/system/security/keystore/ |
H A D | keystore.cpp | 90 length = origLen; 96 int length; member in struct:Value 103 assert(length <= VALUE_SIZE); 104 length = orig->length; 105 value = new char[length + 1]; 106 memcpy(value, orig->value, length); 107 value[length] = '\0'; 126 size_t length; member in class:ValueString 161 * [0-o]. Therefore in the worst case the length o 166 int length = key->length; local 187 decode_key(uint8_t* out, const char* in, int length) argument 286 int32_t length; // in network byte order when encrypted member in struct:blob 505 size_t length = readFully(in, (uint8_t*) &rawBlob, sizeof(rawBlob)); local 857 recv_message(int sock, uint8_t* message, int length) argument 889 send_message(int sock, const uint8_t* message, int length) argument [all...] |
H A D | keystore_cli.cpp | 61 uint16_t length = strlen(argv[i]); local 62 bytes[0] = length >> 8; 63 bytes[1] = length; 65 send(sock, argv[i], length, 0); 77 int length; local 83 length = bytes[0] << 8 | bytes[1]; 84 for (offset = 0; offset < length; offset += i) { 85 i = recv(sock, &bytes[offset], length - offset, 0); 91 fwrite(bytes, 1, length, stdout);
|
H A D | keystore_client.cpp | 78 int length = bytes[0] << 8 | bytes[1]; local 79 while (offset < length) { 80 int n = TEMP_FAILURE_RETRY(recv(sock, &data[offset], length - offset, 0)); 88 reply->setLength(length); 90 ALOGW("truncated read from keystore for length"); 113 void Keystore_Reply::setLength(size_t length) { argument 114 mLength = length; 117 size_t Keystore_Reply::length() const { function in class:Keystore_Reply
|
H A D | keystore_client.h | 31 void setLength(size_t length); 32 size_t length() const; 47 * size_t length, const uint8_t* data, [size_t length, const uint8_t* data, [...]]
|
H A D | keystore_get.h | 36 * The first two arguments are the key and its length. The third argument 38 * KEYSTORE_MESSAGE_SIZE bytes. This function returns the length of the value or 40 static int keystore_get(const char *key, int length, char *value) argument 42 uint8_t bytes[2] = {length >> 8, length}; 46 if (length < 0 || length > KEYSTORE_MESSAGE_SIZE) { 55 send(sock, key, length, 0) == length && shutdown(sock, SHUT_WR) == 0 && 59 length [all...] |
/system/security/keystore-engine/ |
H A D | eng_keystore.cpp | 171 const size_t replyLen = reply.length(); 229 Unique_EVP_PKEY pkey(d2i_PUBKEY(NULL, &tmp, reply.length()));
|
/system/vold/ |
H A D | Devmapper.cpp | 229 tgt->length = numSectors;
|
H A D | Process.cpp | 37 int length; local 45 length = readlink(path, link, max- 1); 46 if (length <= 0) 48 link[length] = 0; 53 int length = strlen(mountPoint); local 54 if (length > 1 && strncmp(path, mountPoint, length) == 0) { 56 if (mountPoint[length - 1] == '/') 60 return (path[length] == 0 || path[length] 73 int length = read(fd, buffer, max - 1); local [all...] |
H A D | cryptfs.c | 111 /* compute length in bytes */ 114 /* return length in sectors */ 286 /* Make sure it's 16 Kbytes in length */ 357 /* Convert a binary key of specified length into an ascii hex string equivalent, 422 tgt->length = crypt_ftr->fs_size; 531 SLOGE("EVP_Encryption length check failed with %d, %d bytes\n", encrypted_len, final_len);
|
/system/bluetooth/bluez-clean-headers/bluetooth/ |
H A D | hci.h | 306 uint8_t length; member in struct:__anon4 325 uint8_t length; member in struct:__anon6 1445 uint16_t length; member in struct:__anon142 1537 uint8_t length; member in struct:__anon153 1545 uint8_t length; member in struct:__anon154 1735 uint8_t length; member in struct:__anon177 2210 uint8_t length; member in struct:__anon230 2471 uint8_t length; member in struct:hci_inquiry_req
