/system/security/keystore/include/keystore/ |
H A D | keystore_get.h | 30 * length. The third argument is a pointer to an array that will be malloc() 33 ssize_t keystore_get(const char *key, size_t length, uint8_t** value);
|
/system/core/include/cutils/ |
H A D | uevent.h | 28 ssize_t uevent_kernel_multicast_recv(int socket, void *buffer, size_t length); 29 ssize_t uevent_kernel_multicast_uid_recv(int socket, void *buffer, size_t length, uid_t *uid);
|
H A D | jstring.h | 39 extern char16_t * strcpylen8to16 (char16_t *dest, const char*s, int length,
|
/system/core/toolbox/ |
H A D | ioctl.c | 20 int length = -1; local 41 length = strtol(optarg, NULL, 0); 47 fprintf(stderr, "%s [-l <length>] [-a <argsize>] [-rdh] <device> <ioctlnr>\n" 82 length = 4; 85 if(length < 0) { 86 length = (argc - optind) * arg_size; 88 if(length) { 89 ioctl_args = calloc(1, length); 92 rem = length; 106 rem = length; [all...] |
/system/keymaster/ |
H A D | google_keymaster_utils.cpp | 28 int memcmp_s(const void* p1, const void* p2, size_t length) { argument 32 while (length-- > 0)
|
H A D | google_softkeymaster.h | 45 void GenerateNonce(uint8_t* nonce, size_t length) { argument 46 for (size_t i = 0; i < length; ++i)
|
H A D | google_keymaster_messages.cpp | 93 void GetKeyCharacteristicsRequest::SetKeyMaterial(const void* key_material, size_t length) { argument 95 key_blob.key_material = dup_buffer(key_material, length); 96 key_blob.key_material_size = length; 135 void BeginOperationRequest::SetKeyMaterial(const void* key_material, size_t length) { argument 137 key_blob.key_material = dup_buffer(key_material, length); 138 key_blob.key_material_size = length; 142 return sizeof(uint32_t) /* purpose */ + sizeof(uint32_t) /* key length */ + 227 void ImportKeyRequest::SetKeyMaterial(const void* key_material, size_t length) { argument 229 key_data = dup_buffer(key_material, length); 230 key_data_length = length; 256 SetKeyMaterial(const void* key_material, size_t length) argument 285 SetKeyMaterial(const void* key_material, size_t length) argument 315 SetKeyMaterial(const void* key_material, size_t length) argument [all...] |
/system/extras/verity/ |
H A D | BootSignature.java | 58 * length INTEGER 70 private ASN1Integer length; field in class:BootSignature 79 * @param length Length of the image, included in the signed data 81 public BootSignature(String target, int length) { argument 84 this.length = new ASN1Integer(length); 115 length = (ASN1Integer) attrs.getObjectAt(1); 123 attrs.add(length); 156 byte[] signable = Arrays.copyOf(image, image.length + attrs.length); [all...] |
H A D | verify_boot_signature.c | 42 ASN1_INTEGER *length; member in struct:__anon289 47 ASN1_SIMPLE(AuthAttrs, length, ASN1_INTEGER) 156 * the length in authenticated attributes matches the actual length of 159 * @param length The actual length of the boot image without the signature 161 static int validate_signature_block(const BootSignature *bs, uint64_t length) argument 190 /* Confirm that the length of the image matches with the length in 192 length 219 hash_image(int fd, uint64_t length, const AuthAttrs *aa, unsigned char *digest) argument 310 verify_signature(int fd, uint64_t length, const BootSignature *bs) argument [all...] |
H A D | VeritySigner.java | 35 if (args.length < 3) { 44 if (args.length > 3 && "-verify".equals(args[3])) {
|
/system/core/fastbootd/ |
H A D | utils.h | 46 ssize_t bulk_read(int bulk_out, char *buf, size_t length); 47 ssize_t bulk_write(int bulk_in, const char *buf, size_t length);
|
H A D | utils.c | 164 ssize_t bulk_write(int bulk_in, const char *buf, size_t length) argument 170 ret = TEMP_FAILURE_RETRY(write(bulk_in, buf + count, length - count)); 172 D(WARN, "[ bulk_write failed fd=%d length=%zu errno=%d %s ]", 173 bulk_in, length, errno, strerror(errno)); 178 } while (count < length); 184 ssize_t bulk_read(int bulk_out, char *buf, size_t length) argument 189 while (n < length) { 190 size_t to_read = (length - n > READ_BUF_SIZE) ? READ_BUF_SIZE : length - n; 193 D(WARN, "[ bulk_read failed fd=%d length [all...] |
/system/core/libcutils/ |
H A D | uevent.c | 32 ssize_t uevent_kernel_multicast_recv(int socket, void *buffer, size_t length) argument 35 return uevent_kernel_multicast_uid_recv(socket, buffer, length, &user); 48 size_t length, uid_t *user) 50 struct iovec iov = { buffer, length }; 91 bzero(buffer, length); 47 uevent_kernel_multicast_uid_recv(int socket, void *buffer, size_t length, uid_t *user) argument
|
/system/core/libutils/ |
