/system/core/base/ |
H A D | logging_test.cpp | 93 std::string output; local 94 android::base::ReadFdToString(cap.fd(), &output); 98 ASSERT_TRUE(std::regex_search(output, message_regex)); 106 std::string output; local 107 android::base::ReadFdToString(cap.fd(), &output); 111 ASSERT_TRUE(std::regex_search(output, message_regex)); 119 std::string output; local 120 android::base::ReadFdToString(cap.fd(), &output); 121 ASSERT_TRUE(output.empty()); 130 std::string output; local 146 std::string output; local 162 std::string output; local [all...] |
/system/core/libutils/tests/ |
H A D | Unicode_test.cpp | 41 << "Zero length input should return zero length output."; 97 char16_t output[1 + 1 + 1 + 2 + 1]; // Room for NULL local 99 utf8_to_utf16(str, sizeof(str), output); 101 EXPECT_EQ(0x0030, output[0]) 103 EXPECT_EQ(0x0100, output[1]) 105 EXPECT_EQ(0x2323, output[2]) 107 EXPECT_EQ(0xD800, output[3]) 109 EXPECT_EQ(0xDC00, output[4]) 111 EXPECT_EQ(NULL, output[5])
|
/system/extras/tests/workloads/ |
H A D | defs.sh | 36 echo "-o output file" 53 (-o) output=$2; shift;; 109 output=${output:="./out"} 111 # clear the output file 112 > $output 125 # debug output enabled by -v 128 echo DEBUG: $* >&2 >> $output 254 # look for any reclaim events in atrace output 266 echo =============================== >> $output [all...] |
/system/core/libsparse/ |
H A D | append2simg.c | 46 fprintf(stderr, "Usage: append2simg <output> <input>\n"); 51 int output; local 79 output = open(output_path, O_RDWR | O_BINARY); 80 if (output < 0) { 81 fprintf(stderr, "Couldn't open output file (%s)\n", strerror(errno)); 85 sparse_output = sparse_file_import_auto(output, true, true); 87 fprintf(stderr, "Couldn't import output file\n"); 102 fprintf(stderr, "Input file is not a multiple of the output file's block size"); 120 lseek64(output, 0, SEEK_SET); 128 close(output); [all...] |
/system/core/logd/ |
H A D | LogStatistics.cpp | 186 static void format_line(android::String8 &output, argument 196 output.appendFormat("%s%*s%*s\n", name.string(), 200 output.appendFormat("%s%*s\n", name.string(), 215 android::String8 output("size/num"); 223 oldLength = output.length(); 227 output.appendFormat("%*s%s", spaces, "", android_log_id_to_name(id)); 228 spaces += spaces_total + oldLength - output.length(); 232 output.appendFormat("\nTotal"); 238 oldLength = output.length(); 242 output [all...] |
/system/keymaster/ |
H A D | aes_operation.h | 69 AuthorizationSet* output_params, Buffer* output, 72 AuthorizationSet* output_params, Buffer* output) override; 86 bool InternalUpdate(const uint8_t* input, size_t input_length, Buffer* output, 115 AuthorizationSet* output_params, Buffer* output) override; 133 AuthorizationSet* output_params, Buffer* output, 136 AuthorizationSet* output_params, Buffer* output) override; 143 keymaster_error_t ProcessAllButTagLengthBytes(const Buffer& input, Buffer* output); 144 bool ProcessTagBufContentsAsData(size_t to_process, Buffer* output, keymaster_error_t* error);
|
H A D | aes_operation.cpp | 197 AuthorizationSet* /* output_params */, Buffer* output, 204 if (!InternalUpdate(input.peek_read(), input.available_read(), output, &error)) 218 AuthorizationSet* /* output_params */, Buffer* output) { 219 if (!output->reserve(AES_BLOCK_SIZE)) 229 if (!EVP_CipherFinal_ex(&ctx_, output->peek_write(), &output_written)) { 237 if (!output->advance_write(output_written)) 448 bool AesEvpOperation::InternalUpdate(const uint8_t* input, size_t input_length, Buffer* output, argument 450 assert(output); 456 if (!output->reserve(input_length + AES_BLOCK_SIZE)) { 462 if (!EVP_CipherUpdate(&ctx_, output 195 Update(const AuthorizationSet& additional_params, const Buffer& input, AuthorizationSet* , Buffer* output, size_t* input_consumed) argument 216 Finish(const AuthorizationSet& , const Buffer& , AuthorizationSet* , Buffer* output) argument 492 Finish(const AuthorizationSet& additional_params, const Buffer& signature, AuthorizationSet* output_params, Buffer* output) argument 544 Update(const AuthorizationSet& additional_params, const Buffer& input, AuthorizationSet* , Buffer* output, size_t* input_consumed) argument 566 ProcessAllButTagLengthBytes(const Buffer& input, Buffer* output) argument 596 ProcessTagBufContentsAsData(size_t to_process, Buffer* output, keymaster_error_t* error) argument 613 Finish(const AuthorizationSet& additional_params, const Buffer& signature, AuthorizationSet* output_params, Buffer* output) argument [all...] |
