/system/core/adb/client/ |
D | transport_usb.cpp | 68 D("UsbReadPayload(%d)", p->msg.data_length); in UsbReadPayload() 70 if (p->msg.data_length > MAX_PAYLOAD) { in UsbReadPayload() 80 size_t len = p->msg.data_length; in UsbReadPayload() 88 if (rc != static_cast<int>(p->msg.data_length)) { in UsbReadPayload() 95 p->payload.resize(p->msg.data_length); in UsbReadPayload() 110 if (p->msg.data_length) { in remote_read() 116 if (static_cast<uint32_t>(n) != p->msg.data_length) { in remote_read() 118 p->msg.data_length, n); in remote_read() 135 if (p->msg.data_length) { in remote_read() 136 if (p->msg.data_length > MAX_PAYLOAD) { in remote_read() [all …]
|
/system/update_engine/scripts/update_payload/ |
D | applier.py | 141 data_length = len(data) 143 if not data_length: 145 write_length = min(data_length, ex.num_blocks * block_size) 150 data_length -= write_length 152 if data_length: 156 def _ExtentsToBspatchArg(extents, block_size, base_name, data_length=-1): argument 176 if data_length < 0: 177 data_length = sys.maxsize 179 if not data_length: 184 if data_length < num_bytes: [all …]
|
D | checker_unittest.py | 586 data_length = 10000 595 op, data_length, (data_length + block_size - 1) // block_size, 602 op, data_length, (data_length + block_size - 1) // block_size, 'foo') 608 op, None, (data_length + block_size - 1) // block_size, 'foo') 614 op, data_length, (data_length + block_size - 1) // block_size + 1, 621 data_length = block_size * 3 631 op, data_length, (data_length + block_size - 1) // block_size + 5, 638 op, data_length, (data_length + block_size - 1) // block_size + 5, 645 op, None, (data_length + block_size - 1) // block_size, 'foo') 651 op, data_length, (data_length + block_size - 1) // block_size, 'foo') [all …]
|
D | test_utils.py | 198 data_length=None, src_extents=None, src_length=None, argument 212 _SetMsgField(op, 'data_length', data_length) 281 data_length = len(data_blob) 283 self.curr_offset += data_length 285 return data_length, data_offset 306 data_offset = data_length = data_sha256_hash = None 310 data_length, data_offset = self.AddData(data_blob) 313 data_length=data_length, src_extents=src_extents,
|
D | checker.py | 753 def _CheckReplaceOperation(self, op, data_length, total_dst_blocks, op_name): argument 775 if data_length is None: 779 PayloadChecker._CheckBlocksFitLength(data_length, total_dst_blocks, 784 if data_length >= total_dst_blocks * self.block_size: 788 (op_name, data_length, total_dst_blocks, self.block_size)) 803 if op.data_length: 808 def _CheckAnyDiffOperation(self, op, data_length, total_dst_blocks, op_name): argument 822 if data_length is None: 826 if data_length >= total_dst_blocks * self.block_size: 830 (op_name, data_length, total_dst_blocks, self.block_size, [all …]
|
/system/core/logd/ |
D | CompressionEngine.cpp | 30 bool ZlibCompressionEngine::Compress(SerializedData& in, size_t data_length, SerializedData& out) { in Compress() argument 40 CHECK_LE(data_length, in.size()); in Compress() 46 strm.avail_in = data_length; in Compress() 82 bool ZstdCompressionEngine::Compress(SerializedData& in, size_t data_length, SerializedData& out) { in Compress() argument 83 CHECK_LE(data_length, in.size()); in Compress() 85 size_t compress_bound = ZSTD_compressBound(data_length); in Compress() 88 size_t out_size = ZSTD_compress(out.data(), out.size(), in.data(), data_length, 1); in Compress()
|
D | CompressionEngine.h | 29 virtual bool Compress(SerializedData& in, size_t data_length, SerializedData& out) = 0; 37 bool Compress(SerializedData& in, size_t data_length, SerializedData& out) override; 43 bool Compress(SerializedData& in, size_t data_length, SerializedData& out) override;
