/system/core/adb/ |
H A D | adb_io_test.cpp | 75 const char input[] = "Foobar"; local 79 ASSERT_TRUE(android::base::WriteStringToFd(input, tf.fd)) << strerror(errno); 83 char buf[sizeof(input) - 1] = {}; 86 std::string expected(input);
|
H A D | shell_service_test.cpp | 225 // Use variable substitution so echoed input is different from output. 242 // it should at least contain echoed input and the expected output. 255 std::string input = "foo\nbar"; local 257 memcpy(protocol->data(), input.data(), input.length()); 258 ASSERT_TRUE(protocol->Write(ShellProtocol::kIdStdin, input.length()));
|
/system/tools/aidl/tests/ |
H A D | test_helpers.h | 35 U input) { 37 android::binder::Status status = (*service.*func)(input, &reply); 38 if (!status.isOk() || input != reply) { 51 std::vector<T> input) { 55 input, &actual_repeated, &actual_reversed); 61 if (input != actual_repeated) { 63 LOG(ERROR) << "input.size()=" << input.size() 67 std::reverse(input.begin(), input 32 RepeatPrimitive( const android::sp<android::aidl::tests::ITestService>& service, android::binder::Status(android::aidl::tests::ITestService::*func)(T, V*), U input) argument 47 ReverseArray( const android::sp<android::aidl::tests::ITestService>& service, android::binder::Status(android::aidl::tests::ITestService::*func)( const std::vector<T>&, std::vector<T>*, std::vector<T>*), std::vector<T> input) argument [all...] |
H A D | aidl_test_client_utf8_strings.cpp | 58 for (const auto& input : utf8_inputs) { 60 Status status = s->RepeatUtf8CppString(input, &reply); 61 if (!status.isOk() || input != reply) { 63 << input 77 for (const auto& input : utf8_inputs) { 80 unique_ptr<string>(new string(input)), &reply); 83 "nullable utf8 string " << input; 88 << input; 91 if (input != *reply) { 93 << input 115 unique_ptr<vector<unique_ptr<string>>> input, reversed, repeated; local [all...] |
H A D | aidl_test_client_primitives.cpp | 110 for (const auto& input : inputs) { 112 Status status = s->RepeatString(input, &reply); 113 if (!status.isOk() || input != reply) { 115 << String8(input).string() 169 vector<sp<IBinder>> input; local 180 input.push_back(INamedCallback::asBinder(got)); 186 status = s->ReverseNamedCallbackList(input, &output, &reversed);
|
/system/tpm/attestation/common/ |
H A D | mock_tpm_utility.cc | 79 const std::string& input) { 80 return input + "_fake_transform_" + method; 78 Transform(const std::string& method, const std::string& input) argument
|
H A D | crypto_utility_impl_test.cc | 150 std::string input; local 151 proto.SerializeToString(&input); 152 EXPECT_FALSE(crypto_utility_->DecryptData(input, key, &output)); 202 crypto_utility_->EncryptForUnbind(public_key_info, "input", &output)); 208 EXPECT_FALSE(crypto_utility_->EncryptForUnbind("bad_key", "input", &output)); 216 std::string input(1000, 'A'); 219 crypto_utility_->EncryptForUnbind(public_key_info, input, &output)); 229 crypto_utility_->VerifySignature(public_key_info, "input", "signature")); 233 EXPECT_FALSE(crypto_utility_->VerifySignature("bad_key", "input", ""));
|
/system/update_engine/payload_consumer/ |
H A D | bzip_extent_writer.cc | 43 // Copy the input data into |input_buffer_| only if |input_buffer_| already 46 const uint8_t* input = reinterpret_cast<const uint8_t*>(bytes); local 47 const uint8_t* input_end = input + count; 49 input_buffer_.insert(input_buffer_.end(), input, input_end); 50 input = input_buffer_.data(); 51 input_end = input + input_buffer_.size(); 53 stream_.next_in = reinterpret_cast<char*>(const_cast<uint8_t*>(input)); 54 stream_.avail_in = input_end - input; 73 break; // no more input to process
|
