/system/tpm/attestation/common/ |
H A D | print_interface_proto.cc | 71 std::string output = local 75 output += indent + " key_label: "; 76 base::StringAppendF(&output, "%s", value.key_label().c_str()); 77 output += "\n"; 80 output += indent + " key_type: "; 81 base::StringAppendF(&output, "%s", GetProtoDebugStringWithIndent( 84 output += "\n"; 87 output += indent + " key_usage: "; 88 base::StringAppendF(&output, "%s", GetProtoDebugStringWithIndent( 91 output 123 std::string output = local 154 std::string output = local 178 std::string output = local 246 std::string output = local 267 std::string output = local 305 std::string output = local 327 std::string output = local 387 std::string output = local 423 std::string output = local 453 std::string output = local 492 std::string output = local 537 std::string output = local 569 std::string output = local 598 std::string output = local 630 std::string output = local 659 std::string output = local 684 std::string output = local [all...] |
H A D | print_common_proto.cc | 89 std::string output = local 93 output += indent + " quote: "; 95 &output, "%s", 97 output += "\n"; 100 output += indent + " quoted_data: "; 102 &output, "%s", 105 output += "\n"; 108 output += indent + " quoted_pcr_value: "; 109 base::StringAppendF(&output, "%s", 113 output 134 std::string output = local 186 std::string output = local 215 std::string output = local [all...] |
H A D | crypto_utility_impl_test.cc | 49 std::vector<uint8_t> output; local 50 CHECK(base::HexStringToBytes(hex, &output)); 51 return std::string(reinterpret_cast<char*>(output.data()), output.size()); 110 std::string output; local 111 EXPECT_TRUE(crypto_utility_->EncryptData(std::string(), key, key, &output)); 116 std::string output; local 117 EXPECT_FALSE(crypto_utility_->EncryptData(std::string(), key, key, &output)); 121 std::string output; local 122 EXPECT_FALSE(crypto_utility_->UnsealKey("invalid", &output, 130 std::string output; local 136 std::string output; local 142 std::string output; local 148 std::string output; local 157 std::string output; local 163 std::string output; local 170 std::string output; local 182 EncryptedIdentityCredential output; local 190 EncryptedIdentityCredential output; local 200 std::string output; local 207 std::string output; local 217 std::string output; local 227 std::string output; local [all...] |
/system/tpm/tpm_manager/common/ |
H A D | print_tpm_manager_proto.cc | 130 std::string output = local 134 output += indent + " index: "; 135 base::StringAppendF(&output, "%u (0x%08X)", value.index(), value.index()); 136 output += "\n"; 139 output += indent + " policy: "; 141 &output, "%s", 143 output += "\n"; 146 output += indent + " world_read_allowed: "; 147 base::StringAppendF(&output, "%s", 149 output 179 std::string output = local 236 std::string output = local 285 std::string output = local 306 std::string output = local 325 std::string output = local 346 std::string output = local 386 std::string output = local 407 std::string output = local 440 std::string output = local 468 std::string output = local 511 std::string output = local 532 std::string output = local 546 std::string output = local 576 std::string output = local 595 std::string output = local 650 std::string output = local 664 std::string output = local 730 std::string output = local 744 std::string output = local 766 std::string output = local 789 std::string output = local [all...] |
/system/tools/hidl/test/error_test/ |
H A D | hidl_error_test.sh | 13 output=$($HIDL_GEN_PATH -L check -r test:$HIDL_ERROR_TEST_DIR test.$package@1.0 2>&1) 19 echo "$output" | while read line; do echo "test output: $line"; done 28 if [[ $output != *$error* ]]; then 29 echo "error: error output for $package does not contain '$error':" 30 echo "$output" | while read line; do echo "test output: $line"; done
|
/system/connectivity/wificond/tests/ |
H A D | shell_unittest.cpp | 28 string output; local 29 int result = RunShellCommand("echo hello world", &output); 31 EXPECT_EQ("hello world\n", output);
|
/system/keymaster/km_openssl/ |
H A D | kdf.cpp | 61 bool Kdf::Uint32ToBigEndianByteArray(uint32_t number, uint8_t* output) { argument 62 if (!output) 65 output[0] = (number >> 24) & 0xff; 66 output[1] = (number >> 16) & 0xff; 67 output[2] = (number >> 8) & 0xff; 68 output[3] = (number)&0xff;
|
