Searched refs:data (Results 1 - 25 of 135) sorted by last modified time

123456

/system/security/keystore/
H A Dkeystore.cpp201 static size_t readFully(int fd, uint8_t* data, size_t size) { argument
204 ssize_t n = TEMP_FAILURE_RETRY(read(fd, data, size));
208 data += n;
214 static size_t writeFully(int fd, uint8_t* data, size_t size) { argument
217 ssize_t n = TEMP_FAILURE_RETRY(write(fd, data, size));
221 data += n;
246 bool generate_random_data(uint8_t* data, size_t size) const { argument
247 return (readFully(mRandom, data, size) == size);
265 * metadata || Enc(MD5(data) || data)
651 uint8_t* data; local
1064 uint8_t* data; local
1133 uint8_t* data = NULL; local
1180 sign(KeyStore* keyStore, int sock, uid_t uid, Value* keyName, Value* data, Value*) argument
1221 verify(KeyStore* keyStore, int, uid_t uid, Value* keyName, Value* data, Value* signature) argument
1296 uint8_t *data; local
[all...]
H A Dkeystore_client.cpp74 uint8_t* data = reply->get(); local
80 int n = TEMP_FAILURE_RETRY(recv(sock, &data[offset], length - offset, 0));
82 ALOGW("truncated read from keystore for data");
130 uint8_t* data = mData; local
132 return data;
H A Dtest-keystore57 run adb shell ls -al /data/misc/keystore
/system/security/softkeymaster/
H A Dkeymaster_openssl.cpp105 /* int type + int size + private key data + int size + public key data */
324 ALOGE("Could not allocate memory for public key data");
334 ALOGV("Length of x509 data is %d", len);
344 const uint8_t* data, const size_t dataLength,
351 if (data == NULL) {
352 ALOGW("input data to sign == NULL");
391 if (RSA_private_encrypt(dataLength, data, tmp, rsa.get(), RSA_NO_PADDING) <= 0) {
408 ALOGW("data or signature buffers == NULL");
430 ALOGW("signed data lengt
341 openssl_sign_data(const keymaster_device_t* dev, const void* params, const uint8_t* keyBlob, const size_t keyBlobLength, const uint8_t* data, const size_t dataLength, uint8_t** signedData, size_t* signedDataLength) argument
[all...]
/system/bluetooth/bluez-clean-headers/bluetooth/
H A Dhci.h1110 uint8_t data[240]; member in struct:__anon100
1117 uint8_t data[240]; member in struct:__anon101
1539 uint8_t data[31]; member in struct:__anon153
1546 uint8_t data[31]; member in struct:__anon154
1670 uint8_t data[16]; member in struct:__anon168
2089 uint8_t data[240]; member in struct:__anon215
2184 uint8_t data[0]; member in struct:__anon228
2211 uint8_t data[0]; member in struct:__anon230
2309 uint8_t data[0]; member in struct:__anon241
H A Dl2cap.h124 uint8_t data[0]; member in struct:__anon253
132 uint8_t data[0]; member in struct:__anon254
184 uint8_t data[0]; member in struct:__anon259
/system/bluetooth/brfpatch/
H A Dbrfpatch.c55 unsigned char *data) {
60 fwrite(&len, 1, 1, fpo); // data length
61 fwrite(data, len, 1, fpo); // data
88 unsigned char data[1024]; local
89 unsigned char *dp = data;
96 FAILIF(dp > data + sizeof(data),
97 "Too much data: %s\n", buffer);
111 // find length of this piece of data
54 dump_record(FILE *fpo, unsigned short opcode, unsigned char len, unsigned char *data) argument
[all...]
/system/core/adb/
H A Dadb.c246 x = (char*) p->data;
322 cp->msg.data_length = fill_connect_data((char *)cp->data,
323 sizeof(cp->data));
340 memcpy(p->data, t->token, ret);
353 ret = adb_auth_sign(t->key, token, token_size, p->data);
372 ret = adb_auth_get_userkey(p->data, sizeof(p->data));
521 parse_banner((char*) p->data, t);
535 send_auth_response(p->data, p->msg.data_length, t);
541 if (adb_auth_verify(t->token, p->data,
[all...]
H A Dadb.h55 unsigned data_check; /* checksum of data payload */
67 unsigned char data[MAX_PAYLOAD]; member in struct:apacket
112 /* enqueue is called by our peer when it has data
114 ** data or 1 if not. If we return 1, we must call
116 ** receive data.
121 ** us to send data via enqueue again
448 int usb_write(usb_handle *h, const void *data, int len);
449 int usb_read(usb_handle *h, void *data, int len);
H A Dadb_auth.h34 int adb_auth_get_userkey(unsigned char *data, size_t len);
38 static inline void adb_auth_confirm_key(unsigned char *data, size_t len, atransport *t) { } argument
45 static inline int adb_auth_get_userkey(unsigned char *data, size_t len) { return 0; } argument
49 void adb_auth_confirm_key(unsigned char *data, size_t len, atransport *t);
H A Dadb_auth_client.c41 "/data/misc/adb/adb_keys",
64 /* Allocate 4 extra bytes to decode the base64 data in-place */
77 D("%s: Invalid base64 data ret=%d\n", file, ret);
155 static void adb_auth_event(int fd, unsigned events, void *data) argument
157 atransport *t = data;
207 static void adb_auth_listener(int fd, unsigned events, void *data) argument