H A D | xz_extent_writer.cc | 66 // Copy the input data into |input_buffer_| only if |input_buffer_| already 69 const uint8_t* input = reinterpret_cast<const uint8_t*>(bytes); local 71 input_buffer_.insert(input_buffer_.end(), input, input + count); 72 input = input_buffer_.data(); 77 request.in = input; 101 break; // No more input to process. 105 // Store unconsumed data (if any) in |input_buffer_|. Since |input| can point
|
/system/connectivity/wifilogd/ |
H A D | local_utils.h | 114 DstType SafelyClamp(SrcType input) { argument 134 if (input < MinAsSrcType) { 136 } else if (input > MaxAsSrcType) { 145 // - Given the range checks above, we know that |input| is within the range. 148 // expression below has the same value as |input|. 149 return static_cast<DstType>(input);
|
/system/core/libsparse/ |
H A D | append2simg.c | 46 fprintf(stderr, "Usage: append2simg <output> <input>\n"); 56 int input; local 91 input = open(input_path, O_RDONLY | O_BINARY); 92 if (input < 0) { 93 fprintf(stderr, "Couldn't open input file (%s)\n", strerror(errno)); 97 input_len = lseek64(input, 0, SEEK_END); 99 fprintf(stderr, "Couldn't get input file length (%s)\n", strerror(errno)); 105 lseek64(input, 0, SEEK_SET); 108 if (sparse_file_add_fd(sparse_output, input, 0, input_len, output_block) < 0) { 109 fprintf(stderr, "Couldn't add input fil [all...] |
/system/vold/ |
H A D | Keymaster.h | 54 // Call "update" repeatedly until all of the input is consumed, and 57 bool updateCompletely(TI& input, TO* output) { argument 59 return updateCompletely(input.data(), input.size(), [&](const char* b, size_t n) { 93 bool updateCompletely(const char* input, size_t inputLen,
|
/system/bt/embdrv/sbc/encoder/srce/ |
H A D | sbc_encoder.c | 37 uint32_t SBC_Encode(SBC_ENC_PARAMS* pstrEncParams, int16_t* input, argument 57 SbcAnalysisFilter4(pstrEncParams, input); 59 SbcAnalysisFilter8(pstrEncParams, input); 159 * InitSbcAnalysisFilt - Initalizes the input data to 0
|
/system/extras/slideshow/ |
H A D | slideshow.cpp | 21 #include <linux/input.h> 88 int input = false; local 120 * timeout or user input */ 132 input = true; 140 /* if there was user input while showing the images, display the last 144 if (input) {
|
/system/keymaster/ |
H A D | ecdsa_operation.cpp | 98 keymaster_error_t EcdsaOperation::StoreData(const Buffer& input, size_t* input_consumed) { argument 102 if (!data_.write(input.peek_read(), min(data_.available_write(), input.available_read()))) 105 *input_consumed = input.available_read(); 126 const Buffer& input, 130 return StoreData(input, input_consumed); 132 if (EVP_DigestSignUpdate(&digest_ctx_, input.peek_read(), input.available_read()) != 1) 134 *input_consumed = input.available_read(); 139 const Buffer& input, cons 125 Update(const AuthorizationSet& , const Buffer& input, AuthorizationSet* , Buffer* , size_t* input_consumed) argument 138 Finish(const AuthorizationSet& additional_params, const Buffer& input, const Buffer& , AuthorizationSet* , Buffer* output) argument 190 Update(const AuthorizationSet& , const Buffer& input, AuthorizationSet* , Buffer* , size_t* input_consumed) argument 203 Finish(const AuthorizationSet& additional_params, const Buffer& input, const Buffer& signature, AuthorizationSet* , Buffer* ) argument [all...] |
H A D | hmac_operation.cpp | 151 const Buffer& input, AuthorizationSet* /* output_params */, 153 if (!HMAC_Update(&ctx_, input.peek_read(), input.available_read())) 155 *input_consumed = input.available_read(); 164 const Buffer& input, const Buffer& signature, 166 keymaster_error_t error = UpdateForFinish(additional_params, input); 150 Update(const AuthorizationSet& , const Buffer& input, AuthorizationSet* , Buffer* , size_t* input_consumed) argument 163 Finish(const AuthorizationSet& additional_params, const Buffer& input, const Buffer& signature, AuthorizationSet* , Buffer* output) argument
