Home
last modified time | relevance | path

Searched refs:check (Results 1 – 25 of 308) sorted by relevance

12345678910>>...13

/system/extras/libfec/
Dfec_open.cpp45 check(offset); in find_offset()
46 check(get_appr_size); in find_offset()
47 check(get_real_size); in find_offset()
91 check(f); in find_verity_offset()
92 check(offset); in find_verity_offset()
101 check(f); in parse_ecc_header()
102 check(f->ecc.rsn > 0 && f->ecc.rsn < FEC_RSM); in parse_ecc_header()
103 check(f->size > sizeof(fec_header)); in parse_ecc_header()
200 check(f); in parse_ecc()
201 check(offset % FEC_BLOCKSIZE == 0); in parse_ecc()
[all …]
Dfec_verity.cpp48 check(dst); in parse_hex()
49 check(src); in parse_hex()
50 check(2 * size == strlen(src)); in parse_hex()
56 check(l >= 0); in parse_hex()
57 check(h >= 0); in parse_hex()
73 check(src); in parse_uint64()
74 check(dst); in parse_uint64()
126 check(md); in get_hash()
128 check(mdctx); in get_hash()
137 check(hash_size == digest_length_); in get_hash()
[all …]
Dfec_read.cpp110 check(offset % FEC_BLOCKSIZE == 0); in __ecc_read()
122 check(!use_erasures || !f->hashtree().hash_data.empty()); in __ecc_read()
156 check(data_index >= 0); in __ecc_read()
192 check(rc <= (use_erasures ? e->roots : e->roots / 2)); in __ecc_read()
211 check(f); in ecc_init()
237 check(f); in ecc_read()
238 check(dest); in ecc_read()
239 check(offset < f->data_size); in ecc_read()
240 check(offset + count <= f->data_size); in ecc_read()
241 check(errors); in ecc_read()
[all …]
Davb_utils.cpp44 check(vbmeta_offset <= f->size - sizeof(footer) - vbmeta_size); in parse_vbmeta_from_footer()
105 check(hashtree_descriptor.salt_len < vbmeta.size()); in parse_avb_image()
106 check(salt_offset < vbmeta.size() - hashtree_descriptor.salt_len); in parse_avb_image()
107 check(hashtree_descriptor.root_digest_len < vbmeta.size()); in parse_avb_image()
108 check(root_offset < vbmeta.size() - hashtree_descriptor.root_digest_len); in parse_avb_image()
121 check(hashtree_descriptor.fec_offset == in parse_avb_image()
123 check(hashtree_descriptor.fec_offset <= in parse_avb_image()
Dfec_process.cpp46 check(f); in process()
47 check(buf); in process()
48 check(func); in process()
85 check(left > 0); in process()
114 check(left == 0); in process()
/system/tools/mkbootimg/tests/
Dmkbootimg_test.py122 subprocess.run(mkbootimg_cmds, check=True, cwd=self._exec_dir)
123 subprocess.run(unpack_bootimg_cmds, check=True)
158 result = subprocess.run(avbtool_info_cmds, check=True,
200 subprocess.run(mkbootimg_cmds, check=True, capture_output=True,
232 subprocess.run(mkbootimg_cmds, check=True)
233 subprocess.run(unpack_bootimg_cmds, check=True)
298 subprocess.run(mkbootimg_cmds, check=True)
299 result = subprocess.run(unpack_bootimg_cmds, check=True,
350 subprocess.run(mkbootimg_cmds, check=True)
351 result = subprocess.run(unpack_bootimg_cmds, check=True,
[all …]
/system/apex/apexd/
Dapexservice.cpp170 if (auto check = CheckCallerSystemOrRoot("unstagePackages"); !check.isOk()) { in unstagePackages() local
171 return check; in unstagePackages()
192 auto check = CheckCallerSystemOrRoot("submitStagedSession"); in submitStagedSession() local
193 if (!check.isOk()) { in submitStagedSession()
194 return check; in submitStagedSession()
222 auto check = CheckCallerSystemOrRoot("markStagedSessionReady"); in markStagedSessionReady() local
223 if (!check.isOk()) { in markStagedSessionReady()
224 return check; in markStagedSessionReady()
243 auto check = CheckCallerSystemOrRoot("markStagedSessionSuccessful"); in markStagedSessionSuccessful() local
244 if (!check.isOk()) { in markStagedSessionSuccessful()
[all …]
/system/media/audio_utils/tests/
Dformat_tests.cpp53 uint8_t check[size]; in fillRamp() local
55 check, AUDIO_FORMAT_PCM_8_BIT, in fillRamp()
57 EXPECT_EQ(0, memcmp(check, bytes, size)); in fillRamp()
86 uint32_t check[SAMPLES]; in TEST_P() local
97 check, dst_encoding, in TEST_P()
104 EXPECT_EQ(0, memcmp(check, data, SAMPLES * audio_bytes_per_sample(dst_encoding))); in TEST_P()
Dstring_tests.cpp35 void check(char (&s)[size], int start, size_t actual) { in check() function
70 check(dst, DST_START, sizeof(dst)); in TEST()
75 check(dst, OVER_START, sizeof(dst)); in TEST()
82 check(dst, UNDER_START, sizeof(under)); in TEST()
/system/media/audio_utils/fuzz/format_fuzzer/
Dformat_fuzzer.cpp53 uint8_t check[size]; in fillBuffer() local
55 check, AUDIO_FORMAT_PCM_8_BIT, in fillBuffer()
84 uint32_t check[size]; in LLVMFuzzerTestOneInput() local
93 check, dst_encoding, in LLVMFuzzerTestOneInput()
/system/core/libnetutils/
Dpacket.c105 ip.check = 0; in send_packet()
