct fstab_rec *record; local 77 record = fs_mgr_get_entry_for_mount_point(fstab, "/misc"); 78 if (record == NULL) { 83 path = strdup(record->blk_device); 86 const char *end_slash = strrchr(record->blk_device, '/'); 91 trimmed_len = end_slash - record->blk_device + 1; 94 strncpy(path, record->blk_device, trimmed_len);
|
/system/netd/server/ |
H A D | XfrmController.h | 292 static netdutils::Status addTransportModeTransform(const XfrmSaInfo& record); 293 static int removeTransportModeTransform(const XfrmSaInfo& record); 297 static void fillXfrmSelector(const XfrmSaInfo& record, xfrm_selector* selector); 303 static int fillNlAttrXfrmEncapTmpl(const XfrmSaInfo& record, nlattr_encap_tmpl* tmpl); 306 static netdutils::Status updateSecurityAssociation(const XfrmSaInfo& record, 308 static int fillUserSaInfo(const XfrmSaInfo& record, xfrm_usersa_info* usersa); 311 static netdutils::Status deleteSecurityAssociation(const XfrmId& record, 313 static int fillUserSaId(const XfrmId& record, xfrm_usersa_id* said); 314 static int fillUserTemplate(const XfrmSaInfo& record, xfrm_user_tmpl* tmpl); 316 static int fillTransportModeUserSpInfo(const XfrmSaInfo& record, XfrmDirectio [all...] |
H A D | XfrmController.cpp | 804 void XfrmController::fillXfrmSelector(const XfrmSaInfo& record, xfrm_selector* selector) { argument 805 selector->family = record.addrFamily; 810 netdutils::Status XfrmController::updateSecurityAssociation(const XfrmSaInfo& record, argument 856 if (!record.aead.name.empty() && (!record.auth.name.empty() || !record.crypt.name.empty())) { 862 if (record.aead.key.size() > MAX_KEY_LENGTH || record.auth.key.size() > MAX_KEY_LENGTH || 863 record.crypt.key.size() > MAX_KEY_LENGTH) { 868 len = iov[USERSA].iov_len = fillUserSaInfo(record, 948 fillNlAttrXfrmEncapTmpl(const XfrmSaInfo& record, nlattr_encap_tmpl* tmpl) argument 961 fillUserSaInfo(const XfrmSaInfo& record, xfrm_usersa_info* usersa) argument 987 fillUserSaId(const XfrmId& record, xfrm_usersa_id* said) argument 996 deleteSecurityAssociation(const XfrmId& record, const XfrmSocket& sock) argument 1021 allocateSpi(const XfrmSaInfo& record, uint32_t minSpi, uint32_t maxSpi, uint32_t* outSpi, const XfrmSocket& sock) argument 1069 updateTunnelModeSecurityPolicy(const XfrmSaInfo& record, const XfrmSocket& sock, XfrmDirection direction, uint16_t msgType) argument 1110 deleteTunnelModeSecurityPolicy(const XfrmSaInfo& record, const XfrmSocket& sock, XfrmDirection direction) argument 1141 fillTransportModeUserSpInfo(const XfrmSaInfo& record, XfrmDirection direction, xfrm_userpolicy_info* usersp) argument 1156 fillUserTemplate(const XfrmSaInfo& record, xfrm_user_tmpl* tmpl) argument 1175 fillNlAttrUserTemplate(const XfrmSaInfo& record, nlattr_user_tmpl* tmpl) argument 1183 fillNlAttrXfrmMark(const XfrmId& record, nlattr_xfrm_mark* mark) argument 1204 fillUserPolicyId(const XfrmSaInfo& record, XfrmDirection direction, xfrm_userpolicy_id* usersp) argument [all...] |
/system/gatekeeper/include/gatekeeper/ |
H A D | gatekeeper.h | 118 * Returns the value of the current failure record for the user. 120 * The failure record should be written to hardware-backed secure storage, such as 124 * may store the failure record in memory or in non-secure storage if this value is false. 126 * Returns true on success, false if failure record cannot be retrieved. 128 virtual bool GetFailureRecord(uint32_t uid, secure_id_t user_id, failure_record_t *record, 132 * Initializes or reinitializes the failure record for the current user. 137 * may store the failure record in memory or in non-secure storage if this value is false. 139 * Returns true if the failure record was successfully persisted. 144 * Writes the provided failure record to persistent storage. 149 * may store the failure record i [all...] |
