/system/core/adb/pairing_auth/tests/ |
D | pairing_auth_test.cpp | 159 size_t out_size; in TEST_F() local 163 &out_size)); in TEST_F() 164 ASSERT_GT(out_size, 0); in TEST_F() 165 client_msg.resize(out_size); in TEST_F() 171 server_msg.data(), &out_size)); in TEST_F() 177 &out_size)); in TEST_F() 178 ASSERT_GT(out_size, 0); in TEST_F() 179 server_msg.resize(out_size); in TEST_F() 185 client_msg.data(), &out_size)); in TEST_F() 209 size_t out_size; in TEST_F() local [all …]
|
D | aes_128_gcm_test.cpp | 53 size_t out_size = sizeof(out_buf); in TEST() local 55 auto decrypted_size = bob.Decrypt(encrypted, *encrypted_size, out_buf, out_size); in TEST()
|
/system/core/trusty/keymaster/ipc/ |
D | trusty_keymaster_ipc.cpp | 50 uint32_t* out_size) { in trusty_keymaster_call() argument 73 size_t out_max_size = *out_size; in trusty_keymaster_call() 74 *out_size = 0; in trusty_keymaster_call() 79 iov[1] = {.iov_base = out + *out_size, in trusty_keymaster_call() 81 out_max_size - *out_size)}; in trusty_keymaster_call() 98 *out_size += ((size_t)rc - sizeof(struct keymaster_message)); in trusty_keymaster_call()
|
/system/bt/stack/a2dp/ |
D | a2dp_sbc_decoder.cc | 79 uint32_t out_size = out_avail; in a2dp_sbc_decoder_decode_packet() local 82 &oi_size, out_ptr, &out_size); in a2dp_sbc_decoder_decode_packet() 87 out_avail -= out_size; in a2dp_sbc_decoder_decode_packet() 88 out_ptr += out_size / sizeof(*out_ptr); in a2dp_sbc_decoder_decode_packet()
|
/system/core/trusty/gatekeeper/ |
D | trusty_gatekeeper_ipc.c | 46 uint32_t *out_size) { in trusty_gatekeeper_call() argument 66 rc = read(handle_, out, *out_size); in trusty_gatekeeper_call() 85 *out_size = ((size_t) rc) - sizeof(struct gatekeeper_message); in trusty_gatekeeper_call()
|
D | trusty_gatekeeper_ipc.h | 21 uint32_t *out_size);
|
/system/core/adb/pairing_auth/ |
D | pairing_auth.cpp | 170 auto out_size = cipher_->Encrypt(data.data(), data.size(), encrypted.data(), encrypted.size()); in Encrypt() local 171 if (!out_size.has_value() || *out_size == 0) { in Encrypt() 175 encrypted.resize(*out_size); in Encrypt() 187 auto out_size = cipher_->Decrypt(data.data(), data.size(), decrypted.data(), decrypted_size); in Decrypt() local 188 if (!out_size.has_value() || *out_size == 0) { in Decrypt() 192 decrypted.resize(*out_size); in Decrypt()
|
/system/core/logd/ |
D | CompressionEngine.cpp | 88 size_t out_size = ZSTD_compress(out.data(), out.size(), in.data(), data_length, 1); in Compress() local 89 if (ZSTD_isError(out_size)) { in Compress() 90 LOG(FATAL) << "ZSTD_compress failed: " << ZSTD_getErrorName(out_size); in Compress() 92 out.Resize(out_size); in Compress()
|
/system/extras/boot_control_copy/ |
D | bootinfo.cpp | 48 int boot_info_open_partition(const char *name, uint64_t *out_size, int flags) in boot_info_open_partition() argument 97 if (fd != -1 && out_size != NULL) { in boot_info_open_partition() 98 if (ioctl(fd, BLKGETSIZE64, out_size) != 0) { in boot_info_open_partition()
|
D | bootinfo.h | 59 int boot_info_open_partition(const char *name, uint64_t *out_size, int flags);
|
/system/core/trusty/storage/proxy/ |
D | ipc.c | 96 int ipc_respond(struct storage_msg *msg, void *out, size_t out_size) in ipc_respond() argument 99 struct iovec iovs[2] = {{msg, sizeof(*msg)}, {out, out_size}}; in ipc_respond()
|
D | ipc.h | 24 int ipc_respond(struct storage_msg *msg, void *out, size_t out_size);
|
/system/core/trusty/keymaster/include/trusty_keymaster/ipc/ |
D | trusty_keymaster_ipc.h | 31 uint32_t* out_size);
|
/system/update_engine/payload_consumer/ |
D | xz_extent_writer.cc | 86 request.out_size = output_buffer.size(); in Write()
|
/system/vold/ |
D | Keymaster.cpp | 263 uint32_t* out_size) { in write_string_to_buf() argument 264 if (!buffer || !out_size) { in write_string_to_buf() 268 *out_size = towrite.size(); in write_string_to_buf()
|