Home
last modified time | relevance | path

Searched refs:is_valid (Results 1 – 25 of 28) sorted by relevance

12

/system/bt/types/test/bluetooth/
Duuid_unittest.cc127 bool is_valid = false; in TEST() local
129 Uuid::FromString("e39c6285-867f-4b1d-9db0-35fbd9aebf22", &is_valid); in TEST()
130 EXPECT_TRUE(is_valid); in TEST()
135 is_valid = false; in TEST()
136 uuid = Uuid::FromString("1Ae8", &is_valid); in TEST()
137 EXPECT_TRUE(is_valid); in TEST()
142 is_valid = false; in TEST()
143 uuid = Uuid::FromString("12341128", &is_valid); in TEST()
144 EXPECT_TRUE(is_valid); in TEST()
149 bool is_valid = false; in TEST() local
[all …]
/system/bt/vendor_libs/test_vendor_lib/types/test/bluetooth/
Duuid_unittest.cc115 bool is_valid = false; in TEST() local
116 Uuid uuid = Uuid::FromString("e39c6285-867f-4b1d-9db0-35fbd9aebf22", &is_valid); in TEST()
117 EXPECT_TRUE(is_valid); in TEST()
121 is_valid = false; in TEST()
122 uuid = Uuid::FromString("1Ae8", &is_valid); in TEST()
123 EXPECT_TRUE(is_valid); in TEST()
127 is_valid = false; in TEST()
128 uuid = Uuid::FromString("12341128", &is_valid); in TEST()
129 EXPECT_TRUE(is_valid); in TEST()
134 bool is_valid = false; in TEST() local
[all …]
/system/bt/types/bluetooth/
Duuid.cc62 Uuid Uuid::FromString(const std::string& uuid, bool* is_valid) { in FromString() argument
63 if (is_valid) *is_valid = false; in FromString()
85 if (is_valid) *is_valid = true; in FromString()
93 if (is_valid) *is_valid = true; in FromString()
100 if (is_valid) *is_valid = true; in FromString()
Duuid.h71 static Uuid FromString(const std::string& uuid, bool* is_valid = nullptr);
/system/bt/vendor_libs/test_vendor_lib/types/bluetooth/
Duuid.cc60 Uuid Uuid::FromString(const std::string& uuid, bool* is_valid) { in FromString() argument
61 if (is_valid) *is_valid = false; in FromString()
81 if (is_valid) *is_valid = true; in FromString()
88 if (is_valid) *is_valid = true; in FromString()
95 if (is_valid) *is_valid = true; in FromString()
Duuid.h71 static Uuid FromString(const std::string& uuid, bool* is_valid = nullptr);
/system/keymaster/tests/
Dauthorization_set_test.cpp67 EXPECT_EQ(AuthorizationSet::OK, set1.is_valid()); in TEST()
71 EXPECT_EQ(AuthorizationSet::OK, set2.is_valid()); in TEST()
176 EXPECT_EQ(AuthorizationSet::OK, deserialized.is_valid()); in TEST()
207 EXPECT_EQ(AuthorizationSet::OK, deserialized.is_valid()); in TEST()
224 EXPECT_EQ(AuthorizationSet::MALFORMED_DATA, deserialized.is_valid()); in TEST()
228 EXPECT_EQ(AuthorizationSet::MALFORMED_DATA, deserialized.is_valid()); in TEST()
250 EXPECT_EQ(AuthorizationSet::MALFORMED_DATA, deserialized.is_valid()); in TEST()
254 EXPECT_EQ(AuthorizationSet::MALFORMED_DATA, deserialized.is_valid()); in TEST()
260 ASSERT_EQ(AuthorizationSet::MALFORMED_DATA, deserialized.is_valid()); in TEST()
263 ASSERT_EQ(AuthorizationSet::OK, deserialized.is_valid()); in TEST()
[all …]
/system/keymaster/include/keymaster/legacy_support/
Dkeymaster_passthrough_key.h91 if (additional_parameters.is_valid() != additional_parameters_.is_valid() && in KeymasterPassthroughKey()
92 additional_parameters_.is_valid() == AuthorizationSet::ALLOCATION_FAILURE) { in KeymasterPassthroughKey()
/system/bt/stack/avrc/
Davrc_utils.cc221 bool is_valid = false; in avrc_is_valid_opcode() local
226 is_valid = true; in avrc_is_valid_opcode()
229 return is_valid; in avrc_is_valid_opcode()
/system/bt/service/ipc/
Dipc_handler_linux.cc82 if (!server_socket.is_valid()) { in Run()
102 CHECK(socket_.is_valid()); in Run()
139 CHECK(socket_.is_valid()); in StartListeningOnThread()
/system/core/libnetutils/
Dpacket.c156 int is_valid; in receive_packet() local
176 is_valid = 0; in receive_packet()
198 is_valid = 1; in receive_packet()
201 if (!is_valid) { in receive_packet()
/system/keymaster/contexts/
Dpure_soft_keymaster_context.cpp475 if (transit_key_authorizations.is_valid() != AuthorizationSet::Error::OK) { in UnwrapKey()
