/system/bt/types/test/bluetooth/ |
D | uuid_unittest.cc | 127 bool is_valid = false; in TEST() local 129 Uuid::FromString("e39c6285-867f-4b1d-9db0-35fbd9aebf22", &is_valid); in TEST() 130 EXPECT_TRUE(is_valid); in TEST() 135 is_valid = false; in TEST() 136 uuid = Uuid::FromString("1Ae8", &is_valid); in TEST() 137 EXPECT_TRUE(is_valid); in TEST() 142 is_valid = false; in TEST() 143 uuid = Uuid::FromString("12341128", &is_valid); in TEST() 144 EXPECT_TRUE(is_valid); in TEST() 149 bool is_valid = false; in TEST() local [all …]
|
/system/bt/vendor_libs/test_vendor_lib/types/test/bluetooth/ |
D | uuid_unittest.cc | 115 bool is_valid = false; in TEST() local 116 Uuid uuid = Uuid::FromString("e39c6285-867f-4b1d-9db0-35fbd9aebf22", &is_valid); in TEST() 117 EXPECT_TRUE(is_valid); in TEST() 121 is_valid = false; in TEST() 122 uuid = Uuid::FromString("1Ae8", &is_valid); in TEST() 123 EXPECT_TRUE(is_valid); in TEST() 127 is_valid = false; in TEST() 128 uuid = Uuid::FromString("12341128", &is_valid); in TEST() 129 EXPECT_TRUE(is_valid); in TEST() 134 bool is_valid = false; in TEST() local [all …]
|
/system/bt/types/bluetooth/ |
D | uuid.cc | 62 Uuid Uuid::FromString(const std::string& uuid, bool* is_valid) { in FromString() argument 63 if (is_valid) *is_valid = false; in FromString() 85 if (is_valid) *is_valid = true; in FromString() 93 if (is_valid) *is_valid = true; in FromString() 100 if (is_valid) *is_valid = true; in FromString()
|
D | uuid.h | 71 static Uuid FromString(const std::string& uuid, bool* is_valid = nullptr);
|
/system/bt/vendor_libs/test_vendor_lib/types/bluetooth/ |
D | uuid.cc | 60 Uuid Uuid::FromString(const std::string& uuid, bool* is_valid) { in FromString() argument 61 if (is_valid) *is_valid = false; in FromString() 81 if (is_valid) *is_valid = true; in FromString() 88 if (is_valid) *is_valid = true; in FromString() 95 if (is_valid) *is_valid = true; in FromString()
|
D | uuid.h | 71 static Uuid FromString(const std::string& uuid, bool* is_valid = nullptr);
|
/system/keymaster/tests/ |
D | authorization_set_test.cpp | 67 EXPECT_EQ(AuthorizationSet::OK, set1.is_valid()); in TEST() 71 EXPECT_EQ(AuthorizationSet::OK, set2.is_valid()); in TEST() 176 EXPECT_EQ(AuthorizationSet::OK, deserialized.is_valid()); in TEST() 207 EXPECT_EQ(AuthorizationSet::OK, deserialized.is_valid()); in TEST() 224 EXPECT_EQ(AuthorizationSet::MALFORMED_DATA, deserialized.is_valid()); in TEST() 228 EXPECT_EQ(AuthorizationSet::MALFORMED_DATA, deserialized.is_valid()); in TEST() 250 EXPECT_EQ(AuthorizationSet::MALFORMED_DATA, deserialized.is_valid()); in TEST() 254 EXPECT_EQ(AuthorizationSet::MALFORMED_DATA, deserialized.is_valid()); in TEST() 260 ASSERT_EQ(AuthorizationSet::MALFORMED_DATA, deserialized.is_valid()); in TEST() 263 ASSERT_EQ(AuthorizationSet::OK, deserialized.is_valid()); in TEST() [all …]
|
/system/keymaster/include/keymaster/legacy_support/ |
D | keymaster_passthrough_key.h | 91 if (additional_parameters.is_valid() != additional_parameters_.is_valid() && in KeymasterPassthroughKey() 92 additional_parameters_.is_valid() == AuthorizationSet::ALLOCATION_FAILURE) { in KeymasterPassthroughKey()
|
/system/bt/stack/avrc/ |
D | avrc_utils.cc | 221 bool is_valid = false; in avrc_is_valid_opcode() local 226 is_valid = true; in avrc_is_valid_opcode() 229 return is_valid; in avrc_is_valid_opcode()
|
/system/bt/service/ipc/ |
D | ipc_handler_linux.cc | 82 if (!server_socket.is_valid()) { in Run() 102 CHECK(socket_.is_valid()); in Run() 139 CHECK(socket_.is_valid()); in StartListeningOnThread()
|
/system/core/libnetutils/ |
D | packet.c | 156 int is_valid; in receive_packet() local 176 is_valid = 0; in receive_packet() 198 is_valid = 1; in receive_packet() 201 if (!is_valid) { in receive_packet()
|
/system/keymaster/contexts/ |