H A D | rsa_operation.cpp | 151 Buffer* /* output */, size_t* input_consumed) { 277 Buffer* output, size_t* input_consumed) { 280 return RsaOperation::Update(additional_params, input, output_params, output, 291 AuthorizationSet* /* output_params */, Buffer* output) { 292 assert(output); 295 return SignUndigested(output); 297 return SignDigested(output); 315 keymaster_error_t RsaSignOperation::SignUndigested(Buffer* output) { argument 320 if (!output->Reinitialize(RSA_size(rsa.get()))) 337 bytes_encrypted = RSA_private_encrypt(key_len, to_encrypt, output 275 Update(const AuthorizationSet& additional_params, const Buffer& input, AuthorizationSet* output_params, Buffer* output, size_t* input_consumed) argument 289 Finish(const AuthorizationSet& , const Buffer& , AuthorizationSet* , Buffer* output) argument 363 SignDigested(Buffer* output) argument 394 Update(const AuthorizationSet& additional_params, const Buffer& input, AuthorizationSet* output_params, Buffer* output, size_t* input_consumed) argument 509 Finish(const AuthorizationSet& , const Buffer& , AuthorizationSet* , Buffer* output) argument 557 Finish(const AuthorizationSet& , const Buffer& , AuthorizationSet* , Buffer* output) argument [all...] |
H A D | rsa_operation.h | 45 AuthorizationSet* output_params, Buffer* output, 96 AuthorizationSet* output_params, Buffer* output, 99 AuthorizationSet* output_params, Buffer* output) override; 102 keymaster_error_t SignUndigested(Buffer* output); 103 keymaster_error_t SignDigested(Buffer* output); 117 AuthorizationSet* output_params, Buffer* output, 120 AuthorizationSet* output_params, Buffer* output) override; 152 AuthorizationSet* output_params, Buffer* output) override; 163 AuthorizationSet* output_params, Buffer* output) override;
|
H A D | hmac_operation.h | 35 AuthorizationSet* output_params, Buffer* output, 40 Buffer* output);
|
H A D | ecdsa_operation.cpp | 127 Buffer* /* output */, size_t* input_consumed) { 140 Buffer* output) { 141 if (!output) 150 output->Reinitialize(ECDSA_size(ecdsa.get())); 153 output->peek_write(), &siglen_tmp, ecdsa.get())) 159 if (!output->Reinitialize(siglen)) 161 if (EVP_DigestSignFinal(&digest_ctx_, output->peek_write(), &siglen) <= 0) 164 if (!output->advance_write(siglen)) 188 Buffer* /* output */, size_t* input_consumed) { 201 Buffer* /* output */) { 137 Finish(const AuthorizationSet& , const Buffer& , AuthorizationSet* , Buffer* output) argument [all...] |
H A D | ecdsa_operation.h | 57 AuthorizationSet* output_params, Buffer* output, 60 AuthorizationSet* output_params, Buffer* output) override; 70 AuthorizationSet* output_params, Buffer* output, 73 AuthorizationSet* output_params, Buffer* output) override;
|
H A D | soft_keymaster_device.cpp | 412 *signed_data_length = finish_response.output.available_read(); 416 if (!finish_response.output.read(*signed_data, *signed_data_length)) 860 keymaster_blob_t* output) { 864 if (!input_consumed || !output || !out_params) 869 output->data = nullptr; 870 output->data_length = 0; 888 output->data_length = response.output.available_read(); 889 uint8_t* tmp = reinterpret_cast<uint8_t*>(malloc(output->data_length)); 892 memcpy(tmp, response.output 855 update(const keymaster1_device_t* dev, keymaster_operation_handle_t operation_handle, const keymaster_key_param_set_t* in_params, const keymaster_blob_t* input, size_t* input_consumed, keymaster_key_param_set_t* out_params, keymaster_blob_t* output) argument 898 finish(const keymaster1_device_t* dev, keymaster_operation_handle_t operation_handle, const keymaster_key_param_set_t* params, const keymaster_blob_t* signature, keymaster_key_param_set_t* out_params, keymaster_blob_t* output) argument [all...] |
H A D | hmac_operation.cpp | 152 Buffer* /* output */, size_t* input_consumed) { 165 AuthorizationSet* /* output_params */, Buffer* output) { 175 if (!output->reserve(mac_length_) || !output->write(digest, mac_length_)) 163 Finish(const AuthorizationSet& , const Buffer& signature, AuthorizationSet* , Buffer* output) argument
|
H A D | operation.h | 106 AuthorizationSet* output_params, Buffer* output, 109 AuthorizationSet* output_params, Buffer* output) = 0;
