Searched refs:output (Results 1 - 25 of 41) sorted by relevance

12

/system/core/base/
H A Dlogging_test.cpp93 std::string output; local
94 android::base::ReadFdToString(cap.fd(), &output);
98 ASSERT_TRUE(std::regex_search(output, message_regex));
106 std::string output; local
107 android::base::ReadFdToString(cap.fd(), &output);
111 ASSERT_TRUE(std::regex_search(output, message_regex));
119 std::string output; local
120 android::base::ReadFdToString(cap.fd(), &output);
121 ASSERT_TRUE(output.empty());
130 std::string output; local
146 std::string output; local
162 std::string output; local
[all...]
/system/core/libutils/tests/
H A DUnicode_test.cpp41 << "Zero length input should return zero length output.";
97 char16_t output[1 + 1 + 1 + 2 + 1]; // Room for NULL local
99 utf8_to_utf16(str, sizeof(str), output);
101 EXPECT_EQ(0x0030, output[0])
103 EXPECT_EQ(0x0100, output[1])
105 EXPECT_EQ(0x2323, output[2])
107 EXPECT_EQ(0xD800, output[3])
109 EXPECT_EQ(0xDC00, output[4])
111 EXPECT_EQ(NULL, output[5])
/system/extras/tests/workloads/
H A Ddefs.sh36 echo "-o output file"
53 (-o) output=$2; shift;;
109 output=${output:="./out"}
111 # clear the output file
112 > $output
125 # debug output enabled by -v
128 echo DEBUG: $* >&2 >> $output
254 # look for any reclaim events in atrace output
266 echo =============================== >> $output
[all...]
/system/core/libsparse/
H A Dappend2simg.c46 fprintf(stderr, "Usage: append2simg <output> <input>\n");
51 int output; local
79 output = open(output_path, O_RDWR | O_BINARY);
80 if (output < 0) {
81 fprintf(stderr, "Couldn't open output file (%s)\n", strerror(errno));
85 sparse_output = sparse_file_import_auto(output, true, true);
87 fprintf(stderr, "Couldn't import output file\n");
102 fprintf(stderr, "Input file is not a multiple of the output file's block size");
120 lseek64(output, 0, SEEK_SET);
128 close(output);
[all...]
/system/core/logd/
H A DLogStatistics.cpp186 static void format_line(android::String8 &output, argument
196 output.appendFormat("%s%*s%*s\n", name.string(),
200 output.appendFormat("%s%*s\n", name.string(),
215 android::String8 output("size/num");
223 oldLength = output.length();
227 output.appendFormat("%*s%s", spaces, "", android_log_id_to_name(id));
228 spaces += spaces_total + oldLength - output.length();
232 output.appendFormat("\nTotal");
238 oldLength = output.length();
242 output
[all...]
/system/keymaster/
H A Daes_operation.h69 AuthorizationSet* output_params, Buffer* output,
72 AuthorizationSet* output_params, Buffer* output) override;
86 bool InternalUpdate(const uint8_t* input, size_t input_length, Buffer* output,
115 AuthorizationSet* output_params, Buffer* output) override;
133 AuthorizationSet* output_params, Buffer* output,
136 AuthorizationSet* output_params, Buffer* output) override;
143 keymaster_error_t ProcessAllButTagLengthBytes(const Buffer& input, Buffer* output);
144 bool ProcessTagBufContentsAsData(size_t to_process, Buffer* output, keymaster_error_t* error);
H A Daes_operation.cpp197 AuthorizationSet* /* output_params */, Buffer* output,
204 if (!InternalUpdate(input.peek_read(), input.available_read(), output, &error))
218 AuthorizationSet* /* output_params */, Buffer* output) {
219 if (!output->reserve(AES_BLOCK_SIZE))
229 if (!EVP_CipherFinal_ex(&ctx_, output->peek_write(), &output_written)) {
237 if (!output->advance_write(output_written))
448 bool AesEvpOperation::InternalUpdate(const uint8_t* input, size_t input_length, Buffer* output, argument
450 assert(output);
456 if (!output->reserve(input_length + AES_BLOCK_SIZE)) {
462 if (!EVP_CipherUpdate(&ctx_, output
195 Update(const AuthorizationSet& additional_params, const Buffer& input, AuthorizationSet* , Buffer* output, size_t* input_consumed) argument
216 Finish(const AuthorizationSet& , const Buffer& , AuthorizationSet* , Buffer* output) argument
492 Finish(const AuthorizationSet& additional_params, const Buffer& signature, AuthorizationSet* output_params, Buffer* output) argument
544 Update(const AuthorizationSet& additional_params, const Buffer& input, AuthorizationSet* , Buffer* output, size_t* input_consumed) argument
566 ProcessAllButTagLengthBytes(const Buffer& input, Buffer* output) argument
596 ProcessTagBufContentsAsData(size_t to_process, Buffer* output, keymaster_error_t* error) argument
613 Finish(const AuthorizationSet& additional_params, const Buffer& signature, AuthorizationSet* output_params, Buffer* output) argument
[all...]
