Home
last modified time | relevance | path

Searched refs:rc (Results 1 – 25 of 155) sorted by relevance

1234567

/system/tpm/trunks/
Dtpm_generated.cc9418 TPM_RC rc = TPM_RC_SUCCESS; in SerializeCommand_Startup() local
9427 rc = Serialize_TPM_CC( in SerializeCommand_Startup()
9430 if (rc != TPM_RC_SUCCESS) { in SerializeCommand_Startup()
9431 return rc; in SerializeCommand_Startup()
9434 rc = Serialize_TPM_SU( in SerializeCommand_Startup()
9437 if (rc != TPM_RC_SUCCESS) { in SerializeCommand_Startup()
9438 return rc; in SerializeCommand_Startup()
9463 rc = Serialize_UINT32(authorization_section_bytes.size(), in SerializeCommand_Startup()
9465 if (rc != TPM_RC_SUCCESS) { in SerializeCommand_Startup()
9466 return rc; in SerializeCommand_Startup()
[all …]
/system/core/logd/
Dlibaudit.c41 int rc; in get_ack() local
49 rc = audit_get_reply(fd, &rep, GET_REPLY_BLOCKING, MSG_PEEK); in get_ack()
50 if (rc < 0) { in get_ack()
51 return rc; in get_ack()
56 rc = ((struct nlmsgerr *)rep.data)->error; in get_ack()
57 if (rc) { in get_ack()
58 return -rc; in get_ack()
85 int rc; in audit_send() local
136 rc = TEMP_FAILURE_RETRY(sendto(fd, &req, req.nlh.nlmsg_len, 0, in audit_send()
140 if (rc < 0) { in audit_send()
[all …]
DLogAudit.cpp88 int rc = vasprintf(&str, fmt, args); in logPrint() local
91 if (rc < 0) { in logPrint()
92 return rc; in logPrint()
177 rc = logbuf->log(LOG_ID_EVENTS, now, uid, pid, tid, in logPrint()
180 if (rc >= 0) { in logPrint()
230 rc = logbuf->log(LOG_ID_MAIN, now, uid, pid, tid, newstr, in logPrint()
233 if (rc >= 0) { in logPrint()
244 if (rc < 0) { in logPrint()
245 rc = n; in logPrint()
249 return rc; in logPrint()
[all …]
/system/core/fs_mgr/
Dfs_mgr_format.c37 int fd, rc = 0; in format_ext4() local
55rc = make_ext4fs_internal(fd, NULL, NULL, fs_mnt_point, 0, 0, 0, 0, 0, 0, 0, 0, 0, NULL, NULL, NUL… in format_ext4()
56 if (rc) { in format_ext4()
57 ERROR("make_ext4fs returned %d.\n", rc); in format_ext4()
61 return rc; in format_ext4()
68 int rc = 0; in format_f2fs() local
84 pid_t p = waitpid(pid, &rc, 0); in format_f2fs()
87 rc = -1; in format_f2fs()
90 if (WIFEXITED(rc)) { in format_f2fs()
91 rc = WEXITSTATUS(rc); in format_f2fs()
[all …]
/system/core/trusty/libtrusty/tipc-test/
Dtipc_test.c275 ssize_t rc; in closer3_test() local
295 rc = write(fd[j], buf, sizeof(buf)); in closer3_test()
296 if (rc != sizeof(buf)) { in closer3_test()
299 __func__, j, fd[j], rc); in closer3_test()
313 rc = write(fd[j], buf, sizeof(buf)); in closer3_test()
314 if (rc != sizeof(buf)) { in closer3_test()
317 __func__, j, fd[j], rc); in closer3_test()
342 ssize_t rc; in echo_test() local
368 rc = write(echo_fd, tx_buf, msg_len); in echo_test()
369 if ((size_t)rc != msg_len) { in echo_test()
[all …]
/system/core/trusty/gatekeeper/
Dtrusty_gatekeeper_ipc.c33 int rc = tipc_connect(TRUSTY_DEVICE_NAME, GATEKEEPER_PORT); in trusty_gatekeeper_connect() local
34 if (rc < 0) { in trusty_gatekeeper_connect()
35 return rc; in trusty_gatekeeper_connect()
38 handle_ = rc; in trusty_gatekeeper_connect()
