/system/core/libmincrypt/test/ |
D | ecdsa_test.c | 231 int success = 1; in main() local 237 success = success && !(good ^ result); \ in main() 244 success = success && result; \ in main() 248 success = success && result; \ in main() 273 success = success && result; \ in main() 281 printf("\n%s\n\n", success ? "PASS" : "FAIL"); in main() 283 return !success; in main()
|
D | rsa_test.c | 813 success = success && result; \ in main() 816 int success = 1; in main() local 839 printf("\n%s\n\n", success ? "PASS" : "FAIL"); in main() 841 return !success; in main()
|
/system/extras/simpleperf/ |
D | cmd_report_test.cpp | 46 success = false; in ReportRaw() 62 success = true; in ReportRaw() 68 bool success; member in ReportCommandTest 73 ASSERT_TRUE(success); in TEST_F() 79 ASSERT_TRUE(success); in TEST_F() 89 ASSERT_TRUE(success); in TEST_F() 104 ASSERT_TRUE(success); in TEST_F() 150 ASSERT_TRUE(success); in TEST_F() 153 ASSERT_TRUE(success); in TEST_F() 156 ASSERT_TRUE(success); in TEST_F() [all …]
|
/system/netd/server/ |
D | DnsProxyListener.cpp | 126 bool success = true; in sendhostent() local 129 success &= sendLenAndData(c, strlen(hp->h_name)+1, hp->h_name); in sendhostent() 131 success &= sendLenAndData(c, 0, "") == 0; in sendhostent() 135 success &= sendLenAndData(c, strlen(hp->h_aliases[i])+1, hp->h_aliases[i]); in sendhostent() 137 success &= sendLenAndData(c, 0, ""); // null to indicate we're done in sendhostent() 140 success &= c->sendData(&buf, sizeof(buf)) == 0; in sendhostent() 143 success &= c->sendData(&buf, sizeof(buf)) == 0; in sendhostent() 146 success &= sendLenAndData(c, 16, hp->h_addr_list[i]); in sendhostent() 148 success &= sendLenAndData(c, 0, ""); // null to indicate we're done in sendhostent() 149 return success; in sendhostent() [all …]
|
/system/connectivity/shill/dbus/ |
D | chromeos_firewalld_proxy.cc | 44 bool success = false; in RequestVpnSetup() local 46 if (!proxy_->RequestVpnSetup(user_names, interface, &success, &error)) { in RequestVpnSetup() 50 return success; in RequestVpnSetup() 60 bool success = false; in RemoveVpnSetup() local 61 if (!proxy_->RemoveVpnSetup(user_names_, interface_name_, &success, &error)) { in RemoveVpnSetup() 67 return success; in RemoveVpnSetup()
|
D | chromeos_permission_broker_proxy.cc | 62 bool success = false; in RequestVpnSetup() local 64 user_names, interface, dbus_fd, &success, &error)) { in RequestVpnSetup() 68 return success; in RequestVpnSetup() 82 bool success = false; in RemoveVpnSetup() local 83 if (!proxy_->RemoveVpnSetup(&success, &error)) { in RemoveVpnSetup() 87 return success; in RemoveVpnSetup()
|
D | chromeos_supplicant_bss_proxy.cc | 70 bool success) { in OnSignalConnected() argument 73 << "success: " << success; in OnSignalConnected() 74 if (!success) { in OnSignalConnected()
|
D | chromeos_supplicant_network_proxy.cc | 107 bool success) { in OnSignalConnected() argument 110 << "success: " << success; in OnSignalConnected() 111 if (!success) { in OnSignalConnected()
|
/system/media/camera/docs/ |
D | metadata_validate.py | 199 success = True 216 success = False 223 success = False 225 return success 243 success = True 251 success = False 263 success = False 276 success = False 282 success = False 284 return success
|
/system/bt/btif/co/ |
D | bta_hl_co.c | 74 BOOLEAN success = FALSE; in bta_hl_co_get_num_of_mdep() local 79 success = TRUE; in bta_hl_co_get_num_of_mdep() 84 __FUNCTION__, success, *p_num_of_mdep ); in bta_hl_co_get_num_of_mdep() 85 return success; in bta_hl_co_get_num_of_mdep() 141 BOOLEAN success = FALSE; in bta_hl_co_get_mdep_config() local 154 success = TRUE; in bta_hl_co_get_mdep_config() 158 __FUNCTION__, success, mdep_idx, mdep_id ); in bta_hl_co_get_mdep_config() 160 return success; in bta_hl_co_get_mdep_config() 181 BOOLEAN success = FALSE; in bta_hl_co_get_echo_config() local 193 success = TRUE; in bta_hl_co_get_echo_config() [all …]
|
/system/core/base/ |
D | utf8_test.cpp | 140 bool success; in TEST() member 169 const bool success = UTF8ToWide(convert_cases[i].utf8, in TEST() local 172 EXPECT_EQ(convert_cases[i].success, success); in TEST() 176 if (success) { in TEST() 204 bool success; in TEST() member 238 const bool success = WideToUTF8(convert_cases[i].utf16, in TEST() local 241 EXPECT_EQ(convert_cases[i].success, success); in TEST() 245 if (success) { in TEST() 260 bool success; in TEST() member 278 EXPECT_EQ(convert_cases[i].success, in TEST()
|
/system/connectivity/apmanager/dbus/ |
