/system/core/libcutils/ |
H A D | sockets.c | 29 socklen_t len = sizeof(cr); local 30 int n = getsockopt(fd, SOL_SOCKET, SO_PEERCRED, &cr, &len);
|
H A D | partition_utils.c | 25 static int only_one_char(char *buf, int len, char c) argument 30 for (i=0; i<len; i++) {
|
H A D | process_name.c | 43 int len = strlen(new_name); local 44 char* copy = (char*) malloc(len + 1); 49 if (len < 16) { 52 prctl(PR_SET_NAME, (unsigned long) new_name + len - 15, 0, 0, 0);
|
H A D | uio.c | 28 int len = vecs->iov_len; local 30 while (len > 0) { 31 int ret = read( fd, buf, len ); 42 len -= ret; 55 int len = (int)vecs->iov_len; local 57 while (len > 0) { 58 int ret = write( fd, buf, len ); 69 len -= ret;
|
H A D | ashmem-dev.c | 75 int ashmem_pin_region(int fd, size_t offset, size_t len) argument 77 struct ashmem_pin pin = { offset, len }; 81 int ashmem_unpin_region(int fd, size_t offset, size_t len) argument 83 struct ashmem_pin pin = { offset, len };
|
H A D | strdup16to8.c | 29 extern size_t strnlen16to8(const char16_t* utf16Str, size_t len) argument 34 * potentially be as big as 3*len, which will overflow 35 * for len > SIZE_MAX/3. 43 * dst = malloc(strnlen16to8(utf16,len)+1) 55 /* Fast path for the usual case where 3*len is < SIZE_MAX-1. 57 if (len < (SIZE_MAX-1)/3) { 58 while (len--) { 72 while (len--) { 102 * not just "len". 107 extern char* strncpy16to8(char* utf8Str, const char16_t* utf16Str, size_t len) argument 146 size_t len; local [all...] |
H A D | ashmem-host.c | 68 /* truncate the file to `len' bytes */ 86 int ashmem_pin_region(int fd, size_t offset, size_t len) argument 91 int ashmem_unpin_region(int fd, size_t offset, size_t len) argument
|
H A D | fs.c | 116 int len = snprintf(buf, BUF_SIZE, "%d", value) + 1; local 117 if (len > BUF_SIZE) { 121 if (TEMP_FAILURE_RETRY(write(fd, buf, len)) < len) {
|
/system/core/libmincrypt/ |
H A D | rsa.c | 32 const int len, 37 const int len, 42 const int len, 46 return RSA_e_3_verify(key, signature, len, sha); 49 return RSA_e_f4_verify(key, signature, len, sha); 40 RSA_verify(const RSAPublicKey *key, const uint8_t *signature, const int len, const uint8_t *sha) argument
|
/system/core/libsparse/ |
H A D | sparse_file.h | 24 int64_t len; member in struct:sparse_file
|
H A D | img2simg.c | 54 off64_t len; local 90 len = lseek64(in, 0, SEEK_END); 93 s = sparse_file_new(block_size, len);
|
/system/extras/ext4_utils/ |
H A D | wipe.c | 33 int wipe_block_device(int fd, s64 len) argument 39 range[1] = len; 43 range[1] = len; 57 int wipe_block_device(int fd, s64 len) argument
|
/system/core/include/mincrypt/ |
H A D | rsa.h | 41 int len; /* Length of n[] in number of uint32_t */ member in struct:RSAPublicKey 50 const int len,
|
/system/core/toolbox/ |
H A D | smd.c | 9 int fd, len, r, port = 0; local 28 len = strlen(argv[0]); 29 r = write(fd, argv[0], len); 30 if(r != len) {
|
H A D | getsebool.c | 17 int i, get_all = 0, rc = 0, active, pending, len = 0, opt; local 31 rc = security_get_boolean_names(&names, &len); 38 if (!len) { 53 if (!len) { 56 len = argc - 1; 57 names = malloc(sizeof(char *) * len); 62 for (i = 0; i < len; i++) { 72 for (i = 0; i < len; i++) { 100 for (i = 0; i < len; i++)
|
H A D | insmod.c | 71 int i, len; local 76 len = min(strlen(argv[i]), end - ptr); 77 memcpy(ptr, argv[i], len); 78 ptr += len;
|
/system/netd/ |
H A D | oem_iptables_hook.cpp | 34 size_t len = strnlen(cmd, 255); local 37 if (len == 255) {
|
/system/core/adb/ |
H A D | test_track_devices.c | 17 unix_write( int fd, const char* buf, int len ) 20 while (len > 0) { 21 int len2 = write(fd, buf, len); 28 len -= len2; 35 unix_read( int fd, char* buf, int len ) 38 while (len > 0) { 39 int len2 = read(fd, buf, len); 46 len -= len2; 59 int len; local 71 len [all...] |
H A D | test_track_jdwp.c | 17 unix_write( int fd, const char* buf, int len ) 20 while (len > 0) { 21 int len2 = write(fd, buf, len); 28 len -= len2; 35 unix_read( int fd, char* buf, int len ) 38 while (len > 0) { 39 int len2 = read(fd, buf, len); 46 len -= len2; 59 int len; local 71 len [all...] |
H A D | utils.c | 48 buff_addb (char* buff, char* buffEnd, const void* data, int len) argument 52 if (avail <= 0 || len <= 0) /* already overflowing */ 55 if (len > avail) 56 len = avail; 58 memcpy(buff, data, len); 60 buff += len;
|
H A D | adb_auth.h | 34 int adb_auth_get_userkey(unsigned char *data, size_t len); 38 static inline void adb_auth_confirm_key(unsigned char *data, size_t len, atransport *t) { } argument 45 static inline int adb_auth_get_userkey(unsigned char *data, size_t len) { return 0; } argument 49 void adb_auth_confirm_key(unsigned char *data, size_t len, atransport *t);
|
/system/core/debuggerd/ |
H A D | utility.c | 41 int len; local 43 len = strlen(buf); 44 write(log->tfd, buf, len);
|
/system/core/include/sync/ |
H A D | sync.h | 29 uint32_t len; member in struct:sync_fence_info_data 36 uint32_t len; member in struct:sync_pt_info
|
/system/extras/libpagemap/ |
H A D | pm_map.c | 22 int pm_map_pagemap(pm_map_t *map, uint64_t **pagemap_out, size_t *len) { argument 27 pagemap_out, len); 32 size_t len, i; local 40 error = pm_map_pagemap(map, &pagemap, &len); 45 for (i = 0; i < len; i++) { 72 size_t len, i; local 80 error = pm_map_pagemap(map, &pagemap, &len); 85 for (i = 0; i < len; i++) {
|
/system/bluetooth/brfpatch/ |
H A D | brfpatch.c | 54 static void dump_record(FILE *fpo, unsigned short opcode, unsigned char len, argument 60 fwrite(&len, 1, 1, fpo); // data length 61 fwrite(data, len, 1, fpo); // data
|