54 ssize_t rc = write(handle_, msg, msg_size); in trusty_gatekeeper_call() local
57 if (rc < 0) { in trusty_gatekeeper_call()
63 rc = read(handle_, out, *out_size); in trusty_gatekeeper_call()
64 if (rc < 0) { in trusty_gatekeeper_call()
70 if ((size_t) rc < sizeof(struct gatekeeper_message)) { in trusty_gatekeeper_call()
71 ALOGE("invalid response size (%d)\n", (int) rc); in trusty_gatekeeper_call()
[all …]
/system/core/trusty/libtrusty/
Dtrusty.c33 int rc; in tipc_connect() local
37 rc = -errno; in tipc_connect()
40 return rc < 0 ? rc : -1; in tipc_connect()
43 rc = ioctl(fd, TIPC_IOC_CONNECT, srv_name); in tipc_connect()
44 if (rc < 0) { in tipc_connect()
45 rc = -errno; in tipc_connect()
49 return rc < 0 ? rc : -1; in tipc_connect()
/system/vold/fs/
DVfat.cpp74 int rc = 0; in Check() local
83 rc = ForkExecvp(cmd, sFsckUntrustedContext); in Check()
85 if (rc < 0) { in Check()
91 switch(rc) { in Check()
117 SLOGE("Filesystem check failed (unknown exit code %d)", rc); in Check()
129 int rc; in Mount() local
146 rc = mount(c_source, c_target, "vfat", flags, mountData); in Mount()
148 if (rc && errno == EROFS) { in Mount()
151 rc = mount(c_source, c_target, "vfat", flags, mountData); in Mount()
154 if (rc == 0 && createLost) { in Mount()
[all …]
/system/extras/tests/pagingtest/
Dpagingtest.c19 ssize_t rc; in create_tmp_file() local
51 rc = read(urandom, buf, size); in create_tmp_file()
53 if (rc < 0) { in create_tmp_file()
58 if (rc != size) { in create_tmp_file()
73 rc = posix_fadvise(fd, 0, size, POSIX_FADV_DONTNEED); in create_tmp_file()
74 if (rc) { in create_tmp_file()
138 int rc; in main() local
160 rc = mmap_test(test_runs, alloc_size); in main()
161 if (rc) { in main()
162 return rc; in main()
[all …]
/system/vold/
Dcryptfs.c114 int rc; in keymaster_init() local
117 rc = hw_get_module_by_class(KEYSTORE_HARDWARE_MODULE_ID, NULL, &mod); in keymaster_init()
118 if (rc) { in keymaster_init()
130 rc = keymaster1_open(mod, keymaster1_dev); in keymaster_init()
133 rc = keymaster0_open(mod, keymaster0_dev); in keymaster_init()
136 if (rc) { in keymaster_init()
138 KEYSTORE_HARDWARE_MODULE_ID, strerror(-rc)); in keymaster_init()
147 return rc; in keymaster_init()
155 int rc = 0; in keymaster_check_compatibility() local
159 rc = -1; in keymaster_check_compatibility()
[all …]
DLoop.cpp48 int rc; in dumpState() local
61 rc = ioctl(fd, LOOP_GET_STATUS64, &li); in dumpState()
63 if (rc < 0 && errno == ENXIO) { in dumpState()
67 if (rc < 0) { in dumpState()
92 int rc; in lookupActive() local
105 rc = ioctl(fd, LOOP_GET_STATUS64, &li); in lookupActive()
106 if (rc < 0 && errno == ENXIO) { in lookupActive()
112 if (rc < 0) { in lookupActive()
137 int rc; in create() local
150 rc = selabel_lookup(sehandle, &secontext, filename, S_IFBLK); in create()
[all …]
DCryptCommandListener.cpp149 int rc; in do_enablecrypto() local
153 rc = cryptfs_enable_default(arg2, no_ui); in do_enablecrypto()
155 rc = cryptfs_enable(arg2, type, arg4, no_ui); in do_enablecrypto()
158 if (rc == 0) { in do_enablecrypto()