H A Drsa_operation.cpp151 Buffer* /* output */, size_t* input_consumed) {
277 Buffer* output, size_t* input_consumed) {
280 return RsaOperation::Update(additional_params, input, output_params, output,
291 AuthorizationSet* /* output_params */, Buffer* output) {
292 assert(output);
295 return SignUndigested(output);
297 return SignDigested(output);
315 keymaster_error_t RsaSignOperation::SignUndigested(Buffer* output) { argument
320 if (!output->Reinitialize(RSA_size(rsa.get())))
337 bytes_encrypted = RSA_private_encrypt(key_len, to_encrypt, output
275 Update(const AuthorizationSet& additional_params, const Buffer& input, AuthorizationSet* output_params, Buffer* output, size_t* input_consumed) argument
289 Finish(const AuthorizationSet& , const Buffer& , AuthorizationSet* , Buffer* output) argument
363 SignDigested(Buffer* output) argument
394 Update(const AuthorizationSet& additional_params, const Buffer& input, AuthorizationSet* output_params, Buffer* output, size_t* input_consumed) argument
509 Finish(const AuthorizationSet& , const Buffer& , AuthorizationSet* , Buffer* output) argument
557 Finish(const AuthorizationSet& , const Buffer& , AuthorizationSet* , Buffer* output) argument
[all...]
H A Drsa_operation.h45 AuthorizationSet* output_params, Buffer* output,
96 AuthorizationSet* output_params, Buffer* output,
99 AuthorizationSet* output_params, Buffer* output) override;
102 keymaster_error_t SignUndigested(Buffer* output);
103 keymaster_error_t SignDigested(Buffer* output);
117 AuthorizationSet* output_params, Buffer* output,
120 AuthorizationSet* output_params, Buffer* output) override;
152 AuthorizationSet* output_params, Buffer* output) override;
163 AuthorizationSet* output_params, Buffer* output) override;
H A Dhmac_operation.h35 AuthorizationSet* output_params, Buffer* output,
40 Buffer* output);
H A Decdsa_operation.cpp127 Buffer* /* output */, size_t* input_consumed) {
140 Buffer* output) {
141 if (!output)
150 output->Reinitialize(ECDSA_size(ecdsa.get()));
153 output->peek_write(), &siglen_tmp, ecdsa.get()))
159 if (!output->Reinitialize(siglen))
161 if (EVP_DigestSignFinal(&digest_ctx_, output->peek_write(), &siglen) <= 0)
164 if (!output->advance_write(siglen))
188 Buffer* /* output */, size_t* input_consumed) {
201 Buffer* /* output */) {
137 Finish(const AuthorizationSet& , const Buffer& , AuthorizationSet* , Buffer* output) argument
[all...]
H A Decdsa_operation.h57 AuthorizationSet* output_params, Buffer* output,
60 AuthorizationSet* output_params, Buffer* output) override;
70 AuthorizationSet* output_params, Buffer* output,
73 AuthorizationSet* output_params, Buffer* output) override;
H A Dsoft_keymaster_device.cpp412 *signed_data_length = finish_response.output.available_read();
416 if (!finish_response.output.read(*signed_data, *signed_data_length))
860 keymaster_blob_t* output) {
864 if (!input_consumed || !output || !out_params)
869 output->data = nullptr;
870 output->data_length = 0;
888 output->data_length = response.output.available_read();
889 uint8_t* tmp = reinterpret_cast<uint8_t*>(malloc(output->data_length));
892 memcpy(tmp, response.output
855 update(const keymaster1_device_t* dev, keymaster_operation_handle_t operation_handle, const keymaster_key_param_set_t* in_params, const keymaster_blob_t* input, size_t* input_consumed, keymaster_key_param_set_t* out_params, keymaster_blob_t* output) argument
898 finish(const keymaster1_device_t* dev, keymaster_operation_handle_t operation_handle, const keymaster_key_param_set_t* params, const keymaster_blob_t* signature, keymaster_key_param_set_t* out_params, keymaster_blob_t* output) argument
[all...]