|
/system/core/adb/ |
H A D | transport_local.c | 88 int length = p->msg.data_length; local 96 if(writex(t->sfd, &p->msg, sizeof(amessage) + length)) {
|
H A D | usb_linux.c | 210 unsigned char length = bufptr[0]; local 215 bufptr += length; 217 if (length != USB_DT_INTERFACE_SIZE) { 296 bufptr += length;
|
H A D | usb_linux_client.c | 68 .length = cpu_to_le32(sizeof(descriptors)), 137 .length = cpu_to_le32(sizeof(strings)), 344 static int bulk_write(int bulk_in, const char *buf, size_t length) argument 350 ret = adb_write(bulk_in, buf + count, length - count); 357 } while (count < length); 378 static int bulk_read(int bulk_out, char *buf, size_t length) argument 384 ret = adb_read(bulk_out, buf + count, length - count); 387 D("[ bulk_read failed fd=%d length=%d count=%d ]\n", 388 bulk_out, length, count); 394 } while (count < length); [all...] |
/system/core/include/cutils/ |
H A D | jstring.h | 36 extern char16_t * strcpylen8to16 (char16_t *dest, const char*s, int length,
|
H A D | uevent.h | 28 ssize_t uevent_kernel_multicast_recv(int socket, void *buffer, size_t length); 29 ssize_t uevent_kernel_multicast_uid_recv(int socket, void *buffer, size_t length, uid_t *uid);
|
/system/core/include/ion/ |
H A D | ion.h | 36 int ion_map(int fd, struct ion_handle *handle, size_t length, int prot,
|
/system/core/include/usbhost/ |
H A D | usbhost.h | 186 int length, 195 int length,
|
/system/core/init/ |
H A D | init_parser.c | 264 ERROR("invalid zero-length prop name in '%s'\n", src); 547 int length = equals - name; local 548 if (length > PROP_NAME_MAX) { 551 memcpy(prop_name, name, length); 552 prop_name[length] = 0;
|
H A D | property_service.c | 325 int fd, length; local 536 int fd, length; local 550 length = read(fd, value, sizeof(value) - 1); 551 if (length >= 0) { 552 value[length] = 0;
|
/system/core/libcorkscrew/ |
H A D | symbol_table.c | 70 size_t length = sb.st_size; local 71 char* base = mmap(NULL, length, PROT_READ, MAP_PRIVATE, fd, 0); 196 munmap(base, length);
|
/system/core/libcutils/ |
H A D | cpu_info.c | 34 int length; local
|
H A D | strdup8to16.c | 40 * length of the UTF-16 string (which may contain embedded \0's) 148 * length of the UTF-16 string (which may contain embedded \0's) 180 * length is the number of characters in the UTF-8 string. 182 * length of the UTF-16 string (which may contain embedded \0's) 186 int length, size_t *out_len) 192 const char *end = utf8Str + length; /* This line */ 185 strcpylen8to16(char16_t *utf16Str, const char*utf8Str, int length, size_t *out_len) argument
|
H A D | uevent.c | 32 ssize_t uevent_kernel_multicast_recv(int socket, void *buffer, size_t length) argument 35 return uevent_kernel_multicast_uid_recv(socket, buffer, length, &user); 48 size_t length, uid_t *user) 50 struct iovec iov = { buffer, length }; 91 bzero(buffer, length); 47 uevent_kernel_multicast_uid_recv(int socket, void *buffer, size_t length, uid_t *user) argument
|
/system/core/libion/ |
H A D | ion.c | 83 int ion_map(int fd, struct ion_handle *handle, size_t length, int prot, argument 98 *ptr = mmap(NULL, length, prot, flags, *map_fd, offset);
|
/system/core/libmincrypt/tools/ |
H A D | DumpPublicKey.java | 130 if (args.length < 1) { 135 for (int i = 0; i < args.length; i++) { 142 System.out.println(i < args.length - 1 ? "," : "");
|