184 int rc = 0; in runCommand() local
190 rc = cryptfs_check_passwd(argv[2]); in runCommand()
201 rc = cryptfs_crypto_complete(); in runCommand()
262 rc = cryptfs_enable_file(); in runCommand()
281 rc = cryptfs_changepw(type, password); in runCommand()
285 rc = cryptfs_verify_passwd(argv[2]); in runCommand()
[all …]
/system/security/keystore/
Dkeystore_main.cpp66 int rc = keymaster0_open(mod, &km0_device); in keymaster0_device_initialize() local
67 if (rc) { in keymaster0_device_initialize()
86 rc = error; in keymaster0_device_initialize()
98 return rc; in keymaster0_device_initialize()
109 int rc = keymaster1_open(mod, &km1_device); in keymaster1_device_initialize() local
110 if (rc) { in keymaster1_device_initialize()
111 ALOGE("Error %d opening keystore keymaster1 device", rc); in keymaster1_device_initialize()
120 rc = error; in keymaster1_device_initialize()
132 return rc; in keymaster1_device_initialize()
142 int rc = keymaster2_open(mod, &km2_device); in keymaster2_device_initialize() local
[all …]
/system/netd/server/
DCommandListener.cpp560 int rc = 0; in runCommand() local
568 rc = gCtls->tetherCtrl.stopTethering(); in runCommand()
618 rc = gCtls->tetherCtrl.startTethering(num_addrs, &(argv[2])); in runCommand()
621 rc = gCtls->tetherCtrl.tetherInterface(argv[3]); in runCommand()
623 rc = gCtls->tetherCtrl.untetherInterface(argv[3]); in runCommand()
637 rc = gCtls->tetherCtrl.setDnsForwarders(netId, &argv[4], argc - 4); in runCommand()
650 if (!rc) { in runCommand()
665 int rc = 0; in runCommand() local
676 rc = gCtls->natCtrl.enableNat(argv[2], argv[3]); in runCommand()
677 if(!rc) { in runCommand()
[all …]
/system/update_engine/payload_consumer/
Dfile_writer.cc37 ssize_t rc = write(fd_, char_bytes + bytes_written, in Write() local
39 if (rc < 0) in Write()
41 bytes_written += rc; in Write()
49 int rc = close(fd_); in Close() local
55 if (rc < 0) in Close()
57 return rc; in Close()
Dbzip_extent_writer.cc31 int rc = BZ2_bzDecompressInit(&stream_, in Init() local
35 TEST_AND_RETURN_FALSE(rc == BZ_OK); in Init()
60 int rc = BZ2_bzDecompress(&stream_); in Write() local
61 TEST_AND_RETURN_FALSE(rc == BZ_OK || rc == BZ_STREAM_END); in Write()
70 if (rc == BZ_STREAM_END) in Write()
/system/core/logwrapper/
Dlogwrapper.c57 int rc; in main() local
83 rc = android_fork_execvp_ext(argc, &argv[0], &status, true, in main()
85 if (!rc) { in main()
87 rc = WEXITSTATUS(status); in main()
89 rc = -ECHILD; in main()
97 return rc; in main()
/system/extras/libfec/
Dfec_process.cpp26 ssize_t rc; member
38 p->rc = p->func(p->f, p->buf, p->count, p->offset, &p->errors); in __process()
79 ssize_t rc = 0; in process() local
91 info[i].rc = -1; in process()
102 rc = -1; in process()
122 rc = -1; in process()
123 } else if (!p || p->rc == -1) { in process()
124 rc = -1; in process()
126 nread += p->rc; in process()
131 if (rc == -1) { in process()
/system/extras/verity/
Dverify_boot_signature.c168 int rc = -1; in validate_signature_block() local
205 rc = 0; in validate_signature_block()
