/system/tpm/trunks/ |
D | tpm_generated.cc | 9418 TPM_RC rc = TPM_RC_SUCCESS; in SerializeCommand_Startup() local 9427 rc = Serialize_TPM_CC( in SerializeCommand_Startup() 9430 if (rc != TPM_RC_SUCCESS) { in SerializeCommand_Startup() 9431 return rc; in SerializeCommand_Startup() 9434 rc = Serialize_TPM_SU( in SerializeCommand_Startup() 9437 if (rc != TPM_RC_SUCCESS) { in SerializeCommand_Startup() 9438 return rc; in SerializeCommand_Startup() 9463 rc = Serialize_UINT32(authorization_section_bytes.size(), in SerializeCommand_Startup() 9465 if (rc != TPM_RC_SUCCESS) { in SerializeCommand_Startup() 9466 return rc; in SerializeCommand_Startup() [all …]
|
/system/core/logd/ |
D | libaudit.c | 41 int rc; in get_ack() local 49 rc = audit_get_reply(fd, &rep, GET_REPLY_BLOCKING, MSG_PEEK); in get_ack() 50 if (rc < 0) { in get_ack() 51 return rc; in get_ack() 56 rc = ((struct nlmsgerr *)rep.data)->error; in get_ack() 57 if (rc) { in get_ack() 58 return -rc; in get_ack() 85 int rc; in audit_send() local 136 rc = TEMP_FAILURE_RETRY(sendto(fd, &req, req.nlh.nlmsg_len, 0, in audit_send() 140 if (rc < 0) { in audit_send() [all …]
|
D | LogAudit.cpp | 88 int rc = vasprintf(&str, fmt, args); in logPrint() local 91 if (rc < 0) { in logPrint() 92 return rc; in logPrint() 177 rc = logbuf->log(LOG_ID_EVENTS, now, uid, pid, tid, in logPrint() 180 if (rc >= 0) { in logPrint() 230 rc = logbuf->log(LOG_ID_MAIN, now, uid, pid, tid, newstr, in logPrint() 233 if (rc >= 0) { in logPrint() 244 if (rc < 0) { in logPrint() 245 rc = n; in logPrint() 249 return rc; in logPrint() [all …]
|
/system/core/fs_mgr/ |
D | fs_mgr_format.c | 37 int fd, rc = 0; in format_ext4() local 55 …rc = make_ext4fs_internal(fd, NULL, NULL, fs_mnt_point, 0, 0, 0, 0, 0, 0, 0, 0, 0, NULL, NULL, NUL… in format_ext4() 56 if (rc) { in format_ext4() 57 ERROR("make_ext4fs returned %d.\n", rc); in format_ext4() 61 return rc; in format_ext4() 68 int rc = 0; in format_f2fs() local 84 pid_t p = waitpid(pid, &rc, 0); in format_f2fs() 87 rc = -1; in format_f2fs() 90 if (WIFEXITED(rc)) { in format_f2fs() 91 rc = WEXITSTATUS(rc); in format_f2fs() [all …]
|
/system/core/trusty/libtrusty/tipc-test/ |
D | tipc_test.c | 275 ssize_t rc; in closer3_test() local 295 rc = write(fd[j], buf, sizeof(buf)); in closer3_test() 296 if (rc != sizeof(buf)) { in closer3_test() 299 __func__, j, fd[j], rc); in closer3_test() 313 rc = write(fd[j], buf, sizeof(buf)); in closer3_test() 314 if (rc != sizeof(buf)) { in closer3_test() 317 __func__, j, fd[j], rc); in closer3_test() 342 ssize_t rc; in echo_test() local 368 rc = write(echo_fd, tx_buf, msg_len); in echo_test() 369 if ((size_t)rc != msg_len) { in echo_test() [all …]
|
/system/core/trusty/gatekeeper/ |
D | trusty_gatekeeper_ipc.c | 33 int rc = tipc_connect(TRUSTY_DEVICE_NAME, GATEKEEPER_PORT); in trusty_gatekeeper_connect() local 34 if (rc < 0) { in trusty_gatekeeper_connect() 35 return rc; in trusty_gatekeeper_connect() 38 handle_ = rc; in trusty_gatekeeper_connect() 54 ssize_t rc = write(handle_, msg, msg_size); in trusty_gatekeeper_call() local 57 if (rc < 0) { in trusty_gatekeeper_call() 63 rc = read(handle_, out, *out_size); in trusty_gatekeeper_call() 64 if (rc < 0) { in trusty_gatekeeper_call() 70 if ((size_t) rc < sizeof(struct gatekeeper_message)) { in trusty_gatekeeper_call() 71 ALOGE("invalid response size (%d)\n", (int) rc); in trusty_gatekeeper_call() [all …]
