/bootable/recovery/otautil/ |
D | asn1_decoder.cpp | 59 size_t length = 0; in decode_length() local 65 length <<= 8; in decode_length() 66 length += byte; in decode_length() 68 *out_len = length; in decode_length() 80 size_t length; in asn1_constructed_get() local 81 if (!decode_length(&length) || length > length_) { in asn1_constructed_get() 84 asn1_context* app_ctx = new asn1_context(p_, length); in asn1_constructed_get() 93 size_t length; in asn1_constructed_skip_all() local 94 if (!decode_length(&length) || !skip_bytes(length)) { in asn1_constructed_skip_all() 110 size_t length; in asn1_sequence_get() local [all …]
|
D | package.cpp | 62 uint64_t length) override; 110 uint64_t length) override; 157 package_size_ = map_->length; in MemoryPackage() 187 uint64_t start, uint64_t length) { in UpdateHashAtOffset() argument 188 if (length > package_size_ || start > package_size_ - length) { in UpdateHashAtOffset() 189 LOG(ERROR) << "Out of bound read, offset: " << start << ", size: " << length in UpdateHashAtOffset() 195 hasher(addr_ + start, length); in UpdateHashAtOffset() 243 uint64_t start, uint64_t length) { in UpdateHashAtOffset() argument 244 if (length > package_size_ || start > package_size_ - length) { in UpdateHashAtOffset() 245 LOG(ERROR) << "Out of bound read, offset: " << start << ", size: " << length in UpdateHashAtOffset() [all …]
|
D | verifier.cpp | 126 uint64_t length = package->GetPackageSize(); in verify_file() local 128 if (length < FOOTER_SIZE) { in verify_file() 134 if (!package->ReadFullyAtOffset(footer, FOOTER_SIZE, length - FOOTER_SIZE)) { in verify_file() 165 if (length < eocd_size) { in verify_file() 173 uint64_t signed_len = length - eocd_size + EOCD_HEADER_SIZE - 2; in verify_file() 176 if (!package->ReadFullyAtOffset(eocd, eocd_size, length - eocd_size)) { in verify_file() 249 LOG(INFO) << "signature (offset: " << std::hex << (length - signature_start) in verify_file()
|
D | sysutil.cpp | 119 length = sb.st_size; in MapFD() 178 length = block_map_data.file_size(); in MapBlockFile() 215 if (munmap(range.addr, range.length) == -1) { in ~MemMapping() 216 PLOG(ERROR) << "Failed to munmap(" << range.addr << ", " << range.length << ")"; in ~MemMapping()
|
/bootable/recovery/tests/unit/ |
D | asn1_decoder_test.cpp | 37 size_t length; in TEST() local 38 ASSERT_FALSE(ctx.asn1_oid_get(&junk, &length)); in TEST() 39 ASSERT_FALSE(ctx.asn1_octet_string_get(&junk, &length)); in TEST() 61 size_t length; in TEST() local 62 ASSERT_FALSE(ptr->asn1_oid_get(&oid, &length)); in TEST() 72 size_t length; in TEST() local 73 ASSERT_TRUE(ptr->asn1_oid_get(&oid, &length)); in TEST() 74 ASSERT_EQ(1U, length); in TEST() 89 size_t length; in TEST() local 90 ASSERT_TRUE(ctx.asn1_oid_get(&oid, &length)); in TEST() [all …]
|
D | sysutil_test.cpp | 101 ASSERT_EQ(content.size(), mapping.length); in TEST() 122 ASSERT_EQ(file_size, mapping.length); in TEST() 130 ASSERT_EQ(file_size, mapping.length); in TEST() 138 ASSERT_EQ(file_size, mapping.length); in TEST() 146 ASSERT_EQ(file_size, mapping.length); in TEST()
|
D | uncrypt_test.cpp | 109 int length = static_cast<int>(message.size()); in SetupOrClearBcb() local 110 int length_out = htonl(length); in SetupOrClearBcb() 113 ASSERT_TRUE(android::base::WriteFully(sockfd, message.data(), length)) in SetupOrClearBcb()
|
D | zip_test.cpp | 37 ASSERT_EQ(0, OpenArchiveFromMemory(map.addr, map.length, zip_path.c_str(), &handle)); in TEST()
|
/bootable/recovery/recovery_utils/ |