211 return rc; in validate_signature_block()
226 int rc = -1; in hash_image() local
289 rc = 0; in hash_image()
304 return rc; in hash_image()
315 int rc = -1; in verify_signature() local
344 rc = 0; in verify_signature()
355 return rc; in verify_signature()
366 int rc = 1; in verify() local
[all …]
/system/core/libpackagelistparser/
Dpackagelistparser.c101 bool rc = false; in packagelist_parse() local
220 rc = parse_gids(cur, pkg_info->gids.gids, &pkg_info->gids.cnt); in packagelist_parse()
221 if (!rc) { in packagelist_parse()
227 rc = callback(pkg_info, userdata); in packagelist_parse()
228 if (rc == false) { in packagelist_parse()
234 rc = true; in packagelist_parse()
240 rc = true; in packagelist_parse()
245 return rc; in packagelist_parse()
252 rc = false; in packagelist_parse()
/system/sepolicy/tools/
Dcheckfc.c119 int rc = ebitmap_and(&dst, attr_set, &policydb->type_attr_map[type->s.value - 1]); in is_type_of_attribute_set() local
120 if (rc) { in is_type_of_attribute_set()
121 fprintf(stderr, "Error: Could not perform ebitmap_and: %d\n", rc); in is_type_of_attribute_set()
151 int rc = sepol_context_from_string(global_state.sepolicy.handle, context, in validate() local
153 if (rc < 0) { in validate()
158 rc = sepol_context_check(global_state.sepolicy.handle, in validate()
160 if (rc < 0) { in validate()
175 rc = -1; in validate()
180 rc = 0; in validate()
184 return rc; in validate()
[all …]
/system/core/libmemtrack/
Dmemtrack_test.c31 int rc = 0; in getprocname() local
39 rc = 1; in getprocname()
45 rc = 2; in getprocname()
50 rc = 3; in getprocname()
59 if (rc != 0) { in getprocname()
66 rc = 4; in getprocname()
70 return rc; in getprocname()
/system/bt/osi/test/
Dlist_test.cpp176 list_node_t *rc = list_foreach(list, list_callback_sum, &sum); in TEST_F() local
178 EXPECT_TRUE(rc == NULL); in TEST_F()
194 list_node_t *rc = list_foreach(list, list_callback_find_int, &find); in TEST_F() local
195 EXPECT_TRUE(rc != NULL); in TEST_F()
196 int *rc_val = (int *)list_node(rc); in TEST_F()
200 rc = list_foreach(list, list_callback_find_int, &find); in TEST_F()
201 EXPECT_TRUE(rc != NULL); in TEST_F()
202 rc_val = (int *)list_node(rc); in TEST_F()
206 rc = list_foreach(list, list_callback_find_int, &find); in TEST_F()
207 EXPECT_TRUE(rc != NULL); in TEST_F()
[all …]
/system/core/libcutils/
Diosched_policy.c45 int rc; in android_get_ioprio() local
47 if ((rc = syscall(SYS_ioprio_get, IOPRIO_WHO_PROCESS, pid)) < 0) { in android_get_ioprio()
51 *clazz = (rc >> IOPRIO_CLASS_SHIFT); in android_get_ioprio()
52 *ioprio = (rc & 0xff); in android_get_ioprio()
/system/extras/ksmutils/
Dksminfo.c79 int rc = EXIT_SUCCESS; in main() local
139 rc = EXIT_FAILURE; in main()
156 rc = EXIT_FAILURE; in main()
164 rc = EXIT_FAILURE; in main()
171 rc = EXIT_FAILURE; in main()
187 return rc; in main()
203 int rc = 0; in read_pages() local
226 rc = -1; in read_pages()
272 rc = -1; in read_pages()
279 rc = pm_kernel_count(ker, PM_PAGEMAP_PFN(pagemap[j]), &kp->pages[kp->len].count); in read_pages()
[all …]

1234567