/system/core/libmincrypt/ |
H A D | p256_ecdsa.c | 33 const p256_int* message, 46 p256_modmul(&SECP256r1_n, message, 0, &v, &u); // message / s % n 32 p256_ecdsa_verify(const p256_int* key_x, const p256_int* key_y, const p256_int* message, const p256_int* r, const p256_int* s) argument
|
/system/core/libutils/ |
H A D | Log.cpp | 25 int timeoutMillis, const char* message) : 26 mTag(tag), mPriority(priority), mTimeoutMillis(timeoutMillis), mMessage(message), 24 LogIfSlow(const char* tag, android_LogPriority priority, int timeoutMillis, const char* message) argument
|
H A D | Looper.cpp | 36 void WeakMessageHandler::handleMessage(const Message& message) { argument 39 handler->handleMessage(message); 200 // Adjust the timeout based on when the next message is due. 209 ALOGD("%p ~ pollOnce - next message in %lldns, adjusted timeout: timeoutMillis=%d", 281 // Invoke pending message callbacks. 293 Message message = messageEnvelope.message; local 299 ALOGD("%p ~ pollOnce - sending message: handler=%p, what=%d", 300 this, handler.get(), message.what); 302 handler->handleMessage(message); 489 sendMessage(const sp<MessageHandler>& handler, const Message& message) argument 494 sendMessageDelayed(nsecs_t uptimeDelay, const sp<MessageHandler>& handler, const Message& message) argument 500 sendMessageAtTime(nsecs_t uptime, const sp<MessageHandler>& handler, const Message& message) argument [all...] |
/system/netd/client/ |
H A D | FwmarkClient.cpp | 60 msghdr message; local 61 memset(&message, 0, sizeof(message)); 62 message.msg_iov = &iov; 63 message.msg_iovlen = 1; 71 message.msg_control = cmsgu.cmsg; 72 message.msg_controllen = sizeof(cmsgu.cmsg); 74 cmsghdr* const cmsgh = CMSG_FIRSTHDR(&message); 80 if (TEMP_FAILURE_RETRY(sendmsg(mChannel, &message, 0)) == -1) {
|
/system/netd/server/ |
H A D | FwmarkServer.cpp | 55 msghdr message; local 56 memset(&message, 0, sizeof(message)); 57 message.msg_iov = &iov; 58 message.msg_iovlen = 1; 66 message.msg_control = cmsgu.cmsg; 67 message.msg_controllen = sizeof(cmsgu.cmsg); 69 int messageLength = TEMP_FAILURE_RETRY(recvmsg(client->getSocket(), &message, 0)); 78 cmsghdr* const cmsgh = CMSG_FIRSTHDR(&message);
|
H A D | CommandListener.cpp | 1377 int CommandListener::NetworkCommand::syntaxError(SocketClient* client, const char* message) { argument 1378 client->sendMsg(ResponseCode::CommandSyntaxError, message, false); 1382 int CommandListener::NetworkCommand::operationError(SocketClient* client, const char* message, argument 1385 client->sendMsg(ResponseCode::OperationFailed, message, true);
|
/system/core/include/log/ |
H A D | logprint.h | 51 const char * message; member in struct:AndroidLogEntry_t 124 * Formats a log message into a buffer
|
/system/core/libmincrypt/test/ |
H A D | ecdsa_test.c | 222 unsigned char* message; local 234 message = parsehex(sig, &mlen); \ 235 int result = dsa_sig_unpack(message, mlen, &r, &s); \ 238 free(message); \ 266 message = parsehex(message_##n, &mlen); \ 267 SHA256_hash(message, mlen, hash_buf); \ 272 printf("message %d: %s\n", n, result ? "verified" : "not verified"); \
|
H A D | rsa_test.c | 802 unsigned char* message; local 808 message = parsehex(message_##n, &mlen); \ 809 SHA_hash(message, mlen, hash); \ 812 printf("message %d: %s\n", n, result ? "verified" : "not verified"); \
|
/system/keymaster/ |
H A D | google_keymaster_messages_test.cpp | 37 * Serialize and deserialize a message. 39 template <typename Message> Message* round_trip(const Message& message, size_t expected_size) { argument 40 size_t size = message.SerializedSize(); 46 EXPECT_EQ(buf.get() + size, message.Serialize(buf.get(), buf.get() + size));