D | pure_soft_keymaster_context.cpp | 475 if (transit_key_authorizations.is_valid() != AuthorizationSet::Error::OK) { in UnwrapKey() 476 return TranslateAuthorizationSetError(transit_key_authorizations.is_valid()); in UnwrapKey() 484 if (gcm_params.is_valid() != AuthorizationSet::Error::OK) { in UnwrapKey() 485 return TranslateAuthorizationSetError(transit_key_authorizations.is_valid()); in UnwrapKey() 526 if (update_params.is_valid() != AuthorizationSet::Error::OK) { in UnwrapKey() 527 return TranslateAuthorizationSetError(update_params.is_valid()); in UnwrapKey()
|
D | soft_keymaster_context.cpp | 176 return TranslateAuthorizationSetError(sw_enforced->is_valid()); in SetAuthorizations()
|
/system/keymaster/android_keymaster/ |
D | authorization_set.cpp | 63 if (is_valid() != OK) return false; in reserve_elems() 80 if (is_valid() != OK) return false; in reserve_indirect() 220 if (is_valid() != OK) return -1; in find() 242 if (is_valid() == OK && at < (int)elems_size_) { in operator []() 250 if (is_valid() == OK && at < (int)elems_size_) { in operator []() 258 if (is_valid() != OK) return false; in push_back() 272 if (is_valid() != OK) return false; in push_back()
|
/system/media/alsa_utils/include/ |
D | alsa_device_profile.h | 51 bool is_valid; member
|
/system/bt/btif/include/ |
D | btif_dm.h | 62 void btif_dm_proc_loc_oob(tBT_TRANSPORT transport, bool is_valid,
|
/system/media/alsa_utils/ |
D | alsa_device_profile.c | 73 profile->is_valid = false; in profile_reset() 88 return profile->is_valid; in profile_is_valid() 470 profile->is_valid = true; in profile_read_device_info() 669 if (!profile->is_valid) { in profile_dump()
|
/system/memory/libmeminfo/libdmabufinfo/ |
D | dmabufinfo_test.cpp | 491 bool is_valid() { return (ion_fd >= 0 && ion_heap_mask > 0); } in is_valid() function in DmaBufTester 573 ASSERT_TRUE(is_valid()); in TEST_F() 597 ASSERT_TRUE(is_valid()); in TEST_F() 638 ASSERT_TRUE(is_valid()); in TEST_F() 681 ASSERT_TRUE(is_valid()); in TEST_F() 711 ASSERT_TRUE(is_valid()); in TEST_F()
|
/system/keymaster/key_blob_utils/ |
D | software_keyblobs.cpp | 90 return TranslateAuthorizationSetError(hidden->is_valid()); in BuildHiddenAuthorizations() 381 return TranslateAuthorizationSetError(sw_enforced->is_valid()); in SetKeyBlobAuthorizations() 396 return TranslateAuthorizationSetError(sw_enforced->is_valid()); in ExtendKeyBlobAuthorizations()
|
/system/bt/stack/test/common/ |
D | mock_btif_dm.cc | 160 void btif_dm_proc_loc_oob(tBT_TRANSPORT transport, bool is_valid, in btif_dm_proc_loc_oob() argument
|
/system/bt/test/mock/ |
D | mock_btif_dm.cc | 172 void btif_dm_proc_loc_oob(tBT_TRANSPORT transport, bool is_valid, in btif_dm_proc_loc_oob() argument
|
/system/bt/btif/src/ |
D | btif_dm.cc | 2413 static void get_address_callback(tBT_TRANSPORT transport, bool is_valid, in get_address_callback() argument 2416 invoke_oob_data_request_cb(transport, is_valid, c, r, address, address_type); in get_address_callback() 2422 bool is_valid, const Octet16& c, in start_advertising_callback() argument 2435 id, base::Bind(&get_address_callback, transport, is_valid, c, r)); in start_advertising_callback() 2449 static void id_status_callback(tBT_TRANSPORT transport, bool is_valid, in id_status_callback() argument 2480 base::Bind(&start_advertising_callback, id, transport, is_valid, c, r), in id_status_callback() 2486 static void start_oob_advertiser(tBT_TRANSPORT transport, bool is_valid, in start_oob_advertiser() argument 2490 base::Bind(&id_status_callback, transport, is_valid, c, r)); in start_oob_advertiser() 2493 void btif_dm_proc_loc_oob(tBT_TRANSPORT transport, bool is_valid, in btif_dm_proc_loc_oob() argument 2496 if (!is_valid) { in btif_dm_proc_loc_oob() [all …]
|
/system/bt/service/test/ |
D | ipc_linux_unittest.cc | 92 ASSERT_TRUE(client_fd_.is_valid()); in ConnectToTestSocket()
|
/system/bt/service/client/ |
D | main.cc | 654 bool is_valid = false; in HandleStartAdv() local 655 uuid = bluetooth::Uuid::FromString(uuid_str, &is_valid); in HandleStartAdv() 656 if (!is_valid) { in HandleStartAdv()
|
/system/bt/include/hardware/ |
D | bluetooth.h | 340 bool is_valid = false; /* Default to invalid data; force caller to verify */ member
|