/system/extras/tests/bionic/libc/other/ |
test_system.c | 9 int rv; local 14 rv = system(argv[1]); 15 if (rv < 0) { 22 if (WEXITSTATUS(rv) != 0) { 24 WEXITSTATUS(rv));
|
/external/chromium/net/http/ |
http_auth_handler_ntlm.cc | 21 int rv = auth_sspi_.GenerateCredentials( local 28 if (rv == OK) 59 int rv = InitializeBeforeFirstChallenge(); 60 if (rv != OK) 80 int rv = GetNextToken(in_buf, in_buf_len, &out_buf, &out_buf_len); 81 if (rv != OK)
|
http_auth_handler_negotiate_win.cc | 25 int rv = auth_sspi_.GenerateCredentials( local 32 if (rv == OK)
|
http_network_layer_unittest.cc | 23 int rv = factory.CreateTransaction(&trans); local 24 EXPECT_EQ(net::OK, rv); 34 int rv = factory.CreateTransaction(&trans); local 35 EXPECT_EQ(net::OK, rv); 41 rv = factory.CreateTransaction(&trans); 42 EXPECT_EQ(net::ERR_NETWORK_IO_SUSPENDED, rv); 48 rv = factory.CreateTransaction(&trans); 49 EXPECT_EQ(net::OK, rv); 76 int rv = factory.CreateTransaction(&trans); local 77 EXPECT_EQ(net::OK, rv); [all...] |
/external/chromium/net/base/ |
address_list_unittest.cc | 22 int rv = SystemHostResolverProc("192.168.1.1", local 25 EXPECT_EQ(0, rv);
|
fixed_host_resolver.cc | 22 int rv = SystemHostResolverProc(host, net::ADDRESS_FAMILY_UNSPECIFIED, local 24 if (rv != OK) {
|
ssl_config_service_mac_unittest.cc | 26 bool rv = net::SSLConfigServiceMac::GetSSLConfigNow(&config); local 27 EXPECT_TRUE(rv); 33 bool rv = net::SSLConfigServiceMac::GetSSLConfigNow(&config_save); local 34 EXPECT_TRUE(rv); 40 rv = net::SSLConfigServiceMac::GetSSLConfigNow(&config); 41 EXPECT_TRUE(rv); 45 rv = net::SSLConfigServiceMac::GetSSLConfigNow(&config); 46 EXPECT_TRUE(rv); 54 rv = net::SSLConfigServiceMac::GetSSLConfigNow(&config); 55 EXPECT_TRUE(rv); [all...] |
ssl_config_service_win_unittest.cc | 26 bool rv = net::SSLConfigServiceWin::GetSSLConfigNow(&config); local 27 EXPECT_TRUE(rv); 33 bool rv = net::SSLConfigServiceWin::GetSSLConfigNow(&config_save); local 34 EXPECT_TRUE(rv); 40 rv = net::SSLConfigServiceWin::GetSSLConfigNow(&config); 41 EXPECT_TRUE(rv); 45 rv = net::SSLConfigServiceWin::GetSSLConfigNow(&config); 46 EXPECT_TRUE(rv); 54 rv = net::SSLConfigServiceWin::GetSSLConfigNow(&config); 55 EXPECT_TRUE(rv); [all...] |
host_resolver.cc | 38 int rv = resolver_->Resolve( local 41 if (rv == ERR_IO_PENDING) { 47 return rv;
|
mime_util_unittest.cc | 28 bool rv; local 31 rv = net::GetMimeTypeFromExtension(tests[i].extension, &mime_type); 32 EXPECT_EQ(tests[i].valid, rv); 33 if (rv) 53 bool rv; local 56 rv = net::GetMimeTypeFromFile(FilePath(tests[i].file_path), 58 EXPECT_EQ(tests[i].valid, rv); 59 if (rv)
|
upload_data_stream.cc | 71 int rv = next_element_stream_.Open(element.file_path(), flags); local 74 DLOG_IF(WARNING, rv != OK) << "Failed to open \"" 76 << "\" for reading: " << rv; 79 if (rv == OK) { 90 int rv = 0; local 94 (rv = next_element_stream_.Read(buf_->data() + buf_len_, 96 buf_len_ += rv; 97 next_element_remaining_ -= rv;
|
/external/chromium/base/crypto/ |
signature_creator_nss.cc | 29 SECStatus rv = SGN_Begin(result->sign_context_); local 30 if (rv != SECSuccess) { 52 SECStatus rv = SGN_Update(sign_context_, local 55 if (rv != SECSuccess) { 65 SECStatus rv = SGN_End(sign_context_, &signature_item); local 66 if (rv != SECSuccess) {
|