|
/system/core/trusty/libtrusty/ |
D | trusty.c | 33 int rc; in tipc_connect() local 37 rc = -errno; in tipc_connect() 40 return rc < 0 ? rc : -1; in tipc_connect() 43 rc = ioctl(fd, TIPC_IOC_CONNECT, srv_name); in tipc_connect() 44 if (rc < 0) { in tipc_connect() 45 rc = -errno; in tipc_connect() 49 return rc < 0 ? rc : -1; in tipc_connect()
|
/system/vold/fs/ |
D | Vfat.cpp | 74 int rc = 0; in Check() local 83 rc = ForkExecvp(cmd, sFsckUntrustedContext); in Check() 85 if (rc < 0) { in Check() 91 switch(rc) { in Check() 117 SLOGE("Filesystem check failed (unknown exit code %d)", rc); in Check() 129 int rc; in Mount() local 146 rc = mount(c_source, c_target, "vfat", flags, mountData); in Mount() 148 if (rc && errno == EROFS) { in Mount() 151 rc = mount(c_source, c_target, "vfat", flags, mountData); in Mount() 154 if (rc == 0 && createLost) { in Mount() [all …]
|
/system/extras/tests/pagingtest/ |
D | pagingtest.c | 19 ssize_t rc; in create_tmp_file() local 51 rc = read(urandom, buf, size); in create_tmp_file() 53 if (rc < 0) { in create_tmp_file() 58 if (rc != size) { in create_tmp_file() 73 rc = posix_fadvise(fd, 0, size, POSIX_FADV_DONTNEED); in create_tmp_file() 74 if (rc) { in create_tmp_file() 138 int rc; in main() local 160 rc = mmap_test(test_runs, alloc_size); in main() 161 if (rc) { in main() 162 return rc; in main() [all …]
|
/system/vold/ |
D | cryptfs.c | 114 int rc; in keymaster_init() local 117 rc = hw_get_module_by_class(KEYSTORE_HARDWARE_MODULE_ID, NULL, &mod); in keymaster_init() 118 if (rc) { in keymaster_init() 130 rc = keymaster1_open(mod, keymaster1_dev); in keymaster_init() 133 rc = keymaster0_open(mod, keymaster0_dev); in keymaster_init() 136 if (rc) { in keymaster_init() 138 KEYSTORE_HARDWARE_MODULE_ID, strerror(-rc)); in keymaster_init() 147 return rc; in keymaster_init() 155 int rc = 0; in keymaster_check_compatibility() local 159 rc = -1; in keymaster_check_compatibility() [all …]
|
D | Loop.cpp | 48 int rc; in dumpState() local 61 rc = ioctl(fd, LOOP_GET_STATUS64, &li); in dumpState() 63 if (rc < 0 && errno == ENXIO) { in dumpState() 67 if (rc < 0) { in dumpState() 92 int rc; in lookupActive() local 105 rc = ioctl(fd, LOOP_GET_STATUS64, &li); in lookupActive() 106 if (rc < 0 && errno == ENXIO) { in lookupActive() 112 if (rc < 0) { in lookupActive() 137 int rc; in create() local 150 rc = selabel_lookup(sehandle, &secontext, filename, S_IFBLK); in create() [all …]
|
D | CryptCommandListener.cpp | 149 int rc; in do_enablecrypto() local 153 rc = cryptfs_enable_default(arg2, no_ui); in do_enablecrypto() 155 rc = cryptfs_enable(arg2, type, arg4, no_ui); in do_enablecrypto() 158 if (rc == 0) { in do_enablecrypto() 184 int rc = 0; in runCommand() local 190 rc = cryptfs_check_passwd(argv[2]); in runCommand() 201 rc = cryptfs_crypto_complete(); in runCommand() 262 rc = cryptfs_enable_file(); in runCommand() 281 rc = cryptfs_changepw(type, password); in runCommand() 285 rc = cryptfs_verify_passwd(argv[2]); in runCommand() [all …]
