Searched refs:result2 (Results 1 – 3 of 3) sorted by relevance
/hardware/interfaces/keymaster/4.0/vts/functional/ |
D | VerificationTokenTest.cpp | 100 auto result2 = verifyAuthorization( in TEST_F() local 102 ASSERT_TRUE(result2.callSuccessful); in TEST_F() 104 EXPECT_EQ(ErrorCode::OK, result2.error); in TEST_F() 105 EXPECT_EQ(2U, result2.token.challenge); in TEST_F() 106 EXPECT_EQ(SecLevel(), result2.token.securityLevel); in TEST_F() 107 EXPECT_EQ(0U, result2.token.parametersVerified.size()) in TEST_F() 117 auto km_time_delta = result2.token.timestamp - result1.token.timestamp; in TEST_F()
|
D | HmacKeySharingTest.cpp | 108 auto result2 = getHmacSharingParameters(keymaster()); in TEST_F() local 109 EXPECT_EQ(ErrorCode::OK, result2.error); in TEST_F() 111 ASSERT_EQ(result1.params.seed, result2.params.seed) in TEST_F() 113 ASSERT_EQ(result1.params.nonce, result2.params.nonce) in TEST_F()
|
/hardware/broadcom/wlan/bcmdhd/wifi_hal/ |
D | wifi_hal.cpp | 480 ssize_t result2 = TEMP_FAILURE_RETRY(read(pfd[0].fd, buf, sizeof(buf))); in wifi_event_loop() local 481 ALOGE("Read after POLL returned %zd, error no = %d (%s)", result2, in wifi_event_loop() 491 ssize_t result2 = TEMP_FAILURE_RETRY(read(pfd[1].fd, buf, sizeof(buf))); in wifi_event_loop() local 493 result2, errno, strerror(errno)); in wifi_event_loop()
|