/system/core/rootdir/etc/ |
H A D | init.testmenu | 86 echo Got key -$c- 101 echo Got key -$c- 129 echo Got key -$c- 159 echo Got key -$c- 194 echo Got key -$c- 219 echo Got key -$c- 281 echo Got key -$c-
|
/system/core/init/ |
H A D | property_service.c | 492 char *key, *value, *eol, *sol, *tmp; local 496 key = sol; 500 value = strchr(key, '='); 504 while(isspace(*key)) key++; 505 if(*key == '#') continue; 507 while((tmp > key) && isspace(*tmp)) *tmp-- = 0; 513 property_set(key, value);
|
H A D | init.c | 105 /* add_environment - add "key=value" to the current environment */ 106 int add_environment(const char *key, const char *val) argument 112 size_t len = strlen(key) + strlen(val) + 2; 114 snprintf(entry, len, "%s=%s", key, val); 148 char key[64] = ANDROID_SOCKET_ENV_PREFIX; local 151 strlcpy(key + sizeof(ANDROID_SOCKET_ENV_PREFIX) - 1, 153 sizeof(key) - sizeof(ANDROID_SOCKET_ENV_PREFIX)); 155 add_environment(key, val);
|
/system/core/libpixelflinger/tests/codegen/ |
H A D | codegen.cpp | 33 const AssemblyKey<needs_t>& key() const { return mKey; } function in class:ScanlineAssembly
|
/system/security/softkeymaster/ |
H A D | keymaster_openssl.cpp | 101 ALOGE("private or public key size was too big"); 105 /* int type + int size + private key data + int size + public key data */ 111 ALOGE("could not allocate memory for key blob"); 119 /* Write key type to allocated buffer */ 124 /* Write public key to allocated buffer */ 133 /* Write private key to allocated buffer */ 154 ALOGE("supplied key blob was NULL"); 162 ALOGE("key blob appears to be truncated"); 167 ALOGE("cannot read key; i 268 openssl_import_keypair(const keymaster_device_t* dev, const uint8_t* key, const size_t key_length, uint8_t** key_blob, size_t* key_blob_length) argument [all...] |
/system/core/adb/ |
H A D | adb.c | 353 ret = adb_auth_sign(t->key, token, token_size, p->data); 374 D("Failed to get user public key\n"); 443 char *key; local 444 key = adb_strtok_r(cp + 1, prop_seps, &save); 445 while (key) { 446 cp = strchr(key, key_val_sep); 449 if (!strcmp(key, "ro.product.name")) 451 else if (!strcmp(key, "ro.product.model")) 453 else if (!strcmp(key, "ro.product.device")) 456 key [all...] |
H A D | adb.h | 206 void *key; member in struct:atransport
|
/system/security/keystore/ |
H A D | keystore.cpp | 53 /* KeyStore is a secured storage for key-value pairs. In this implementation, 54 * each file stores one key-value pair. Keys are encoded in file names, and 55 * values are encrypted with checksums. The encryption key is protected by a 161 * [0-o]. Therefore in the worst case the length of a key gets doubled. Note 164 static int encode_key(char* out, const Value* key) { argument 165 const uint8_t* in = key->value; 166 int length = key->length; 180 static int encode_key_for_uid(char* out, uid_t uid, const Value* key) { argument 184 return n + encode_key(out, key); 503 // the AES key, the 650 importKey(const Value* key, const char* filename) argument 729 generateKeyFromPassword(uint8_t* key, ssize_t keySize, Value* pw, uint8_t* salt) argument 1094 import(KeyStore* keyStore, int, uid_t uid, Value* keyName, Value* key, Value*) argument [all...] |
/system/core/charger/ |
H A D | charger.c | 772 * of time the key spent not being pressed is not useful */ 778 LOGV("[%lld] key[%d] down\n", now, code); 783 LOGV("[%lld] key[%d] up (was down for %lld.%lldsec)\n", now, 799 struct key_state *key, 802 int64_t then = key->timestamp + timeout; 810 struct key_state *key = &charger->keys[code]; local 814 if (key->down) { 815 int64_t reboot_timeout = key->timestamp + POWER_ON_KEY_TIME; 820 /* if the key is pressed but timeout hasn't expired, 823 set_next_key_check(charger, key, POWER_ON_KEY_TIM 798 set_next_key_check(struct charger *charger, struct key_state *key, int64_t timeout) argument [all...] |