D | firewalld_dbus_proxy.cc | 58 bool success = false; in RequestUdpPortAccess() local 60 if (!proxy_->PunchUdpHole(port, interface, &success, &error)) { in RequestUdpPortAccess() 65 if (!success) { in RequestUdpPortAccess() 83 bool success; in ReleaseUdpPortAccess() local 84 if (!proxy_->PlugUdpHole(port, interface, &success, &error)) { in ReleaseUdpPortAccess() 89 if (!success) { in ReleaseUdpPortAccess()
|
/system/firewalld/ |
D | iptables.cc | 86 bool success = true; in RunForAllArguments() local 92 success = false; in RunForAllArguments() 97 return success; in RunForAllArguments() 266 bool success = true; in ApplyVpnSetup() local 274 success = false; in ApplyVpnSetup() 282 success = false; in ApplyVpnSetup() 291 success = false; in ApplyVpnSetup() 298 return success; in ApplyVpnSetup() 390 bool success = ExecvNonRoot(argv, kIpTablesCapMask) == 0; in ApplyMasqueradeWithExecutable() local 392 if (!success) { in ApplyMasqueradeWithExecutable() [all …]
|
/system/core/libsuspend/ |
D | autosuspend_wakeup_count.c | 42 static void (*wakeup_func)(bool success) = NULL; 50 bool success; in suspend_thread_func() local 77 success = true; in suspend_thread_func() 87 success = false; in suspend_thread_func() 89 void (*func)(bool success) = wakeup_func; in suspend_thread_func() 91 (*func)(success); in suspend_thread_func() 143 void set_wakeup_callback(void (*func)(bool success)) in set_wakeup_callback() argument
|
/system/core/adb/ |
D | remount_service.cpp | 138 bool success = true; in remount_service() local 142 success &= remount_partition(fd, "/"); in remount_service() 144 success &= remount_partition(fd, "/system"); in remount_service() 146 success &= remount_partition(fd, "/vendor"); in remount_service() 147 success &= remount_partition(fd, "/oem"); in remount_service() 149 WriteFdExactly(fd, success ? "remount succeeded\n" : "remount failed\n"); in remount_service()
|
/system/connectivity/shill/test-scripts/ |
D | connect-disconnect | 108 success = 0 113 success += 1 117 (float(total - success) / total, success, total - success, total))
|
D | connect-vpn | 160 (success, diagnostics) = flim.ConnectService(service_type = "vpn", 163 if not success or options.verbose: 164 print "Success:", success 167 if not success:
|
D | connect-service | 25 (success, diagnostics) = flim.ConnectService(service=service) 27 print 'Success:', success
|
/system/tools/aidl/ |
D | code_writer.cpp | 63 bool success; in Write() local 66 success = vfprintf(output_, format, ap) >= 0; in Write() 68 no_error_ = no_error_ && success; in Write() 69 return success; in Write()
|
D | aidl.cpp | 147 bool success = true; in check_filenames() local 150 success &= check_filename(filename, item->GetPackage(), item->GetName(), in check_filenames() 154 return success; in check_filenames() 160 bool success = true; in gather_types() local 168 success &= types->AddParcelableType(*item, filename); in gather_types() 171 return success; in gather_types() 459 bool success = true; in parse_preprocessed_file() local 463 success = false; in parse_preprocessed_file() 464 return success; in parse_preprocessed_file() 479 success = false; in parse_preprocessed_file() [all …]
|
D | io_delegate.cpp | 132 bool success; in CreatedNestedDirs() local 134 success = _mkdir(base_dir.c_str()) == 0; in CreatedNestedDirs() 136 success = mkdir(base_dir.c_str(), in CreatedNestedDirs() 140 if (!success && (errno != EEXIST && errno != EISDIR)) { in CreatedNestedDirs()
|
/system/connectivity/shill/wifi/ |
D | tdls_manager.cc | 64 bool success = false; in PerformOperation() local 66 success = DiscoverPeer(peer_mac_address); in PerformOperation() 68 success = SetupPeer(peer_mac_address); in PerformOperation() 93 success = TearDownPeer(peer_mac_address); in PerformOperation() 99 if (!success) { in PerformOperation()
|
/system/update_engine/payload_consumer/ |
D | filesystem_verifier_action_unittest.cc | 165 bool success = true; in DoTest() local 180 success = false; in DoTest() 189 success = false; in DoTest() 219 success = success && is_delegate_ran; in DoTest() 240 success = success && is_a_file_reading_eq; in DoTest() 244 success = success && is_install_plan_eq; in DoTest() 245 return success; in DoTest()
|
/system/bt/service/ |
D | gatt_client.cpp | 97 bool success = (status == BT_STATUS_SUCCESS); in RegisterClientCallback() local 98 BLEStatus result = success ? BLE_STATUS_SUCCESS : BLE_STATUS_FAILURE; in RegisterClientCallback() 102 if (success) in RegisterClientCallback()
|
/system/connectivity/shill/test-rpc-proxy/ |
D | proxy_rpc_out_data_types.cc | 25 bool success, in AssociationResult() argument 30 : success_(success), in AssociationResult()
|