/system/extras/ext4_utils/include/ext4_utils/ |
H A D | ext4_sb.h | 31 int64_t len; /* If set to 0, ask the block device for the size, member in struct:fs_info
|
/system/extras/tests/workloads/ |
H A D | atrace-uncompress.py | 10 if len(sys.argv) != 2:
|
/system/hwservicemanager/ |
H A D | AccessControl.h | 18 static int auditCallback(void *data, security_class_t cls, char *buf, size_t len);
|
/system/extras/ext4_utils/ |
H A D | make_ext4fs.c | 364 u32 journal_blocks = DIV_ROUND_UP(info.len, info.block_size) / 64; 379 return DIV_ROUND_UP(info.len, info.block_size) / 4; 384 u32 blocks = DIV_ROUND_UP(info.len, info.block_size); 399 u32 blocks = DIV_ROUND_UP(info.len, info.block_size); 426 int make_ext4fs_sparse_fd(int fd, long long len, argument 429 return make_ext4fs_sparse_fd_align(fd, len, mountpoint, sehnd, 0, 0); 432 int make_ext4fs_sparse_fd_align(int fd, long long len, argument 436 return make_ext4fs_sparse_fd_directory_align(fd, len, mountpoint, sehnd, NULL, 440 int make_ext4fs_sparse_fd_directory(int fd, long long len, argument 444 return make_ext4fs_sparse_fd_directory_align(fd, len, mountpoin 447 make_ext4fs_sparse_fd_directory_align(int fd, long long len, const char *mountpoint, struct selabel_handle *sehnd, const char *directory, unsigned eraseblk, unsigned logicalblk) argument 461 make_ext4fs(const char *filename, long long len, const char *mountpoint, struct selabel_handle *sehnd) argument 467 make_ext4fs_directory(const char *filename, long long len, const char *mountpoint, struct selabel_handle *sehnd, const char *directory) argument 474 make_ext4fs_directory_align(const char *filename, long long len, const char *mountpoint, struct selabel_handle *sehnd, const char *directory, unsigned eraseblk, unsigned logicalblk) argument 508 int len = strlen(str); local [all...] |
/system/bt/stack/bnep/ |
H A D | bnep_api.cc | 140 if (src_uuid->len != dst_uuid->len) return BNEP_CONN_FAILED_UUID_SIZE; 267 rem_len = p_bcb->p_pending_data->len; 351 if (p_buf->len > BNEP_MTU_SIZE) { 352 BNEP_TRACE_ERROR("BNEP_Write() length %d exceeded MTU %d", p_buf->len, 369 /* parse the extension headers and findout the new packet len */ 370 org_len = p_buf->len; 393 p_buf->len = new_len; 441 uint16_t len, uint16_t protocol, uint8_t* p_src_addr, 447 if (len > BNEP_MTU_SIZ 440 BNEP_Write(uint16_t handle, uint8_t* p_dest_addr, uint8_t* p_data, uint16_t len, uint16_t protocol, uint8_t* p_src_addr, bool fw_ext_present) argument [all...] |
/system/core/adb/client/ |
H A D | usb_windows.cpp | 115 int usb_write(usb_handle* handle, const void* data, int len); 118 int usb_read(usb_handle *handle, void* data, int len); 354 int usb_write(usb_handle* handle, const void* data, int len) { argument 359 D("usb_write %d", len); 369 (unsigned long)len, 379 D("usb_write got: %ld, expected: %d", written, len); 380 if (written != (unsigned long)len) { 384 len, written); 389 if (handle->zero_mask && (len & handle->zero_mask) == 0) { 418 int usb_read(usb_handle *handle, void* data, int len) { argument [all...] |
/system/core/toolbox/upstream-netbsd/usr.bin/grep/ |
H A D | util.c | 225 ln.len = 0; 230 ln.off += ln.len + 1; 231 if ((ln.dat = grep_fgetln(f, &ln.len)) == NULL || ln.len == 0) 233 if (ln.len > 0 && ln.dat[ln.len - 1] == line_sep) 234 --ln.len; 296 while (st <= l->len) { 298 pmatch.rm_eo = l->len; 309 l->len, [all...] |
/system/keymaster/ |
H A D | keymaster0_engine.cpp | 245 int Keymaster0Engine::rsa_private_transform(RSA* rsa, uint8_t* out, const uint8_t* in, size_t len) { argument 246 ALOGV("rsa_private_transform(%p, %p, %p, %u)", rsa, out, in, (unsigned)len); 249 return instance_->RsaPrivateTransform(rsa, out, in, len); 293 static bool data_too_large_for_public_modulus(const uint8_t* data, size_t len, const RSA* rsa) { argument 295 BN_bin2bn(data, len, nullptr /* allocate result */)); 300 size_t len) const { 310 if (!Keymaster0Sign(&sign_params, *key_blob, in, len, &signature, &signature_length)) { 311 if (data_too_large_for_public_modulus(in, len, rsa)) { 322 if (signature_length > len) { 327 memcpy(out, signature.get() + signature_length - len, le [all...] |
