/system/tpm/tpm_manager/server/ |
H A D | openssl_crypto_util_impl.cc | 25 bool OpensslCryptoUtilImpl::GetRandomBytes(size_t num_bytes, argument 27 random_data->resize(num_bytes); 30 if (RAND_bytes(random_buffer, num_bytes) != 1) {
|
H A D | mock_openssl_crypto_util.cc | 31 bool MockOpensslCryptoUtil::FakeGetRandomBytes(size_t num_bytes, argument 33 random_data->assign(num_bytes, 'a');
|
H A D | tpm2_initializer_impl.cc | 125 bool Tpm2InitializerImpl::GetTpmRandomData(size_t num_bytes, argument 128 num_bytes, nullptr /* No Authorization */, random_data);
|
/system/tpm/attestation/common/ |
H A D | mock_crypto_utility.cc | 26 bool FakeRandom(size_t num_bytes, std::string* output) { argument 27 *output = std::string(num_bytes, 'A');
|
H A D | crypto_utility_impl_test.cc | 79 size_t num_bytes = -1; local 81 EXPECT_FALSE(crypto_utility_->GetRandom(num_bytes, &buffer));
|
H A D | crypto_utility_impl.cc | 71 bool CryptoUtilityImpl::GetRandom(size_t num_bytes, argument 74 if (num_bytes > static_cast<size_t>(std::numeric_limits<int>::max())) { 77 random_data->resize(num_bytes); 79 return (RAND_bytes(buffer, num_bytes) == 1);
|
/system/connectivity/shill/net/ |
H A D | netlink_message.cc | 97 size_t num_bytes) { 104 if (num_bytes >= sizeof(nlmsghdr)) { 107 num_bytes -= sizeof(nlmsghdr); 109 VLOG(log_level) << "Not enough bytes (" << num_bytes 114 PrintPayload(log_level, buf, num_bytes); 156 size_t num_bytes) { 157 while (num_bytes) { 159 size_t bytes_this_row = min(num_bytes, static_cast<size_t>(32)); 164 num_bytes -= bytes_this_row; 96 PrintBytes(int log_level, const unsigned char* buf, size_t num_bytes) argument 155 PrintPayload(int log_level, const unsigned char* buf, size_t num_bytes) argument
|
/system/extras/boot_control_copy/ |
H A D | boot_control_copy.c | 97 static bool copy_data(int src_fd, int dst_fd, size_t num_bytes) argument 102 remaining = num_bytes;
|
/system/update_engine/ |
H A D | payload_state_unittest.cc | 909 uint64_t num_bytes = 42 * 1000 * 1000; local 910 payload_state.DownloadProgress(num_bytes); 913 EXPECT_EQ(num_bytes, 915 EXPECT_EQ(num_bytes, 939 uint64_t num_bytes = 10000; local 940 payload_state.DownloadProgress(num_bytes); 941 EXPECT_EQ(num_bytes, 943 EXPECT_EQ(num_bytes, 954 EXPECT_EQ(num_bytes,
|
/system/tpm/trunks/ |
H A D | trunks_client_test.cc | 79 size_t num_bytes = 70; local 85 result = utility->GenerateRandom(num_bytes, session->GetDelegate(), 92 if (num_bytes != random_data.size()) {
|
H A D | tpm_utility_test.cc | 397 size_t num_bytes = 72; local 411 num_bytes, &mock_authorization_delegate_, &random_data)); 412 EXPECT_EQ(num_bytes, random_data.size()); 416 size_t num_bytes = 5; local 421 utility_.GenerateRandom(num_bytes, nullptr, &random_data));
|
H A D | tpm_utility_impl.cc | 328 TPM_RC TpmUtilityImpl::GenerateRandom(size_t num_bytes, argument 332 size_t bytes_left = num_bytes; 347 CHECK_EQ(random_data->size(), num_bytes); 1179 size_t num_bytes, 1182 if (num_bytes > MAX_NV_INDEX_SIZE) { 1216 public_data.data_size = num_bytes; 1358 size_t num_bytes, 1362 if (num_bytes > MAX_NV_BUFFER_SIZE) { 1392 num_bytes, 1178 DefineNVSpace(uint32_t index, size_t num_bytes, AuthorizationDelegate* delegate) argument 1356 ReadNVSpace(uint32_t index, uint32_t offset, size_t num_bytes, std::string* nvram_data, AuthorizationDelegate* delegate) argument
|
/system/connectivity/shill/wifi/ |
H A D | wake_on_wifi_unittest.cc | 974 void AddSSIDToWhitelist(const uint8_t* ssid, int num_bytes, argument 976 vector<uint8_t> ssid_vector(ssid, ssid + num_bytes);
|
/system/extras/perfprofd/quipper/ |
H A D | perf_reader.cc | 598 int num_bytes = AlignSize(sizeof(sample.raw_size) + sample.raw_size, local 600 array += num_bytes / sizeof(uint64_t);
|