|
/system/keymaster/legacy_support/ |
D | keymaster_passthrough_operation.cpp | 38 while (in.data_length != 0) { in Finish() 43 accumulated_output_size += out.data_length; in Finish() 62 if (consumed > in.data_length) return KM_ERROR_UNKNOWN_ERROR; in Finish() 63 in.data_length -= consumed; in Finish() 72 accumulated_output_size += out.data_length; in Finish() 83 output->write(outBlob.data, outBlob.data_length); in Finish() 105 if (output) output->Reinitialize(out.data, out.data_length); in Finish()
|
/system/bt/gd/packet/parser/test/ |
D | variable.h | 51 size_t data_length = it.template extract<uint8_t>(); in Parse() local 52 if (data_length > 255) { in Parse() 55 if (it.NumBytesRemaining() < data_length) { in Parse() 59 for (size_t i = 0; i < data_length; i++) { in Parse()
|
/system/extras/verity/ |
D | build_verity_tree_test.cpp | 125 size_t data_length = in TEST_F() local 127 ASSERT_TRUE(builder->Update(data.data() + offset, data_length)); in TEST_F() 128 offset += data_length; in TEST_F() 148 size_t data_length = std::min<size_t>(rand() % 40960, data.size() - offset); in TEST_F() local 149 ASSERT_TRUE(builder->Update(data.data() + offset, data_length)); in TEST_F() 150 offset += data_length; in TEST_F() 170 size_t data_length = std::min<size_t>(rand() % 40960, data.size() - offset); in TEST_F() local 171 ASSERT_TRUE(builder->Update(data.data() + offset, data_length)); in TEST_F() 172 offset += data_length; in TEST_F()
|
/system/keymaster/km_openssl/ |
D | block_cipher_operation.cpp | 263 if (block_mode_ != KM_MODE_GCM && iv_blob.data_length != block_size_bytes()) { in GetIv() 265 iv_blob.data_length); in GetIv() 269 if (block_mode_ == KM_MODE_GCM && iv_blob.data_length != GCM_NONCE_SIZE) { in GetIv() 271 iv_blob.data_length); in GetIv() 275 iv_ = KeymasterBlob(iv_blob.data, iv_blob.data_length); in GetIv() 306 size_t blocks_to_process = aad.data_length / block_size; in HandleAad() 310 aad.data_length -= blocks_to_process * block_size; in HandleAad() 313 assert(aad.data_length == 0); in HandleAad() 352 size_t to_buffer = min(block_size_bytes() - aad_block_buf_len_, aad->data_length); in FillBufferedAadBlock() 355 aad->data_length -= to_buffer; in FillBufferedAadBlock() [all …]
|
D | soft_keymaster_enforcement.cpp | 110 if (!HMAC_Update(ctx.get(), chunk.data, chunk.data_length)) { in hmacSha256() 119 if (digest_len != output->data_length) return KM_ERROR_UNKNOWN_ERROR; in hmacSha256() 135 if (!a.data_length && !b.data_length) return true; in operator ==() 137 return (a.data_length == b.data_length && !memcmp(a.data, b.data, a.data_length)); in operator ==()
|
D | attestation_record.cpp | 347 if (!ASN1_OCTET_STRING_set(*string_ptr, entry.blob.data, entry.blob.data_length)) in build_auth_list() 409 if (verified_boot_key.data_length && in build_attestation_record() 411 verified_boot_key.data_length)) { in build_attestation_record() 414 if (verified_boot_hash.data_length && in build_attestation_record() 416 verified_boot_hash.data_length)) { in build_attestation_record() 436 if (attestation_challenge.data_length > kMaximumAttestationChallengeLength) in build_attestation_record() 440 attestation_challenge.data_length)) in build_attestation_record() 775 attestation_challenge->data_length = record->attestation_challenge->length; in parse_attestation_record() 778 unique_id->data_length = record->unique_id->length; in parse_attestation_record() 809 verified_boot_key->data_length = root_of_trust->verified_boot_key->length; in parse_root_of_trust()
