/system/bt/bta/include/ |
H A D | bta_pan_co.h | 139 uint16_t len, bool ext, bool forward); 185 tBTA_PAN_STATUS result, uint16_t len, 198 tBTA_PAN_STATUS result, uint16_t len,
|
/system/bt/osi/src/ |
H A D | allocator.cc | 41 char* osi_strndup(const char* str, size_t len) { argument 43 if (len < size) size = len;
|
/system/bt/packet/avrcp/ |
H A D | set_addressed_player.cc | 31 size_t len = VendorPacket::kMinSize(); local 32 len += 1; // Status 33 return len;
|
H A D | change_path.cc | 32 size_t len = BrowsePacket::kMinSize(); local 33 len += 1; // Status 34 if (status_ != Status::NO_ERROR) return len; 36 len += 4; // Number of items in folder 37 return len;
|
/system/bt/stack/avrc/ |
H A D | avrc_api.cc | 236 const int pkt_len = MAX(rsp_pkt_len, p_pkt->len); 244 memcpy(p_data_copy, p_data, p_pkt->len); 275 p_pkt_new->len -= 287 /* 4=pdu, pkt_type & len */ 289 p_data, (p_pkt_new->len - AVRC_VENDOR_HDR_SIZE - AVRC_MIN_META_HDR_SIZE)); 311 AVRC_TRACE_DEBUG("%s handle = %u label = %u len = %d", __func__, handle, 312 label, p_pkt->len); 313 if (p_pkt->len > AVRC_MAX_CTRL_DATA_LEN) { 317 p_pkt->len = AVRC_MAX_CTRL_DATA_LEN; 328 /* 4=pdu, pkt_type & len */ 1080 uint16_t len; local [all...] |
H A D | avrc_pars_tg.cc | 55 uint16_t len; local 56 BE_STREAM_TO_UINT16(len, p); 57 if ((len + 4) != (p_msg->vendor_len)) { 65 if (len != 1) 101 uint16_t len; local 123 BE_STREAM_TO_UINT16(len, p); 124 if ((len + 4) != (p_msg->vendor_len)) { 125 AVRC_TRACE_ERROR("%s incorrect length :%d, %d", __func__, len, 137 else if (len != 1) 143 if (len ! [all...] |
/system/chre/apps/chqts/src/shared/ |
H A D | nano_string.cc | 56 char *strncpy(char *dest, const char *src, size_t len) { argument 58 for (i = 0; (i < len) && (src[i] != '\0'); i++) { 61 for (; i < len; i++) {
|
/system/core/libappfuse/ |
H A D | FuseBuffer.cc | 42 if (header.len >= sizeof(header) && header.len <= max_size) { 45 LOG(ERROR) << "Invalid header length is found in " << name << ": " << header.len; 78 if (static_cast<uint32_t>(result) != header.len) { 79 LOG(ERROR) << "Read bytes " << result << " are different from header.len " << header.len; 100 result = TEMP_FAILURE_RETRY(send(fd, buf, header.len, sockflag)); 103 {const_cast<void*>(data), header.len - sizeof(header)}}; 106 result = TEMP_FAILURE_RETRY(write(fd, buf, header.len)); 126 if (static_cast<unsigned int>(result) != header.len) { [all...] |
/system/core/libsparse/ |
H A D | img2simg.c | 53 off64_t len; local 89 len = lseek64(in, 0, SEEK_END); 92 s = sparse_file_new(block_size, len);
|
/system/tools/hidl/c2hal/test/ |
H A D | build_all.py | 37 ratio = len(success) / (len(success) + len(failure))
|
/system/netd/server/ |
H A D | XfrmController.cpp | 147 void logHex(const char* desc16, const char* buf, size_t len) { argument 148 char* printBuf = new char[len * 2 + 1 + 26]; // len->ascii, +newline, +prefix strlen 154 sprintf(printBuf + offset, "[%4.4u]: ", (len > 9999) ? 9999 : (unsigned)len); 157 for (uint32_t j = 0; j < (uint32_t)len; j++) { 231 static netdutils::Status validateResponse(NetlinkResponse response, size_t len) { argument 232 if (len < sizeof(nlmsghdr)) { 245 if (len < sizeof(NetlinkResponse::_err_)) { 330 void fillXfrmNlaHdr(nlattr* hdr, uint16_t type, uint16_t len) { argument 867 int len; local 897 int len = NLA_HDRLEN + sizeof(xfrm_algo); local 912 int len = NLA_HDRLEN + sizeof(xfrm_algo_auth); local 932 int len = NLA_HDRLEN + sizeof(xfrm_algo_aead); local 953 int len = NLA_HDRLEN + sizeof(xfrm_encap_tmpl); local 1011 int len; local 1034 int len; local 1097 int len; local 1132 int len = iov[USERPOLICYID].iov_len = fillUserPolicyId(record, direction, &policyid); local 1178 int len = NLA_HDRLEN + sizeof(xfrm_user_tmpl); local 1186 int len = NLA_HDRLEN + sizeof(xfrm_mark); local 1199 int len = NLA_HDRLEN + sizeof(__u32); local [all...] |