H A Dhmac_operation.cpp152 Buffer* /* output */, size_t* input_consumed) {
165 AuthorizationSet* /* output_params */, Buffer* output) {
175 if (!output->reserve(mac_length_) || !output->write(digest, mac_length_))
163 Finish(const AuthorizationSet& , const Buffer& signature, AuthorizationSet* , Buffer* output) argument
H A Doperation.h106 AuthorizationSet* output_params, Buffer* output,
109 AuthorizationSet* output_params, Buffer* output) = 0;
H A Dandroid_keymaster_messages.cpp197 return output.SerializedSize();
199 return output.SerializedSize() + sizeof(uint32_t);
201 return output.SerializedSize() + sizeof(uint32_t) + output_params.SerializedSize();
209 buf = output.Serialize(buf, end);
218 bool retval = output.Deserialize(buf_ptr, end);
251 return output.SerializedSize();
253 return output.SerializedSize() + output_params.SerializedSize();
257 buf = output.Serialize(buf, end);
264 bool retval = output.Deserialize(buf_ptr, end);
/system/bt/stack/smp/
H A Dsmp_cmac.c72 ** data. The parameter dest is input and output parameter, it
95 static void leftshift_onebit(UINT8 *input, UINT8 *output) argument
103 output[i] = (input[i] << 1) | overflow;
137 tSMP_ENC output; local
148 if (!SMP_Encrypt(key, BT_OCTET16_LEN, &cmac_cb.text[(cmac_cb.round - i)*BT_OCTET16_LEN], BT_OCTET16_LEN, &output))
154 memcpy(x, output.param_buf, BT_OCTET16_LEN);
160 p_mac = output.param_buf + (BT_OCTET16_LEN - tlen);
267 tSMP_ENC output; local
270 if (SMP_Encrypt(key, BT_OCTET16_LEN, z, BT_OCTET16_LEN, &output))
272 cmac_subkey_cont(&output);;
[all...]
H A Dsmp_keys.c55 static BOOLEAN smp_calculate_legacy_short_term_key(tSMP_CB *p_cb, tSMP_ENC *output);
146 UINT8 *p_rev_output = NULL; /* encrypted output in big endilan format */
277 tSMP_ENC output; local
285 output.param_len = SMP_ENCRYT_KEY_SIZE;
286 output.status = HCI_SUCCESS;
287 output.opcode = HCI_BLE_ENCRYPT;
288 memcpy(output.param_buf, p_cb->ltk, SMP_ENCRYT_DATA_SIZE);
290 else if (!smp_calculate_legacy_short_term_key(p_cb, &output))
297 smp_process_stk(p_cb, &output);
409 tSMP_ENC output; local
624 tSMP_ENC output; local
661 tSMP_ENC output; local
830 tSMP_ENC output; local
866 tSMP_ENC output; local
944 smp_calculate_legacy_short_term_key(tSMP_CB *p_cb, tSMP_ENC *output) argument
[all...]
/system/bt/btcore/src/
H A Dcounter.c81 static void output(socket_t *socket, const char* format, ...);
310 output(socket, "counter:%s val:%lld\n", name, val);
349 output(socket, WELCOME);
350 output(socket, PROMPT);
375 output(socket, "unable to find command %s\n", client->buffer);
379 output(socket, GOODBYE);
384 output(socket, PROMPT);
387 static void output(socket_t *socket, const char* format, ...) { function
397 output(socket, "help command unimplemented\n");
406 output(socke
[all...]
/system/bt/btif/co/
H A Dbta_hh_co.c105 if (ret < (ssize_t)(sizeof(ev.type) + sizeof(ev.u.output))) {
108 sizeof(ev.type) + sizeof(ev.u.output));
113 ,ev.u.output.rtype, ev.u.output.size);
114 //Send SET_REPORT with feature report if the report type in output event is FEATURE
115 if(ev.u.output.rtype == UHID_FEATURE_REPORT)
117 ev.u.output.size, ev.u.output.data);
118 else if(ev.u.output.rtype == UHID_OUTPUT_REPORT)
120 ev.u.output
[all...]
/system/security/keystore/tests/
H A DMakefile71 genhtml coverage.info --output-directory coverage
74 lcov --capture --directory=. --directory=.. -b . --output-file coverage.info
79 lcov --capture --directory=. --output-file coverage.info
80 genhtml coverage.info --output-directory coverage
/system/extras/verity/
H A Dbuild_verity_metadata.py15 status, output = commands.getstatusoutput(cmd)
16 print output
/system/core/libpixelflinger/tests/gglmul/
H A Dgglmul_test.cpp39 GGLfixed output; member in struct:gglClampx_test_t
60 printf("Test input=0x%08x output=0x%08x :",
61 test->input, test->output);
62 if(gglClampx(test->input) == test->output)
73 GGLfixed output; member in struct:gglClz_test_t
91 printf("Test input=0x%08x output=%2d :", test->input, test->output);
92 if(gglClz(test->input) == test->output)
/system/bt/stack/btm/
H A Dbtm_ble_addr.c95 tSMP_ENC output; local
108 if (!SMP_Encrypt(btm_cb.devcb.id_keys.irk, BT_OCTET16_LEN, p->param_buf, 3, &output))
114 btm_gen_resolve_paddr_cmpl(&output);
306 tSMP_ENC output; local
318 &rand[0], 3, &output);
324 if (!memcmp(output.param_buf, &rand[0], 3))
359 tSMP_ENC output; local
371 &rand[0], 3, &output);
372 return btm_ble_proc_resolve_x(&output);
501 ** random_pseudo is input and output paramete
[all...]
/system/vold/
H A DUtils.h68 std::vector<std::string>& output);
70 std::vector<std::string>& output, security_context_t context);

Completed in 510 milliseconds

12