/system/bt/stack/include/ |
H A D | advertise_data_parser.h | 26 * Return true if this |ad| represent properly formatted advertising data. 28 static bool IsValid(const std::vector<uint8_t>& ad) { argument 31 size_t ad_len = ad.size(); 33 uint8_t len = ad[position]; 52 * This function returns a pointer inside the |ad| array of length |ad_len| 55 static const uint8_t* GetFieldByType(const uint8_t* ad, size_t ad_len, argument 60 uint8_t len = ad[position]; 65 uint8_t adv_type = ad[position + 1]; 70 return ad + position + 2; 84 static const uint8_t* GetFieldByType(std::vector<uint8_t> const& ad, argument [all...] |
/system/hwservicemanager/ |
H A D | AccessControl.cpp | 67 struct audit_data ad; local 74 ad.pid = sourcePid; 75 ad.interfaceName = interface; 78 perm, (void *) &ad) == 0); 103 struct audit_data *ad = (struct audit_data *)data; local 105 if (!ad || !ad->interfaceName) { 110 snprintf(buf, len, "interface=%s pid=%d", ad->interfaceName, ad->pid);
|
/system/keymaster/ |
H A D | ae.h | 94 int ae_encrypt(ae_ctx* ctx, const void* nonce, const void* pt, int pt_len, const void* ad, 105 * ad - Pointer to associated data. 106 * ad_len - number of bytes pointed to by ad. 115 * ad_len<0, then use same ad as last message. 124 int ae_decrypt(ae_ctx* ctx, const void* nonce, const void* ct, int ct_len, const void* ad, 135 * ad - Pointer to associated data. 136 * ad_len - number of bytes pointed to by ad. 146 * ad_len<0, then use same ad as last message.
|
H A D | ocb.c | 789 static void process_ad(ae_ctx* ctx, const void* ad, int ad_len, int final) { argument 796 const block* adp = (block*)ad; 918 int ae_encrypt(ae_ctx* ctx, const void* nonce, const void* pt, int pt_len, const void* ad, argument 941 process_ad(ctx, ad, ad_len, final); 1129 int ae_decrypt(ae_ctx* ctx, const void* nonce, const void* ct, int ct_len, const void* ad, argument 1160 process_ad(ctx, ad, ad_len, final);
|
/system/bt/stack/avdt/ |
H A D | avdt_ad.cc | 102 tAVDT_TC_TBL* p_tbl = avdt_cb.ad.tc_tbl; 103 memset(&avdt_cb.ad, 0, sizeof(tAVDT_AD)); 127 tAVDT_TC_TBL* p_tbl = avdt_cb.ad.tc_tbl; 179 idx = avdt_cb.ad.lcid_tbl[lcid - L2CAP_BASE_APPL_CID]; 182 return &avdt_cb.ad.tc_tbl[idx]; 203 tAVDT_TC_TBL* p_tbl = avdt_cb.ad.tc_tbl; 232 tAVDT_TC_TBL* p_tbl = avdt_cb.ad.tc_tbl; 263 AVDT_TRACE_DEBUG("avdt_ad_tc_tbl_to_idx: %d", (p_tbl - avdt_cb.ad.tc_tbl)); 265 return (uint8_t)(p_tbl - avdt_cb.ad.tc_tbl); 304 avdt_scb_by_hdl(avdt_cb.ad [all...] |
H A D | avdt_l2c.cc | 99 avdt_cb.ad.lcid_tbl[p_tbl->lcid - L2CAP_BASE_APPL_CID] = 101 avdt_cb.ad.rt_tbl[avdt_ccb_to_idx(p_ccb)][p_tbl->tcid].lcid = p_tbl->lcid; 258 avdt_cb.ad.lcid_tbl[lcid - L2CAP_BASE_APPL_CID] = 260 avdt_cb.ad.rt_tbl[avdt_ccb_to_idx(p_ccb)][p_tbl->tcid].lcid = lcid;
|
H A D | avdt_api.cc | 978 lcid = avdt_cb.ad.rt_tbl[avdt_ccb_to_idx(p_ccb)][tcid].lcid; 1003 lcid = avdt_cb.ad.rt_tbl[avdt_ccb_to_idx(p_ccb)][tcid].lcid; 1007 lcid = avdt_cb.ad.rt_tbl[avdt_ccb_to_idx(p_ccb)][tcid].lcid;
|
H A D | avdt_int.h | 517 tAVDT_AD ad; /* adaption layer control block */ member in struct:__anon853
|
H A D | avdt_scb_act.cc | 1378 lcid = avdt_cb.ad.rt_tbl[avdt_ccb_to_idx(p_ccb)][tcid].lcid;
|
/system/security/keystore/ |
H A D | permissions.cpp | 94 struct audit_data* ad = reinterpret_cast<struct audit_data*>(data); local 95 if (!ad) { 100 snprintf(buf, len, "pid=%d uid=%d", ad->pid, ad->uid); 121 audit_data ad; local 135 ad.pid = spid; 136 ad.uid = uid; 139 reinterpret_cast<void*>(&ad)) == 0;
|
/system/security/keystore-engine/ |
H A D | methods.h | 55 int keyhandle_new(void*, void*, CRYPTO_EX_DATA* ad, int idx, long, void*);
|