/system/security/keystore/ |
H A D | keystore.cpp | 823 int len = i2d_PKCS8_PRIV_KEY_INFO(pkcs8.get(), NULL); local 824 if (len < 0) { 830 pkcs8key.length = len; 832 if (i2d_PKCS8_PRIV_KEY_INFO(pkcs8.get(), &tmp) != len) {
|
/system/security/softkeymaster/ |
H A D | keymaster_openssl.cpp | 316 int len = i2d_PUBKEY(pkey.get(), NULL); local 317 if (len <= 0) { 322 UniquePtr<uint8_t> key(static_cast<uint8_t*>(malloc(len))); 329 if (i2d_PUBKEY(pkey.get(), &tmp) != len) { 334 ALOGV("Length of x509 data is %d", len); 335 *x509_data_length = len;
|
/system/vold/ |
H A D | CommandListener.cpp | 60 unsigned int len = strlen(argv[i]) + 1; // Account for space local 62 len += 2; // Account for {} 64 if (((p - buffer) + len) < (sizeof(buffer)-1)) {
|
H A D | Devmapper.cpp | 133 int Devmapper::lookupActive(const char *name, char *ubuffer, size_t len) { argument 162 snprintf(ubuffer, len, "/dev/block/dm-%u", minor); 167 unsigned int numSectors, char *ubuffer, size_t len) { 218 snprintf(ubuffer, len, "/dev/block/dm-%u", minor); 166 create(const char *name, const char *loopFile, const char *key, unsigned int numSectors, char *ubuffer, size_t len) argument
|
H A D | Devmapper.h | 28 unsigned int numSectors, char *buffer, size_t len); 30 static int lookupActive(const char *name, char *buffer, size_t len);
|
H A D | Loop.cpp | 81 int Loop::lookupActive(const char *id, char *buffer, size_t len) { argument 86 memset(buffer, 0, len); 123 strncpy(buffer, filename, len -1); 127 int Loop::create(const char *id, const char *loopFile, char *loopDeviceBuffer, size_t len) { argument 175 strncpy(loopDeviceBuffer, filename, len -1);
|
H A D | Loop.h | 29 static int lookupActive(const char *id, char *buffer, size_t len); 31 static int create(const char *id, const char *loopFile, char *loopDeviceBuffer, size_t len);
|
H A D | VolumeManager.cpp | 79 char *VolumeManager::asecHash(const char *id, char *buffer, size_t len) { argument 92 } else if (len < MD5_ASCII_LENGTH_PLUS_NULL) { 94 MD5_ASCII_LENGTH_PLUS_NULL, len);
|
H A D | VolumeManager.h | 136 static char *asecHash(const char *id, char *buffer, size_t len);
|
H A D | cryptfs.c | 91 off64_t len; local 112 len = ( ((off64_t)sb.s_blocks_count_hi << 32) + sb.s_blocks_count_lo) * block_size; 115 return (unsigned int) (len / 512); 1030 static inline int unix_read(int fd, void* buff, int len) argument 1033 do { ret = read(fd, buff, len); } while (ret < 0 && errno == EINTR); 1037 static inline int unix_write(int fd, const void* buff, int len) argument 1040 do { ret = write(fd, buff, len); } while (ret < 0 && errno == EINTR);
|
/system/bluetooth/bluez-clean-headers/bluetooth/ |
H A D | l2cap.h | 77 uint16_t len; member in struct:__anon248 86 uint16_t len; member in struct:__anon249 144 uint8_t len; member in struct:__anon255
|
/system/bluetooth/brcm_patchram_plus/ |
H A D | brcm_patchram_plus.c | 553 dump(uchar *out, int len) argument 557 for (i = 0; i < len; i++) { 572 int len = 3; local 575 while ((count = read(fd, &buffer[i], len)) < len) { 577 len -= count; 581 len = buffer[2]; 583 while ((count = read(fd, &buffer[i], len)) < len) { 585 len 597 hci_send_cmd(uchar *buf, int len) argument 632 int len; local 749 int len = 17; local [all...] |
/system/bluetooth/brfpatch/ |
H A D | brfpatch.c | 54 static void dump_record(FILE *fpo, unsigned short opcode, unsigned char len, argument 60 fwrite(&len, 1, 1, fpo); // data length 61 fwrite(data, len, 1, fpo); // data
|
/system/bluetooth/tools/ |
H A D | asocket_test.c | 139 int len = 0; local 147 len = sizeof(local_addr_un); 151 len = sizeof(local_addr_rc); 155 len = sizeof(local_addr_sco); 159 len = sizeof(local_addr_l2); 163 len = sizeof(local_addr_in); 168 ret = bind(fd, addr, len); 201 int len; local 207 len = sizeof(remote_addr_un); 211 len 240 int len = 0; local [all...] |
