Home
last modified time | relevance | path

Searched refs:token (Results 1 – 14 of 14) sorted by relevance

/system/core/libpixelflinger/codeflinger/
DArm64Disassembler.cpp95 static void get_token(const char *instr, uint32_t index, char *token) in get_token() argument
102 token[j++] = instr[i]; in get_token()
111 token[j++] = instr[i]; in get_token()
114 token[j] = '\0'; in get_token()
134 static void decode_token(uint32_t code, char *token, char *instr_part) in decode_token() argument
136 if(strcmp(token, "<imm1>") == 0) in decode_token()
138 else if(strcmp(token, "<imm2>") == 0) in decode_token()
140 else if(strcmp(token, "<shift1>") == 0) in decode_token()
142 else if(strcmp(token, "<shift2>") == 0) in decode_token()
147 else if(strcmp(token, "<shift3>") == 0) in decode_token()
[all …]
/system/core/adb/
Dadb_auth.h34 int adb_auth_sign(void *key, void *token, size_t token_size, void *sig);
38 static inline int adb_auth_generate_token(void *token, size_t token_size) { return 0; } in adb_auth_generate_token() argument
39 static inline int adb_auth_verify(void *token, void *sig, int siglen) { return 0; } in adb_auth_verify() argument
44 static inline int adb_auth_sign(void* key, void *token, size_t token_size, void *sig) { return 0; } in adb_auth_sign() argument
48 int adb_auth_generate_token(void *token, size_t token_size);
49 int adb_auth_verify(void *token, void *sig, int siglen);
Dremount_service.c39 char *token = NULL; in find_mount() local
51 token = strtok(buf, delims); in find_mount()
53 while (token) { in find_mount()
59 res = sscanf(token, "%255s %255s %*s %*s %d %d\n", in find_mount()
66 token = strtok(NULL, delims); in find_mount()
Dadb_auth_client.c124 int adb_auth_generate_token(void *token, size_t token_size) in adb_auth_generate_token() argument
133 ret = fread(token, token_size, 1, f); in adb_auth_generate_token()
139 int adb_auth_verify(void *token, void *sig, int siglen) in adb_auth_verify() argument
153 ret = RSA_verify(&key->key, sig, siglen, token, SHA_DIGEST_SIZE); in adb_auth_verify()
Dadb.c359 ret = adb_auth_generate_token(t->token, sizeof(t->token)); in send_auth_request()
360 if (ret != sizeof(t->token)) { in send_auth_request()
366 memcpy(p->data, t->token, ret); in send_auth_request()
373 static void send_auth_response(uint8_t *token, size_t token_size, atransport *t) in send_auth_response() argument
379 ret = adb_auth_sign(t->key, token, token_size, p->data); in send_auth_response()
574 if (adb_auth_verify(t->token, p->data, p->msg.data_length)) { in handle_packet()
Dadb_auth_host.c346 int adb_auth_sign(void *node, void *token, size_t token_size, void *sig) in adb_auth_sign() argument
351 if (!RSA_sign(NID_sha1, token, token_size, sig, &len, key->rsa)) { in adb_auth_sign()
Dprotocol.txt81 connect to the sender. If type is TOKEN(1), data is a random token that
87 packet and a new random token, so that the recipient can retry signing
178 sends a SYNC(1, token) and continues to discard messages
179 * when the io pump receives a matching SYNC(1, token), it once again
Dadb.h211 unsigned char token[TOKEN_SIZE]; member
/system/extras/ext4_utils/
Dcanned_fs_config.c63 char* token = NULL; in load_canned_fs_config() local
65 token = strtok(NULL, " "); in load_canned_fs_config()
66 if (token && strncmp(token, "capabilities=", 13) == 0) { in load_canned_fs_config()
67 p->capabilities = strtoll(token+13, NULL, 0); in load_canned_fs_config()
70 } while (token); in load_canned_fs_config()
/system/core/sdcard/
Dsdcard.c234 int token; member
832 TRACE("[%d] LOOKUP %s @ %"PRIx64" (%s)\n", handler->token, name, hdr->nodeid, in handle_lookup()
854 TRACE("[%d] FORGET #%"PRIu64" @ %"PRIx64" (%s)\n", handler->token, req->nlookup, in handle_forget()
874 TRACE("[%d] GETATTR flags=%x fh=%"PRIx64" @ %"PRIx64" (%s)\n", handler->token, in handle_getattr()
899 TRACE("[%d] SETATTR fh=%"PRIx64" valid=%x @ %"PRIx64" (%s)\n", handler->token, in handle_setattr()
943 handler->token, path, times[0].tv_sec, times[1].tv_sec); in handle_setattr()
964 TRACE("[%d] MKNOD %s 0%o @ %"PRIx64" (%s)\n", handler->token, in handle_mknod()
995 TRACE("[%d] MKDIR %s 0%o @ %"PRIx64" (%s)\n", handler->token, in handle_mkdir()
1044 TRACE("[%d] UNLINK %s @ %"PRIx64" (%s)\n", handler->token, in handle_unlink()
1073 TRACE("[%d] RMDIR %s @ %"PRIx64" (%s)\n", handler->token, in handle_rmdir()
[all …]
/system/core/include/utils/
DPropertyMap.h97 status_t parseModifier(const String8& token, int32_t* outMetaState);
/system/core/init/
Dueventd_parser.c212 int token = next_token(&state); in parse_config() local
213 switch (token) { in parse_config()
Dreadme.txt10 whitespace into a token. Double quotes may also be used to prevent
/system/vold/
Dcryptfs.c342 char *token; in get_device_scrypt_params() local
352 for (i = 0, token = strtok_r(paramstr, ":", &saveptr); in get_device_scrypt_params()
353 token != NULL && i < 3; in get_device_scrypt_params()
354 i++, token = strtok_r(NULL, ":", &saveptr)) { in get_device_scrypt_params()
356 params[i] = strtol(token, &endptr, 10); in get_device_scrypt_params()
362 if ((*token == '\0') || (*endptr != '\0') || params[i] < 0 || params[i] > 255) { in get_device_scrypt_params()
372 if ((i != 3) || (token != NULL)) { in get_device_scrypt_params()