/system/vold/ |
H A D | EncryptInplace.cpp | 372 static int encrypt_one_block_f2fs(u64 pos, void *data) argument 376 priv_dat->blocks_already_done = pos - 1; 379 off64_t offset = pos * CRYPT_INPLACE_BUFSIZE; 392 log_progress_f2fs(pos, false);
|
H A D | Process.cpp | 52 std::string::size_type pos = line.find('/'); local 53 if (pos != std::string::npos) { 54 line = line.substr(pos);
|
/system/tpm/tpm_manager/client/ |
H A D | main.cc | 384 std::string::size_type pos = 0; local 387 next_pos = attributes.find('|', pos); 390 attribute_str = attributes.substr(pos); 392 attribute_str = attributes.substr(pos, next_pos - pos); 402 pos = next_pos + 1;
|
/system/tools/aidl/ |
H A D | ast_java.cpp | 446 size_t pos = name.rfind('.'); local 447 if (pos != string::npos) { 448 name = name.c_str() + pos + 1;
|
/system/tools/hidl/ |
H A D | Location.cpp | 42 bool Position::operator<(const Position& pos) const { 43 CHECK(inSameFile(*this, pos)) << "Cannot compare positions in different files"; 44 if (mLine == pos.mLine) { 45 return mColumn < pos.mColumn; 47 return mLine < pos.mLine; 50 std::ostream& operator<<(std::ostream& ostr, const Position& pos) { argument 51 if (!pos.filename().empty()) { 52 ostr << pos.filename() << ":"; 54 return ostr << pos.line() << "." << pos [all...] |
/system/tools/hidl/utils/ |
H A D | FQName.cpp | 486 size_t pos = s1.rfind(s2); local 487 if (pos == std::string::npos || pos + s2.size() != s1.size()) { 495 if (pos == 0) { 500 if (s1[pos - 1] == '.') { 505 if (s1[pos - 1] == ':') { 510 if (s1[pos] == '@') {
|
H A D | Formatter.cpp | 122 size_t pos = out.find('\n', start); local 124 if (pos == std::string::npos) { 135 if (mAtStartOfLine && (pos > start || !mLinePrefix.empty())) { 140 if (pos == start) { 143 } else if (pos > start) { 144 output(out.substr(start, pos - start + 1)); 148 start = pos + 1;
|
H A D | FqInstance.cpp | 66 auto pos = s.find(INSTANCE_SEP); local 67 if (!mFqName.setTo(s.substr(0, pos))) return false; 68 mInstance = pos == std::string::npos ? std::string{} : s.substr(pos + 1);
|
/system/security/keystore/ |
H A D | authorization_set.cpp | 124 int pos = -1; local 126 pos = find(i->tag, pos); 127 if (pos != -1 && keyParamEqual(*i, data_[pos])) { 128 data_.erase(data_.begin() + pos); 131 } while (pos != -1); 146 auto pos = data_.begin() + index; local 147 if (pos != data_.end()) { 148 data_.erase(pos); 174 int pos = find(tag); local 288 auto pos = indirect.tellp(); local [all...] |
H A D | grant_store.cpp | 34 auto pos = grantAlias.rfind(kKeystoreGrantInfix); local 35 if (pos == std::string::npos) return {kInvalidGrantNo, ""}; 36 std::stringstream s(grantAlias.substr(pos + kKeystoreGrantInfixLength)); 37 std::string wrapped_alias = grantAlias.substr(0, pos);
|
/system/security/keystore/include/keystore/ |
H A D | keystore_hidl_support.h | 97 auto pos = result.begin(); local 98 *pos++ = 0; // Version byte 99 pos = copy_bytes_to_iterator(token.challenge, pos); 100 pos = copy_bytes_to_iterator(token.userId, pos); 101 pos = copy_bytes_to_iterator(token.authenticatorId, pos); 102 pos = copy_bytes_to_iterator(token.authenticatorType, pos); [all...] |
/system/nvram/messages/include/nvram/messages/ |
H A D | vector.h | 71 ElementType& operator[](size_t pos) { argument 72 NVRAM_CHECK(pos < size_); 73 return data_[pos]; 75 const ElementType& operator[](size_t pos) const { 76 NVRAM_CHECK(pos < size_); 77 return data_[pos];
|
/system/netd/server/ |
H A D | IptablesRestoreController.cpp | 311 size_t pos = output->find(PING); local 312 if (pos != std::string::npos) { 313 if (output->size() > pos + PING_SIZE) { 314 size_t extra = output->size() - (pos + PING_SIZE); 316 extra, output->substr(pos + PING_SIZE, 128).c_str()); 318 output->resize(pos);
|
/system/libufdt/ |
H A D | ufdt_overlay.c | 57 * Increases u32 value at pos by offset. 59 static void fdt_increase_u32(void *pos, uint32_t offset) { argument 62 dto_memcpy(&val, pos, sizeof(val)); 64 dto_memcpy(pos, &val, sizeof(val));