|
H A D | google_keymaster_test.cpp | 405 void SignMessage(const void* message, size_t size) { argument 406 SignMessage(generate_response_.key_blob, message, size); 409 void SignMessage(const keymaster_key_blob_t& key_blob, const void* message, size_t size) { argument 422 update_request.input.Reinitialize(message, size); 459 const char message[] = "12345678901234567890123456789012"; local 473 update_request.input.Reinitialize(message, array_size(message) - 1); 474 EXPECT_EQ(array_size(message) - 1, update_request.input.available_read()); 669 const char message[] = "12345678901234567890123456789012"; local 670 SignMessage(message, array_siz 705 const char message[] = "123456789012345678901234567890123456789012345678"; local 741 const char message[] = "123456789012345678901234567890123456789012345678"; local [all...] |
/system/core/include/utils/ |
H A D | Looper.h | 48 * A message that can be posted to a Looper. 54 /* The message type. (interpretation is left up to the handler) */ 60 * Interface for a Looper message handler. 62 * The Looper holds a strong reference to the message handler whenever it has 63 * a message to deliver to it. Make sure to call Looper::removeMessages 73 * Handles a message. 75 virtual void handleMessage(const Message& message) = 0; 80 * A simple proxy that holds a weak reference to a message handler. 88 virtual void handleMessage(const Message& message); 343 * Enqueues a message t 434 MessageEnvelope(nsecs_t uptime, const sp<MessageHandler> handler, const Message& message) argument 440 Message message; member in struct:android::Looper::MessageEnvelope [all...] |
/system/core/libutils/tests/ |
H A D | Looper_test.cpp | 96 virtual void handleMessage(const Message& message) { argument 97 messages.push(message); 449 << "elapsed time should approx. zero because message was already sent"; 451 << "pollOnce result should be Looper::POLL_CALLBACK because message was sent"; 453 << "handled message"; 455 << "handled message"; 471 << "elapsed time should approx. zero because message was already sent"; 473 << "pollOnce result should be Looper::POLL_CALLBACK because message was sent"; 475 << "handled message"; 477 << "handled message"; [all...] |
/system/extras/taskstats/ |
H A D | taskstats.c | 47 struct nl_msg* message = nlmsg_alloc(); local 52 genlmsg_put(message, nlmsg_pid, seq, nlmsg_type, header_length, flags, 54 nla_put(message, nla_type, nla_len, nla_data); 57 struct nlmsghdr* header = nlmsg_hdr(message); 60 int result = nl_send(netlink_socket, message); 61 nlmsg_free(message);
|
/system/vold/ |
H A D | CommandListener.cpp | 713 char* message = 0; local 714 int size = asprintf(&message, "{{sensitive}} %s", password); 716 cli->sendMsg(ResponseCode::CommandOkay, message, false); 717 memset(message, 0, size); 718 free (message);
|
/system/security/softkeymaster/ |
H A D | keymaster_openssl.cpp | 115 char message[256]; local 116 ERR_error_string_n(error, message, sizeof(message)); 117 ALOGE("OpenSSL error in %s %d: %s", location, error, message);
|
/system/core/adb/ |
H A D | adb.c | 607 /* On first READY message, create the connection. */ 1072 /* message since the pipe handles must be inheritable, we use a */ 1152 /* wait for the "OK\n" message */ 1203 // wait for the "OK\n" message 1535 const char* message; local 1538 message = "cannot bind to socket"; 1541 message = "cannot rebind existing socket"; 1544 message = "internal error"; 1546 sendfailmsg(reply_fd, message);
|