/bootable/recovery/ |
D | asn1_decoder.cpp | 61 size_t length = 0; in decode_length() local 67 length <<= 8; in decode_length() 68 length += byte; in decode_length() 70 *out_len = length; in decode_length() 82 size_t length; in asn1_constructed_get() local 83 if (!decode_length(&length) || length > length_) { in asn1_constructed_get() 86 asn1_context* app_ctx = new asn1_context(p_, length); in asn1_constructed_get() 95 size_t length; in asn1_constructed_skip_all() local 96 if (!decode_length(&length) || !skip_bytes(length)) { in asn1_constructed_skip_all() 112 size_t length; in asn1_sequence_get() local [all …]
|
D | asn1_decoder.h | 24 asn1_context(const uint8_t* buffer, size_t length) : p_(buffer), length_(length), app_type_(0) {} in asn1_context() argument 31 bool asn1_oid_get(const uint8_t** oid, size_t* length); 32 bool asn1_octet_string_get(const uint8_t** octet_string, size_t* length);
|
D | roots.cpp | 67 printf(" %d %s %s %s %lld\n", i, v->mount_point, v->fs_type, v->blk_device, v->length); in load_volume_table() 264 int64_t length = 0; in format_volume() local 265 if (v->length > 0) { in format_volume() 266 length = v->length; in format_volume() 267 } else if (v->length < 0 || in format_volume() 274 length = in format_volume() 275 get_file_size(fd.get(), v->length ? -v->length : CRYPT_FOOTER_OFFSET); in format_volume() 276 if (length <= 0) { in format_volume() 277 LOG(ERROR) << "get_file_size: invalid size " << length << " for " in format_volume() 301 if (length != 0) { in format_volume() [all …]
|
D | verifier.cpp | 123 int verify_file(const unsigned char* addr, size_t length, const std::vector<Certificate>& keys, in verify_file() argument 139 if (length < FOOTER_SIZE) { in verify_file() 144 const unsigned char* footer = addr + length - FOOTER_SIZE; in verify_file() 172 if (length < eocd_size) { in verify_file() 180 size_t signed_len = length - eocd_size + EOCD_HEADER_SIZE - 2; in verify_file() 182 const unsigned char* eocd = addr + length - eocd_size; in verify_file() 243 LOG(INFO) << "signature (offset: " << std::hex << (length - signature_start) << ", length: " in verify_file()
|
D | verifier.h | 68 int verify_file(const unsigned char* addr, size_t length, const std::vector<Certificate>& keys,
|
D | install.cpp | 90 uint32_t length = entry.uncompressed_length; in read_metadata_from_package() local 91 metadata->resize(length, '\0'); in read_metadata_from_package() 92 int32_t err = ExtractToMemory(zip, &entry, reinterpret_cast<uint8_t*>(&(*metadata)[0]), length); in read_metadata_from_package() 593 if (!verify_package(map.addr, map.length)) { in really_install_package() 600 int err = OpenArchiveFromMemory(map.addr, map.length, path.c_str(), &zip); in really_install_package()
|
D | recovery.cpp | 420 __pmsg_write(destination, content.c_str(), content.length()); in copy_log_file_to_pmsg()
|
/bootable/recovery/tests/unit/ |
D | asn1_decoder_test.cpp | 37 size_t length; in TEST() local 38 ASSERT_FALSE(ctx.asn1_oid_get(&junk, &length)); in TEST() 39 ASSERT_FALSE(ctx.asn1_octet_string_get(&junk, &length)); in TEST() 61 size_t length; in TEST() local 62 ASSERT_FALSE(ptr->asn1_oid_get(&oid, &length)); in TEST() 72 size_t length; in TEST() local 73 ASSERT_TRUE(ptr->asn1_oid_get(&oid, &length)); in TEST() 74 ASSERT_EQ(1U, length); in TEST() 89 size_t length; in TEST() local 90 ASSERT_TRUE(ctx.asn1_oid_get(&oid, &length)); in TEST() [all …]
|