|
/system/libvintf/ |
H A D | RuntimeInfo-target.cpp | 134 auto pos = mRuntimeInfo->mOsRelease.find('.'); local 135 if (pos == std::string::npos) { 138 pos = mRuntimeInfo->mOsRelease.find('.', pos + 1); 139 if (pos == std::string::npos) { 142 pos = mRuntimeInfo->mOsRelease.find_first_not_of("0123456789", pos + 1); 143 // no need to check pos == std::string::npos, because substr will handle this 144 if (!parse(mRuntimeInfo->mOsRelease.substr(0, pos), &mRuntimeInfo->mKernelVersion)) {
|
H A D | check_vintf.cpp | 204 auto pos = arg.find('='); local 205 auto key = arg.substr(0, pos); 206 auto value = pos == std::string::npos ? std::string{} : arg.substr(pos + 1);
|
H A D | parse_string.cpp | 171 auto pos = s.find('-'); local 172 if (pos == std::string::npos) { 175 return parseKernelConfigInt(s.substr(0, pos), &range->first) 176 && parseKernelConfigInt(s.substr(pos + 1), &range->second);
|
/system/libhwbinder/ |
H A D | Debug.cpp | 95 char* pos = out; local 134 if( fullContext ) *pos++ = '\''; 135 pos = appendcharornum(c[0], pos); 136 pos = appendcharornum(c[1], pos); 137 pos = appendcharornum(c[2], pos); 138 pos = appendcharornum(c[3], pos); 173 unsigned char *pos = (unsigned char *)buf; local [all...] |
/system/libufdt/tests/src/ |
H A D | extract_dtb.c | 31 int pos = buf_size; local 33 pos--; 34 if (pos < 0) { 37 uint32_t tag = fdt32_to_cpu(*(fdt32_t *)(buf + pos)); 44 return pos;
|
/system/keymaster/android_keymaster/ |
H A D | authorization_set.cpp | 549 for (int pos = -1; (pos = find(tag, pos)) != -1;) 555 int pos = find(tag); local 556 if (pos == -1) { 559 *val = elems_[pos].enumerated; 566 int pos = -1; local 568 pos = find(tag, pos); 569 if (pos 579 int pos = find(tag); local 590 int pos = -1; local 603 int pos = find(tag); local 614 int pos = -1; local 627 int pos = find(tag); local 636 int pos = find(tag); local 645 int pos = find(tag); local [all...] |
/system/keymaster/legacy_support/ |
H A D | ecdsa_keymaster1_operation.cpp | 50 int pos = begin_params.find(TAG_DIGEST); local 51 if (pos == -1) 53 begin_params[pos].enumerated = KM_DIGEST_NONE;
|
H A D | rsa_keymaster1_operation.cpp | 49 int pos = begin_params.find(TAG_DIGEST); local 50 if (pos == -1) 52 begin_params[pos].enumerated = KM_DIGEST_NONE; 54 pos = begin_params.find(TAG_PADDING); 55 if (pos == -1) 57 switch (begin_params[pos].enumerated) { 62 begin_params[pos].enumerated = KM_PAD_NONE;
|
/system/keymaster/ng/include/ |
H A D | keystore_hidl_support.h | 115 auto pos = result.begin(); local 116 *pos++ = 0; // Version byte 117 pos = copy_bytes_to_iterator(token.challenge, pos); 118 pos = copy_bytes_to_iterator(token.userId, pos); 119 pos = copy_bytes_to_iterator(token.authenticatorId, pos); 120 pos = copy_bytes_to_iterator(token.authenticatorType, pos); [all...] |
/system/keymaster/tests/ |
H A D | android_keymaster_test_utils.h | 60 int pos = set.find(tag); local 61 return pos != -1 && static_cast<KeymasterEnum>(set[pos].enumerated) == val; 67 int pos = -1; local 68 while ((pos = set.find(tag, pos)) != -1) 69 if (static_cast<KeymasterEnum>(set[pos].enumerated) == val) 76 int pos = set.find(tag); local 77 return pos != -1 && set[pos] 82 int pos = -1; local 91 int pos = set.find(tag); local 97 int pos = set.find(tag); local 105 int pos = set.find(tag); local [all...] |
H A D | authorization_set_test.cpp | 80 int pos = set.find(TAG_ALGORITHM); local 81 ASSERT_NE(-1, pos); 82 EXPECT_EQ(KM_TAG_ALGORITHM, set[pos].tag); 83 EXPECT_EQ(KM_ALGORITHM_RSA, set[pos].enumerated); 85 pos = set.find(TAG_MAC_LENGTH); 86 EXPECT_EQ(-1, pos); 111 int pos = set.find(TAG_PURPOSE); local 112 ASSERT_FALSE(pos == -1); 113 EXPECT_EQ(KM_TAG_PURPOSE, set[pos].tag); 114 EXPECT_EQ(KM_PURPOSE_SIGN, set[pos] 172 int pos = deserialized.find(TAG_APPLICATION_ID); local 207 int pos = deserialized.find(TAG_APPLICATION_ID); local [all...] |