Home
last modified time | relevance | path

Searched refs:is_valid (Results 1 – 22 of 22) sorted by relevance

/system/bt/types/test/bluetooth/
Duuid_unittest.cc127 bool is_valid = false; in TEST() local
129 Uuid::FromString("e39c6285-867f-4b1d-9db0-35fbd9aebf22", &is_valid); in TEST()
130 EXPECT_TRUE(is_valid); in TEST()
135 is_valid = false; in TEST()
136 uuid = Uuid::FromString("1Ae8", &is_valid); in TEST()
137 EXPECT_TRUE(is_valid); in TEST()
142 is_valid = false; in TEST()
143 uuid = Uuid::FromString("12341128", &is_valid); in TEST()
144 EXPECT_TRUE(is_valid); in TEST()
149 bool is_valid = false; in TEST() local
[all …]
/system/bt/vendor_libs/test_vendor_lib/types/test/bluetooth/
Duuid_unittest.cc115 bool is_valid = false; in TEST() local
116 Uuid uuid = Uuid::FromString("e39c6285-867f-4b1d-9db0-35fbd9aebf22", &is_valid); in TEST()
117 EXPECT_TRUE(is_valid); in TEST()
121 is_valid = false; in TEST()
122 uuid = Uuid::FromString("1Ae8", &is_valid); in TEST()
123 EXPECT_TRUE(is_valid); in TEST()
127 is_valid = false; in TEST()
128 uuid = Uuid::FromString("12341128", &is_valid); in TEST()
129 EXPECT_TRUE(is_valid); in TEST()
134 bool is_valid = false; in TEST() local
[all …]
/system/bt/types/bluetooth/
Duuid.cc61 Uuid Uuid::FromString(const std::string& uuid, bool* is_valid) { in FromString() argument
62 if (is_valid) *is_valid = false; in FromString()
84 if (is_valid) *is_valid = true; in FromString()
92 if (is_valid) *is_valid = true; in FromString()
99 if (is_valid) *is_valid = true; in FromString()
Duuid.h71 static Uuid FromString(const std::string& uuid, bool* is_valid = nullptr);
/system/bt/vendor_libs/test_vendor_lib/types/bluetooth/
Duuid.cc60 Uuid Uuid::FromString(const std::string& uuid, bool* is_valid) { in FromString() argument
61 if (is_valid) *is_valid = false; in FromString()
81 if (is_valid) *is_valid = true; in FromString()
88 if (is_valid) *is_valid = true; in FromString()
95 if (is_valid) *is_valid = true; in FromString()
Duuid.h71 static Uuid FromString(const std::string& uuid, bool* is_valid = nullptr);
/system/keymaster/tests/
Dauthorization_set_test.cpp60 EXPECT_EQ(AuthorizationSet::OK, set1.is_valid()); in TEST()
64 EXPECT_EQ(AuthorizationSet::OK, set2.is_valid()); in TEST()
169 EXPECT_EQ(AuthorizationSet::OK, deserialized.is_valid()); in TEST()
200 EXPECT_EQ(AuthorizationSet::OK, deserialized.is_valid()); in TEST()
217 EXPECT_EQ(AuthorizationSet::MALFORMED_DATA, deserialized.is_valid()); in TEST()
221 EXPECT_EQ(AuthorizationSet::MALFORMED_DATA, deserialized.is_valid()); in TEST()
243 EXPECT_EQ(AuthorizationSet::MALFORMED_DATA, deserialized.is_valid()); in TEST()
247 EXPECT_EQ(AuthorizationSet::MALFORMED_DATA, deserialized.is_valid()); in TEST()
253 ASSERT_EQ(AuthorizationSet::MALFORMED_DATA, deserialized.is_valid()); in TEST()
256 ASSERT_EQ(AuthorizationSet::OK, deserialized.is_valid()); in TEST()
[all …]
/system/keymaster/include/keymaster/legacy_support/
Dkeymaster_passthrough_key.h87 if (additional_parameters.is_valid() != additional_parameters_.is_valid() in KeymasterPassthroughKey()
88 && additional_parameters_.is_valid() == AuthorizationSet::ALLOCATION_FAILURE) { in KeymasterPassthroughKey()
/system/bt/stack/avrc/
Davrc_utils.cc221 bool is_valid = false; in avrc_is_valid_opcode() local
