Home
last modified time | relevance | path

Searched refs:length (Results 1 – 22 of 22) sorted by relevance

/bootable/recovery/
Dasn1_decoder.cpp61 size_t length = 0; in decode_length() local
67 length <<= 8; in decode_length()
68 length += byte; in decode_length()
70 *out_len = length; in decode_length()
82 size_t length; in asn1_constructed_get() local
83 if (!decode_length(&length) || length > length_) { in asn1_constructed_get()
86 asn1_context* app_ctx = new asn1_context(p_, length); in asn1_constructed_get()
95 size_t length; in asn1_constructed_skip_all() local
96 if (!decode_length(&length) || !skip_bytes(length)) { in asn1_constructed_skip_all()
112 size_t length; in asn1_sequence_get() local
[all …]
Dasn1_decoder.h24 asn1_context(const uint8_t* buffer, size_t length) : p_(buffer), length_(length), app_type_(0) {} in asn1_context() argument
31 bool asn1_oid_get(const uint8_t** oid, size_t* length);
32 bool asn1_octet_string_get(const uint8_t** octet_string, size_t* length);
Droots.cpp67 printf(" %d %s %s %s %lld\n", i, v->mount_point, v->fs_type, v->blk_device, v->length); in load_volume_table()
264 int64_t length = 0; in format_volume() local
265 if (v->length > 0) { in format_volume()
266 length = v->length; in format_volume()
267 } else if (v->length < 0 || in format_volume()
274 length = in format_volume()
275 get_file_size(fd.get(), v->length ? -v->length : CRYPT_FOOTER_OFFSET); in format_volume()
276 if (length <= 0) { in format_volume()
277 LOG(ERROR) << "get_file_size: invalid size " << length << " for " in format_volume()
301 if (length != 0) { in format_volume()
[all …]
Dverifier.cpp123 int verify_file(const unsigned char* addr, size_t length, const std::vector<Certificate>& keys, in verify_file() argument
139 if (length < FOOTER_SIZE) { in verify_file()
144 const unsigned char* footer = addr + length - FOOTER_SIZE; in verify_file()
172 if (length < eocd_size) { in verify_file()
180 size_t signed_len = length - eocd_size + EOCD_HEADER_SIZE - 2; in verify_file()
182 const unsigned char* eocd = addr + length - eocd_size; in verify_file()
243 LOG(INFO) << "signature (offset: " << std::hex << (length - signature_start) << ", length: " in verify_file()
Dverifier.h68 int verify_file(const unsigned char* addr, size_t length, const std::vector<Certificate>& keys,
Dinstall.cpp90 uint32_t length = entry.uncompressed_length; in read_metadata_from_package() local
91 metadata->resize(length, '\0'); in read_metadata_from_package()
92 int32_t err = ExtractToMemory(zip, &entry, reinterpret_cast<uint8_t*>(&(*metadata)[0]), length); in read_metadata_from_package()
593 if (!verify_package(map.addr, map.length)) { in really_install_package()
600 int err = OpenArchiveFromMemory(map.addr, map.length, path.c_str(), &zip); in really_install_package()
Drecovery.cpp420 __pmsg_write(destination, content.c_str(), content.length()); in copy_log_file_to_pmsg()
/bootable/recovery/tests/unit/
Dasn1_decoder_test.cpp37 size_t length; in TEST() local
38 ASSERT_FALSE(ctx.asn1_oid_get(&junk, &length)); in TEST()
39 ASSERT_FALSE(ctx.asn1_octet_string_get(&junk, &length)); in TEST()
61 size_t length; in TEST() local
62 ASSERT_FALSE(ptr->asn1_oid_get(&oid, &length)); in TEST()
72 size_t length; in TEST() local
73 ASSERT_TRUE(ptr->asn1_oid_get(&oid, &length)); in TEST()
74 ASSERT_EQ(1U, length); in TEST()
89 size_t length; in TEST() local
