/system/tools/aidl/tests/android/aidl/tests/ |
H A D | ITestService.aidl | 44 SimpleParcelable RepeatSimpleParcelable(in SimpleParcelable input, 46 PersistableBundle RepeatPersistableBundle(in PersistableBundle input); 49 boolean[] ReverseBoolean(in boolean[] input, out boolean[] repeated); 50 byte[] ReverseByte (in byte[] input, out byte[] repeated); 51 char[] ReverseChar (in char[] input, out char[] repeated); 52 int[] ReverseInt (in int[] input, out int[] repeated); 53 long[] ReverseLong (in long[] input, out long[] repeated); 54 float[] ReverseFloat (in float[] input, out float[] repeated); 55 double[] ReverseDouble (in double[] input, out double[] repeated); 56 String[] ReverseString (in String[] input, ou [all...] |
/system/tools/aidl/tests/ |
H A D | aidl_test_client_utf8_strings.cpp | 58 for (const auto& input : utf8_inputs) { 60 Status status = s->RepeatUtf8CppString(input, &reply); 61 if (!status.isOk() || input != reply) { 63 << input 77 for (const auto& input : utf8_inputs) { 80 unique_ptr<string>(new string(input)), &reply); 83 "nullable utf8 string " << input; 88 << input; 91 if (input != *reply) { 93 << input 115 unique_ptr<vector<unique_ptr<string>>> input, reversed, repeated; local [all...] |
H A D | test_helpers.h | 35 U input) { 37 android::binder::Status status = (*service.*func)(input, &reply); 38 if (!status.isOk() || input != reply) { 51 std::vector<T> input) { 55 input, &actual_repeated, &actual_reversed); 61 if (input != actual_repeated) { 63 LOG(ERROR) << "input.size()=" << input.size() 67 std::reverse(input.begin(), input 32 RepeatPrimitive( const android::sp<android::aidl::tests::ITestService>& service, android::binder::Status(android::aidl::tests::ITestService::*func)(T, T*), U input) argument 47 ReverseArray( const android::sp<android::aidl::tests::ITestService>& service, android::binder::Status(android::aidl::tests::ITestService::*func)( const std::vector<T>&, std::vector<T>*, std::vector<T>*), std::vector<T> input) argument [all...] |
H A D | aidl_test_service.cpp | 158 Status RepeatSimpleParcelable(const SimpleParcelable& input, 161 ALOGI("Repeated a SimpleParcelable %s", input.toString().c_str()); 162 *repeat = input; 163 *_aidl_return = input; 167 Status RepeatPersistableBundle(const PersistableBundle& input, 170 *_aidl_return = input; 175 Status ReverseArray(const vector<T>& input, vector<T>* repeated, argument 177 ALOGI("Reversing array of length %zu", input.size()); 178 *repeated = input; 179 *_aidl_return = input; 185 RepeatNullable(const unique_ptr<T>& input, unique_ptr<T>* _aidl_return) argument 308 RepeatNullableIntArray(const unique_ptr<vector<int32_t>>& input, unique_ptr<vector<int32_t>>* _aidl_return) argument 313 RepeatNullableStringList( const unique_ptr<vector<unique_ptr<String16>>>& input, unique_ptr<vector<unique_ptr<String16>>>* _aidl_return) argument 335 RepeatNullableString(const unique_ptr<String16>& input, unique_ptr<String16>* _aidl_return) argument 340 RepeatNullableParcelable(const unique_ptr<SimpleParcelable>& input, unique_ptr<SimpleParcelable>* _aidl_return) argument 365 ReverseUtf8CppString(const vector<string>& input, vector<string>* repeated, vector<string>* _aidl_return) argument 371 ReverseUtf8CppStringList( const unique_ptr<vector<unique_ptr<::string>>>& input, unique_ptr<vector<unique_ptr<string>>>* repeated, unique_ptr<vector<unique_ptr<string>>>* _aidl_return) argument [all...] |
/system/tools/aidl/tests/java_app/src/android/aidl/tests/ |
H A D | TestServiceClient.java | 96 String message = "Failed to read intent extra input."; 214 mLog.logAndThrow("Expected to fail on null string input!"); 232 boolean[] input = {true, false, false, false}; 233 boolean echoed[] = new boolean[input.length]; 234 boolean[] reversed = service.ReverseBoolean(input, echoed); 235 if (!Arrays.equals(input, echoed)) { 236 mLog.logAndThrow("Failed to echo input array back."); 238 if (input.length != reversed.length) { 241 for (int i = 0; i < input.length; ++i) { 243 if (input[ [all...] |
/system/connectivity/shill/ |
H A D | socket_info_reader.h | 63 bool ParseSocketInfo(const std::string& input, SocketInfo* socket_info); 65 const std::string& input, IPAddress* ip_address, uint16_t* port); 66 bool ParseIPAddress(const std::string& input, IPAddress* ip_address); 67 bool ParsePort(const std::string& input, uint16_t* port); 69 const std::string& input, 71 bool ParseConnectionState(const std::string& input, 73 bool ParseTimerState(const std::string& input,
