/system/keymaster/ |
H A D | dsa_operation.cpp | 29 keymaster_error_t DsaOperation::Update(const Buffer& input, Buffer* /* output */) { argument 35 return StoreData(input); 39 keymaster_error_t DsaOperation::StoreData(const Buffer& input) { argument 40 if (!data_.reserve(data_.available_read() + input.available_read()) || 41 !data_.write(input.peek_read(), input.available_read()))
|
H A D | ecdsa_operation.cpp | 29 keymaster_error_t EcdsaOperation::Update(const Buffer& input, Buffer* /* output */) { argument 35 return StoreData(input); 39 keymaster_error_t EcdsaOperation::StoreData(const Buffer& input) { argument 40 if (!data_.reserve(data_.available_read() + input.available_read()) || 41 !data_.write(input.peek_read(), input.available_read()))
|
H A D | rsa_operation.cpp | 34 keymaster_error_t RsaOperation::Update(const Buffer& input, Buffer* /* output */) { argument 40 return StoreData(input); 44 keymaster_error_t RsaOperation::StoreData(const Buffer& input) { argument 45 if (!data_.reserve(data_.available_read() + input.available_read()) || 46 !data_.write(input.peek_read(), input.available_read()))
|
H A D | dsa_operation.h | 38 virtual keymaster_error_t Update(const Buffer& input, Buffer* output); 42 keymaster_error_t StoreData(const Buffer& input);
|
H A D | ecdsa_operation.h | 38 virtual keymaster_error_t Update(const Buffer& input, Buffer* output); 42 keymaster_error_t StoreData(const Buffer& input);
|
H A D | rsa_operation.h | 36 virtual keymaster_error_t Update(const Buffer& input, Buffer* output); 40 keymaster_error_t StoreData(const Buffer& input);
|
H A D | operation.h | 44 virtual keymaster_error_t Update(const Buffer& input, Buffer* output) = 0;
|
H A D | google_keymaster_test.cpp | 422 update_request.input.Reinitialize(message, size); 423 EXPECT_EQ(size, update_request.input.available_read()); 473 update_request.input.Reinitialize(message, array_size(message) - 1); 474 EXPECT_EQ(array_size(message) - 1, update_request.input.available_read()); 505 update_request.input.Reinitialize("123456789012345678901234567890123456789012345678", 48); 506 EXPECT_EQ(48U, update_request.input.available_read()); 537 update_request.input.Reinitialize("123456789012345678901234567890123456789012345678", 48); 538 EXPECT_EQ(48U, update_request.input.available_read()); 649 update_request.input.Reinitialize("01234567890123456789012345678901", 31); 650 EXPECT_EQ(31U, update_request.input [all...] |
H A D | google_keymaster_messages.cpp | 178 return sizeof(op_handle) + input.SerializedSize(); 183 return input.Serialize(buf, end); 187 return copy_uint64_from_buf(buf_ptr, end, &op_handle) && input.Deserialize(buf_ptr, end);
|
H A D | google_keymaster_messages_test.cpp | 206 msg.input.Reinitialize("foo", 3); 209 EXPECT_EQ(3U, deserialized->input.available_read()); 210 EXPECT_EQ(0, memcmp(deserialized->input.peek_read(), "foo", 3));
|
H A D | google_keymaster.cpp | 219 response->error = entry->operation->Update(request.input, &response->output);
|
/system/core/libsparse/ |
H A D | append2simg.c | 46 fprintf(stderr, "Usage: append2simg <output> <input>\n"); 56 int input; local 91 input = open(input_path, O_RDONLY | O_BINARY); 92 if (input < 0) { 93 fprintf(stderr, "Couldn't open input file (%s)\n", strerror(errno)); 97 input_len = lseek64(input, 0, SEEK_END); 99 fprintf(stderr, "Couldn't get input file length (%s)\n", strerror(errno)); 105 lseek64(input, 0, SEEK_SET); 108 if (sparse_file_add_fd(sparse_output, input, 0, input_len, output_block) < 0) { 109 fprintf(stderr, "Couldn't add input fil [all...] |
/system/core/fastbootd/ |
H A D | secure.c | 101 BIO *input; local 105 input = BIO_new_fd(fd, BIO_NOCLOSE); 106 if (input == NULL) { 107 D(ERR, "Unable to open input"); 114 *content = SMIME_read_CMS(input, output); 117 D(ERR, "Unable to parse input file: %s", ERR_lib_error_string(err)); 121 BIO_free(input); 126 BIO_free(input);
|
/system/core/fastbootd/commands/ |
H A D | flash.c | 94 struct GPT_mapping input; local 100 if (gpt_mmap(&input, written + skip, current_size, data_fd)) { 109 memcpy(output.ptr, input.ptr, current_size); 111 gpt_unmap(&input);
|
/system/core/libpixelflinger/tests/gglmul/ |
H A D | gglmul_test.cpp | 38 GGLfixed input; member in struct:gglClampx_test_t 60 printf("Test input=0x%08x output=0x%08x :", 61 test->input, test->output); 62 if(gglClampx(test->input) == test->output) 72 GGLfixed input; member in struct:gglClz_test_t 91 printf("Test input=0x%08x output=%2d :", test->input, test->output); 92 if(gglClz(test->input) == test->output)
|
/system/extras/verity/ |
H A D | Utils.java | 229 static boolean verify(PublicKey key, byte[] input, byte[] signature, argument 239 verifier.update(input); 244 static byte[] sign(PrivateKey privateKey, byte[] input) throws Exception { argument 247 signer.update(input);
|
H A D | KeystoreSigner.java | 124 public void parse(byte[] input) throws Exception { argument 125 ASN1InputStream stream = new ASN1InputStream(input);
|
/system/core/libmincrypt/tools/ |
H A D | DumpPublicKey.java | 239 FileInputStream input = new FileInputStream(args[i]); 241 X509Certificate cert = (X509Certificate) cf.generateCertificate(input);
|
/system/extras/tests/fstest/ |
H A D | perm_checker.conf | 86 /dev/input/ 755 755 root root root root 87 /dev/input/* 660 660 root root input input
|
/system/core/debuggerd/ |
H A D | getevent.cpp | 27 #include <linux/input.h> 167 const char* device_path = "/dev/input"; 199 const char* device_path = "/dev/input";
|
H A D | debuggerd.cpp | 39 #include <linux/input.h>
|
/system/keymaster/include/keymaster/ |
H A D | google_keymaster_messages.h | 193 Buffer input; member in struct:keymaster::UpdateOperationRequest
|
/system/netd/server/ |
H A D | RouteController.cpp | 229 int padInterfaceName(const char* input, char* name, size_t* length, uint16_t* padding) { argument 230 if (!input) { 235 *length = strlcpy(name, input, IFNAMSIZ) + 1;
|
/system/core/healthd/ |
H A D | healthd_mode_charger.cpp | 21 #include <linux/input.h>
|
/system/core/toolbox/ |
H A D | getevent.c | 11 #include <linux/input.h> 51 printf(" input props:\n"); 513 const char *device_path = "/dev/input";
|