/system/bt/hci/include/ |
H A D | bt_hci_bdroid.h | 76 uint16_t len; member in struct:__anon648
|
/system/bt/stack/gap/ |
H A D | gap_ble.cc | 133 p_value->len = GATT_MAX_ATTR_LEN; 135 p_value->len = (uint16_t)strlen((char*)p_dev_name); 137 if (offset > p_value->len) 140 p_value->len -= offset; 142 ARRAY_TO_STREAM(p, p_dev_name, p_value->len); 143 DVLOG(1) << "GATT_UUID_GAP_DEVICE_NAME len=" << +p_value->len; 149 p_value->len = 2; 157 p_value->len = 8; 163 p_value->len 263 cl_op_cmpl(tGAP_CLCB& clcb, bool status, uint16_t len, uint8_t* p_name) argument 312 uint16_t len; local [all...] |
/system/chre/apps/wifi_offload/include/chre/apps/wifi_offload/ |
H A D | ssid.h | 43 void SetData(const uint8_t *buff, size_t len);
|
/system/core/adb/ |
H A D | adb_auth.h | 53 void adbd_auth_confirm_key(const char* data, size_t len, atransport* t);
|
/system/core/debuggerd/ |
H A D | util.cpp | 33 ssize_t send_fd(int sockfd, const void* data, size_t len, unique_fd fd) { argument 36 iovec iov = { .iov_base = const_cast<void*>(data), .iov_len = len }; 49 ssize_t recv_fd(int sockfd, void* _Nonnull data, size_t len, unique_fd* _Nullable out_fd) { argument 52 iovec iov = { .iov_base = const_cast<void*>(data), .iov_len = len };
|
/system/core/libion/ |
H A D | ion_4.12.h | 35 * @len: size of the allocation 45 __u64 len; member in struct:ion_new_allocation_data
|
/system/core/logd/ |
H A D | LogBufferInterface.h | 34 pid_t tid, const char* msg, unsigned short len) = 0;
|
/system/extras/ext4_utils/include/ext4_utils/ |
H A D | ext4_sb.h | 31 int64_t len; /* If set to 0, ask the block device for the size, member in struct:fs_info
|
/system/extras/tests/workloads/ |
H A D | atrace-uncompress.py | 10 if len(sys.argv) != 2:
|
/system/core/include/log/ |
H A D | log_read.h | 56 uint16_t len; /* length of the payload */ member in struct:logger_entry 74 uint16_t len; /* length of the payload */ member in struct:logger_entry_v2 93 uint16_t len; /* length of the payload */ member in struct:logger_entry_v3 112 uint16_t len; /* length of the payload */ member in struct:logger_entry_v4 191 unsigned int len() { function in struct:log_msg 194 entry.len; 230 char* buf, size_t len); 232 char* buf, size_t len); 234 size_t len);
|
/system/core/libdiskconfig/ |
H A D | config_mbr.c | 28 /* start and len are in LBA units */ 31 uint32_t start, uint32_t len) 33 if (len > 0) { 47 pentry->len_lba = len; 145 uint32_t len; /* in lba units */ local 162 len = kb_to_lba(pinfo->len_kb, dinfo->sect_size); 169 len = dinfo->num_lba - *lba; 173 (uint32_t)(((uint64_t)len * (uint64_t)dinfo->sect_size) / 178 pinfo->type, 1, len); 181 *lba += len; 30 cfg_pentry(struct pc_partition *pentry, uint8_t status, uint8_t type, uint32_t start, uint32_t len) argument [all...] |
/system/core/liblog/include/log/ |
H A D | log_read.h | 56 uint16_t len; /* length of the payload */ member in struct:logger_entry 74 uint16_t len; /* length of the payload */ member in struct:logger_entry_v2 93 uint16_t len; /* length of the payload */ member in struct:logger_entry_v3 112 uint16_t len; /* length of the payload */ member in struct:logger_entry_v4 191 unsigned int len() { function in struct:log_msg 194 entry.len; 230 char* buf, size_t len); 232 char* buf, size_t len); 234 size_t len);
|
/system/core/liblog/include_vndk/log/ |
H A D | log_read.h | 56 uint16_t len; /* length of the payload */ member in struct:logger_entry 74 uint16_t len; /* length of the payload */ member in struct:logger_entry_v2 93 uint16_t len; /* length of the payload */ member in struct:logger_entry_v3 112 uint16_t len; /* length of the payload */ member in struct:logger_entry_v4 191 unsigned int len() { function in struct:log_msg 194 entry.len; 230 char* buf, size_t len); 232 char* buf, size_t len); 234 size_t len);