/system/core/libcorkscrew/ |
H A D | symbol_table.c | 48 static int bcompar(const void *key, const void *element) { argument 49 uintptr_t addr = *(const uintptr_t*)key;
|
/system/extras/showslab/ |
H A D | showslab.c | 243 * set_sort_func - return the slab_sort_func that matches the given key. 244 * On unrecognizable key, the call returns NULL. 246 static void * set_sort_func(char key) argument 248 switch (tolower(key)) {
|
/system/vold/ |
H A D | Devmapper.cpp | 166 int Devmapper::create(const char *name, const char *loopFile, const char *key, argument 236 "twofish %s 0 %s 0", key, loopFile);
|
H A D | cryptfs.c | 18 * 1. Perhaps keep several copies of the encrypted key, in case something 142 /* key or salt can be NULL, in which case just skip writing that value. Useful to 143 * update the failed mount count but not change the key. 146 unsigned char *key, unsigned char *salt) 171 * encryption info footer and key, and plenty of bytes to spare for future 187 SLOGE("Unexpected value for crypto key location\n"); 196 if (key) { 203 if ( (cnt = write(fd, key, crypt_ftr->keysize)) != crypt_ftr->keysize) { 204 SLOGE("Cannot write key for real block device %s\n", fname); 212 if (! key) 145 put_crypt_ftr_and_key(char *real_blk_name, struct crypt_mnt_ftr *crypt_ftr, unsigned char *key, unsigned char *salt) argument 244 get_crypt_ftr_and_key(char *real_blk_name, struct crypt_mnt_ftr *crypt_ftr, unsigned char *key, unsigned char *salt) argument 886 unsigned char key[32], salt[32]; local [all...] |
H A D | VolumeManager.cpp | 241 const char *key, const int ownerUid, bool isExternal) { 326 if (strcmp(key, "none")) { 329 if (Devmapper::create(idHash, loopDevice, key, numImgSectors, dmDevice, 861 int VolumeManager::mountAsec(const char *id, const char *key, int ownerUid) { argument 920 if (strcmp(key, "none")) { 922 if (Devmapper::create(idHash, loopDevice, key, nr_sec, 1004 int VolumeManager::mountObb(const char *img, const char *key, int ownerGid) { argument 1056 if (strcmp(key, "none")) { 1058 if (Devmapper::create(idHash, loopDevice, key, nr_sec, 240 createAsec(const char *id, unsigned int numSectors, const char *fstype, const char *key, const int ownerUid, bool isExternal) argument
|
/system/media/camera/src/ |
H A D | camera_metadata.c | 408 camera_metadata_buffer_entry_t key; local 409 key.tag = tag; 410 search_entry = bsearch(&key,
|
/system/core/libcutils/ |
H A D | mq.c | 230 static int pidHash(void* key) { argument 231 pid_t* pid = (pid_t*) key; 365 static bool peerProxyRemoveConnection(void* key, void* value, void* context) { argument 1017 // Add this proxy to the map. Make sure the key points to the stable memory
|
/system/bluetooth/bluez-clean-headers/bluetooth/ |
H A D | hci.h | 561 uint8_t key[32]; member in struct:__anon34 1662 uint8_t key[16]; member in struct:__anon167 1687 uint8_t key[16]; member in struct:__anon170 1695 uint8_t key[16]; member in struct:__anon171
|
/system/core/libpixelflinger/ |
H A D | scanline.cpp | 288 const AssemblyKey<needs_t>& key() const { return mKey; } function in class:android::ScanlineAssembly 383 const AssemblyKey<needs_t> key(c->state.needs); 384 sp<Assembly> assembly = gCodeCache.lookup(key); 402 err = gCodeCache.cache(a->key(), a);
|