/system/core/fastboot/ |
H A D | protocol.cpp | 205 size_t len = std::min(remaining, MAX_MAP_SIZE); local 207 if (!filemap.create(NULL, fd, offset, len, true)) { 211 if (_command_write_data(transport, filemap.getDataPtr(), len) < 0) { 215 remaining -= len; 216 offset += len; 274 static int fb_download_data_sparse_write(void *priv, const void *data, int len) argument 282 to_write = std::min(TRANSPORT_BUF_SIZE - transport_buf_len, len); 287 len -= to_write; 298 if (len > TRANSPORT_BUF_SIZE) { 303 to_write = round_down(len, TRANSPORT_BUF_SIZ [all...] |
/system/core/libmemtrack/ |
H A D | memtrack_test.c | 28 static int getprocname(pid_t pid, char *buf, int len) { argument 34 if (len <= 0) { 49 if (fgets(buf, len, f) == NULL) { 65 if (strlcpy(buf, unknown_cmdline, (size_t)len) >= (size_t)len) {
|
/system/core/logd/ |
H A D | libaudit.c | 192 ssize_t len; local 212 len = TEMP_FAILURE_RETRY(recvfrom(fd, rep, sizeof(*rep), flags, 218 if (len < 0) { 237 if (!NLMSG_OK(&rep->nlh, (size_t)len)) { 238 rc = (len == sizeof(*rep)) ? -EFBIG : -EBADE;
|
/system/sepolicy/tests/ |
H A D | FcSort.py | 30 while i < len(path): 55 if (len(line) == 0) or (line[0] == '#'): 62 if len(split) == 3: 66 strLen = len(path.replace("\\", "")) 122 if len(sys.argv) < 2:
|
/system/bt/stack/smp/ |
H A D | smp_cmac.cc | 36 uint16_t len; member in struct:__anon1339 184 ((cmac_cb.len % BT_OCTET16_LEN) == 0 && cmac_cb.len != 0) ? true : false; 192 padding(&cmac_cb.text[0], (uint8_t)(cmac_cb.len % 16)); 281 uint16_t len, diff; local 289 len = n * BT_OCTET16_LEN; 291 SMP_TRACE_WARNING("AES128_CMAC started, allocate buffer size = %d", len); 293 cmac_cb.text = (uint8_t*)osi_calloc(len); 295 diff = len - length; 299 cmac_cb.len [all...] |
/system/core/libappfuse/tests/ |
H A D | FuseBufferTest.cc | 46 packet->header.len = headerSize; 59 packet->header.len = size; 70 request.header.len = sizeof(FuseRequest); 85 EXPECT_EQ(sizeof(FuseRequest), request.header.len); 121 EXPECT_EQ(sizeof(fuse_out_header), response.header.len); 128 EXPECT_EQ(sizeof(fuse_out_header) + 5, response.header.len); 145 EXPECT_EQ(sizeof(fuse_out_header), response.header.len); 152 EXPECT_EQ(sizeof(fuse_out_header) + 5, response.header.len); 170 buffer.response.header.len); 186 ASSERT_EQ(sizeof(fuse_out_header), buffer.response.header.len); [all...] |
/system/core/libcutils/ |
H A D | trace-container.cpp | 131 int len = snprintf( \ 135 if (len >= (int) sizeof(buf)) { \ 136 int name_len = strlen(name) - (len - sizeof(buf)) - 1; \ 140 len = snprintf( \ 147 len = 0; \ 150 if (len > 0) { \ 151 write(atrace_container_sock_fd, buf, len); \
|
/system/extras/simpleperf/ |
H A D | thread_tree.h | 39 uint64_t len; member in struct:simpleperf::MapEntry 45 MapEntry(uint64_t start_addr, uint64_t len, uint64_t pgoff, uint64_t time, argument 48 len(len), 55 uint64_t get_end_addr() const { return start_addr + len; } 95 void AddKernelMap(uint64_t start_addr, uint64_t len, uint64_t pgoff, 97 void AddThreadMap(int pid, int tid, uint64_t start_addr, uint64_t len,
