Home
last modified time | relevance | path

Searched refs:length (Results 1 – 20 of 20) sorted by relevance

/bootable/recovery/
Dasn1_decoder.cpp61 size_t length = 0; in decode_length() local
67 length <<= 8; in decode_length()
68 length += byte; in decode_length()
70 *out_len = length; in decode_length()
82 size_t length; in asn1_constructed_get() local
83 if (!decode_length(&length) || length > length_) { in asn1_constructed_get()
86 asn1_context* app_ctx = new asn1_context(p_, length); in asn1_constructed_get()
95 size_t length; in asn1_constructed_skip_all() local
96 if (!decode_length(&length) || !skip_bytes(length)) { in asn1_constructed_skip_all()
112 size_t length; in asn1_sequence_get() local
[all …]
Droots.cpp66 v->blk_device, v->length); in load_volume_table()
210 ssize_t length = 0; in format_volume() local
211 if (v->length != 0) { in format_volume()
212 length = v->length; in format_volume()
214 length = -CRYPT_FOOTER_OFFSET; in format_volume()
219 result = make_ext4fs_directory_align(v->blk_device, length, volume, sehandle, in format_volume()
222 result = make_ext4fs_directory(v->blk_device, length, volume, sehandle, directory); in format_volume()
225 if (v->key_loc != NULL && strcmp(v->key_loc, "footer") == 0 && length < 0) { in format_volume()
226 LOG(ERROR) << "format_volume: crypt footer + negative length (" << length in format_volume()
230 if (length < 0) { in format_volume()
[all …]
Dasn1_decoder.h24 asn1_context(const uint8_t* buffer, size_t length) : p_(buffer), length_(length), app_type_(0) {} in asn1_context() argument
31 bool asn1_oid_get(const uint8_t** oid, size_t* length);
32 bool asn1_octet_string_get(const uint8_t** octet_string, size_t* length);
Dverifier.cpp123 int verify_file(const unsigned char* addr, size_t length, const std::vector<Certificate>& keys, in verify_file() argument
139 if (length < FOOTER_SIZE) { in verify_file()
144 const unsigned char* footer = addr + length - FOOTER_SIZE; in verify_file()
172 if (length < eocd_size) { in verify_file()
180 size_t signed_len = length - eocd_size + EOCD_HEADER_SIZE - 2; in verify_file()
182 const unsigned char* eocd = addr + length - eocd_size; in verify_file()
243 LOG(INFO) << "signature (offset: " << std::hex << (length - signature_start) << ", length: " in verify_file()
Dverifier.h68 int verify_file(const unsigned char* addr, size_t length, const std::vector<Certificate>& keys,
Dinstall.cpp588 if (!verify_package(map.addr, map.length)) { in really_install_package()
596 int err = OpenArchiveFromMemory(map.addr, map.length, path, &zip); in really_install_package()
Drecovery.cpp415 __pmsg_write(destination, content.c_str(), content.length()); in copy_log_file_to_pmsg()
/bootable/recovery/tests/unit/
Dasn1_decoder_test.cpp37 size_t length; in TEST() local
38 ASSERT_FALSE(ctx.asn1_oid_get(&junk, &length)); in TEST()
39 ASSERT_FALSE(ctx.asn1_octet_string_get(&junk, &length)); in TEST()
61 size_t length; in TEST() local
62 ASSERT_FALSE(ptr->asn1_oid_get(&oid, &length)); in TEST()
72 size_t length; in TEST() local
73 ASSERT_TRUE(ptr->asn1_oid_get(&oid, &length)); in TEST()
74 ASSERT_EQ(1U, length); in TEST()
89 size_t length; in TEST() local
90 ASSERT_TRUE(ctx.asn1_oid_get(&oid, &length)); in TEST()
[all …]
Dsysutil_test.cpp43 ASSERT_EQ(content.size(), mapping.length); in TEST()
67 ASSERT_EQ(file_size, mapping.length); in TEST()
75 ASSERT_EQ(file_size, mapping.length); in TEST()
83 ASSERT_EQ(file_size, mapping.length); in TEST()
91 ASSERT_EQ(file_size, mapping.length); in TEST()
Dzip_test.cpp75 ASSERT_EQ(0, OpenArchiveFromMemory(map.addr, map.length, zip_path.c_str(), &handle)); in TEST()
/bootable/recovery/otautil/
DSysUtil.cpp51 pMap->length = sb.st_size; in sysMapFD()
136 size_t length = (end - start) * blksize; in sysMapBlockFile() local
137 if (end <= start || (end - start) > SIZE_MAX / blksize || length > remaining_size) { in sysMapBlockFile()
143 void* addr = mmap64(next, length, PROT_READ, MAP_PRIVATE | MAP_FIXED, fd, in sysMapBlockFile()
151 pMap->ranges[i].length = length; in sysMapBlockFile()
153 next += length; in sysMapBlockFile()
154 remaining_size -= length; in sysMapBlockFile()
166 pMap->length = size; in sysMapBlockFile()
207 if (munmap(range.addr, range.length) == -1) { in sysReleaseMap()
208 PLOG(ERROR) << "munmap(" << range.addr << ", " << range.length << ") failed"; in sysReleaseMap()
DSysUtil.h26 size_t length; member
34 size_t length; /* length of data */ member
/bootable/recovery/minui/
Dgraphics_fbdev.cpp87 vi.bits_per_pixel, vi.red.offset, vi.red.length, vi.green.offset, vi.green.length, in Init()
88 vi.blue.offset, vi.blue.length); in Init()
/bootable/recovery/tests/component/
Duncrypt_test.cpp104 int length = static_cast<int>(message.size()); in TEST_F() local
105 int length_out = htonl(length); in TEST_F()
108 ASSERT_TRUE(android::base::WriteFully(sockfd, message.data(), length)) in TEST_F()
Dverifier_test.cpp136 ASSERT_EQ(verify_file(memmap.addr, memmap.length, certs, nullptr), VERIFY_SUCCESS); in TEST_P()
140 ASSERT_EQ(verify_file(memmap.addr, memmap.length, certs, nullptr), VERIFY_FAILURE); in TEST_P()
Dupdater_test.cpp575 ASSERT_EQ(0, OpenArchiveFromMemory(map.addr, map.length, zip_file.path, &handle));
583 updater_info.package_zip_len = map.length;
/bootable/recovery/tools/dumpkey/
DDumpPublicKey.java232 if (args.length < 1) { in main()
238 for (int i = 0; i < args.length; i++) { in main()
262 System.out.println(i < args.length - 1 ? "," : ""); in main()
/bootable/recovery/uncrypt/
Duncrypt.cpp550 int length; in setup_bcb() local
551 if (!android::base::ReadFully(socket, &length, 4)) { in setup_bcb()
555 length = ntohl(length); in setup_bcb()
559 content.resize(length); in setup_bcb()
560 if (!android::base::ReadFully(socket, &content[0], length)) { in setup_bcb()
/bootable/recovery/updater/
Dupdater.cpp98 int open_err = OpenArchiveFromMemory(map.addr, map.length, argv[3], &za); in main()
157 updater_info.package_zip_len = map.length; in main()
/bootable/recovery/tools/recovery_l10n/src/com/android/recovery_l10n/
DMain.java309 out.setPixel(4, p, colorFor(langBytes.length));