108 ip.check = finish_sum(checksum(&ip, sizeof(ip), 0)); in send_packet()
113 udp.check = 0; in send_packet()
128 udp.check = finish_sum(udpsum); in send_packet()
209 ALOGW("IP header checksum failure (0x%x)", packet.ip.check); in receive_packet()
240 temp = packet.udp.check; in receive_packet()
241 packet.udp.check = 0; in receive_packet()
243 packet.udp.check = temp; in receive_packet()
/system/tools/hidl/test/version_test/
DAndroid.bp15 cmd: "$(location hidl-gen) -L check " +
25 "($(location hidl-gen) -L check " +
29 "($(location hidl-gen) -L check " +
33 "($(location hidl-gen) -L check " +
37 "($(location hidl-gen) -L check " +
41 "($(location hidl-gen) -L check " +
/system/tools/mkbootimg/gki/
Dcertify_bootimg_test.py115 result = subprocess.run(avbtool_info_cmd, check=False,
159 subprocess.run(avbtool_cmd, check=False, stderr=subprocess.DEVNULL)
773 result = subprocess.run(avbtool_info_cmds, check=True,
795 subprocess.run(certify_bootimg_cmds, check=True, cwd=self._exec_dir)
815 subprocess.run(certify_bootimg_cmds, check=True, cwd=self._exec_dir)
845 subprocess.run(certify_bootimg_cmds, check=True, cwd=self._exec_dir)
878 subprocess.run(certify_bootimg_cmds, check=True, cwd=self._exec_dir)
934 subprocess.run(certify_bootimg_cmds, check=True, cwd=self._exec_dir)
976 subprocess.run(certify_bootimg_cmds, check=True,
1020 subprocess.run(certify_bootimg_cmds, check=True, cwd=self._exec_dir)
[all …]
/system/libfmq/
DFmqInternal.cpp25 void check(bool exp) { in check() function
29 void check(bool exp, const char* message) { in check() function
/system/sepolicy/prebuilts/api/34.0/private/
Dkeystore.te17 # Allow to check whether security logging is enabled.
20 # Allow keystore to check if the system is rkp only.
23 # Allow keystore to check rkpd feature flags
/system/tools/hidl/test/hash_test/
DAndroid.bp15 cmd: "$(location hidl-gen) -L check " +
20 "!($(location hidl-gen) -F -L check " +
25 "!($(location hidl-gen) -L check " +
/system/sepolicy/private/
Dkeystore.te17 # Allow to check whether security logging is enabled.
20 # Allow keystore to check if the system is rkp only.
23 # Allow keystore to check rkpd feature flags
/system/libfmq/base/fmq/
DMQDescriptorBase.h58 void check(bool exp, const char* message);
82 check(length <= SIZE_MAX - kAlignmentSize / 8 + 1, "Queue size too large"); in alignToWordBoundary()
/system/sepolicy/tools/
DREADME19 argument in order to check the validity of the security contexts
63 sepolicy-check
68 …sepolicy-check -s <domain> -t <type> -c <class> -p <permission> -P out/target/product/<board>/root…
75 …Tool to check if fuzzer is added for new services. it is used by fuzzer_bindings_test soong module…
82 …-s [SRCs...] list of service_contexts files. Tool will check if there is f…
Dsepolicy-check.c43 int check(int op, uint16_t arg1, uint16_t arg2) { in check() function
86 match &= check(s_op, source_type, cur->key.source_type); in expand_and_check()
87 match &= check(t_op, target_type, cur->key.target_type); in expand_and_check()
88 match &= check(c_op, target_class, cur->key.target_class); in expand_and_check()
/system/core/fastboot/
Dusb_linux.cpp131 static int check(void *_desc, int len, unsigned type, int size) in check() function
158 if (check(ptr, len, USB_DT_DEVICE, USB_DT_DEVICE_SIZE)) in filter_usb_device()
164 if (check(ptr, len, USB_DT_CONFIG, USB_DT_CONFIG_SIZE)) in filter_usb_device()
213 if (check(hdr, len, USB_DT_INTERFACE, USB_DT_INTERFACE_SIZE) == 0) in filter_usb_device()
235 if (check(hdr, len, USB_DT_ENDPOINT, USB_DT_ENDPOINT_SIZE) == 0) in filter_usb_device()
258 if (check((struct usb_descriptor_hdr *)ptr, len, in filter_usb_device()
/system/keymaster/include/keymaster/
Dkeymaster_tags.h66 static void check() {}
105 StaticAssert<(tag & tag_type) == tag_type>::check();
106 StaticAssert<(tag_type != KM_ENUM) && (tag_type != KM_ENUM_REP)>::check();
123 StaticAssert<(tag & tag_type) == tag_type>::check();
124 StaticAssert<(tag_type == KM_ENUM) || (tag_type == KM_ENUM_REP)>::check();
/system/tools/mkbootimg/
Drepack_bootimg.py116 decompression_cmd, check=False, capture_output=True)
128 ['toybox', 'cpio', '-idu'], check=True,
149 ['mkbootfs', self._ramdisk_dir], check=True, capture_output=True)
152 subprocess.run(compression_cmd, check=True,
193 result = subprocess.run(unpack_bootimg_cmds, check=True,
/system/sepolicy/prebuilts/api/33.0/private/
Dkeystore.te17 # Allow to check whether security logging is enabled.
20 # Allow keystore to check if the system is rkp only.
/system/update_engine/scripts/
Dpaycheck.py148 args.check = (args.check or args.report or args.assert_type or
191 if args.check and not args.meta_sig:
211 if args.check:

12345678910>>...13