|
H A D | android_keymaster_messages.cpp | 197 return output.SerializedSize(); 199 return output.SerializedSize() + sizeof(uint32_t); 201 return output.SerializedSize() + sizeof(uint32_t) + output_params.SerializedSize(); 209 buf = output.Serialize(buf, end); 218 bool retval = output.Deserialize(buf_ptr, end); 251 return output.SerializedSize(); 253 return output.SerializedSize() + output_params.SerializedSize(); 257 buf = output.Serialize(buf, end); 264 bool retval = output.Deserialize(buf_ptr, end);
|
/system/bt/stack/smp/ |
H A D | smp_cmac.c | 72 ** data. The parameter dest is input and output parameter, it 95 static void leftshift_onebit(UINT8 *input, UINT8 *output) argument 103 output[i] = (input[i] << 1) | overflow; 137 tSMP_ENC output; local 148 if (!SMP_Encrypt(key, BT_OCTET16_LEN, &cmac_cb.text[(cmac_cb.round - i)*BT_OCTET16_LEN], BT_OCTET16_LEN, &output)) 154 memcpy(x, output.param_buf, BT_OCTET16_LEN); 160 p_mac = output.param_buf + (BT_OCTET16_LEN - tlen); 267 tSMP_ENC output; local 270 if (SMP_Encrypt(key, BT_OCTET16_LEN, z, BT_OCTET16_LEN, &output)) 272 cmac_subkey_cont(&output);; [all...] |
H A D | smp_keys.c | 55 static BOOLEAN smp_calculate_legacy_short_term_key(tSMP_CB *p_cb, tSMP_ENC *output); 146 UINT8 *p_rev_output = NULL; /* encrypted output in big endilan format */ 277 tSMP_ENC output; local 285 output.param_len = SMP_ENCRYT_KEY_SIZE; 286 output.status = HCI_SUCCESS; 287 output.opcode = HCI_BLE_ENCRYPT; 288 memcpy(output.param_buf, p_cb->ltk, SMP_ENCRYT_DATA_SIZE); 290 else if (!smp_calculate_legacy_short_term_key(p_cb, &output)) 297 smp_process_stk(p_cb, &output); 409 tSMP_ENC output; local 624 tSMP_ENC output; local 661 tSMP_ENC output; local 830 tSMP_ENC output; local 866 tSMP_ENC output; local 944 smp_calculate_legacy_short_term_key(tSMP_CB *p_cb, tSMP_ENC *output) argument [all...] |
/system/bt/btcore/src/ |
H A D | counter.c | 81 static void output(socket_t *socket, const char* format, ...); 310 output(socket, "counter:%s val:%lld\n", name, val); 349 output(socket, WELCOME); 350 output(socket, PROMPT); 375 output(socket, "unable to find command %s\n", client->buffer); 379 output(socket, GOODBYE); 384 output(socket, PROMPT); 387 static void output(socket_t *socket, const char* format, ...) { function 397 output(socket, "help command unimplemented\n"); 406 output(socke [all...] |
/system/bt/btif/co/ |
H A D | bta_hh_co.c | 105 if (ret < (ssize_t)(sizeof(ev.type) + sizeof(ev.u.output))) { 108 sizeof(ev.type) + sizeof(ev.u.output)); 113 ,ev.u.output.rtype, ev.u.output.size); 114 //Send SET_REPORT with feature report if the report type in output event is FEATURE 115 if(ev.u.output.rtype == UHID_FEATURE_REPORT) 117 ev.u.output.size, ev.u.output.data); 118 else if(ev.u.output.rtype == UHID_OUTPUT_REPORT) 120 ev.u.output [all...] |
/system/security/keystore/tests/ |
H A D | Makefile | 71 genhtml coverage.info --output-directory coverage 74 lcov --capture --directory=. --directory=.. -b . --output-file coverage.info 79 lcov --capture --directory=. --output-file coverage.info 80 genhtml coverage.info --output-directory coverage
|
/system/extras/verity/ |
H A D | build_verity_metadata.py | 15 status, output = commands.getstatusoutput(cmd) 16 print output
|
/system/core/libpixelflinger/tests/gglmul/ |
H A D | gglmul_test.cpp | 39 GGLfixed output; member in struct:gglClampx_test_t 60 printf("Test input=0x%08x output=0x%08x :", 61 test->input, test->output); 62 if(gglClampx(test->input) == test->output) 73 GGLfixed output; member in struct:gglClz_test_t 91 printf("Test input=0x%08x output=%2d :", test->input, test->output); 92 if(gglClz(test->input) == test->output)
|
/system/bt/stack/btm/ |
H A D | btm_ble_addr.c | 95 tSMP_ENC output; local 108 if (!SMP_Encrypt(btm_cb.devcb.id_keys.irk, BT_OCTET16_LEN, p->param_buf, 3, &output)) 114 btm_gen_resolve_paddr_cmpl(&output); 306 tSMP_ENC output; local 318 &rand[0], 3, &output); 324 if (!memcmp(output.param_buf, &rand[0], 3)) 359 tSMP_ENC output; local 371 &rand[0], 3, &output); 372 return btm_ble_proc_resolve_x(&output); 501 ** random_pseudo is input and output paramete [all...] |
/system/vold/ |
H A D | Utils.h | 68 std::vector<std::string>& output); 70 std::vector<std::string>& output, security_context_t context);
|