H A D | ckdf.cpp | 42 KeymasterKeyBlob* output) { 46 const uint32_t blocks = div_round_up(output->key_material_size, AES_BLOCK_SIZE); 47 const uint32_t L = output->key_material_size * 8; // bits 70 auto output_pos = const_cast<uint8_t*>(output->begin()); 71 memset(output_pos, 0, output->key_material_size); 106 if (output_pos <= output->end() - AES_BLOCK_SIZE) { 112 size_t to_copy = output->end() - output_pos; 119 assert(output_pos == output->end()); 40 ckdf(const KeymasterKeyBlob& key, const KeymasterBlob& label, const keymaster_blob_t* context_chunks, size_t num_chunks, KeymasterKeyBlob* output) argument
|
H A D | block_cipher_operation.cpp | 171 Buffer* output, size_t* input_consumed) { 174 if (!InternalUpdate(input.peek_read(), input.available_read(), output, &error)) return error; 188 AuthorizationSet* output_params, Buffer* output) { 190 if (!UpdateForFinish(additional_params, input, output_params, output, &error)) return error; 191 if (!output->reserve(block_size_bytes())) return KM_ERROR_MEMORY_ALLOCATION_FAILED; 198 if (!EVP_CipherFinal_ex(&ctx_, output->peek_write(), &output_written)) { 206 if (!output->advance_write(output_written)) return KM_ERROR_UNKNOWN_ERROR; 360 Buffer* output, keymaster_error_t* error) { 361 assert(output); 366 if (!output 168 Update(const AuthorizationSet& additional_params, const Buffer& input, AuthorizationSet* , Buffer* output, size_t* input_consumed) argument 185 Finish(const AuthorizationSet& additional_params, const Buffer& input, const Buffer& , AuthorizationSet* output_params, Buffer* output) argument 359 InternalUpdate(const uint8_t* input, size_t input_length, Buffer* output, keymaster_error_t* error) argument 379 UpdateForFinish(const AuthorizationSet& additional_params, const Buffer& input, AuthorizationSet* output_params, Buffer* output, keymaster_error_t* error) argument 416 Finish(const AuthorizationSet& additional_params, const Buffer& input, const Buffer& signature, AuthorizationSet* output_params, Buffer* output) argument 463 Update(const AuthorizationSet& additional_params, const Buffer& input, AuthorizationSet* , Buffer* output, size_t* input_consumed) argument 482 ProcessAllButTagLengthBytes(const Buffer& input, Buffer* output) argument 509 ProcessTagBufContentsAsData(size_t to_process, Buffer* output, keymaster_error_t* error) argument 527 Finish(const AuthorizationSet& additional_params, const Buffer& input, const Buffer& signature, AuthorizationSet* output_params, Buffer* output) argument [all...] |
/system/keymaster/include/keymaster/km_openssl/ |
H A D | ckdf.h | 30 KeymasterKeyBlob* output); 37 const keymaster_blob_t& context_chunks, KeymasterKeyBlob* output) { 38 return ckdf(key, label, &context_chunks, 1 /* num_chunks */, output); 36 ckdf(const KeymasterKeyBlob& key, const KeymasterBlob& label, const keymaster_blob_t& context_chunks, KeymasterKeyBlob* output) argument
|
H A D | kdf.h | 37 virtual bool GenerateKey(const uint8_t* info, size_t info_len, uint8_t* output, 41 bool Uint32ToBigEndianByteArray(uint32_t number, uint8_t* output);
|
/system/keymaster/tests/ |
H A D | ckdf_test.cpp | 33 const char* output; member in struct:keymaster::test::CkdfTest 92 auto expected = hex2blob(test.output); 94 KeymasterKeyBlob output; local 95 output.Reset(expected.data_length); 97 ASSERT_EQ(KM_ERROR_OK, ckdf(key, label, context, &output)); 98 EXPECT_TRUE(std::equal(output.begin(), output.end(), expected.begin()));
|
H A D | kdf1_test.cpp | 48 uint8_t output[output_len]; local 53 ASSERT_TRUE(kdf1.GenerateKey(nullptr, 0, output, output_len)); 54 EXPECT_EQ(0, memcmp(output, expected_output.data(), output_len));
|
H A D | kdf2_test.cpp | 73 uint8_t output[output_len]; local 79 output, output_len)); 80 EXPECT_EQ(0, memcmp(output, expected_output.data(), output_len));
|
/system/tpm/trunks/ |
H A D | background_command_transceiver_test.cc | 54 std::string* output) { 55 *output = transceiver->SendCommandAndWait("test"); 83 std::string output = "not_assigned"; local 84 background_transceiver.SendCommand("test", base::Bind(Assign, &output)); 88 } while (output == "not_assigned"); 90 EXPECT_EQ(std::string(kTestThreadName), output); local 96 std::string output = "not_assigned"; local 100 &background_transceiver, &output)); 104 EXPECT_EQ(std::string("test_thread"), output); 53 SendCommandAndWaitAndAssign(trunks::CommandTransceiver* transceiver, std::string* output) argument
|
/system/extras/libfec/test/ |
H A D | test_read.cpp | 29 cerr << "usage: " << argv[0] << " input output" << endl; 46 ofstream output(argv[2], ios::binary | ios::trunc); 48 if (!output) { 61 output.write(reinterpret_cast<const char *>(buffer.get()), count); 63 if (!output) {
|
/system/core/logcat/include/log/ |