/system/bt/stack/gatt/ |
H A D | gatt_auth.cc | 55 (uint8_t*)osi_malloc(p_attr->len + 3); /* 3 = 2 byte handle + opcode */ 60 ARRAY_TO_STREAM(p, p_attr->value, p_attr->len); 64 if ((payload_size - GATT_AUTH_SIGN_LEN - 3) < p_attr->len) 65 p_attr->len = payload_size - GATT_AUTH_SIGN_LEN - 3; 67 p_signature = p_attr->value + p_attr->len; 70 (uint16_t)(p_attr->len + 3), /* 3 = 2 byte handle + opcode */ 72 p_attr->len += BTM_BLE_AUTH_SIGN_LEN; 100 if (p_buf->len < GATT_AUTH_SIGN_LEN + 4) { 102 p_buf->len, GATT_AUTH_SIGN_LEN + 4); 105 cmd_len = p_buf->len [all...] |
/system/extras/verity/ |
H A D | build_verity_tree.cpp | 54 const unsigned char *block, size_t len, 66 ret &= EVP_DigestUpdate(mdctx, block, len); 93 int hash_chunk(void *priv, const void *data, int len) argument 96 assert(len % ctx->block_size == 0); 99 hash_blocks(ctx->md, (const unsigned char *)data, len, 104 for (size_t i = 0; i < (size_t)len; i += ctx->block_size) { 278 int64_t len = sparse_file_len(file, false, false); local 279 if (len % block_size != 0) { 281 len, block_size); 289 level_blocks = verity_tree_blocks(len, block_siz 53 hash_block(const EVP_MD *md, const unsigned char *block, size_t len, const unsigned char *salt, size_t salt_len, unsigned char *out, size_t *out_size) argument [all...] |
/system/nfc/src/nfa/dm/ |
H A D | nfa_dm_ndef.c | 355 uint32_t len) { 366 NFA_TRACE_DEBUG3("nfa_dm_ndef_handle_message status=%i, msgbuf=%08x, len=%i", 367 status, p_msg_buf, len); 382 ndef_data.len = len; 389 if (len == 0) { 396 ndef_data.len = 0; 404 ndef_status = NDEF_MsgValidate(p_msg_buf, len, true); 465 ndef_data.len = payload_len + (uint32_t)(p_payload - p_rec); 490 ndef_data.len 354 nfa_dm_ndef_handle_message(tNFA_STATUS status, uint8_t* p_msg_buf, uint32_t len) argument [all...] |
/system/nfc/halimpl/bcm2079x/adaptation/ |
H A D | userial_linux.c | 174 extern uint8_t* scru_dump_hex(uint8_t* p, char* p_title, uint32_t len, 601 int my_read(int fd, uchar* pbuf, int len) { argument 612 "%s: enter, pbuf=%lx, len = %d\n", __func__, (unsigned long)pbuf, 613 len); 614 memset(pbuf, 0, len); 644 if (!bSerialPortDevice || len < MIN_BUFSIZE) 645 count = len; 653 if (ret <= 0 || !bSerialPortDevice || len < MIN_BUFSIZE) break; 671 if (count > (len - offset)) // if (count > (remaining buffer size)) 673 len 1105 USERIAL_Read(tUSERIAL_PORT port, uint8_t* p_data, uint16_t len) argument 1198 USERIAL_Write(tUSERIAL_PORT port, uint8_t* p_data, uint16_t len) argument 1606 setReadPacketSize(int len) argument 1648 int len = spi_negotiation[0]; local [all...] |
/system/bt/btif/src/ |
H A D | btif_gatt_client.cc | 122 memcpy(data.value, p_data->notify.value, p_data->notify.len); 126 data.len = p_data->notify.len; 396 uint16_t len, uint8_t* value, void* data) { 401 params->value.len = len; 402 CHECK(len <= BTGATT_MAX_ATTR_LEN); 403 if (len > 0) memcpy(params->value.value, value, len); 416 uint16_t handle, uint16_t len, uint8_ [all...] |
H A D | btif_sock_l2cap.cc | 58 uint32_t len; member in struct:packet 115 uint32_t* len) { 121 if (len) *len = sock->first_packet->len; 128 if (len) sock->bytes_buffered -= *len; 135 static struct packet* packet_alloc(const uint8_t* data, uint32_t len) { argument 137 uint8_t* buf = (uint8_t*)osi_malloc(len); 140 p->len 114 packet_get_head_l(l2cap_socket* sock, uint8_t** data, uint32_t* len) argument 146 packet_put_head_l(l2cap_socket* sock, const void* data, uint32_t len) argument 173 packet_put_tail_l(l2cap_socket* sock, const void* data, uint32_t len) argument 636 on_l2cap_write_done(void* req_id, uint16_t len, uint32_t id) argument 660 on_l2cap_write_fixed_done(void* req_id, uint16_t len, uint32_t id) argument 987 uint32_t len; local [all...] |
