/system/bt/stack/smp/ |
H A D | smp_utils.cc | 430 p_buf->len = SMP_PAIRING_REQ_SIZE; 456 p_buf->len = SMP_CONFIRM_CMD_SIZE; 480 p_buf->len = SMP_RAND_CMD_SIZE; 505 p_buf->len = SMP_ENC_INFO_SIZE; 531 p_buf->len = SMP_MASTER_ID_SIZE; 560 p_buf->len = SMP_ID_INFO_SIZE; 586 p_buf->len = SMP_ID_ADDR_SIZE; 611 p_buf->len = SMP_SIGN_INFO_SIZE; 636 p_buf->len = SMP_PAIR_FAIL_SIZE; 660 p_buf->len 1276 smp_reverse_array(uint8_t* arr, uint8_t len) argument [all...] |
/system/bt/hci/src/ |
H A D | hci_layer_android.cc | 64 packet->len = data.size(); 123 data.setToExternal(packet->data + packet->offset, packet->len); 165 TEMP_FAILURE_RETRY(write(fd, packet->data, packet->len));
|
/system/bt/stack/avrc/ |
H A D | avrc_opt.cc | 70 p_cmd->len = (uint16_t)(p_data + p_msg->vendor_len - (uint8_t*)(p_cmd + 1) - 109 p_cmd->len = 154 p_cmd->len =
|
/system/core/liblog/ |
H A D | logger.h | 91 size_t len); 94 size_t len); 97 size_t len); 125 struct log_msg logMsg; /* peek at upcoming data, valid if logMsg.len != 0 */
|
/system/core/libziparchive/ |
H A D | zip_writer.cc | 318 int32_t ZipWriter::WriteBytes(const void* data, size_t len) { argument 325 result = CompressBytes(¤t_file_entry_, data, len); 327 result = StoreBytes(¤t_file_entry_, data, len); 335 reinterpret_cast<const Bytef*>(data), len); 336 current_file_entry_.uncompressed_size += len; 340 int32_t ZipWriter::StoreBytes(FileEntry* file, const void* data, size_t len) { argument 343 if (fwrite(data, 1, len, file_) != len) { 346 file->compressed_size += len; 347 current_offset_ += len; 351 CompressBytes(FileEntry* file, const void* data, size_t len) argument [all...] |
/system/core/logd/ |
H A D | LogReader.cpp | 52 int len = read(cli->getSocket(), buffer, sizeof(buffer) - 1); local 53 if (len <= 0) { 57 buffer[len] = '\0';
|
H A D | main.cpp | 341 ssize_t len = rc + 1024; local 342 std::unique_ptr<char[]> buf(new char[len]); 344 rc = klogctl(KLOG_READ_ALL, buf.get(), len); 349 if (rc < len) { 350 len = rc + 1; 352 buf[--len] = '\0'; 355 kl->synchronize(buf.get(), len); 360 (rc >= 0) && !!(tok = android::log_strntok_r(tok, len, ptr, sublen));
|
/system/netd/server/ |
H A D | NetlinkCommands.cpp | 128 uint32_t len = bytesread; local 130 NLMSG_OK(nlh, len); 131 nlh = NLMSG_NEXT(nlh, len)) {
|
/system/update_engine/ |
H A D | certificate_checker.cc | 48 unsigned int len; local 50 bool success = X509_digest(certificate, digest_function, out_digest, &len); 53 *out_digest_length = len;
|
/system/vold/ |
H A D | TrimTask.cpp | 127 range.len = ULLONG_MAX; 135 LOG(INFO) << "Trimmed " << range.len << " bytes on " << path 137 notifyResult(path, range.len, delta);
|
/system/libufdt/utils/src/ |
H A D | mkdtimg_core.c | 75 size_t len = ftell(fp); local 78 char *buf = malloc(len); 83 if (fread(buf, len, 1, fp) != 1) { 89 *len_ptr = len; 137 int len; local 138 fdt32_t *prop_value_ptr = (fdt32_t *)fdt_getprop(fdt, node_off, prop, &len); 145 /* TODO: check len */
|
/system/bt/stack/include/ |
H A D | bnep_api.h | 122 uint16_t len, bool fw_ext_present); 333 uint8_t* p_data, uint16_t len, uint16_t protocol,