|
/system/core/libsysutils/src/ |
H A D | SocketClient.cpp | 101 int SocketClient::sendBinaryMsg(int code, const void *data, int len) { argument 103 // 4 bytes for the code & null + 4 bytes for the len 107 // Write the len 108 uint32_t tmp = htonl(len); 115 vec[1].iov_len = len; 118 int result = sendDataLockedv(vec, (len > 0) ? 2 : 1); 132 int len = strlen(arg); local 133 char *result = (char *)malloc(len * 2 + 3); 135 const char *end = arg + len; 170 int SocketClient::sendData(const void *data, int len) { argument [all...] |
/system/libhwbinder/ |
H A D | BufferedTextOutput.cpp | 53 status_t append(const char* txt, size_t len) { argument 54 if ((len+bufferPos) > bufferSize) { 55 size_t newSize = ((len+bufferPos)*3)/2; 56 if (newSize < (len+bufferPos)) return NO_MEMORY; // overflow 62 if ((len+bufferPos) < bufferPos) return NO_MEMORY; // integer overflow 63 memcpy(buffer+bufferPos, txt, len); 64 bufferPos += len; 162 status_t BufferedTextOutput::print(const char* txt, size_t len) argument 166 const char* const end = txt+len;
|
/system/bt/btif/src/ |
H A D | btif_sock_l2cap.cc | 58 uint32_t len; member in struct:packet 116 uint32_t* len) { 122 if (len) *len = sock->first_packet->len; 129 if (len) sock->bytes_buffered -= *len; 136 static struct packet* packet_alloc(const uint8_t* data, uint32_t len) { argument 138 uint8_t* buf = (uint8_t*)osi_malloc(len); 141 p->len 115 packet_get_head_l(l2cap_socket* sock, uint8_t** data, uint32_t* len) argument 147 packet_put_head_l(l2cap_socket* sock, const void* data, uint32_t len) argument 174 packet_put_tail_l(l2cap_socket* sock, const void* data, uint32_t len) argument 614 on_l2cap_write_done(uint16_t len, uint32_t id) argument 898 uint32_t len; local 922 malloc_l2cap_buf(uint16_t len) argument [all...] |
H A D | btif_gatt_client.cc | 122 memcpy(data.value, p_data->notify.value, p_data->notify.len); 126 data.len = p_data->notify.len; 376 uint16_t len, uint8_t* value, void* data) { 381 params->value.len = len; 382 CHECK(len <= BTGATT_MAX_ATTR_LEN); 383 if (len > 0) memcpy(params->value.value, value, len); 398 uint16_t handle, uint16_t len, uint8_ [all...] |
/system/extras/simpleperf/scripts/ |
H A D | debug_unwind_reporter.py | 189 if len(result_list) < 10: 302 if i == len(lines) or not lines[i].startswith('record sample:'): 306 while i < len(lines) and (not lines[i] or lines[i].startswith(' ')): 311 if i == len(lines) or not lines[i].startswith('record callchain:'): 323 while i < len(lines) and not lines[i].startswith('record'): 329 if items[0] == 'pid' and len(items) == 2: 331 elif items[0] == 'tid' and len(items) == 2: 333 elif items[0] == 'chain_type' and len(items) == 2: 365 n = len(ips) 366 if (None in [record.pid, record.tid] or n == 0 or len(sp [all...] |
/system/core/toolbox/upstream-netbsd/usr.bin/grep/ |
H A D | util.c | 225 ln.len = 0; 230 ln.off += ln.len + 1; 231 if ((ln.dat = grep_fgetln(f, &ln.len)) == NULL || ln.len == 0) 233 if (ln.len > 0 && ln.dat[ln.len - 1] == line_sep) 234 --ln.len; 296 while (st <= l->len) { 298 pmatch.rm_eo = l->len; 309 l->len, [all...] |
/system/keymaster/legacy_support/ |
