Home
last modified time | relevance | path

Searched refs:token (Results 1 – 17 of 17) sorted by relevance

/system/core/adb/
Dadb_auth.h34 int adb_auth_sign(void *key, void *token, size_t token_size, void *sig);
38 static inline int adb_auth_generate_token(void *token, size_t token_size) { return 0; } in adb_auth_generate_token() argument
39 static inline int adb_auth_verify(void *token, void *sig, int siglen) { return 0; } in adb_auth_verify() argument
44 static inline int adb_auth_sign(void* key, void *token, size_t token_size, void *sig) { return 0; } in adb_auth_sign() argument
48 int adb_auth_generate_token(void *token, size_t token_size);
49 int adb_auth_verify(void *token, void *sig, int siglen);
Dremount_service.c39 char *token = NULL; in find_mount() local
51 token = strtok(buf, delims); in find_mount()
53 while (token) { in find_mount()
59 res = sscanf(token, "%255s %255s %*s %*s %d %d\n", in find_mount()
66 token = strtok(NULL, delims); in find_mount()
Dadb_auth_client.c124 int adb_auth_generate_token(void *token, size_t token_size) in adb_auth_generate_token() argument
133 ret = fread(token, token_size, 1, f); in adb_auth_generate_token()
139 int adb_auth_verify(void *token, void *sig, int siglen) in adb_auth_verify() argument
153 ret = RSA_verify(&key->key, sig, siglen, token, SHA_DIGEST_SIZE); in adb_auth_verify()
Dadb.c336 ret = adb_auth_generate_token(t->token, sizeof(t->token)); in send_auth_request()
337 if (ret != sizeof(t->token)) { in send_auth_request()
343 memcpy(p->data, t->token, ret); in send_auth_request()
350 static void send_auth_response(uint8_t *token, size_t token_size, atransport *t) in send_auth_response() argument
356 ret = adb_auth_sign(t->key, token, token_size, p->data); in send_auth_response()
551 if (adb_auth_verify(t->token, p->data, p->msg.data_length)) { in handle_packet()
Dadb_auth_host.c346 int adb_auth_sign(void *node, void *token, size_t token_size, void *sig) in adb_auth_sign() argument
351 if (!RSA_sign(NID_sha1, token, token_size, sig, &len, key->rsa)) { in adb_auth_sign()
Dprotocol.txt81 connect to the sender. If type is TOKEN(1), data is a random token that
87 packet and a new random token, so that the recipient can retry signing
178 sends a SYNC(1, token) and continues to discard messages
179 * when the io pump receives a matching SYNC(1, token), it once again
Dadb.h204 unsigned char token[TOKEN_SIZE]; member
/system/core/init/
Dueventd_parser.c41 int token = next_token(&state); in parse_config() local
42 switch (token) { in parse_config()
Dreadme.txt10 whitespace into a token. Double quotes may also be used to prevent
/system/core/sdcard/
Dsdcard.c229 int token; member
822 TRACE("[%d] LOOKUP %s @ %llx (%s)\n", handler->token, name, hdr->nodeid, in handle_lookup()
844 TRACE("[%d] FORGET #%lld @ %llx (%s)\n", handler->token, req->nlookup, in handle_forget()
864 TRACE("[%d] GETATTR flags=%x fh=%llx @ %llx (%s)\n", handler->token, in handle_getattr()
889 TRACE("[%d] SETATTR fh=%llx valid=%x @ %llx (%s)\n", handler->token, in handle_setattr()
933 handler->token, path, times[0].tv_sec, times[1].tv_sec); in handle_setattr()
954 TRACE("[%d] MKNOD %s 0%o @ %llx (%s)\n", handler->token, in handle_mknod()
985 TRACE("[%d] MKDIR %s 0%o @ %llx (%s)\n", handler->token, in handle_mkdir()
1034 TRACE("[%d] UNLINK %s @ %llx (%s)\n", handler->token, in handle_unlink()
1063 TRACE("[%d] RMDIR %s @ %llx (%s)\n", handler->token, in handle_rmdir()
[all …]
/system/core/sh/
Dmktokens71 exec > token.h
DAndroid.mk45 p4 edit init.c nodes.c nodes.h token.h
Darith.y61 %token ARITH_NUM ARITH_LPAREN ARITH_RPAREN
Dparser.c792 #define RETURN(token) return lasttoken = token argument
1598 synexpect(int token) in synexpect() argument
1602 if (token >= 0) { in synexpect()
1604 tokname[lasttoken], tokname[token]); in synexpect()
DTOUR32 mktokens - token.h
/system/core/include/utils/
DPropertyMap.h97 status_t parseModifier(const String8& token, int32_t* outMetaState);
/system/vold/
Dcryptfs.c112 char *token; in get_device_scrypt_params() local
122 for (i = 0, token = strtok_r(paramstr, ":", &saveptr); in get_device_scrypt_params()
123 token != NULL && i < 3; in get_device_scrypt_params()
124 i++, token = strtok_r(NULL, ":", &saveptr)) { in get_device_scrypt_params()
126 params[i] = strtol(token, &endptr, 10); in get_device_scrypt_params()
132 if ((*token == '\0') || (*endptr != '\0') || params[i] < 0 || params[i] > 255) { in get_device_scrypt_params()
142 if ((i != 3) || (token != NULL)) { in get_device_scrypt_params()