476 return TranslateAuthorizationSetError(transit_key_authorizations.is_valid()); in UnwrapKey()
484 if (gcm_params.is_valid() != AuthorizationSet::Error::OK) { in UnwrapKey()
485 return TranslateAuthorizationSetError(transit_key_authorizations.is_valid()); in UnwrapKey()
526 if (update_params.is_valid() != AuthorizationSet::Error::OK) { in UnwrapKey()
527 return TranslateAuthorizationSetError(update_params.is_valid()); in UnwrapKey()
Dsoft_keymaster_context.cpp176 return TranslateAuthorizationSetError(sw_enforced->is_valid()); in SetAuthorizations()
/system/keymaster/android_keymaster/
Dauthorization_set.cpp63 if (is_valid() != OK) return false; in reserve_elems()
80 if (is_valid() != OK) return false; in reserve_indirect()
220 if (is_valid() != OK) return -1; in find()
242 if (is_valid() == OK && at < (int)elems_size_) { in operator []()
250 if (is_valid() == OK && at < (int)elems_size_) { in operator []()
258 if (is_valid() != OK) return false; in push_back()
272 if (is_valid() != OK) return false; in push_back()
/system/media/alsa_utils/include/
Dalsa_device_profile.h51 bool is_valid; member
/system/bt/btif/include/
Dbtif_dm.h62 void btif_dm_proc_loc_oob(tBT_TRANSPORT transport, bool is_valid,
/system/media/alsa_utils/
Dalsa_device_profile.c73 profile->is_valid = false; in profile_reset()
88 return profile->is_valid; in profile_is_valid()
470 profile->is_valid = true; in profile_read_device_info()
669 if (!profile->is_valid) { in profile_dump()
/system/memory/libmeminfo/libdmabufinfo/
Ddmabufinfo_test.cpp491 bool is_valid() { return (ion_fd >= 0 && ion_heap_mask > 0); } in is_valid() function in DmaBufTester
573 ASSERT_TRUE(is_valid()); in TEST_F()
597 ASSERT_TRUE(is_valid()); in TEST_F()
638 ASSERT_TRUE(is_valid()); in TEST_F()
681 ASSERT_TRUE(is_valid()); in TEST_F()
711 ASSERT_TRUE(is_valid()); in TEST_F()
/system/keymaster/key_blob_utils/
Dsoftware_keyblobs.cpp90 return TranslateAuthorizationSetError(hidden->is_valid()); in BuildHiddenAuthorizations()
381 return TranslateAuthorizationSetError(sw_enforced->is_valid()); in SetKeyBlobAuthorizations()
396 return TranslateAuthorizationSetError(sw_enforced->is_valid()); in ExtendKeyBlobAuthorizations()
/system/bt/stack/test/common/
Dmock_btif_dm.cc160 void btif_dm_proc_loc_oob(tBT_TRANSPORT transport, bool is_valid, in btif_dm_proc_loc_oob() argument
/system/bt/test/mock/
Dmock_btif_dm.cc172 void btif_dm_proc_loc_oob(tBT_TRANSPORT transport, bool is_valid, in btif_dm_proc_loc_oob() argument
/system/bt/btif/src/
Dbtif_dm.cc2413 static void get_address_callback(tBT_TRANSPORT transport, bool is_valid, in get_address_callback() argument
2416 invoke_oob_data_request_cb(transport, is_valid, c, r, address, address_type); in get_address_callback()
2422 bool is_valid, const Octet16& c, in start_advertising_callback() argument
2435 id, base::Bind(&get_address_callback, transport, is_valid, c, r)); in start_advertising_callback()
2449 static void id_status_callback(tBT_TRANSPORT transport, bool is_valid, in id_status_callback() argument
2480 base::Bind(&start_advertising_callback, id, transport, is_valid, c, r), in id_status_callback()
2486 static void start_oob_advertiser(tBT_TRANSPORT transport, bool is_valid, in start_oob_advertiser() argument
2490 base::Bind(&id_status_callback, transport, is_valid, c, r)); in start_oob_advertiser()
2493 void btif_dm_proc_loc_oob(tBT_TRANSPORT transport, bool is_valid, in btif_dm_proc_loc_oob() argument
2496 if (!is_valid) { in btif_dm_proc_loc_oob()
[all …]
/system/bt/service/test/
Dipc_linux_unittest.cc92 ASSERT_TRUE(client_fd_.is_valid()); in ConnectToTestSocket()
/system/bt/service/client/
Dmain.cc654 bool is_valid = false; in HandleStartAdv() local
655 uuid = bluetooth::Uuid::FromString(uuid_str, &is_valid); in HandleStartAdv()
656 if (!is_valid) { in HandleStartAdv()
/system/bt/include/hardware/
Dbluetooth.h340 bool is_valid = false; /* Default to invalid data; force caller to verify */ member

12