|
D | ckdf.cpp | 84 if (!CMAC_Update(ctx.get(), label.data, label.data_length)) { in DEFINE_OPENSSL_OBJECT_POINTER() 95 context_chunks[chunk].data_length)) { in DEFINE_OPENSSL_OBJECT_POINTER()
|
/system/core/libappfuse/ |
D | FuseBuffer.cc | 190 uint32_t data_length, uint32_t opcode, uint64_t unique) { in Reset() argument 191 memset(this, 0, sizeof(fuse_in_header) + data_length); in Reset() 192 header.len = sizeof(fuse_in_header) + data_length; in Reset() 198 void FuseResponseBase<N>::ResetHeader(uint32_t data_length, int32_t error, uint64_t unique) { in ResetHeader() argument 200 header.len = sizeof(fuse_out_header) + data_length; in ResetHeader() 206 void FuseResponseBase<N>::Reset(uint32_t data_length, int32_t error, uint64_t unique) { in Reset() argument 207 memset(this, 0, sizeof(fuse_out_header) + data_length); in Reset() 208 ResetHeader(data_length, error, unique); in Reset()
|
/system/bt/hci/test/ |
D | packet_fragmenter_test.cc | 64 uint16_t data_length = strlen(data); in manufacture_packet_for_fragmentation() local 65 uint16_t size = data_length; in manufacture_packet_for_fragmentation() 79 UINT16_TO_STREAM(packet_data, data_length); in manufacture_packet_for_fragmentation() 82 memcpy(packet_data, data, data_length); in manufacture_packet_for_fragmentation() 133 uint16_t data_length = strlen(data); in manufacture_packet_and_then_reassemble() local 136 uint16_t total_length = data_length + 2; // 2 for l2cap length; in manufacture_packet_and_then_reassemble() 138 uint16_t l2cap_length = data_length - 2; // l2cap length field, 2 for the in manufacture_packet_and_then_reassemble() 168 BT_HDR* packet = (BT_HDR*)osi_malloc(data_length + sizeof(BT_HDR)); in manufacture_packet_and_then_reassemble() 169 packet->len = data_length; in manufacture_packet_and_then_reassemble() 173 memcpy(packet->data, data, data_length); in manufacture_packet_and_then_reassemble()
|
/system/keymaster/contexts/ |
D | soft_keymaster_device.cpp | 633 const uint8_t* data, size_t data_length) { in add_rng_entropy() argument 639 return km1_dev->add_rng_entropy(km1_dev, data, data_length); in add_rng_entropy() 642 request.random_data.Reinitialize(data, data_length); in add_rng_entropy() 652 const uint8_t* data, size_t data_length) { in add_rng_entropy() argument 660 return add_rng_entropy(&sk_dev->km1_device_, data, data_length); in add_rng_entropy() 959 request.SetKeyMaterial(key_data->data, key_data->data_length); in import_key() 1029 export_data->data_length = 0; in export_key() 1041 export_data->data_length = response.key_data_length; in export_key() 1042 uint8_t* tmp = reinterpret_cast<uint8_t*>(malloc(export_data->data_length)); in export_key() 1045 memcpy(tmp, response.key_data, export_data->data_length); in export_key() [all …]
|
/system/update_engine/payload_generator/ |
D | payload_file_unittest.cc | 78 EXPECT_EQ(3U, part0_aops[0].op.data_length()); in TEST_F() 80 EXPECT_EQ(1U, part0_aops[1].op.data_length()); in TEST_F() 84 EXPECT_EQ(6U, part1_aops[0].op.data_length()); in TEST_F()
|