|
H A D | connection_info_reader.h | 54 bool ParseConnectionInfo(const std::string& input, ConnectionInfo* info); 55 bool ParseProtocol(const std::string& input, int* protocol); 56 bool ParseTimeToExpireSeconds(const std::string& input, 58 bool ParseIsUnreplied(const std::string& input, bool* is_unreplied); 59 bool ParseIPAddress(const std::string& input, 61 bool ParsePort(const std::string& input, uint16_t* port, bool* is_source);
|
H A D | connection_info_reader.cc | 83 bool ConnectionInfoReader::ParseConnectionInfo(const string& input, argument 85 vector<string> tokens = base::SplitString(input, base::kWhitespaceASCII, 159 bool ConnectionInfoReader::ParseProtocol(const string& input, int* protocol) { argument 160 if (!base::StringToInt(input, protocol) || 168 const string& input, int64_t* time_to_expire_seconds) { 169 if (!base::StringToInt64(input, time_to_expire_seconds) || 177 const string& input, IPAddress* ip_address, bool* is_source) { 180 if (base::StartsWith(input, kSourceIPAddressTag, 183 ip_address_string = input.substr(strlen(kSourceIPAddressTag)); 184 } else if (base::StartsWith(input, kDestinationIPAddressTa 167 ParseTimeToExpireSeconds( const string& input, int64_t* time_to_expire_seconds) argument 176 ParseIPAddress( const string& input, IPAddress* ip_address, bool* is_source) argument 207 ParsePort( const string& input, uint16_t* port, bool* is_source) argument [all...] |
H A D | socket_info_reader.cc | 86 bool SocketInfoReader::ParseSocketInfo(const string& input, argument 88 vector<string> tokens = base::SplitString(input, base::kWhitespaceASCII, 135 const string& input, IPAddress* ip_address, uint16_t* port) { 137 input, ":", base::TRIM_WHITESPACE, base::SPLIT_WANT_ALL); 147 bool SocketInfoReader::ParseIPAddress(const string& input, argument 149 ByteString byte_string = ByteString::CreateFromHexString(input); 172 bool SocketInfoReader::ParsePort(const string& input, uint16_t* port) { argument 175 if (input.size() != 4 || !base::HexStringToInt(input, &result) || 185 const string& input, 134 ParseIPAddressAndPort( const string& input, IPAddress* ip_address, uint16_t* port) argument 184 ParseTransimitAndReceiveQueueValues( const string& input, uint64_t* transmit_queue_value, uint64_t* receive_queue_value) argument 202 ParseConnectionState( const string& input, SocketInfo::ConnectionState* connection_state) argument 218 ParseTimerState( const string& input, SocketInfo::TimerState* timer_state) argument [all...] |
/system/update_engine/payload_consumer/ |
H A D | bzip_extent_writer.cc | 43 // Copy the input data into |input_buffer_| only if |input_buffer_| already 46 const uint8_t* input = reinterpret_cast<const uint8_t*>(bytes); local 47 const uint8_t* input_end = input + count; 49 input_buffer_.insert(input_buffer_.end(), input, input_end); 50 input = input_buffer_.data(); 51 input_end = input + input_buffer_.size(); 53 stream_.next_in = reinterpret_cast<char*>(const_cast<uint8_t*>(input)); 54 stream_.avail_in = input_end - input; 73 break; // no more input to process
|
H A D | xz_extent_writer.cc | 66 // Copy the input data into |input_buffer_| only if |input_buffer_| already 69 const uint8_t* input = reinterpret_cast<const uint8_t*>(bytes); local 71 input_buffer_.insert(input_buffer_.end(), input, input + count); 72 input = input_buffer_.data(); 77 request.in = input; 101 break; // No more input to process. 105 // Store unconsumed data (if any) in |input_buffer_|. Since |input| can point
|
/system/extras/libfec/test/ |
H A D | test_read.cpp | 29 cerr << "usage: " << argv[0] << " input output" << endl; 40 fec::io input(argv[1]); 42 if (!input) { 56 count = input.read(buffer.get(), bufsize);
|
/system/core/metricsd/uploader/ |
H A D | metrics_hashes_unittest.cc | 29 std::string input; member in struct:metrics::__anon1711 38 uint64_t hash = HashMetricName(cases[i].input);
|
/system/keymaster/ |
H A D | ecdsa_operation.cpp | 98 keymaster_error_t EcdsaOperation::StoreData(const Buffer& input, size_t* input_consumed) { argument 102 if (!data_.write(input.peek_read(), min(data_.available_write(), input.available_read()))) 105 *input_consumed = input.available_read(); 126 const Buffer& input, 130 return StoreData(input, input_consumed); 132 if (EVP_DigestSignUpdate(&digest_ctx_, input.peek_read(), input.available_read()) != 1) 134 *input_consumed = input.available_read(); 139 const Buffer& input, cons 125 Update(const AuthorizationSet& , const Buffer& input, AuthorizationSet* , Buffer* , size_t* input_consumed) argument 138 Finish(const AuthorizationSet& additional_params, const Buffer& input, const Buffer& , AuthorizationSet* , Buffer* output) argument 190 Update(const AuthorizationSet& , const Buffer& input, AuthorizationSet* , Buffer* , size_t* input_consumed) argument 203 Finish(const AuthorizationSet& additional_params, const Buffer& input, const Buffer& signature, AuthorizationSet* , Buffer* ) argument [all...] |
