/system/core/adb/ |
H A D | adb_auth.h | 34 int adb_auth_sign(void *key, void *token, size_t token_size, void *sig); 38 static inline int adb_auth_generate_token(void *token, size_t token_size) { return 0; } argument 39 static inline int adb_auth_verify(void *token, void *sig, int siglen) { return 0; } argument 44 static inline int adb_auth_sign(void* key, void *token, size_t token_size, void *sig) { return 0; } argument 48 int adb_auth_generate_token(void *token, size_t token_size); 49 int adb_auth_verify(void *token, void *sig, int siglen);
|
H A D | remount_service.c | 39 char *token = NULL; local 51 token = strtok(buf, delims); 53 while (token) { 59 res = sscanf(token, "%255s %255s %*s %*s %d %d\n", 66 token = strtok(NULL, delims);
|
H A D | adb_auth_client.c | 124 int adb_auth_generate_token(void *token, size_t token_size) argument 133 ret = fread(token, token_size, 1, f); 139 int adb_auth_verify(void *token, void *sig, int siglen) argument 153 ret = RSA_verify(&key->key, sig, siglen, token, SHA_DIGEST_SIZE);
|
H A D | adb_auth_host.c | 346 int adb_auth_sign(void *node, void *token, size_t token_size, void *sig) argument 351 if (!RSA_sign(NID_sha1, token, token_size, sig, &len, key->rsa)) {
|
H A D | adb.c | 336 ret = adb_auth_generate_token(t->token, sizeof(t->token)); 337 if (ret != sizeof(t->token)) { 338 D("Error generating token ret=%d\n", ret); 343 memcpy(p->data, t->token, ret); 350 static void send_auth_response(uint8_t *token, size_t token_size, atransport *t) argument 356 ret = adb_auth_sign(t->key, token, token_size, p->data); 358 D("Error signing the token\n"); 551 if (adb_auth_verify(t->token, p->data, p->msg.data_length)) {
|
H A D | adb.h | 204 unsigned char token[TOKEN_SIZE]; member in struct:atransport
|
/system/core/init/ |
H A D | ueventd_parser.c | 41 int token = next_token(&state); local 42 switch (token) {
|
/system/core/sh/ |
H A D | mktokens | 37 # token marks the end of a list. The third column is the name to print in 71 exec > token.h
|
H A D | Android.mk | 45 p4 edit init.c nodes.c nodes.h token.h
|
H A D | arith.y | 61 %token ARITH_NUM ARITH_LPAREN ARITH_RPAREN
|
H A D | parser.c | 73 #include "token.h" 93 int lasttoken; /* last token read */ 94 MKINIT int tokpushback; /* last token pushed back */ 100 int quoteflag; /* set if (part of) last token was quoted */ 101 int startlinno; /* line # where last token started */ 766 TRACE(("token %s %s\n", tokname[t], t == TWORD ? wordtext : "")); 768 TRACE(("reread token %s %s\n", tokname[t], t == TWORD ? wordtext : "")); 775 * Read the next input token. 776 * If the token is a word, we set backquotelist to the list of cmds in 779 * If the token i 1598 synexpect(int token) argument [all...] |
/system/core/sdcard/ |
H A D | sdcard.c | 229 int token; member in struct:fuse_handler 822 TRACE("[%d] LOOKUP %s @ %llx (%s)\n", handler->token, name, hdr->nodeid, 844 TRACE("[%d] FORGET #%lld @ %llx (%s)\n", handler->token, req->nlookup, 864 TRACE("[%d] GETATTR flags=%x fh=%llx @ %llx (%s)\n", handler->token, 889 TRACE("[%d] SETATTR fh=%llx valid=%x @ %llx (%s)\n", handler->token, 933 handler->token, path, times[0].tv_sec, times[1].tv_sec); 954 TRACE("[%d] MKNOD %s 0%o @ %llx (%s)\n", handler->token, 985 TRACE("[%d] MKDIR %s 0%o @ %llx (%s)\n", handler->token, 1034 TRACE("[%d] UNLINK %s @ %llx (%s)\n", handler->token, 1063 TRACE("[%d] RMDIR %s @ %llx (%s)\n", handler->token, 1626 char* token = strtok(gids, ","); local [all...] |
/system/core/include/utils/ |
H A D | PropertyMap.h | 97 status_t parseModifier(const String8& token, int32_t* outMetaState);
|
/system/vold/ |
H A D | cryptfs.c | 112 char *token; local 119 * The token we're looking for should be three integers separated by 122 for (i = 0, token = strtok_r(paramstr, ":", &saveptr); 123 token != NULL && i < 3; 124 i++, token = strtok_r(NULL, ":", &saveptr)) { 126 params[i] = strtol(token, &endptr, 10); 132 if ((*token == '\0') || (*endptr != '\0') || params[i] < 0 || params[i] > 255) { 138 * If there were not enough tokens or a token was malformed (not an 142 if ((i != 3) || (token != NULL)) {
|