/system/extras/simpleperf/ |
H A D | record_file_reader.cpp | 27 #include "record.h" 76 PLOG(ERROR) << "failed to open record file '" << filename << "'"; 101 PLOG(ERROR) << "failed to close record file '" << filename_ << "'"; 113 LOG(ERROR) << filename_ << " is not a valid profiling record file."; 210 std::unique_ptr<Record> record; local 211 while (ReadRecord(record, sorted)) { 212 if (record == nullptr) { 215 if (!callback(std::move(record))) { 222 bool RecordFileReader::ReadRecord(std::unique_ptr<Record>& record, argument 238 record 356 GetAttrIndexOfRecord(const Record* record) argument [all...] |
H A D | record_test.cpp | 21 #include "record.h" 33 void CheckRecordMatchBinary(Record& record) { argument 35 ReadRecordsFromBuffer(event_attr, record.BinaryForTestingOnly(), record.size()); 37 CheckRecordEqual(record, *records[0]); 44 MmapRecord record(event_attr, true, 1, 2, 0x1000, 0x2000, 0x3000, 46 CheckRecordMatchBinary(record); 50 CommRecord record(event_attr, 1, 2, "CommRecord", 0, 7); 51 CheckRecordMatchBinary(record); 58 SampleRecord record(event_att [all...] |
H A D | cmd_record.cpp | 49 #include "record.h" 92 "record", "record sampling info in perf.data", 94 "Usage: simpleperf record [options] [--] [command [command-args]]\n" 164 "--no-inherit Don't record created child threads/processes.\n" 188 "-o record_file_name Set record file name, default is perf.data.\n" 227 // If we run `adb shell simpleperf record xxx` and stop profiling by ctrl-c, adb closes 252 bool ProcessRecord(Record* record); 253 bool SaveRecordForPostUnwinding(Record* record); 254 bool SaveRecordAfterUnwinding(Record* record); 1016 ProcessRecord(Record* record) argument 1026 SaveRecordForPostUnwinding(Record* record) argument 1038 SaveRecordAfterUnwinding(Record* record) argument 1063 SaveRecordWithoutUnwinding(Record* record) argument 1081 UpdateMmapRecordForEmbeddedElfPath(RecordType* record) argument 1105 UpdateRecordForEmbeddedElfPath(Record* record) argument [all...] |
H A D | thread_tree.cpp | 27 #include "record.h" 104 // kernel map len can be 0 when record command is not run in supervisor mode. 294 void ThreadTree::Update(const Record& record) { argument 295 if (record.type() == PERF_RECORD_MMAP) { 296 const MmapRecord& r = *static_cast<const MmapRecord*>(&record); 304 } else if (record.type() == PERF_RECORD_MMAP2) { 305 const Mmap2Record& r = *static_cast<const Mmap2Record*>(&record); 316 } else if (record.type() == PERF_RECORD_COMM) { 317 const CommRecord& r = *static_cast<const CommRecord*>(&record); 319 } else if (record [all...] |
/system/core/init/ |
H A D | perfboot.py | 17 This script repeats the record of each event log during Android boot specified 57 # The default event tags to record. 261 def get_values(record, tag): 262 """Gets values that matches |tag| from |record|.""" 263 keys = [key for key in record.keys() if key[0] == tag] 264 return [record[k] for k in sorted(keys)] 267 def get_last_value(record, tag): 268 """Gets the last value that matches |tag| from |record|.""" 269 values = get_values(record, tag) 283 for record i [all...] |
/system/core/bootstat/ |
H A D | boot_event_record_store_test.cpp | 41 // Creates a fake boot event record file at |record_path| containing the boot 42 // record |value|. This method is necessary as truncating a 44 // the value of the record. 110 // This removes the record store temporary directory even though 195 BootEventRecordStore::BootEventRecord record; local 196 bool result = store.GetBootEvent("nonexistent", &record); 200 EXPECT_DEATH(store.GetBootEvent(std::string(), &record), std::string()); 204 result = store.GetBootEvent("carboniferous", &record); 206 EXPECT_EQ("carboniferous", record.first); 207 EXPECT_EQ(314, record 221 BootEventRecordStore::BootEventRecord record; local [all...] |