H A D | aes_operation.h | 68 keymaster_error_t Update(const AuthorizationSet& additional_params, const Buffer& input, 71 keymaster_error_t Finish(const AuthorizationSet& additional_params, const Buffer& input, 82 bool HandleAad(const AuthorizationSet& input_params, const Buffer& input, 87 bool InternalUpdate(const uint8_t* input, size_t input_length, Buffer* output, 89 bool UpdateForFinish(const AuthorizationSet& additional_params, const Buffer& input, 117 keymaster_error_t Finish(const AuthorizationSet& additional_params, const Buffer& input, 136 keymaster_error_t Update(const AuthorizationSet& additional_params, const Buffer& input, 139 keymaster_error_t Finish(const AuthorizationSet& additional_params, const Buffer& input, 148 keymaster_error_t ProcessAllButTagLengthBytes(const Buffer& input, Buffer* output);
|
H A D | aes_operation.cpp | 194 const Buffer& input, 199 if (!HandleAad(additional_params, input, &error)) 202 if (!InternalUpdate(input.peek_read(), input.available_read(), output, &error)) 204 *input_consumed = input.available_read(); 215 const Buffer& input, const Buffer& /* signature */, 218 if (!UpdateForFinish(additional_params, input, output_params, output, &error)) 377 bool AesEvpOperation::HandleAad(const AuthorizationSet& input_params, const Buffer& input, argument 405 if (input.available_read()) { 447 bool AesEvpOperation::InternalUpdate(const uint8_t* input, size_ argument 193 Update(const AuthorizationSet& additional_params, const Buffer& input, AuthorizationSet* , Buffer* output, size_t* input_consumed) argument 214 Finish(const AuthorizationSet& additional_params, const Buffer& input, const Buffer& , AuthorizationSet* output_params, Buffer* output) argument 468 UpdateForFinish(const AuthorizationSet& additional_params, const Buffer& input, AuthorizationSet* output_params, Buffer* output, keymaster_error_t* error) argument 508 Finish(const AuthorizationSet& additional_params, const Buffer& input, const Buffer& signature, AuthorizationSet* output_params, Buffer* output) argument 560 Update(const AuthorizationSet& additional_params, const Buffer& input, AuthorizationSet* , Buffer* output, size_t* input_consumed) argument 582 ProcessAllButTagLengthBytes(const Buffer& input, Buffer* output) argument 629 Finish(const AuthorizationSet& additional_params, const Buffer& input, const Buffer& signature, AuthorizationSet* output_params, Buffer* output) argument [all...] |
H A D | ecdsa_operation.h | 40 keymaster_error_t StoreData(const Buffer& input, size_t* input_consumed); 56 keymaster_error_t Update(const AuthorizationSet& additional_params, const Buffer& input, 59 keymaster_error_t Finish(const AuthorizationSet& additional_params, const Buffer& input, 70 keymaster_error_t Update(const AuthorizationSet& additional_params, const Buffer& input, 73 keymaster_error_t Finish(const AuthorizationSet& additional_params, const Buffer& input,
|
H A D | rsa_operation.cpp | 145 const Buffer& input, AuthorizationSet* /* output_params */, 155 return StoreData(input, input_consumed); 159 keymaster_error_t RsaOperation::StoreData(const Buffer& input, size_t* input_consumed) { argument 164 // If the write fails, it's because input length exceeds key size. 165 if (!data_.write(input.peek_read(), input.available_read())) { 167 input.available_read() + data_.available_read(), EVP_PKEY_size(rsa_key_)); 171 *input_consumed = input.available_read(); 279 const Buffer& input, AuthorizationSet* output_params, 283 return RsaOperation::Update(additional_params, input, output_param 144 Update(const AuthorizationSet& , const Buffer& input, AuthorizationSet* , Buffer* , size_t* input_consumed) argument 278 Update(const AuthorizationSet& additional_params, const Buffer& input, AuthorizationSet* output_params, Buffer* output, size_t* input_consumed) argument 292 Finish(const AuthorizationSet& additional_params, const Buffer& input, const Buffer& , AuthorizationSet* , Buffer* output) argument 401 Update(const AuthorizationSet& additional_params, const Buffer& input, AuthorizationSet* output_params, Buffer* output, size_t* input_consumed) argument 415 Finish(const AuthorizationSet& additional_params, const Buffer& input, const Buffer& signature, AuthorizationSet* , Buffer* ) argument 520 Finish(const AuthorizationSet& additional_params, const Buffer& input, const Buffer& , AuthorizationSet* , Buffer* output) argument 573 Finish(const AuthorizationSet& additional_params, const Buffer& input, const Buffer& , AuthorizationSet* , Buffer* output) argument [all...] |