|
H A D | operation.cpp | 144 const Buffer& input) { 145 if (!input_params.empty() || input.available_read()) { 150 Update(input_params, input, &output_params, &output, &input_consumed); 153 assert(input_consumed == input.available_read()); 143 UpdateForFinish(const AuthorizationSet& input_params, const Buffer& input) argument
|
/system/update_engine/ |
H A D | chrome_browser_proxy_resolver.cc | 51 const string& input) { 56 StringTokenizer entry_tok(input, ";"); 50 ParseProxyString( const string& input) argument
|
/system/bt/stack/smp/ |
H A D | smp_cmac.cc | 67 * data. The parameter dest is input and output parameter, it 89 static void leftshift_onebit(uint8_t* input, uint8_t* output) { argument 92 /* input[0] is LSB */ 94 next_overflow = (input[i] & 0x80) ? 1 : 0; 95 output[i] = (input[i] << 1) | overflow; 270 * input - text to be signed in little endian byte order. 271 * length - length of the input in byte. 279 bool aes_cipher_msg_auth_code(BT_OCTET16 key, uint8_t* input, uint16_t length, argument 297 if (input != NULL && length > 0) { 298 memcpy(&cmac_cb.text[diff], input, (in [all...] |
/system/core/libpixelflinger/tests/gglmul/ |
H A D | gglmul_test.cpp | 38 GGLfixed input; member in struct:gglClampx_test_t 60 printf("Test input=0x%08x output=0x%08x :", 61 test->input, test->output); 62 if(gglClampx(test->input) == test->output) 72 GGLfixed input; member in struct:gglClz_test_t 91 printf("Test input=0x%08x output=%2d :", test->input, test->output); 92 if(gglClz(test->input) == test->output)
|
/system/core/trusty/keymaster/ |
H A D | trusty_keymaster_main.cpp | 139 keymaster_key_blob_t* key, keymaster_blob_t* input, 153 error = device->update(op_handle, nullptr, input, &input_consumed, nullptr, nullptr); 158 if (input_consumed != input->data_length) { 191 keymaster_blob_t input = {message.get(), message_len}, signature; local 193 if (!do_operation(device, KM_PURPOSE_SIGN, &key, &input, nullptr, &signature)) { 200 if (!do_operation(device, KM_PURPOSE_VERIFY, &key, &input, &signature, nullptr)) { 227 keymaster_blob_t input = {message.get(), message_len}, signature; local 229 if (!do_operation(device, KM_PURPOSE_SIGN, &key, &input, nullptr, &signature)) { 236 if (!do_operation(device, KM_PURPOSE_VERIFY, &key, &input, &signature, nullptr)) { 296 keymaster_blob_t input local 138 do_operation(TrustyKeymasterDevice* device, keymaster_purpose_t purpose, keymaster_key_blob_t* key, keymaster_blob_t* input, keymaster_blob_t* signature, keymaster_blob_t* output) argument 332 keymaster_blob_t input = {message.get(), message_len}, signature; local [all...] |
/system/extras/verity/ |
H A D | Utils.java | 259 static boolean verify(PublicKey key, byte[] input, byte[] signature, argument 269 verifier.update(input); 274 static byte[] sign(PrivateKey privateKey, byte[] input) throws Exception { argument 277 signer.update(input);
|
/system/extras/verity/fec/ |
H A D | image.h | 41 /* if true, assume input is a sparse file */ 62 uint8_t *input; member in struct:image 100 return ctx->input[offset];
|
/system/nvram/hal/tests/ |
H A D | nvram_hal_test.cc | 193 std::string SHA256HashString(const std::string& input) { argument 195 SHA256(reinterpret_cast<const uint8_t*>(input.data()), input.size(), hash);
|
/system/tools/aidl/ |
H A D | aidl_unittest.cpp | 111 "interface IFoo { void f(in IBar[] input); }"; 346 const string input = "package p; import p.Outer; interface IFoo" local 349 auto cpp_parse_result = Parse(input_path, input, &cpp_types_); 363 const string input = "package p; import p.Bar; interface IFoo { }"; local 366 auto cpp_parse_result = Parse(input_path, input, &cpp_types_); 377 auto java_parse_result = Parse(input_path, input, &java_types_);
|