/system/bt/types/test/bluetooth/ |
D | uuid_unittest.cc | 127 bool is_valid = false; in TEST() local 129 Uuid::FromString("e39c6285-867f-4b1d-9db0-35fbd9aebf22", &is_valid); in TEST() 130 EXPECT_TRUE(is_valid); in TEST() 135 is_valid = false; in TEST() 136 uuid = Uuid::FromString("1Ae8", &is_valid); in TEST() 137 EXPECT_TRUE(is_valid); in TEST() 142 is_valid = false; in TEST() 143 uuid = Uuid::FromString("12341128", &is_valid); in TEST() 144 EXPECT_TRUE(is_valid); in TEST() 149 bool is_valid = false; in TEST() local [all …]
|
/system/bt/vendor_libs/test_vendor_lib/types/test/bluetooth/ |
D | uuid_unittest.cc | 115 bool is_valid = false; in TEST() local 116 Uuid uuid = Uuid::FromString("e39c6285-867f-4b1d-9db0-35fbd9aebf22", &is_valid); in TEST() 117 EXPECT_TRUE(is_valid); in TEST() 121 is_valid = false; in TEST() 122 uuid = Uuid::FromString("1Ae8", &is_valid); in TEST() 123 EXPECT_TRUE(is_valid); in TEST() 127 is_valid = false; in TEST() 128 uuid = Uuid::FromString("12341128", &is_valid); in TEST() 129 EXPECT_TRUE(is_valid); in TEST() 134 bool is_valid = false; in TEST() local [all …]
|
/system/bt/types/bluetooth/ |
D | uuid.cc | 61 Uuid Uuid::FromString(const std::string& uuid, bool* is_valid) { in FromString() argument 62 if (is_valid) *is_valid = false; in FromString() 84 if (is_valid) *is_valid = true; in FromString() 92 if (is_valid) *is_valid = true; in FromString() 99 if (is_valid) *is_valid = true; in FromString()
|
D | uuid.h | 71 static Uuid FromString(const std::string& uuid, bool* is_valid = nullptr);
|
/system/bt/vendor_libs/test_vendor_lib/types/bluetooth/ |
D | uuid.cc | 60 Uuid Uuid::FromString(const std::string& uuid, bool* is_valid) { in FromString() argument 61 if (is_valid) *is_valid = false; in FromString() 81 if (is_valid) *is_valid = true; in FromString() 88 if (is_valid) *is_valid = true; in FromString() 95 if (is_valid) *is_valid = true; in FromString()
|
D | uuid.h | 71 static Uuid FromString(const std::string& uuid, bool* is_valid = nullptr);
|
/system/keymaster/tests/ |
D | authorization_set_test.cpp | 60 EXPECT_EQ(AuthorizationSet::OK, set1.is_valid()); in TEST() 64 EXPECT_EQ(AuthorizationSet::OK, set2.is_valid()); in TEST() 169 EXPECT_EQ(AuthorizationSet::OK, deserialized.is_valid()); in TEST() 200 EXPECT_EQ(AuthorizationSet::OK, deserialized.is_valid()); in TEST() 217 EXPECT_EQ(AuthorizationSet::MALFORMED_DATA, deserialized.is_valid()); in TEST() 221 EXPECT_EQ(AuthorizationSet::MALFORMED_DATA, deserialized.is_valid()); in TEST() 243 EXPECT_EQ(AuthorizationSet::MALFORMED_DATA, deserialized.is_valid()); in TEST() 247 EXPECT_EQ(AuthorizationSet::MALFORMED_DATA, deserialized.is_valid()); in TEST() 253 ASSERT_EQ(AuthorizationSet::MALFORMED_DATA, deserialized.is_valid()); in TEST() 256 ASSERT_EQ(AuthorizationSet::OK, deserialized.is_valid()); in TEST() [all …]
|
/system/keymaster/include/keymaster/legacy_support/ |
D | keymaster_passthrough_key.h | 87 if (additional_parameters.is_valid() != additional_parameters_.is_valid() in KeymasterPassthroughKey() 88 && additional_parameters_.is_valid() == AuthorizationSet::ALLOCATION_FAILURE) { in KeymasterPassthroughKey()
|
/system/bt/stack/avrc/ |
D | avrc_utils.cc | 221 bool is_valid = false; in avrc_is_valid_opcode() local 226 is_valid = true; in avrc_is_valid_opcode() 229 return is_valid; in avrc_is_valid_opcode()