H A D | hmac_operation.cpp | 151 const Buffer& input, AuthorizationSet* /* output_params */, 153 if (!HMAC_Update(&ctx_, input.peek_read(), input.available_read())) 155 *input_consumed = input.available_read(); 164 const Buffer& input, const Buffer& signature, 166 keymaster_error_t error = UpdateForFinish(additional_params, input); 150 Update(const AuthorizationSet& , const Buffer& input, AuthorizationSet* , Buffer* , size_t* input_consumed) argument 163 Finish(const AuthorizationSet& additional_params, const Buffer& input, const Buffer& signature, AuthorizationSet* , Buffer* output) argument
|
H A D | operation.cpp | 138 const Buffer& input) { 139 if (!input_params.empty() || input.available_read()) { 144 Update(input_params, input, &output_params, &output, &input_consumed); 147 assert(input_consumed == input.available_read()); 137 UpdateForFinish(const AuthorizationSet& input_params, const Buffer& input) argument
|
/system/core/libsparse/ |
H A D | append2simg.c | 46 fprintf(stderr, "Usage: append2simg <output> <input>\n"); 56 int input; local 91 input = open(input_path, O_RDONLY | O_BINARY); 92 if (input < 0) { 93 fprintf(stderr, "Couldn't open input file (%s)\n", strerror(errno)); 97 input_len = lseek64(input, 0, SEEK_END); 99 fprintf(stderr, "Couldn't get input file length (%s)\n", strerror(errno)); 105 lseek64(input, 0, SEEK_SET); 108 if (sparse_file_add_fd(sparse_output, input, 0, input_len, output_block) < 0) { 109 fprintf(stderr, "Couldn't add input fil [all...] |
/system/tpm/attestation/client/ |
H A D | main.cc | 66 activate --input=<input_file> 69 encrypt_for_activate --input=<input_file> --output=<output_file> 73 encrypt [--user=<email>] [--label=<keylabel>] --input=<input_file> 77 decrypt [--user=<email>] [--label=<keylabel>] --input=<input_file> 80 sign [--user=<email>] [--label=<keylabel>] --input=<input_file> 83 verify [--user=<email>] [--label=<keylabel] --input=<signed_data_file> 164 if (!command_line->HasSwitch("input")) { 167 std::string input; local 168 base::FilePath filename(command_line->GetSwitchValueASCII("input")); 169 if (!base::ReadFileToString(filename, &input)) { 181 std::string input; local 195 std::string input; local 210 std::string input; local 225 std::string input; local 241 std::string input; local 329 CallActivateAttestationKey(const std::string& input) argument 340 EncryptForActivate(const std::string& input) argument 350 EncryptForActivate2(const std::string& input, const GetEndorsementInfoReply& endorsement_info) argument 365 EncryptForActivate3( const std::string& input, const GetEndorsementInfoReply& endorsement_info, const GetAttestationKeyInfoReply& attestation_key_info) argument 401 Encrypt(const std::string& label, const std::string& username, const std::string& input) argument 412 Encrypt2(const std::string& input, const GetKeyInfoReply& key_info) argument 423 CallDecrypt(const std::string& label, const std::string& username, const std::string& input) argument 436 CallSign(const std::string& label, const std::string& username, const std::string& input) argument 455 VerifySignature(const std::string& label, const std::string& username, const std::string& input, const std::string& signature) argument 467 VerifySignature2(const std::string& input, const std::string& signature, const GetKeyInfoReply& key_info) argument [all...] |
/system/connectivity/shill/init/ |
H A D | netfilter-queue.conf | 32 --input-queue=${NETFILTER_INPUT_NFQUEUE} \
|
/system/extras/slideshow/ |
H A D | slideshow.cpp | 21 #include <linux/input.h> 86 int input = false; local 117 * timeout or user input */ 129 input = true; 137 /* if there was user input while showing the images, display the last 141 if (input) {
|
/system/core/logwrapper/include/logwrap/ |
H A D | logwrap.h | 84 const uint8_t* input; member in struct:AndroidForkExecvpOption::__anon1701::__anon1702
|