|
/system/bt/hci/src/ |
H A D | hci_layer_linux.cc | 76 uint16_t len; member in struct:mgmt_pkt 114 ssize_t len = read(fd, buf, buf_size); local 116 while (len > 0) { 117 if (len == buf_size) 128 packet->len = len - 1; 129 memcpy(packet->data, buf + 1, len - 1); 165 len = read(fd, buf, buf_size); 272 size_t ret = write(bt_vendor_fd, addr, packet->len + 1); 276 if (ret != packet->len 384 ssize_t len; local [all...] |
/system/iot/attestation/atap/libatap/ |
H A D | atap_util.c | 23 size_t len = atap_strlen(str); local 25 if (len >= 2) { 26 for (n = len - 2; n >= 0; n--) { 273 uint32_t cert_chain_len = 0, len = 0; local 286 copy_uint32_from_buf(&buf_ptr, &len); 287 if (len != buf_size - ATAP_HEADER_LEN) { 294 copy_uint32_from_buf(&buf_ptr, &len); 297 i != ATAP_INNER_CA_RESPONSE_FIELDS - 1 && len != 0) { 300 if (len > ATAP_KEY_LEN_MAX) { 303 buf_ptr += len; [all...] |
/system/bt/btif/co/ |
H A D | bta_hh_co.cc | 239 int bta_hh_co_write(int fd, uint8_t* rpt, uint16_t len) { argument 240 APPL_TRACE_VERBOSE("%s: UHID write %d", __func__, len); 245 ev.u.input.size = len; 246 if (len > sizeof(ev.u.input.data)) { 250 memcpy(ev.u.input.data, rpt, len); 396 * len - length of report data 403 void bta_hh_co_data(uint8_t dev_handle, uint8_t* p_rpt, uint16_t len, argument 433 bta_hh_co_write(p_dev->fd, p_rpt, len); 435 APPL_TRACE_WARNING("%s: Error: fd = %d, ready %d, len = %d", __func__, 436 p_dev->fd, p_dev->ready_for_data, len); 527 size_t len = btif_config_get_bin_length(bdstr, "HidReport"); local 564 size_t len = btif_config_get_bin_length(bdstr, "HidReport"); local [all...] |
/system/extras/boottime_tools/bootanalyze/ |
H A D | bugreport_anayze.py | 82 if len(self.native_crash) > 0: 87 if len(self.java_crash) > 0: 94 if len(self.shutdown_events) == 0: 113 if len(self.events) > 0: 116 if len(self.timings) > 0: 119 nums_to_dump = min(20, len(timings_sorted)) 124 if len(self.shutdown_events) > 0: 127 if len(self.native_crash) > 0: 128 print "\n***Native crash founds:", len(self.native_crash) 131 if len(sel [all...] |
/system/core/liblog/ |
H A D | pmsg_reader.c | 187 if ((buf.p.magic != LOGGER_MAGIC) || (buf.p.len <= sizeof(buf)) || 188 (buf.p.len > (sizeof(buf) + LOGGER_ENTRY_MAX_PAYLOAD)) || 217 read(fd, msg + sizeof(buf.prio), buf.p.len - sizeof(buf))); 221 if (ret != (ssize_t)(buf.p.len - sizeof(buf))) { 225 log_msg->entry_v4.len = buf.p.len - sizeof(buf) + sizeof(buf.prio); 254 lseek(fd, (off_t)(buf.p.len - sizeof(buf)), SEEK_CUR)); 258 if ((next - current) != (ssize_t)(buf.p.len - sizeof(buf))) { 297 size_t len, prefix_len; local 360 len [all...] |
/system/extras/boottime_tools/io_analysis/ |
H A D | check_file_read.py | 37 # init-1 [003] ...1 2.703991: ext4_ext_map_blocks_enter: dev 253,0 ino 2719 lblk 154 len 30 flags 38 RE_EXT4_MA_BLOCKS_ENTER = r"""\s+(\S+)-([0-9]+).+\s+([0-9]+\.[0-9]+):\s+ext4_ext_map_blocks_enter:\s+dev\s+(\S+)\s+ino\s+([0-9]+)\s+lblk\s+([0-9]+)\s+len\s+([0-9]+)""" 39 # init-1 [002] ...1 2.687205: ext4_ext_map_blocks_exit: dev 253,0 ino 8 flags lblk 0 pblk 196608 len 1 mflags M ret 1 83 for i in range(len(offsets)): 87 for j in range(len(lens)): 89 total_lens = len(total_read_offsets) 101 if len(self.ext4_access_size_histogram) > 1: 104 if len(self.ext4_single_block_accesses) > 0 and self.total_access > 1: 107 if len(self.block_access_size_histogram) > 1: 110 if len(sel [all...] |