|
H A D | pan_api.h | 122 uint16_t protocol, uint8_t* p_data, uint16_t len, 318 * len - length of the data 327 uint16_t protocol, uint8_t* p_data, uint16_t len,
|
/system/bt/stack/pan/ |
H A D | pan_api.cc | 370 src_uuid.len = 2; 371 dst_uuid.len = 2; 442 * len - length of the data 451 uint16_t protocol, uint8_t* p_data, uint16_t len, 466 BNEP_Write(pan_cb.pcb[i].handle, dst, p_data, len, protocol, src, ext); 472 buffer->len = len; 475 buffer->len); 520 BNEP_Write(pan_cb.pcb[i].handle, dst, data, p_buf->len, protocol, src, 450 PAN_Write(uint16_t handle, BD_ADDR dst, BD_ADDR src, uint16_t protocol, uint8_t* p_data, uint16_t len, bool ext) argument
|
/system/core/adb/client/ |
H A D | usb_libusb.cpp | 460 int usb_write(usb_handle* h, const void* d, int len) { argument 461 LOG(DEBUG) << "usb_write of length " << len; 474 info->transfer->length = len; 479 LOG(DEBUG) << "usb_write(" << len << ") = " << rc; 483 int usb_read(usb_handle* h, void* d, int len) { argument 484 LOG(DEBUG) << "usb_read of length " << len; 497 info->transfer->length = len; 502 LOG(DEBUG) << "usb_read(" << len << ") = " << rc;
|
/system/core/fs_mgr/ |
H A D | fs_mgr_format.cpp | 68 info.len = (off64_t)dev_sz; 70 info.len -= CRYPT_FOOTER_OFFSET;
|
/system/core/libcutils/ |
H A D | socket_network_client_unix.c | 96 socklen_t len = sizeof(error); local 98 if (getsockopt(s, SOL_SOCKET, SO_ERROR, &error, &len) < 0) {
|
/system/core/liblog/tests/ |
H A D | log_read_test.cpp | 65 if (log_msg.entry.len != buf.length()) continue; 67 if (buf != std::string(log_msg.msg(), log_msg.entry.len)) continue;
|
/system/core/libsparse/ |
H A D | append2simg.c | 107 output_block = sparse_output->len / sparse_output->block_size; 112 sparse_output->len += input_len;
|
/system/extras/libfec/ |
H A D | fec_open.cpp | 169 uint32_t len = FEC_BLOCKSIZE; local 172 if (len > f->ecc.size - n) { 173 len = f->ecc.size - n; 176 if (!raw_pread(f, buf, len, f->ecc.start + n)) { 181 SHA256_Update(&ctx, buf, len); 182 n += len; 263 info.len = 0; /* only len is set to 0 to ask the device for real size. */ 270 *offset = info.len;
|
/system/extras/libpagemap/ |
H A D | pm_kernel.c | 62 int pm_kernel_pids(pm_kernel_t *ker, pid_t **pids_out, size_t *len) { argument 111 *len = pids_count;
|
/system/gatekeeper/include/gatekeeper/ |
H A D | gatekeeper_messages.h | 62 SizedBuffer(uint8_t buf[], uint32_t len) { argument 64 length = len;
|
/system/hwservicemanager/ |
H A D | AccessControl.cpp | 102 int AccessControl::auditCallback(void *data, security_class_t /*cls*/, char *buf, size_t len) { argument 110 snprintf(buf, len, "interface=%s pid=%d", ad->interfaceName, ad->pid);
|
/system/keymaster/ |
H A D | keymaster0_engine.h | 74 static int rsa_private_transform(RSA* rsa, uint8_t* out, const uint8_t* in, size_t len); 87 int RsaPrivateTransform(RSA* rsa, uint8_t* out, const uint8_t* in, size_t len) const;
|
H A D | keymaster_configuration.cpp | 57 size_t len = match.rm_eo - match.rm_so; 58 std::string s(expression + match.rm_so, len);
|