226 is_valid = true; in avrc_is_valid_opcode()
229 return is_valid; in avrc_is_valid_opcode()
/system/bt/service/ipc/
Dipc_handler_linux.cc80 if (!server_socket.is_valid()) { in Run()
100 CHECK(socket_.is_valid()); in Run()
136 CHECK(socket_.is_valid()); in StartListeningOnThread()
/system/core/libmeminfo/libdmabufinfo/
Ddmabufinfo_test.cpp233 if (is_valid()) { in ~DmaBufTester()
238 bool is_valid() { return (ion_fd >= 0 && ion_heap_mask > 0); } in is_valid() function in DmaBufTester
316 ASSERT_TRUE(is_valid()); in TEST_F()
340 ASSERT_TRUE(is_valid()); in TEST_F()
381 ASSERT_TRUE(is_valid()); in TEST_F()
424 ASSERT_TRUE(is_valid()); in TEST_F()
454 ASSERT_TRUE(is_valid()); in TEST_F()
/system/keymaster/contexts/
Dpure_soft_keymaster_context.cpp336 if (transit_key_authorizations.is_valid() != AuthorizationSet::Error::OK) { in UnwrapKey()
337 return TranslateAuthorizationSetError(transit_key_authorizations.is_valid()); in UnwrapKey()
345 if (gcm_params.is_valid() != AuthorizationSet::Error::OK) { in UnwrapKey()
346 return TranslateAuthorizationSetError(transit_key_authorizations.is_valid()); in UnwrapKey()
387 if (update_params.is_valid() != AuthorizationSet::Error::OK) { in UnwrapKey()
388 return TranslateAuthorizationSetError(transit_key_authorizations.is_valid()); in UnwrapKey()
Dsoft_keymaster_context.cpp193 return TranslateAuthorizationSetError(sw_enforced->is_valid()); in SetAuthorizations()
/system/core/libnetutils/
Dpacket.c159 int is_valid; in receive_packet() local
179 is_valid = 0; in receive_packet()
201 is_valid = 1; in receive_packet()
204 if (!is_valid) { in receive_packet()
/system/keymaster/android_keymaster/
Dauthorization_set.cpp65 if (is_valid() != OK) in reserve_elems()
83 if (is_valid() != OK) in reserve_indirect()
230 if (is_valid() != OK) in find()
254 if (is_valid() == OK && at < (int)elems_size_) { in operator []()
262 if (is_valid() == OK && at < (int)elems_size_) { in operator []()
270 if (is_valid() != OK) in push_back()
287 if (is_valid() != OK) in push_back()
/system/media/alsa_utils/include/
Dalsa_device_profile.h50 bool is_valid; member
/system/media/alsa_utils/
Dalsa_device_profile.c73 profile->is_valid = false; in profile_reset()
88 return profile->is_valid; in profile_is_valid()
430 profile->is_valid = true; in profile_read_device_info()
607 if (!profile->is_valid) { in profile_dump()
/system/keymaster/key_blob_utils/
Dsoftware_keyblobs.cpp91 return TranslateAuthorizationSetError(hidden->is_valid()); in BuildHiddenAuthorizations()
300 return TranslateAuthorizationSetError(sw_enforced->is_valid()); in SetKeyBlobAuthorizations()
/system/bt/service/test/
Dipc_linux_unittest.cc90 ASSERT_TRUE(client_fd_.is_valid()); in ConnectToTestSocket()
/system/bt/service/client/
Dmain.cc654 bool is_valid = false; in HandleStartAdv() local
655 uuid = bluetooth::Uuid::FromString(uuid_str, &is_valid); in HandleStartAdv()
656 if (!is_valid) { in HandleStartAdv()
/system/bt/btif/src/
Dbtif_storage.cc552 bool is_valid; in btif_split_uuids_string() local
554 Uuid::FromString(std::string(str, Uuid::kString128BitLen), &is_valid); in btif_split_uuids_string()
555 if (!is_valid) break; in btif_split_uuids_string()
/system/keymaster/include/keymaster/
Dauthorization_set.h135 Error is_valid() const { return error_; } in is_valid() function