H A D | logcat.h | 60 /* Collects and outputs the logcat data to output and error file descriptors 64 * The output file descriptor variable, if greater than or equal to 0, is 65 * where the output (ie: stdout) will be sent. The file descriptor is closed 67 * (output redirect to a file) is present in the command. The error file 70 * The error file descriptor can be set to equal to the output file descriptor, 71 * which will mix output and error stream content, and will defer closure of 78 int android_logcat_run_command(android_logcat_context ctx, int output, int error, 109 * a wrapper for a reasonable wait until output has subsided for command 114 int android_logcat_pclose(android_logcat_context* ctx, FILE* output);
|
/system/netd/server/ |
H A D | IptablesRestoreController.h | 32 // Execute |commands| on the given |target|, and populate |output| with stdout. 34 std::string* output) = 0; 46 std::string* output) override; 77 std::string *output); 81 std::string *output);
|
H A D | IptablesRestoreController.cpp | 208 std::string *output) { 247 if (!drainAndWaitForAck(*process, command, output)) { 274 std::string *output) { 308 // i == STDOUT_IDX: accumulate stdout into *output, and look 310 output->append(buffer, size); 311 size_t pos = output->find(PING); 313 if (output->size() > pos + PING_SIZE) { 314 size_t extra = output->size() - (pos + PING_SIZE); 316 extra, output->substr(pos + PING_SIZE, 128).c_str()); 318 output 206 sendCommand(const IptablesProcessType type, const std::string& command, std::string *output) argument 272 drainAndWaitForAck(const std::unique_ptr<IptablesProcess> &process, const std::string& command, std::string *output) argument 348 execute(const IptablesTarget target, const std::string& command, std::string *output) argument [all...] |
/system/keymaster/legacy_support/ |
H A D | keymaster_passthrough_operation.cpp | 29 Buffer* output) { 78 if (output && accumulated_output_size) { 79 if (!output->reserve(accumulated_output_size)) { 83 output->write(outBlob.data, outBlob.data_length); 97 Buffer* output) { 105 if (output) output->Reinitialize(out.data, out.data_length); 26 Finish(const AuthorizationSet& input_params, const Buffer& input, const Buffer& signature, AuthorizationSet* output_params, Buffer* output) argument 95 Finish(const AuthorizationSet& input_params, const Buffer& input, const Buffer& signature, AuthorizationSet* output_params, Buffer* output) argument
|
/system/core/libutils/tests/ |
H A D | Unicode_test.cpp | 47 << "Zero length input should return zero length output."; 103 char16_t output[1 + 1 + 1 + 2 + 1]; // Room for NULL local 105 utf8_to_utf16(str, sizeof(str), output, sizeof(output) / sizeof(output[0])); 107 EXPECT_EQ(0x0030, output[0]) 109 EXPECT_EQ(0x0100, output[1]) 111 EXPECT_EQ(0x2323, output[2]) 113 EXPECT_EQ(0xD800, output[3]) 115 EXPECT_EQ(0xDC00, output[ [all...] |
/system/extras/tests/workloads/ |
H A D | defs.sh | 40 echo "-o output file" 57 (-o) output=$2; shift;; 127 output=${output:="./out"} 129 # clear the output file 130 if [ -f $output ]; then 131 > $output 145 # debug output enabled by -v 148 echo DEBUG: $* >&2 >> $output 275 # look for any reclaim events in atrace output [all...] |
/system/core/libsparse/ |
H A D | append2simg.c | 46 fprintf(stderr, "Usage: append2simg <output> <input>\n"); 51 int output; local 79 output = open(output_path, O_RDWR | O_BINARY); 80 if (output < 0) { 81 fprintf(stderr, "Couldn't open output file (%s)\n", strerror(errno)); 85 sparse_output = sparse_file_import_auto(output, false, true); 87 fprintf(stderr, "Couldn't import output file\n"); 102 fprintf(stderr, "Input file is not a multiple of the output file's block size"); 120 lseek64(output, 0, SEEK_SET); 128 close(output); [all...] |
/system/extras/tools/ |
H A D | graph_lockdep_chains | 10 echo "Usage: ${progname} [flags...] [regex...] < input-file > output-file" 27 echo " --output=<filename> | -o <filename>" 49 output="cat -" 129 --output | -o) 130 if [ "${output}" != "cat -" ]; then 132 echo "ERROR: --output can only be specified once" >&2 135 output="cat - > ${2}" # run through eval 139 --output=*) 140 if [ "${output}" != "cat -" ]; then 142 echo "ERROR: --output ca [all...] |
/system/tools/aidl/tests/ |
H A D | test_util.cpp | 116 vector<string> output; local 120 output.push_back(" " + a_lines[i-1]); 124 output.push_back("-" + a_lines[i-1]); 127 output.push_back("+" + b_lines[j-1]); 136 for (auto it = output.crbegin(), frontier = output.crbegin(); 137 it != output.crend(); ++it) { 138 while (frontier != output.crend() && distance(it, frontier) <= 3) {
|