H A D | keymaster0_engine.cpp | 245 int Keymaster0Engine::rsa_private_transform(RSA* rsa, uint8_t* out, const uint8_t* in, size_t len) { argument 246 ALOGV("rsa_private_transform(%p, %p, %p, %u)", rsa, out, in, (unsigned)len); 249 return instance_->RsaPrivateTransform(rsa, out, in, len); 293 static bool data_too_large_for_public_modulus(const uint8_t* data, size_t len, const RSA* rsa) { argument 295 BN_bin2bn(data, len, nullptr /* allocate result */)); 300 size_t len) const { 310 if (!Keymaster0Sign(&sign_params, *key_blob, in, len, &signature, &signature_length)) { 311 if (data_too_large_for_public_modulus(in, len, rsa)) { 322 if (signature_length > len) { 327 memcpy(out, signature.get() + signature_length - len, le [all...] |
/system/libufdt/ |
H A D | ufdt_overlay.c | 72 if (sorted_table.len > 0) 73 return sorted_table.data[sorted_table.len - 1].phandle; 84 int len = 0; local 85 char *prop_data = ufdt_node_get_fdt_prop_data_by_name(node, "phandle", &len); 86 if (prop_data != NULL && len == sizeof(fdt32_t)) { 89 prop_data = ufdt_node_get_fdt_prop_data_by_name(node, "linux,phandle", &len); 90 if (prop_data != NULL && len == sizeof(fdt32_t)) { 103 for (i = 0; i < sorted_table.len; i++) { 233 int len = 0; local 267 main_symbols_node, ufdt_node_name(fixups), &len); 446 int len = 0; local [all...] |
/system/bt/stack/gatt/ |
H A D | gatt_auth.cc | 57 (uint8_t*)osi_malloc(p_attr->len + 3); /* 3 = 2 byte handle + opcode */ 62 ARRAY_TO_STREAM(p, p_attr->value, p_attr->len); 66 if ((payload_size - GATT_AUTH_SIGN_LEN - 3) < p_attr->len) 67 p_attr->len = payload_size - GATT_AUTH_SIGN_LEN - 3; 69 p_signature = p_attr->value + p_attr->len; 72 (uint16_t)(p_attr->len + 3), /* 3 = 2 byte handle + opcode */ 74 p_attr->len += BTM_BLE_AUTH_SIGN_LEN; 102 if (p_buf->len < GATT_AUTH_SIGN_LEN + 4) { 104 __func__, p_buf->len, GATT_AUTH_SIGN_LEN + 4); 107 cmd_len = p_buf->len [all...] |
/system/extras/verity/ |
H A D | build_verity_tree.cpp | 54 const unsigned char *block, size_t len, 66 ret &= EVP_DigestUpdate(mdctx, block, len); 93 int hash_chunk(void *priv, const void *data, int len) argument 96 assert(len % ctx->block_size == 0); 99 hash_blocks(ctx->md, (const unsigned char *)data, len, 104 for (size_t i = 0; i < (size_t)len; i += ctx->block_size) { 266 int64_t len = sparse_file_len(file, false, false); local 267 if (len % block_size != 0) { 269 len, block_size); 277 level_blocks = verity_tree_blocks(len, block_siz 53 hash_block(const EVP_MD *md, const unsigned char *block, size_t len, const unsigned char *salt, size_t salt_len, unsigned char *out, size_t *out_size) argument [all...] |
/system/nfc/src/nfa/dm/ |
H A D | nfa_dm_ndef.cc | 364 uint32_t len) { 376 "nfa_dm_ndef_handle_message status=%i, len=%i", status, len); 391 ndef_data.len = len; 399 if (len == 0) { 406 ndef_data.len = 0; 415 ndef_status = NDEF_MsgValidate(p_msg_buf, len, true); 477 ndef_data.len = payload_len + (uint32_t)(p_payload - p_rec); 502 ndef_data.len 363 nfa_dm_ndef_handle_message(tNFA_STATUS status, uint8_t* p_msg_buf, uint32_t len) argument [all...] |
/system/core/liblog/ |
H A D | logd_reader.c | 67 char* buf, size_t len); 70 char* buf, size_t len); 73 char* buf, size_t len); 261 size_t len; local 274 len = strlen(buf) + 1; 275 ret = TEMP_FAILURE_RETRY(write(sock, buf, len)); 280 len = buf_size; 282 while ((ret = TEMP_FAILURE_RETRY(read(sock, cp, len))) > 0) { 285 if (((size_t)ret == len) || (buf_size < PAGE_SIZE)) { 289 len 409 logdGetStats(struct android_log_logger_list* logger_list, struct android_log_transport_context* transp __unused, char* buf, size_t len) argument 436 logdGetPrune(struct android_log_logger_list* logger_list __unused, struct android_log_transport_context* transp __unused, char* buf, size_t len) argument 442 logdSetPrune(struct android_log_logger_list* logger_list __unused, struct android_log_transport_context* transp __unused, char* buf, size_t len) argument [all...] |