/system/core/liblog/ |
H A D | logd_reader.c | 67 char* buf, size_t len); 70 char* buf, size_t len); 73 char* buf, size_t len); 261 size_t len; local 274 len = strlen(buf) + 1; 275 ret = TEMP_FAILURE_RETRY(write(sock, buf, len)); 280 len = buf_size; 282 while ((ret = TEMP_FAILURE_RETRY(read(sock, cp, len))) > 0) { 285 if (((size_t)ret == len) || (buf_size < PAGE_SIZE)) { 289 len 409 logdGetStats(struct android_log_logger_list* logger_list, struct android_log_transport_context* transp __unused, char* buf, size_t len) argument 436 logdGetPrune(struct android_log_logger_list* logger_list __unused, struct android_log_transport_context* transp __unused, char* buf, size_t len) argument 442 logdSetPrune(struct android_log_logger_list* logger_list __unused, struct android_log_transport_context* transp __unused, char* buf, size_t len) argument [all...] |
/system/nfc/halimpl/bcm2079x/hal/hal/ |
H A D | nfc_hal_prm.c | 65 uint8_t len; member in struct:__anon1926 104 uint16_t len, offset = nfc_hal_cb.prm.cur_patch_offset; local 124 STREAM_TO_UINT8(len, p_src); 128 nfc_hal_cb.prm.cur_patch_offset += (len + patch_hdr_size); 129 nfc_hal_cb.prm.cur_patch_len_remaining -= (len + patch_hdr_size); 165 (uint8_t)(len + NCI_MSG_HDR_SIZE), 186 nfc_hal_cb.prm.spd_patch_desc[nfc_hal_cb.prm.spd_cur_patch_idx].len; 258 nfc_hal_cb.prm.cur_patch_len_remaining = nfc_hal_cb.prm_i2c.len; 416 STREAM_TO_UINT16(nfc_hal_cb.prm.spd_patch_desc[i].len, p); 419 patchfile_patchsize += nfc_hal_cb.prm.spd_patch_desc[i].len; 614 uint8_t len = 0; local [all...] |
H A D | nfc_hal_hci_ci.c | 51 p_msg->hdr.len = sizeof(tNFC_HAL_HCI_RSP_NV_READ_EVT); 82 p_msg->nv_write.hdr.len = sizeof(tNFC_HAL_HCI_RSP_NV_READ_EVT);
|
/system/bt/test/suite/rfcomm/ |
H A D | rfcomm_test.cc | 49 int num_bonded_devices = bonded_devices_prop->len / sizeof(bt_bdaddr_t); 61 int num_uuids = uuid_prop->len / sizeof(bt_uuid_t);
|
/system/core/include/sysutils/ |
H A D | SocketClient.h | 59 int sendBinaryMsg(int code, const void *data, int len); 62 int sendData(const void *data, int len);
|
/system/core/include/utils/ |
H A D | String16.h | 58 size_t len, 61 explicit String16(const char16_t* o, size_t len); 64 explicit String16(const char* o, size_t len); 77 status_t setTo(const char16_t* other, size_t len); 79 size_t len, 83 status_t append(const char16_t* other, size_t len); 92 const char16_t* chrs, size_t len); 107 status_t remove(size_t len, size_t begin=0);
|
/system/core/libcutils/ |
H A D | ashmem-host.c | 63 int ashmem_pin_region(int fd __unused, size_t offset __unused, size_t len __unused) 68 int ashmem_unpin_region(int fd __unused, size_t offset __unused, size_t len __unused)
|
/system/core/liblog/tests/ |
H A D | benchmark_main.cpp | 61 int PrettyPrintInt(char* str, int len, unsigned int arg) { argument 63 return snprintf(str, len, "%uGi", arg / (1 << 30)); 65 return snprintf(str, len, "%uMi", arg / (1 << 20)); 67 return snprintf(str, len, "%uKi", arg / (1 << 10)); 69 return snprintf(str, len, "%uG", arg / 1000000000); 71 return snprintf(str, len, "%uM", arg / 1000000); 73 return snprintf(str, len, "%uK", arg / 1000); 75 return snprintf(str, len, "%u", arg);
|
/system/core/libsysutils/include/sysutils/ |
H A D | SocketClient.h | 59 int sendBinaryMsg(int code, const void *data, int len); 62 int sendData(const void *data, int len);
|
/system/core/libutils/include/utils/ |
H A D | String16.h | 58 size_t len, 61 explicit String16(const char16_t* o, size_t len); 64 explicit String16(const char* o, size_t len); 77 status_t setTo(const char16_t* other, size_t len); 79 size_t len, 83 status_t append(const char16_t* other, size_t len); 92 const char16_t* chrs, size_t len); 107 status_t remove(size_t len, size_t begin=0);
|
/system/extras/simpleperf/ |
H A D | build_id.h | 41 BuildId(const void* data, size_t len) : BuildId() { argument 42 memcpy(data_, data, std::min(len, BUILD_ID_SIZE));
|