|
/system/bt/service/ipc/ |
D | ipc_handler_linux.cc | 80 if (!server_socket.is_valid()) { in Run() 100 CHECK(socket_.is_valid()); in Run() 136 CHECK(socket_.is_valid()); in StartListeningOnThread()
|
/system/core/libmeminfo/libdmabufinfo/ |
D | dmabufinfo_test.cpp | 233 if (is_valid()) { in ~DmaBufTester() 238 bool is_valid() { return (ion_fd >= 0 && ion_heap_mask > 0); } in is_valid() function in DmaBufTester 316 ASSERT_TRUE(is_valid()); in TEST_F() 340 ASSERT_TRUE(is_valid()); in TEST_F() 381 ASSERT_TRUE(is_valid()); in TEST_F() 424 ASSERT_TRUE(is_valid()); in TEST_F() 454 ASSERT_TRUE(is_valid()); in TEST_F()
|
/system/keymaster/contexts/ |
D | pure_soft_keymaster_context.cpp | 336 if (transit_key_authorizations.is_valid() != AuthorizationSet::Error::OK) { in UnwrapKey() 337 return TranslateAuthorizationSetError(transit_key_authorizations.is_valid()); in UnwrapKey() 345 if (gcm_params.is_valid() != AuthorizationSet::Error::OK) { in UnwrapKey() 346 return TranslateAuthorizationSetError(transit_key_authorizations.is_valid()); in UnwrapKey() 387 if (update_params.is_valid() != AuthorizationSet::Error::OK) { in UnwrapKey() 388 return TranslateAuthorizationSetError(transit_key_authorizations.is_valid()); in UnwrapKey()
|
D | soft_keymaster_context.cpp | 193 return TranslateAuthorizationSetError(sw_enforced->is_valid()); in SetAuthorizations()
|
/system/core/libnetutils/ |
D | packet.c | 159 int is_valid; in receive_packet() local 179 is_valid = 0; in receive_packet() 201 is_valid = 1; in receive_packet() 204 if (!is_valid) { in receive_packet()
|
/system/keymaster/android_keymaster/ |
D | authorization_set.cpp | 65 if (is_valid() != OK) in reserve_elems() 83 if (is_valid() != OK) in reserve_indirect() 230 if (is_valid() != OK) in find() 254 if (is_valid() == OK && at < (int)elems_size_) { in operator []() 262 if (is_valid() == OK && at < (int)elems_size_) { in operator []() 270 if (is_valid() != OK) in push_back() 287 if (is_valid() != OK) in push_back()
|
/system/media/alsa_utils/include/ |
D | alsa_device_profile.h | 50 bool is_valid; member
|
/system/media/alsa_utils/ |
D | alsa_device_profile.c | 73 profile->is_valid = false; in profile_reset() 88 return profile->is_valid; in profile_is_valid() 430 profile->is_valid = true; in profile_read_device_info() 607 if (!profile->is_valid) { in profile_dump()
|
/system/keymaster/key_blob_utils/ |
D | software_keyblobs.cpp | 91 return TranslateAuthorizationSetError(hidden->is_valid()); in BuildHiddenAuthorizations() 300 return TranslateAuthorizationSetError(sw_enforced->is_valid()); in SetKeyBlobAuthorizations()
|
/system/bt/service/test/ |
D | ipc_linux_unittest.cc | 90 ASSERT_TRUE(client_fd_.is_valid()); in ConnectToTestSocket()
|
/system/bt/service/client/ |
D | main.cc | 654 bool is_valid = false; in HandleStartAdv() local 655 uuid = bluetooth::Uuid::FromString(uuid_str, &is_valid); in HandleStartAdv() 656 if (!is_valid) { in HandleStartAdv()
|
/system/bt/btif/src/ |
D | btif_storage.cc | 552 bool is_valid; in btif_split_uuids_string() local 554 Uuid::FromString(std::string(str, Uuid::kString128BitLen), &is_valid); in btif_split_uuids_string() 555 if (!is_valid) break; in btif_split_uuids_string()
|
/system/keymaster/include/keymaster/ |
D | authorization_set.h | 135 Error is_valid() const { return error_; } in is_valid() function
|