D | sysutil_test.cpp | 42 ASSERT_EQ(content.size(), mapping.length); in TEST() 63 ASSERT_EQ(file_size, mapping.length); in TEST() 71 ASSERT_EQ(file_size, mapping.length); in TEST() 79 ASSERT_EQ(file_size, mapping.length); in TEST() 87 ASSERT_EQ(file_size, mapping.length); in TEST()
|
D | zip_test.cpp | 38 ASSERT_EQ(0, OpenArchiveFromMemory(map.addr, map.length, zip_path.c_str(), &handle)); in TEST()
|
/bootable/recovery/otautil/include/otautil/ |
D | SysUtil.h | 39 size_t length; // length of data variable 44 size_t length; member
|
/bootable/recovery/otautil/ |
D | SysUtil.cpp | 48 length = sb.st_size; in MapFD() 161 length = size; in MapBlockFile() 198 if (munmap(range.addr, range.length) == -1) { in ~MemMapping() 199 PLOG(ERROR) << "Failed to munmap(" << range.addr << ", " << range.length << ")"; in ~MemMapping()
|
/bootable/recovery/minui/ |
D | graphics_fbdev.cpp | 87 vi.bits_per_pixel, vi.red.offset, vi.red.length, vi.green.offset, vi.green.length, in Init() 88 vi.blue.offset, vi.blue.length); in Init()
|
/bootable/recovery/tests/component/ |
D | uncrypt_test.cpp | 110 int length = static_cast<int>(message.size()); in SetupOrClearBcb() local 111 int length_out = htonl(length); in SetupOrClearBcb() 114 ASSERT_TRUE(android::base::WriteFully(sockfd, message.data(), length)) in SetupOrClearBcb()
|
D | verifier_test.cpp | 181 ASSERT_EQ(verify_file(memmap.addr, memmap.length, certs, nullptr), VERIFY_SUCCESS); in TEST_P() 185 ASSERT_EQ(verify_file(memmap.addr, memmap.length, certs, nullptr), VERIFY_FAILURE); in TEST_P()
|
D | updater_test.cpp | 490 ASSERT_EQ(0, OpenArchiveFromMemory(map.addr, map.length, zip_file.path, &handle)); 498 updater_info.package_zip_len = map.length;
|
D | imgdiff_test.cpp | 692 size_t length = std::get<1>(t); in ConstructImageChunks() local 693 chunks.emplace_back(CHUNK_NORMAL, start, &content, length, std::get<0>(t)); in ConstructImageChunks() 694 start += length; in ConstructImageChunks()
|
/bootable/recovery/applypatch/ |
D | imgdiff.cpp | 197 static bool AlignHead(size_t* start, size_t* length) { in AlignHead() argument 200 if (*length <= residual) { in AlignHead() 201 *length = 0; in AlignHead() 207 *length -= residual; in AlignHead() 211 static bool AlignTail(size_t* start, size_t* length) { in AlignTail() argument 212 size_t residual = (*start + *length) % BLOCK_SIZE; in AlignTail() 213 if (*length <= residual) { in AlignTail() 214 *length = 0; in AlignTail() 219 *length -= residual; in AlignTail() 226 static bool RemoveUsedBlocks(size_t* start, size_t* length, const SortedRangeSet& used_ranges) { in RemoveUsedBlocks() argument [all …]
|
/bootable/recovery/tools/dumpkey/ |
D | DumpPublicKey.java | 232 if (args.length < 1) { in main() 238 for (int i = 0; i < args.length; i++) { in main() 262 System.out.println(i < args.length - 1 ? "," : ""); in main()
|
/bootable/recovery/updater/ |
D | updater.cpp | 100 int open_err = OpenArchiveFromMemory(map.addr, map.length, argv[3], &za); in main() 159 updater_info.package_zip_len = map.length; in main()
|
/bootable/recovery/uncrypt/ |
D | uncrypt.cpp | 568 int length; in setup_bcb() local 569 if (!android::base::ReadFully(socket, &length, 4)) { in setup_bcb() 573 length = ntohl(length); in setup_bcb() 577 content.resize(length); in setup_bcb() 578 if (!android::base::ReadFully(socket, &content[0], length)) { in setup_bcb()
|
/bootable/recovery/tools/recovery_l10n/src/com/android/recovery_l10n/ |
D | Main.java | 309 out.setPixel(4, p, colorFor(langBytes.length));
|