Home
last modified time | relevance | path

Searched refs:size (Results 1 – 21 of 21) sorted by relevance

/bootable/recovery/tools/ota/
Dconvert-to-bmp.py50 im.size[0] * im.size[1] * 4),
56 im.size[0],
57 im.size[1],
71 for j in range(im.size[1]-1, -1, -1): # rows bottom-to-top
72 for i in range(j*im.size[0]*4, (j+1)*im.size[0]*4, 4):
/bootable/recovery/
Dbootloader.cpp87 const ssize_t size = write_size * MISC_PAGES; in get_bootloader_message_mtd() local
88 char data[size]; in get_bootloader_message_mtd()
89 ssize_t r = mtd_read_data(read, data, size); in get_bootloader_message_mtd()
90 if (r != size) LOGE("Can't read %s\n(%s)\n", v->blk_device, strerror(errno)); in get_bootloader_message_mtd()
92 if (r != size) return -1; in get_bootloader_message_mtd()
113 ssize_t size = write_size * MISC_PAGES; in set_bootloader_message_mtd() local
114 char data[size]; in set_bootloader_message_mtd()
115 ssize_t r = mtd_read_data(read, data, size); in set_bootloader_message_mtd()
116 if (r != size) LOGE("Can't read %s\n(%s)\n", v->blk_device, strerror(errno)); in set_bootloader_message_mtd()
118 if (r != size) return -1; in set_bootloader_message_mtd()
[all …]
Dmake-overlay.py33 minmini = base.size[0]-1
35 minminj = base.size[1]-1
42 assert base.size == top.size
44 mini = base.size[0]-1
46 minj = base.size[1]-1
49 h, w = base.size
Dverifier.cpp155 size_t size = BUFFER_SIZE; in verify_file() local
156 if (signed_len - so_far < size) size = signed_len - so_far; in verify_file()
157 if (fread(buffer, 1, size, f) != size) { in verify_file()
162 SHA_update(&ctx, buffer, size); in verify_file()
163 so_far += size; in verify_file()
165 if (f > frac + 0.02 || size == so_far) { in verify_file()
/bootable/recovery/applypatch/
Dapplypatch.c69 file->size = file->st.st_size; in LoadFileContents()
70 file->data = malloc(file->size); in LoadFileContents()
80 ssize_t bytes_read = fread(file->data, 1, file->size, f); in LoadFileContents()
81 if (bytes_read != file->size) { in LoadFileContents()
83 filename, (long)bytes_read, (long)file->size); in LoadFileContents()
95 if (retouch_mask_data(file->data, file->size, in LoadFileContents()
104 SHA(file->data, file->size, file->sha1); in LoadFileContents()
171 size_t* size = malloc(pairs * sizeof(size_t)); in LoadPartitionContents() local
176 size[i] = strtol(size_str, NULL, 10); in LoadPartitionContents()
177 if (size[i] == 0) { in LoadPartitionContents()
[all …]
Dimgpatch.c44 if (patch->size < 12) { in ApplyImagePatch()
62 if (pos + 4 > patch->size) { in ApplyImagePatch()
72 if (pos > patch->size) { in ApplyImagePatch()
86 if (pos > patch->size) { in ApplyImagePatch()
93 if (pos + data_len > patch->size) { in ApplyImagePatch()
108 if (pos > patch->size) { in ApplyImagePatch()
131 size_t bonus_size = (i == 1 && bonus_data != NULL) ? bonus_data->size : 0; in ApplyImagePatch()
Dfreecache.c77 int size = 32; in FindExpendableFiles() local
79 *names = malloc(size * sizeof(char*)); in FindExpendableFiles()
108 if (*entries >= size) { in FindExpendableFiles()
109 size *= 2; in FindExpendableFiles()
110 *names = realloc(*names, size * sizeof(char*)); in FindExpendableFiles()
Dmain.c82 (*patches)[i]->size = fc.size; in ParsePatchArgs()
112 bonus->size = fc.size; in PatchMode()
Dbspatch.c84 int FillBuffer(unsigned char* buffer, int size, bz_stream* stream) { in FillBuffer() argument
86 stream->avail_out = size; in FillBuffer()
178 estream.avail_in = patch->size - (patch_offset + 32 + ctrl_len + data_len); in ApplyBSDiffPatchMem()
Dimgdiff_test.sh60 size() { function
94 /data/local/tmp/target $(sha1 $tmpdir/target) $(size $tmpdir/target) \
Dapplypatch.h33 ssize_t size; member
Dimgdiff.c607 unsigned char* MakePatch(ImageChunk* src, ImageChunk* tgt, size_t* size) { in MakePatch() argument
611 *size = tgt->len; in MakePatch()
638 *size = tgt->len; in MakePatch()
642 *size = st.st_size; in MakePatch()
/bootable/recovery/mtdutils/
Dmtdutils.c33 unsigned int size; member
145 p->size = mtdsize; in mtd_scan_partitions()
251 if (total_size != NULL) *total_size = mtd_info.size; in mtd_partition_info()
298 ssize_t size = partition->erase_size; in read_block() local
301 while (pos + size <= (int) partition->size) { in read_block()
302 if (lseek64(fd, pos, SEEK_SET) != pos || read(fd, data, size) != size) { in read_block()
415 ssize_t size = partition->erase_size; in write_block() local
416 while (pos + size <= (int) partition->size) { in write_block()
430 erase_info.length = size; in write_block()
439 write(fd, data, size) != size) { in write_block()
[all …]
/bootable/recovery/updater/
Dinstall.c421 v->size = -1; in PackageExtractFileFn()
433 v->size = mzGetZipEntryUncompLen(entry); in PackageExtractFileFn()
434 v->data = malloc(v->size); in PackageExtractFileFn()
437 name, (long)v->size, zip_path); in PackageExtractFileFn()
449 v->size = -1; in PackageExtractFileFn()
792 ssize_t wrote = mtd_write_data(ctx, contents->data, contents->size); in WriteRawImageFn()
793 success = (wrote == contents->size); in WriteRawImageFn()
944 int size = 0; in UIPrintFn() local
947 size += strlen(args[i]); in UIPrintFn()
949 char* buffer = malloc(size+1); in UIPrintFn()
[all …]
/bootable/recovery/edify/
Dmain.c190 int size = fread(buffer, 1, 8191, f); in main() local
192 buffer[size] = '\0'; in main()
196 yy_scan_bytes(buffer, size); in main()
Dexpr.h53 ssize_t size; member
Dexpr.c56 v->size = strlen(str); in StringValue()
/bootable/recovery/minadbd/
Dtransport_usb.c80 unsigned size = p->msg.data_length; in remote_write() local
89 if(usb_write(t->usb, &p->data, size)) { in remote_write()
/bootable/diskinstaller/
Dinstaller.c78 int size = 0; in exec_cmd() local
84 size = strlen(cmd) + 1; in exec_cmd()
87 size += strlen(str) + 1; /* need room for the space separator */ in exec_cmd()
91 if (!(outbuf = malloc(size + 1))) { in exec_cmd()
/bootable/recovery/minzip/
DHash.h85 size_t mzHashSize(size_t size);
DHash.c26 size_t mzHashSize(size_t size) { in mzHashSize() argument
27 return (size * LOAD_DENOM) / LOAD_NUMER +1; in mzHashSize()