/system/core/adb/ |
D | adb_auth.h | 34 int adb_auth_sign(void *key, void *token, size_t token_size, void *sig); 38 static inline int adb_auth_generate_token(void *token, size_t token_size) { return 0; } in adb_auth_generate_token() argument 39 static inline int adb_auth_verify(void *token, void *sig, int siglen) { return 0; } in adb_auth_verify() argument 44 static inline int adb_auth_sign(void* key, void *token, size_t token_size, void *sig) { return 0; } in adb_auth_sign() argument 48 int adb_auth_generate_token(void *token, size_t token_size); 49 int adb_auth_verify(void *token, void *sig, int siglen);
|
D | remount_service.c | 39 char *token = NULL; in find_mount() local 51 token = strtok(buf, delims); in find_mount() 53 while (token) { in find_mount() 59 res = sscanf(token, "%255s %255s %*s %*s %d %d\n", in find_mount() 66 token = strtok(NULL, delims); in find_mount()
|
D | adb_auth_client.c | 124 int adb_auth_generate_token(void *token, size_t token_size) in adb_auth_generate_token() argument 133 ret = fread(token, token_size, 1, f); in adb_auth_generate_token() 139 int adb_auth_verify(void *token, void *sig, int siglen) in adb_auth_verify() argument 153 ret = RSA_verify(&key->key, sig, siglen, token, SHA_DIGEST_SIZE); in adb_auth_verify()
|
D | adb.c | 336 ret = adb_auth_generate_token(t->token, sizeof(t->token)); in send_auth_request() 337 if (ret != sizeof(t->token)) { in send_auth_request() 343 memcpy(p->data, t->token, ret); in send_auth_request() 350 static void send_auth_response(uint8_t *token, size_t token_size, atransport *t) in send_auth_response() argument 356 ret = adb_auth_sign(t->key, token, token_size, p->data); in send_auth_response() 551 if (adb_auth_verify(t->token, p->data, p->msg.data_length)) { in handle_packet()
|
D | adb_auth_host.c | 346 int adb_auth_sign(void *node, void *token, size_t token_size, void *sig) in adb_auth_sign() argument 351 if (!RSA_sign(NID_sha1, token, token_size, sig, &len, key->rsa)) { in adb_auth_sign()
|
D | protocol.txt | 81 connect to the sender. If type is TOKEN(1), data is a random token that 87 packet and a new random token, so that the recipient can retry signing 178 sends a SYNC(1, token) and continues to discard messages 179 * when the io pump receives a matching SYNC(1, token), it once again
|
D | adb.h | 204 unsigned char token[TOKEN_SIZE]; member
|
/system/core/init/ |
D | ueventd_parser.c | 41 int token = next_token(&state); in parse_config() local 42 switch (token) { in parse_config()
|
D | readme.txt | 10 whitespace into a token. Double quotes may also be used to prevent
|
/system/core/sdcard/ |
D | sdcard.c | 229 int token; member 822 TRACE("[%d] LOOKUP %s @ %llx (%s)\n", handler->token, name, hdr->nodeid, in handle_lookup() 844 TRACE("[%d] FORGET #%lld @ %llx (%s)\n", handler->token, req->nlookup, in handle_forget() 864 TRACE("[%d] GETATTR flags=%x fh=%llx @ %llx (%s)\n", handler->token, in handle_getattr() 889 TRACE("[%d] SETATTR fh=%llx valid=%x @ %llx (%s)\n", handler->token, in handle_setattr() 933 handler->token, path, times[0].tv_sec, times[1].tv_sec); in handle_setattr() 954 TRACE("[%d] MKNOD %s 0%o @ %llx (%s)\n", handler->token, in handle_mknod() 985 TRACE("[%d] MKDIR %s 0%o @ %llx (%s)\n", handler->token, in handle_mkdir() 1034 TRACE("[%d] UNLINK %s @ %llx (%s)\n", handler->token, in handle_unlink() 1063 TRACE("[%d] RMDIR %s @ %llx (%s)\n", handler->token, in handle_rmdir() [all …]
|
/system/core/sh/ |
D | mktokens | 71 exec > token.h
|
D | Android.mk | 45 p4 edit init.c nodes.c nodes.h token.h
|
D | arith.y | 61 %token ARITH_NUM ARITH_LPAREN ARITH_RPAREN
|
D | parser.c | 792 #define RETURN(token) return lasttoken = token argument 1598 synexpect(int token) in synexpect() argument 1602 if (token >= 0) { in synexpect() 1604 tokname[lasttoken], tokname[token]); in synexpect()
|
D | TOUR | 32 mktokens - token.h
|
/system/core/include/utils/ |
D | PropertyMap.h | 97 status_t parseModifier(const String8& token, int32_t* outMetaState);
|
/system/vold/ |
D | cryptfs.c | 112 char *token; in get_device_scrypt_params() local 122 for (i = 0, token = strtok_r(paramstr, ":", &saveptr); in get_device_scrypt_params() 123 token != NULL && i < 3; in get_device_scrypt_params() 124 i++, token = strtok_r(NULL, ":", &saveptr)) { in get_device_scrypt_params() 126 params[i] = strtol(token, &endptr, 10); in get_device_scrypt_params() 132 if ((*token == '\0') || (*endptr != '\0') || params[i] < 0 || params[i] > 255) { in get_device_scrypt_params() 142 if ((i != 3) || (token != NULL)) { in get_device_scrypt_params()
|