H A D | pipetest.c | 72 static int _write(int fd, char *buf, int len) { argument 76 ret = write(fd, buf, len);
|
H A D | sock_shutdown_test.c | 121 int len = 0; local 129 len = sizeof(local_addr_un); 133 len = sizeof(local_addr_rc); 137 len = sizeof(local_addr_sco); 141 len = sizeof(local_addr_l2); 145 len = sizeof(local_addr_in); 150 ret = bind(fd, addr, len); 170 int len; local 176 len = sizeof(remote_addr_un); 180 len [all...] |
H A D | socktest.c | 138 int len = 0; local 146 len = sizeof(local_addr_un); 150 len = sizeof(local_addr_rc); 154 len = sizeof(local_addr_sco); 158 len = sizeof(local_addr_l2); 162 len = sizeof(local_addr_in); 167 ret = bind(fd, addr, len); 200 int len; local 206 len = sizeof(remote_addr_un); 210 len 253 int len = 0; local [all...] |
/system/core/adb/ |
H A D | adb.c | 115 int len, tagn; local 121 len = q - p; 127 if (len == taglen && !memcmp(tags[tagn].tag, p, len) ) 298 size_t len; 300 len = snprintf(buf, remaining, "%s::", adb_device_banner); 301 remaining -= len; 302 buf += len; 306 len = snprintf(buf, remaining, "%s=%s;", cnxn_props[i], value); 307 remaining -= len; [all...] |
H A D | adb.h | 63 unsigned len; member in struct:apacket 448 int usb_write(usb_handle *h, const void *data, int len); 449 int usb_read(usb_handle *h, void *data, int len);
|
H A D | adb_auth.h | 34 int adb_auth_get_userkey(unsigned char *data, size_t len); 38 static inline void adb_auth_confirm_key(unsigned char *data, size_t len, atransport *t) { } argument 45 static inline int adb_auth_get_userkey(unsigned char *data, size_t len) { return 0; } argument 49 void adb_auth_confirm_key(unsigned char *data, size_t len, atransport *t);
|
H A D | adb_auth_client.c | 82 if (key->key.len != RSANUMWORDS) { 83 D("%s: Invalid key len %d\n", file, key->key.len); 175 void adb_auth_confirm_key(unsigned char *key, size_t len, atransport *t) argument 185 if (key[len - 1] != '\0') {
|
H A D | adb_auth_host.c | 88 pkey->len = RSANUMWORDS; 110 static void get_user_info(char *buf, size_t len) argument 127 ret = snprintf(buf, len, " %s@%s", username, hostname); 128 if (ret >= (signed)len) 129 buf[len - 1] = '\0'; 260 static int get_user_keyfilepath(char *filename, size_t len) argument 293 return snprintf(filename, len, format, android_dir, ADB_KEY_FILE); 348 unsigned int len; local 351 if (!RSA_sign(NID_sha1, token, token_size, sig, &len, key->rsa)) { 355 D("adb_auth_sign len 381 adb_auth_get_userkey(unsigned char *data, size_t len) argument [all...] |
H A D | adb_client.c | 90 int len; local 115 len = strlen(service); 116 snprintf(tmp, sizeof tmp, "%04x", len); 118 if(writex(fd, tmp, 4) || writex(fd, service, len)) { 137 unsigned len; local 156 strcpy(__adb_error, "protocol fault (status len)"); 160 len = strtoul((char*)buf, 0, 16); 161 if(len > 255) len = 255; 162 if(readx(fd, __adb_error, len)) { 173 int len; local [all...] |
H A D | commandline.c | 230 int len; local 234 len = adb_read(fd, buf, 4096); 235 D("read_and_dump(): post adb_read(fd=%d): len=%d\n", fd, len); 236 if(len == 0) { 240 if(len < 0) { 244 fwrite(buf, 1, len, stdout); 252 int len; local 257 len = adb_read(inFd, buf, BUFSIZE); 258 if (len [all...] |
H A D | file_sync_client.c | 81 int len; local 83 len = strlen(path); 84 if(len > 1024) goto fail; 87 msg.req.namelen = htoll(len); 90 writex(fd, path, len)) { 99 len = ltohl(msg.dent.namelen); 100 if(len > 256) break; 102 if(readx(fd, buf, len)) break; 103 buf[len] = 0; 129 int len local 154 int len = strlen(path); local 188 int len = strlen(path); local 275 int len, ret; local 301 int len, r; local 444 int len; local [all...] |