90 ASSERT_TRUE(ctx.asn1_oid_get(&oid, &length)); in TEST()
[all …]
Dsysutil_test.cpp42 ASSERT_EQ(content.size(), mapping.length); in TEST()
63 ASSERT_EQ(file_size, mapping.length); in TEST()
71 ASSERT_EQ(file_size, mapping.length); in TEST()
79 ASSERT_EQ(file_size, mapping.length); in TEST()
87 ASSERT_EQ(file_size, mapping.length); in TEST()
Dzip_test.cpp38 ASSERT_EQ(0, OpenArchiveFromMemory(map.addr, map.length, zip_path.c_str(), &handle)); in TEST()
/bootable/recovery/otautil/include/otautil/
DSysUtil.h39 size_t length; // length of data variable
44 size_t length; member
/bootable/recovery/otautil/
DSysUtil.cpp48 length = sb.st_size; in MapFD()
161 length = size; in MapBlockFile()
198 if (munmap(range.addr, range.length) == -1) { in ~MemMapping()
199 PLOG(ERROR) << "Failed to munmap(" << range.addr << ", " << range.length << ")"; in ~MemMapping()
/bootable/recovery/minui/
Dgraphics_fbdev.cpp87 vi.bits_per_pixel, vi.red.offset, vi.red.length, vi.green.offset, vi.green.length, in Init()
88 vi.blue.offset, vi.blue.length); in Init()
/bootable/recovery/tests/component/
Duncrypt_test.cpp110 int length = static_cast<int>(message.size()); in SetupOrClearBcb() local
111 int length_out = htonl(length); in SetupOrClearBcb()
114 ASSERT_TRUE(android::base::WriteFully(sockfd, message.data(), length)) in SetupOrClearBcb()
Dverifier_test.cpp181 ASSERT_EQ(verify_file(memmap.addr, memmap.length, certs, nullptr), VERIFY_SUCCESS); in TEST_P()
185 ASSERT_EQ(verify_file(memmap.addr, memmap.length, certs, nullptr), VERIFY_FAILURE); in TEST_P()
Dupdater_test.cpp490 ASSERT_EQ(0, OpenArchiveFromMemory(map.addr, map.length, zip_file.path, &handle));
498 updater_info.package_zip_len = map.length;
Dimgdiff_test.cpp692 size_t length = std::get<1>(t); in ConstructImageChunks() local
693 chunks.emplace_back(CHUNK_NORMAL, start, &content, length, std::get<0>(t)); in ConstructImageChunks()
694 start += length; in ConstructImageChunks()
/bootable/recovery/applypatch/
Dimgdiff.cpp197 static bool AlignHead(size_t* start, size_t* length) { in AlignHead() argument
200 if (*length <= residual) { in AlignHead()
201 *length = 0; in AlignHead()
207 *length -= residual; in AlignHead()
211 static bool AlignTail(size_t* start, size_t* length) { in AlignTail() argument
212 size_t residual = (*start + *length) % BLOCK_SIZE; in AlignTail()
213 if (*length <= residual) { in AlignTail()
214 *length = 0; in AlignTail()
219 *length -= residual; in AlignTail()
226 static bool RemoveUsedBlocks(size_t* start, size_t* length, const SortedRangeSet& used_ranges) { in RemoveUsedBlocks() argument
[all …]
/bootable/recovery/tools/dumpkey/
DDumpPublicKey.java232 if (args.length < 1) { in main()
238 for (int i = 0; i < args.length; i++) { in main()
262 System.out.println(i < args.length - 1 ? "," : ""); in main()
/bootable/recovery/updater/
Dupdater.cpp100 int open_err = OpenArchiveFromMemory(map.addr, map.length, argv[3], &za); in main()
159 updater_info.package_zip_len = map.length; in main()
/bootable/recovery/uncrypt/
Duncrypt.cpp568 int length; in setup_bcb() local
569 if (!android::base::ReadFully(socket, &length, 4)) { in setup_bcb()
573 length = ntohl(length); in setup_bcb()
577 content.resize(length); in setup_bcb()
578 if (!android::base::ReadFully(socket, &content[0], length)) { in setup_bcb()
/bootable/recovery/tools/recovery_l10n/src/com/android/recovery_l10n/
DMain.java309 out.setPixel(4, p, colorFor(langBytes.length));