|
/system/security/keystore/ |
D | keystore_main.cpp | 66 int rc = keymaster0_open(mod, &km0_device); in keymaster0_device_initialize() local 67 if (rc) { in keymaster0_device_initialize() 86 rc = error; in keymaster0_device_initialize() 98 return rc; in keymaster0_device_initialize() 109 int rc = keymaster1_open(mod, &km1_device); in keymaster1_device_initialize() local 110 if (rc) { in keymaster1_device_initialize() 111 ALOGE("Error %d opening keystore keymaster1 device", rc); in keymaster1_device_initialize() 120 rc = error; in keymaster1_device_initialize() 132 return rc; in keymaster1_device_initialize() 142 int rc = keymaster2_open(mod, &km2_device); in keymaster2_device_initialize() local [all …]
|
/system/netd/server/ |
D | CommandListener.cpp | 560 int rc = 0; in runCommand() local 568 rc = gCtls->tetherCtrl.stopTethering(); in runCommand() 618 rc = gCtls->tetherCtrl.startTethering(num_addrs, &(argv[2])); in runCommand() 621 rc = gCtls->tetherCtrl.tetherInterface(argv[3]); in runCommand() 623 rc = gCtls->tetherCtrl.untetherInterface(argv[3]); in runCommand() 637 rc = gCtls->tetherCtrl.setDnsForwarders(netId, &argv[4], argc - 4); in runCommand() 650 if (!rc) { in runCommand() 665 int rc = 0; in runCommand() local 676 rc = gCtls->natCtrl.enableNat(argv[2], argv[3]); in runCommand() 677 if(!rc) { in runCommand() [all …]
|
/system/update_engine/payload_consumer/ |
D | file_writer.cc | 37 ssize_t rc = write(fd_, char_bytes + bytes_written, in Write() local 39 if (rc < 0) in Write() 41 bytes_written += rc; in Write() 49 int rc = close(fd_); in Close() local 55 if (rc < 0) in Close() 57 return rc; in Close()
|
D | bzip_extent_writer.cc | 31 int rc = BZ2_bzDecompressInit(&stream_, in Init() local 35 TEST_AND_RETURN_FALSE(rc == BZ_OK); in Init() 60 int rc = BZ2_bzDecompress(&stream_); in Write() local 61 TEST_AND_RETURN_FALSE(rc == BZ_OK || rc == BZ_STREAM_END); in Write() 70 if (rc == BZ_STREAM_END) in Write()
|
/system/core/logwrapper/ |
D | logwrapper.c | 57 int rc; in main() local 83 rc = android_fork_execvp_ext(argc, &argv[0], &status, true, in main() 85 if (!rc) { in main() 87 rc = WEXITSTATUS(status); in main() 89 rc = -ECHILD; in main() 97 return rc; in main()
|
/system/extras/libfec/ |
D | fec_process.cpp | 26 ssize_t rc; member 38 p->rc = p->func(p->f, p->buf, p->count, p->offset, &p->errors); in __process() 79 ssize_t rc = 0; in process() local 91 info[i].rc = -1; in process() 102 rc = -1; in process() 122 rc = -1; in process() 123 } else if (!p || p->rc == -1) { in process() 124 rc = -1; in process() 126 nread += p->rc; in process() 131 if (rc == -1) { in process()
|
/system/extras/verity/ |
