/system/core/libpixelflinger/codeflinger/ |
D | Arm64Disassembler.cpp | 95 static void get_token(const char *instr, uint32_t index, char *token) in get_token() argument 102 token[j++] = instr[i]; in get_token() 111 token[j++] = instr[i]; in get_token() 114 token[j] = '\0'; in get_token() 134 static void decode_token(uint32_t code, char *token, char *instr_part) in decode_token() argument 136 if(strcmp(token, "<imm1>") == 0) in decode_token() 138 else if(strcmp(token, "<imm2>") == 0) in decode_token() 140 else if(strcmp(token, "<shift1>") == 0) in decode_token() 142 else if(strcmp(token, "<shift2>") == 0) in decode_token() 147 else if(strcmp(token, "<shift3>") == 0) in decode_token() [all …]
|
/system/core/adb/ |
D | adb_auth.h | 34 int adb_auth_sign(void *key, void *token, size_t token_size, void *sig); 38 static inline int adb_auth_generate_token(void *token, size_t token_size) { return 0; } in adb_auth_generate_token() argument 39 static inline int adb_auth_verify(void *token, void *sig, int siglen) { return 0; } in adb_auth_verify() argument 44 static inline int adb_auth_sign(void* key, void *token, size_t token_size, void *sig) { return 0; } in adb_auth_sign() argument 48 int adb_auth_generate_token(void *token, size_t token_size); 49 int adb_auth_verify(void *token, void *sig, int siglen);
|
D | remount_service.c | 39 char *token = NULL; in find_mount() local 51 token = strtok(buf, delims); in find_mount() 53 while (token) { in find_mount() 59 res = sscanf(token, "%255s %255s %*s %*s %d %d\n", in find_mount() 66 token = strtok(NULL, delims); in find_mount()
|
D | adb_auth_client.c | 124 int adb_auth_generate_token(void *token, size_t token_size) in adb_auth_generate_token() argument 133 ret = fread(token, token_size, 1, f); in adb_auth_generate_token() 139 int adb_auth_verify(void *token, void *sig, int siglen) in adb_auth_verify() argument 153 ret = RSA_verify(&key->key, sig, siglen, token, SHA_DIGEST_SIZE); in adb_auth_verify()
|
D | adb.c | 359 ret = adb_auth_generate_token(t->token, sizeof(t->token)); in send_auth_request() 360 if (ret != sizeof(t->token)) { in send_auth_request() 366 memcpy(p->data, t->token, ret); in send_auth_request() 373 static void send_auth_response(uint8_t *token, size_t token_size, atransport *t) in send_auth_response() argument 379 ret = adb_auth_sign(t->key, token, token_size, p->data); in send_auth_response() 574 if (adb_auth_verify(t->token, p->data, p->msg.data_length)) { in handle_packet()
|
D | adb_auth_host.c | 346 int adb_auth_sign(void *node, void *token, size_t token_size, void *sig) in adb_auth_sign() argument 351 if (!RSA_sign(NID_sha1, token, token_size, sig, &len, key->rsa)) { in adb_auth_sign()
|
D | protocol.txt | 81 connect to the sender. If type is TOKEN(1), data is a random token that 87 packet and a new random token, so that the recipient can retry signing 178 sends a SYNC(1, token) and continues to discard messages 179 * when the io pump receives a matching SYNC(1, token), it once again
|
D | adb.h | 211 unsigned char token[TOKEN_SIZE]; member
|
/system/extras/ext4_utils/ |
D | canned_fs_config.c | 63 char* token = NULL; in load_canned_fs_config() local 65 token = strtok(NULL, " "); in load_canned_fs_config() 66 if (token && strncmp(token, "capabilities=", 13) == 0) { in load_canned_fs_config() 67 p->capabilities = strtoll(token+13, NULL, 0); in load_canned_fs_config() 70 } while (token); in load_canned_fs_config()
|
/system/core/sdcard/ |
D | sdcard.c | 234 int token; member 832 TRACE("[%d] LOOKUP %s @ %"PRIx64" (%s)\n", handler->token, name, hdr->nodeid, in handle_lookup() 854 TRACE("[%d] FORGET #%"PRIu64" @ %"PRIx64" (%s)\n", handler->token, req->nlookup, in handle_forget() 874 TRACE("[%d] GETATTR flags=%x fh=%"PRIx64" @ %"PRIx64" (%s)\n", handler->token, in handle_getattr() 899 TRACE("[%d] SETATTR fh=%"PRIx64" valid=%x @ %"PRIx64" (%s)\n", handler->token, in handle_setattr() 943 handler->token, path, times[0].tv_sec, times[1].tv_sec); in handle_setattr() 964 TRACE("[%d] MKNOD %s 0%o @ %"PRIx64" (%s)\n", handler->token, in handle_mknod() 995 TRACE("[%d] MKDIR %s 0%o @ %"PRIx64" (%s)\n", handler->token, in handle_mkdir() 1044 TRACE("[%d] UNLINK %s @ %"PRIx64" (%s)\n", handler->token, in handle_unlink() 1073 TRACE("[%d] RMDIR %s @ %"PRIx64" (%s)\n", handler->token, in handle_rmdir() [all …]
|
/system/core/include/utils/ |
D | PropertyMap.h | 97 status_t parseModifier(const String8& token, int32_t* outMetaState);
|
/system/core/init/ |
D | ueventd_parser.c | 212 int token = next_token(&state); in parse_config() local 213 switch (token) { in parse_config()
|
D | readme.txt | 10 whitespace into a token. Double quotes may also be used to prevent
|
/system/vold/ |
D | cryptfs.c | 342 char *token; in get_device_scrypt_params() local 352 for (i = 0, token = strtok_r(paramstr, ":", &saveptr); in get_device_scrypt_params() 353 token != NULL && i < 3; in get_device_scrypt_params() 354 i++, token = strtok_r(NULL, ":", &saveptr)) { in get_device_scrypt_params() 356 params[i] = strtol(token, &endptr, 10); in get_device_scrypt_params() 362 if ((*token == '\0') || (*endptr != '\0') || params[i] < 0 || params[i] > 255) { in get_device_scrypt_params() 372 if ((i != 3) || (token != NULL)) { in get_device_scrypt_params()
|