rsa_private_key_nss.cc | 27 SECStatus rv; local 28 rv = PK11_ReadRawAttribute(PK11_TypePrivKey, key, type, &item); 29 if (rv != SECSuccess) { 75 SECStatus rv = PK11_ImportDERPrivateKeyInfoAndReturnKey(slot, local 79 if (rv != SECSuccess) {
|
signature_verifier_nss.cc | 56 SECStatus rv; local 57 rv = SEC_QuickDERDecodeItem(arena, &sig_alg_id, SECOID_AlgorithmIDTemplate, 59 if (rv != SECSuccess) { 82 rv = VFY_Begin(vfy_context_); 83 if (rv != SECSuccess) { 92 SECStatus rv = VFY_Update(vfy_context_, data_part, data_part_len); local 93 DCHECK(rv == SECSuccess); 97 SECStatus rv = VFY_End(vfy_context_); local 102 return (rv == SECSuccess);
|
/external/chromium/base/ |
lock_impl_posix.cc | 15 int rv = pthread_mutexattr_init(&mta); local 16 DCHECK_EQ(rv, 0); 17 rv = pthread_mutexattr_settype(&mta, PTHREAD_MUTEX_ERRORCHECK); 18 DCHECK_EQ(rv, 0); 19 rv = pthread_mutex_init(&os_lock_, &mta); 20 DCHECK_EQ(rv, 0); 21 rv = pthread_mutexattr_destroy(&mta); 22 DCHECK_EQ(rv, 0); 30 int rv = pthread_mutex_destroy(&os_lock_); local 31 DCHECK_EQ(rv, 0) 35 int rv = pthread_mutex_trylock(&os_lock_); local 41 int rv = pthread_mutex_lock(&os_lock_); local 46 int rv = pthread_mutex_unlock(&os_lock_); local [all...] |
condition_variable_posix.cc | 20 int rv = pthread_cond_init(&condition_, NULL); local 21 DCHECK(rv == 0); 25 int rv = pthread_cond_destroy(&condition_); local 26 DCHECK(rv == 0); 30 int rv = pthread_cond_wait(&condition_, user_mutex_); local 31 DCHECK(rv == 0); 49 int rv = pthread_cond_timedwait(&condition_, user_mutex_, &abstime); local 50 DCHECK(rv == 0 || rv == ETIMEDOUT); 54 int rv = pthread_cond_broadcast(&condition_) local 59 int rv = pthread_cond_signal(&condition_); local [all...] |
waitable_event_win.cc | 32 HANDLE rv = handle_; local 34 return rv;
|
/external/chromium/net/third_party/nss/ssl/ |
authcert.c | 69 SECStatus rv = SECFailure; local 80 rv = SECSuccess; 104 rv = NSS_CmpCertChainWCANames(cert, caNames); 105 if ( rv == SECSuccess ) { 110 rv = SECFailure; 116 if (rv == SECSuccess) { 120 return rv;
|
ssl3gthr.c | 73 int rv = 1; local 97 rv = 0; 102 rv = SECFailure; 110 rv = SECFailure; 167 return rv; 190 int rv; local 195 rv = ssl3_GatherData(ss, &ss->gs, flags); 196 if (rv <= 0) { 197 return rv; 206 rv = ssl3_HandleRecord(ss, &cText, &ss->gs.buf) 231 int rv; local [all...] |
cmpcert.c | 67 SECStatus rv; local 84 rv = DER_Lengths(&issuerName, &headerlen, (PRUint32 *)&contentlen); 85 if ( rv == SECSuccess ) { 96 rv = SECSuccess; 100 rv = SECSuccess; 118 rv = SECFailure; 121 return rv;
|
sslauth.c | 237 SECStatus rv; local 254 rv = CERT_VerifyCertNow(handle, ss->sec.peerCert, checkSig, certUsage, 257 if ( rv != SECSuccess || isServer ) 258 return rv; 266 rv = CERT_VerifyCertName(ss->sec.peerCert, hostname); 268 rv = SECFailure; 269 if (rv != SECSuccess) 272 return rv;
|
/external/chromium/net/socket/ |
tcp_pinger_unittest.cc | 72 int rv = resolver->Resolve(info, &addr, NULL, NULL, NULL); local 73 EXPECT_EQ(rv, net::OK); 76 rv = pinger.Ping(); 77 EXPECT_EQ(rv, net::OK); 89 int rv = resolver->Resolve(info, &addr, NULL, NULL, NULL); local 90 EXPECT_EQ(rv, net::OK); 93 rv = pinger.Ping(base::TimeDelta::FromMilliseconds(100), 1); 94 EXPECT_NE(rv, net::OK);
|
/external/iproute2/lib/ |
dnet_pton.c | 21 int rv = 0; local 28 return rv; 30 rv++; 35 return rv;
|
/system/core/toolbox/ |
cmp.c | 15 int rv = 0; local 66 return rv; 76 rv = 1; 81 return rv;
|
hd.c | 16 int rv = 0; local
|