D | verify_boot_signature.c | 168 int rc = -1; in validate_signature_block() local 205 rc = 0; in validate_signature_block() 211 return rc; in validate_signature_block() 226 int rc = -1; in hash_image() local 289 rc = 0; in hash_image() 304 return rc; in hash_image() 315 int rc = -1; in verify_signature() local 344 rc = 0; in verify_signature() 355 return rc; in verify_signature() 366 int rc = 1; in verify() local [all …]
|
/system/core/libpackagelistparser/ |
D | packagelistparser.c | 101 bool rc = false; in packagelist_parse() local 220 rc = parse_gids(cur, pkg_info->gids.gids, &pkg_info->gids.cnt); in packagelist_parse() 221 if (!rc) { in packagelist_parse() 227 rc = callback(pkg_info, userdata); in packagelist_parse() 228 if (rc == false) { in packagelist_parse() 234 rc = true; in packagelist_parse() 240 rc = true; in packagelist_parse() 245 return rc; in packagelist_parse() 252 rc = false; in packagelist_parse()
|
/system/sepolicy/tools/ |
D | checkfc.c | 119 int rc = ebitmap_and(&dst, attr_set, &policydb->type_attr_map[type->s.value - 1]); in is_type_of_attribute_set() local 120 if (rc) { in is_type_of_attribute_set() 121 fprintf(stderr, "Error: Could not perform ebitmap_and: %d\n", rc); in is_type_of_attribute_set() 151 int rc = sepol_context_from_string(global_state.sepolicy.handle, context, in validate() local 153 if (rc < 0) { in validate() 158 rc = sepol_context_check(global_state.sepolicy.handle, in validate() 160 if (rc < 0) { in validate() 175 rc = -1; in validate() 180 rc = 0; in validate() 184 return rc; in validate() [all …]
|
/system/core/libmemtrack/ |
D | memtrack_test.c | 31 int rc = 0; in getprocname() local 39 rc = 1; in getprocname() 45 rc = 2; in getprocname() 50 rc = 3; in getprocname() 59 if (rc != 0) { in getprocname() 66 rc = 4; in getprocname() 70 return rc; in getprocname()
|
/system/bt/osi/test/ |
D | list_test.cpp | 176 list_node_t *rc = list_foreach(list, list_callback_sum, &sum); in TEST_F() local 178 EXPECT_TRUE(rc == NULL); in TEST_F() 194 list_node_t *rc = list_foreach(list, list_callback_find_int, &find); in TEST_F() local 195 EXPECT_TRUE(rc != NULL); in TEST_F() 196 int *rc_val = (int *)list_node(rc); in TEST_F() 200 rc = list_foreach(list, list_callback_find_int, &find); in TEST_F() 201 EXPECT_TRUE(rc != NULL); in TEST_F() 202 rc_val = (int *)list_node(rc); in TEST_F() 206 rc = list_foreach(list, list_callback_find_int, &find); in TEST_F() 207 EXPECT_TRUE(rc != NULL); in TEST_F() [all …]
|
/system/core/libcutils/ |
D | iosched_policy.c | 45 int rc; in android_get_ioprio() local 47 if ((rc = syscall(SYS_ioprio_get, IOPRIO_WHO_PROCESS, pid)) < 0) { in android_get_ioprio() 51 *clazz = (rc >> IOPRIO_CLASS_SHIFT); in android_get_ioprio() 52 *ioprio = (rc & 0xff); in android_get_ioprio()
|
/system/extras/ksmutils/ |
D | ksminfo.c | 79 int rc = EXIT_SUCCESS; in main() local 139 rc = EXIT_FAILURE; in main() 156 rc = EXIT_FAILURE; in main() 164 rc = EXIT_FAILURE; in main() 171 rc = EXIT_FAILURE; in main() 187 return rc; in main() 203 int rc = 0; in read_pages() local 226 rc = -1; in read_pages() 272 rc = -1; in read_pages() 279 rc = pm_kernel_count(ker, PM_PAGEMAP_PFN(pagemap[j]), &kp->pages[kp->len].count); in read_pages() [all …]
|