H A Dadb_auth_host.c381 int adb_auth_get_userkey(unsigned char *data, size_t len) argument
405 memcpy(data, file, ret);
406 data[ret] = '\0';
H A Dcommandline.c127 " ('-r' means reinstall the app, keeping its data)\n"
131 " ('-k' means keep the data and cache directories)\n"
136 " - write an archive of the device's data to <file>.\n"
137 " If no -f option is supplied then the data is written\n"
181 " - If <directory> is not specified, both /system and /data partitions will be updated.\n"
183 " - If it is \"system\" or \"data\", only the corresponding partition\n"
374 int adb_download_buffer(const char *service, const void* data, int sz, argument
393 ptr = data;
404 fprintf(stderr,"* failed to write data '%s' *\n", adb_error());
437 void *data; local
[all...]
H A Dfdevent.c132 ev.data.ptr = fde;
148 ev.data.ptr = fde;
167 ev.data.ptr = fde;
220 fde = ev->data.ptr;
559 // If there is data left, it will show up in the select().
561 // data when in this fd_func().
H A Dfile_sync_client.c121 char data[SYNC_DATA_MAX]; member in struct:syncsendbuf
224 ret = adb_read(lfd, sbuf->data, SYNC_DATA_MAX);
259 memcpy(sbuf->data, &file_buffer[total], count);
277 len = readlink(path, sbuf->data, SYNC_DATA_MAX-1);
282 sbuf->data[len] = '\0';
391 msg.data.id = ID_DONE;
392 msg.data.size = htoll(mtime);
393 if(writex(fd, &msg.data, sizeof(msg.data)))
403 if(readx(fd, sbuf->data, le
[all...]
H A Dfile_sync_service.c136 msg.data.id = ID_FAIL;
137 msg.data.size = htoll(len);
138 if(writex(s, &msg.data, sizeof(msg.data)) ||
174 if(readx(s, &msg.data, sizeof(msg.data)))
177 if(msg.data.id != ID_DATA) {
178 if(msg.data.id == ID_DONE) {
179 timestamp = ltohl(msg.data.size);
182 fail_message(s, "invalid data messag
[all...]
H A Dfile_sync_service.h71 } data; member in union:__anon274
H A Djdwp_service.c429 ** we do implement a custom asocket to receive the data
591 p->len = jdwp_process_list((char*)p->data, MAX_PAYLOAD);
647 memcpy(p->data, buffer, len);
680 p->len = jdwp_process_list_msg((char*)p->data, sizeof(p->data));
H A Dsockets.c134 p->ptr = p->data;
136 /* if there is already data queue'd, we will receive
165 return 0; /* ready for more data */
185 /* far side is ready for data, pay attention to
211 /* dispose of any unwritten data */
322 unsigned char *x = p->data;
374 /* Don't allow a forced eof if data is still there */
384 ** bytes of readable data.
457 /* a Remote socket is used to send/receive data to/from a given transport object
555 strcpy((char*) p->data, destinatio
[all...]
H A Dsysdeps_win32.c24 char *data; local
39 data = NULL;
42 data = (char*) malloc( file_size + 1 );
43 if (data == NULL) {
49 if ( !ReadFile( file, data, file_size, &out_bytes, NULL ) ||
53 free(data);
54 data = NULL;
62 return data;
801 * - it avoids copying data from/to the Nt kernel
815 * a_start is the pointer where we start reading data
[all...]
H A Dtransport.c132 dump_hex(p->data, len);
221 x = (unsigned char *) p->data;
273 D("%s: data pump started\n", t->serial);
445 memcpy(p->data, buffer, len);
566 static void transport_registration_func(int _fd, unsigned ev, void *data) argument
1175 x = p->data;
H A Dtransport_local.c69 D("bad header: terminated (data)\n");
73 if(readx(t->sfd, p->data, p->msg.data_length)){
74 D("remote local: terminated (data)\n");
79 D("bad data: terminated (data)\n");
213 * independent from the network, we use here 'adb' QEMUD service to transfer data
H A Dtransport_usb.c68 if(usb_read(t->usb, p->data, p->msg.data_length)){
69 D("remote usb: terminated (data)\n");
93 if(usb_write(t->usb, &p->data, size)) {
H A Dusb_libusb.c86 D("Device offered more data\n");
100 usb_bulk_write(usb_handle *uh, const void *data, int len) argument
105 r = libusb_bulk_transfer(uh->devh, uh->end_point_address[1], (void *)data, len,
118 usb_bulk_read(usb_handle *uh, void *data, int len) argument
123 r = libusb_bulk_transfer(uh->devh, uh->end_point_address[0], data, len,
138 unsigned char *data = (unsigned char*) _data; local
153 n = usb_bulk_write(uh, data, xfer);
161 data += xfer;
179 unsigned char *data = (unsigned char*) _data; local
187 n = usb_bulk_read(uh, data, xfe
[all...]
H A Dusb_linux.c311 static int usb_bulk_write(usb_handle *h, const void *data, int len) argument
322 urb->buffer = (void*) data;
364 static int usb_bulk_read(usb_handle *h, void *data, int len) argument
374 urb->buffer = data;
438 unsigned char *data = (unsigned char*) _data; local
455 n = usb_bulk_write(h, data, xfer);
463 data += xfer;
476 unsigned char *data = (unsigned char*) _data; local
484 n = usb_bulk_read(h, data, xfer);
490 data
[all...]

Completed in 664 milliseconds

123456