D | ab_generator_unittest.cc | 150 EXPECT_EQ(first_expected_blob.size(), first_op.data_length()); in TestSplitReplaceOrReplaceXzOperation() 152 brillo::Blob first_data_blob(first_op.data_length()); in TestSplitReplaceOrReplaceXzOperation() 156 first_op.data_length(), in TestSplitReplaceOrReplaceXzOperation() 159 ASSERT_EQ(bytes_read, static_cast<ssize_t>(first_op.data_length())); in TestSplitReplaceOrReplaceXzOperation() 180 EXPECT_EQ(second_expected_blob.size(), second_op.data_length()); in TestSplitReplaceOrReplaceXzOperation() 182 brillo::Blob second_data_blob(second_op.data_length()); in TestSplitReplaceOrReplaceXzOperation() 185 second_op.data_length(), in TestSplitReplaceOrReplaceXzOperation() 188 ASSERT_EQ(bytes_read, static_cast<ssize_t>(second_op.data_length())); in TestSplitReplaceOrReplaceXzOperation() 192 EXPECT_EQ(first_op.data_offset() + first_op.data_length(), in TestSplitReplaceOrReplaceXzOperation() 194 EXPECT_EQ(second_op.data_offset() + second_op.data_length(), in TestSplitReplaceOrReplaceXzOperation() [all …]
|
D | annotated_operation.cc | 58 os << InstallOperationTypeName(aop.op.type()) << " " << aop.op.data_length(); in operator <<() 59 if (aop.op.data_length() > 0) in operator <<()
|
/system/core/libappfuse/include/libappfuse/ |
D | FuseBuffer.h | 70 void Reset(uint32_t data_length, uint32_t opcode, uint64_t unique); 92 void Reset(uint32_t data_length, int32_t error, uint64_t unique); 93 void ResetHeader(uint32_t data_length, int32_t error, uint64_t unique);
|
/system/keymaster/tests/ |
D | attestation_record_test.cpp | 39 unique_id->Reinitialize(application_id.data, application_id.data_length); in GenerateUniqueId() 46 verified_boot_key->data_length = sizeof(vboot_key_); in GetVerifiedBootParams() 54 EXPECT_EQ(sizeof(vboot_key_), verified_boot_key.data_length); in VerifyRootOfTrust() 55 if (sizeof(vboot_key_) == verified_boot_key.data_length) { in VerifyRootOfTrust()
|
/system/keymaster/android_keymaster/ |
D | authorization_set.cpp | 222 void* tmp = malloc(src.blob.data_length); in CopyToParamSet() 223 memcpy(tmp, src.blob.data, src.blob.data_length); in CopyToParamSet() 295 if (indirect_data_capacity_ - indirect_data_size_ < elem.blob.data_length) in push_back() 296 if (!reserve_indirect(2 * (indirect_data_capacity_ + elem.blob.data_length))) in push_back() 299 memcpy(indirect_data_ + indirect_data_size_, elem.blob.data, elem.blob.data_length); in push_back() 301 indirect_data_size_ += elem.blob.data_length; in push_back() 359 buf = append_uint32_to_buf(buf, end, param.blob.data_length); in serialize() 402 if (!copy_uint32_from_buf(buf_ptr, end, ¶m->blob.data_length) || in deserialize() 405 if (param->blob.data_length + offset < param->blob.data_length || // Overflow check in deserialize() 407 static_cast<ptrdiff_t>(offset + param->blob.data_length) > indirect_end - indirect_base) in deserialize() [all …]
|
/system/core/adb/ |
D | shell_service_protocol_test.cpp | 91 const void* data, size_t data_length) { in PacketEquals() argument 94 protocol->data_length() == data_length && in PacketEquals() 95 !memcmp(data, protocol->data(), data_length)); in PacketEquals()
|
/system/bt/stack/btm/ |
D | ble_advertiser_hci_interface.cc | 162 uint8_t fragment_preference, uint8_t data_length, in SetAdvertisingData() argument 168 if (data_length > BTM_BLE_AD_DATA_LEN) { in SetAdvertisingData() 171 << ": data_length=" << static_cast<int>(data_length) in SetAdvertisingData() 173 data_length = BTM_BLE_AD_DATA_LEN; in SetAdvertisingData() 178 UINT8_TO_STREAM(pp, data_length); in SetAdvertisingData() 179 ARRAY_TO_STREAM(pp, data, data_length); in SetAdvertisingData() 388 uint8_t fragment_preference, uint8_t data_length, in SetAdvertisingData() argument 394 if (data_length > HCIC_PARAM_SIZE_BLE_WRITE_ADV_DATA) { in SetAdvertisingData() 397 << ": data_length=" << static_cast<int>(data_length) in SetAdvertisingData() 400 data_length = HCIC_PARAM_SIZE_BLE_WRITE_ADV_DATA; in SetAdvertisingData() [all …]
|