H A D | boot_event_record_store.cpp | 38 // Given a boot even record file at |path|, extracts the event's relative time 39 // from the record into |uptime|. 98 bool BootEventRecordStore::GetBootEvent(const std::string& event, BootEventRecord* record) const { 99 CHECK_NE(static_cast<BootEventRecord*>(nullptr), record); local 105 LOG(ERROR) << "Failed to parse boot time record: " << record_path; 109 *record = std::make_pair(event, uptime); 119 // so crash out if the record store doesn't exist. 130 BootEventRecord record; local 131 if (!GetBootEvent(event, &record)) { 136 events.push_back(record); [all...] |
H A D | boot_event_record_store.h | 27 // BootEventRecordStore manages the persistence of boot events to the record 37 // Persists the boot |event| in the record store. 40 // Persists the boot |event| with the associated |value| in the record store. 43 // Queries the named boot |event|. |record| must be non-null. |record| 46 bool GetBootEvent(const std::string& event, BootEventRecord* record) const; 48 // Returns a list of all of the boot events persisted in the record store. 60 // Sets the filesystem path of the record store. 66 // The filesystem path of the record store.
|
/system/bt/btif/src/ |
H A D | btif_sdp_server.cc | 88 * which creates the actual record, and updates the ID<->SDPHandle map 123 bluetooth_sdp_record* record = in_record; local 127 record = &in_record[i]; 129 records_size += record->hdr.service_name_length; 130 if (record->hdr.service_name_length > 0) { 133 records_size += record->hdr.user1_ptr_len; 134 records_size += record->hdr.user2_ptr_len; 185 * The record_data will contain both the record and any data pointed to by 186 * the record. 193 /* We are optimists here, and preallocate the record 195 bluetooth_sdp_record* record = (bluetooth_sdp_record*)osi_malloc(record_size); local 216 bluetooth_sdp_record* record = NULL; local 272 create_sdp_record(bluetooth_sdp_record* record, int* record_handle) argument 322 bluetooth_sdp_record* record = sdp_slot->record_data; local [all...] |
/system/chre/apps/wifi_offload/test/ |
H A D | utility.cc | 82 void init(wifi_offload::ScanRecord &record, RandomGenerator &rand_gen) { argument 83 init(record.time_spent_scanning_ms_, rand_gen); 84 init(record.num_channels_scanned_, rand_gen); 85 init(record.num_entries_aggregated_, rand_gen); 88 void init(wifi_offload::RpcLogRecord &record, RandomGenerator &rand_gen) { argument 89 init_rpc_log_record(record.record_type_, rand_gen); 90 init(record.timestamp_chre_ms_, rand_gen);
|
/system/netd/server/dns/ |
H A D | DnsTlsTransport.cpp | 41 auto record = mQueries.recordQuery(query); local 42 if (!record) { 52 sendQuery(record->query); 55 return std::move(record->result); 215 // TODO: Further validate the response contents (check for valid AAAA record, ...).
|
/system/chre/apps/wifi_offload/test/include/ |
H A D | utility.h | 65 void init(wifi_offload::ScanRecord &record, RandomGenerator &rand_gen); 66 void init(wifi_offload::RpcLogRecord &record, RandomGenerator &rand_gen);
|
/system/extras/perfprofd/ |
H A D | perf_data_converter.cc | 32 void AddSymbolInfo(PerfprofdRecord* record, argument 36 for (auto& perf_build_id : record->perf_data().build_ids()) { 42 quipper::MmapEventIterator it(record->perf_data()); 66 auto it = record->perf_data().events().begin(); 67 auto end = record->perf_data().events().end(); 142 PerfprofdRecord_SymbolInfo* symbol_info = record->add_symbol_info();
|