H A D | Tokenizer.cpp | 39 bool ownBuffer, size_t length) : 41 mBuffer(buffer), mOwnBuffer(ownBuffer), mLength(length), 68 size_t length = size_t(stat.st_size); local 73 if (fileMap->create(NULL, fd, 0, length, true)) { 81 // The length we obtained from stat is wrong too (it will always be 4096) 83 buffer = new char[length]; 85 ssize_t nrd = read(fd, buffer, length); 92 length = size_t(nrd); 97 *outTokenizer = new Tokenizer(filename, fileMap, buffer, ownBuffer, length); 38 Tokenizer(const String8& filename, FileMap* fileMap, char* buffer, bool ownBuffer, size_t length) argument
|
H A D | FileMap.cpp | 90 bool FileMap::create(const char* origFileName, int fd, off64_t offset, size_t length, argument 117 adjLength = length + adjust; 142 assert(length > 0); 161 adjLength = length + adjust; 188 mDataLength = length;
|
H A D | String8.cpp | 338 size_t oldLength = length(); 440 void String8::toLower(size_t start, size_t length) argument 446 if (start+length > len) { 447 length = len-start; 451 while (length > 0) { 454 length--; 464 void String8::toUpper(size_t start, size_t length) argument 470 if (start+length > len) { 471 length = len-start; 475 while (length > [all...] |
/system/core/mkbootimg/ |
H A D | bootimg.h | 90 unsigned length; /* length in blocks */ 96 ** length: 2 + 7 * n
|
/system/vold/ |
H A D | Process.cpp | 37 int length; local 45 length = readlink(path, link, max- 1); 46 if (length <= 0) 48 link[length] = 0; 53 int length = strlen(mountPoint); local 54 if (length > 1 && strncmp(path, mountPoint, length) == 0) { 56 if (mountPoint[length - 1] == '/') 60 return (path[length] == 0 || path[length] 73 int length = read(fd, buffer, max - 1); local [all...] |
/system/extras/ksmutils/ |
H A D | lookup3.c | 25 then use c as the hash value. If you have a variable length array of 165 -- that the length be the number of uint32_t's in the key 169 except that the length has to be measured in uint32_ts rather than in 176 size_t length, /* the length of the key, in uint32_ts */ 182 a = b = c = 0xdeadbeef + (((uint32_t)length)<<2) + initval; 185 while (length > 3) 191 length -= 3; 196 switch(length) /* all the case statements fall through */ 220 size_t length, /* th 174 hashword( const uint32_t *k, size_t length, uint32_t initval) argument 218 hashword2( const uint32_t *k, size_t length, uint32_t *pc, uint32_t *pb) argument 283 hashlittle( const void *key, size_t length, uint32_t initval) argument 463 hashlittle2( const void *key, size_t length, uint32_t *pc, uint32_t *pb) argument 645 hashbig( const void *key, size_t length, uint32_t initval) argument [all...] |
/system/core/fastbootd/commands/ |
H A D | flash.c | 57 size_t length; local 63 length = strspn(name, ALLOWED_CHARS); 64 if (length != strlen(name)) { 65 D(ERR, "Not allowed char in name: %c", name[length]);
|
/system/core/include/utils/ |
H A D | FileMap.h | 60 off64_t offset, size_t length, bool readOnly); 73 * Get the length we requested. 122 size_t mBaseLength; // length, measured from "mBasePtr" 125 size_t mDataLength; // length, measured from "mDataPtr"
|
H A D | VectorImpl.h | 72 ssize_t insertArrayAt(const void* array, size_t index, size_t length); 73 ssize_t appendArray(const void* array, size_t length); 170 ssize_t insertArrayAt(const void* array, size_t index, size_t length); 171 ssize_t appendArray(const void* array, size_t length);
|
/system/core/libion/include/ion/ |
H A D | ion.h | 39 int ion_map(int fd, ion_user_handle_t handle, size_t length, int prot,
|
/system/media/audio_route/ |
H A D | audio_route.c | 58 unsigned int length; member in struct:mixer_path 103 ALOGE("Path: %s, length: %d", path->name, path->length); 104 for (i = 0; i < path->length; i++) { 170 ar->mixer_path[ar->num_mixer_paths].length = 0; 182 for (i = 0; i < path->length; i++) 195 if (path->size <= path->length) { 211 path_index = path->length; 212 path->length++; 293 for (i = 0; i < sub_path->length; [all...] |
/system/core/adb/ |
H A D | usb_linux_client.c | 68 .length = cpu_to_le32(sizeof(descriptors)), 137 .length = cpu_to_le32(sizeof(strings)), 346 static int bulk_write(int bulk_in, const char *buf, size_t length) argument 352 ret = adb_write(bulk_in, buf + count, length - count); 359 } while (count < length); 380 static int bulk_read(int bulk_out, char *buf, size_t length) argument 386 ret = adb_read(bulk_out, buf + count, length - count); 389 D("[ bulk_read failed fd=%d length=%zu count=%zu ]\n", 390 bulk_out, length, count); 396 } while (count < length); [all...] |