D | roots.cpp | 61 .length = 0, in load_volume_table() 68 << " " << entry.fs_type << " " << entry.blk_device << " " << entry.length in load_volume_table() 163 int64_t length = 0; in format_volume() local 164 if (v->length > 0) { in format_volume() 165 length = v->length; in format_volume() 166 } else if (v->length < 0) { in format_volume() 172 length = get_file_size(fd.get(), -v->length); in format_volume() 173 if (length <= 0) { in format_volume() 174 LOG(ERROR) << "get_file_size: invalid size " << length << " for " << v->blk_device; in format_volume() 186 if (!v->metadata_key_dir.empty() && length == 0 && new_fstype.empty()) { in format_volume() [all …]
|
/bootable/recovery/otautil/include/private/ |
D | asn1_decoder.h | 25 asn1_context(const uint8_t* buffer, size_t length) : p_(buffer), length_(length), app_type_(0) {} in asn1_context() argument 32 bool asn1_oid_get(const uint8_t** oid, size_t* length); 33 bool asn1_octet_string_get(const uint8_t** octet_string, size_t* length);
|
/bootable/recovery/updater_sample/src/com/example/android/systemupdatersample/util/ |
D | PayloadSpecs.java | 62 long extraSize = entry.getExtra() == null ? 0 : entry.getExtra().length; in forNonStreaming() 63 offset += 30 + name.length() + extraSize; in forNonStreaming() 69 long length = entry.getCompressedSize(); in forNonStreaming() local 76 payloadSize = length; in forNonStreaming() 87 offset += length; in forNonStreaming()
|
/bootable/libbootloader/gbl/third_party/libzbi/src/ |
D | lib.rs | 141 usize::try_from(hdr.length).map_err(|_| ZbiError::PlatformBadLength)?; in parse() 238 header.length = payload_len_u32; in new() 287 payload_length: usize::try_from(header.length) in construct() 297 self.header.length in get_payload_length_u32() 325 if hdr.length == 0 { in is_bootable() 353 let length: usize = header.length.try_into().map_err(|_| ZbiError::TooBig)?; in parse() localVariable 354 if length > payload.len() { in parse() 389 self.header.length = u32::try_from(len).map_err(|_| ZbiError::PlatformBadLength)?; in set_payload_length_usize() 408 let length = self.get_payload_length_usize(); in align_tail() localVariable 409 let align_offset = get_align_buffer_offset(&self.buffer[length..])?; in align_tail() [all …]
|
D | zbi_format.rs | 115 pub length: u32, field 143 unsafe { ::std::ptr::addr_of!((*ptr).length) as usize - ptr as usize }, in bindgen_test_layout_zbi_header_t() 145 concat!("Offset of field: ", stringify!(zbi_header_t), "::", stringify!(length)) in bindgen_test_layout_zbi_header_t()
|
/bootable/recovery/install/ |
D | wipe_device.cpp | 54 auto length = entry.uncompressed_length; in GetWipePartitionList() local 55 if (length > std::numeric_limits<size_t>::max()) { in GetWipePartitionList() 57 << " because's uncompressed size exceeds size of address space. " << length; in GetWipePartitionList() 60 partition_list_content = std::string(length, '\0'); in GetWipePartitionList() 62 zip, &entry, reinterpret_cast<uint8_t*>(partition_list_content.data()), length); in GetWipePartitionList()
|
D | install.cpp | 92 uint32_t length = entry.uncompressed_length; in ReadMetadataFromPackage() local 93 std::string metadata_string(length, '\0'); in ReadMetadataFromPackage() 95 ExtractToMemory(zip, &entry, reinterpret_cast<uint8_t*>(&metadata_string[0]), length); in ReadMetadataFromPackage() 799 if (target_token.length() > str_list.length()) { in isInStringList() 801 } else if (target_token.length() == str_list.length() || deliminator.length() == 0) { in isInStringList()
|
/bootable/recovery/minui/ |
D | graphics_fbdev.cpp | 106 vi.bits_per_pixel, vi.red.offset, vi.red.length, vi.green.offset, vi.green.length, in Init() 107 vi.blue.offset, vi.blue.length); in Init()
|
/bootable/recovery/otautil/include/otautil/ |
D | sysutil.h | 90 size_t length; // length of data variable 95 size_t length; member
|
/bootable/deprecated-ota/applypatch/ |
D | imgdiff.cpp | 197 static bool AlignHead(size_t* start, size_t* length) { in AlignHead() argument 200 if (*length <= residual) { in AlignHead() 201 *length = 0; in AlignHead() 207 *length -= residual; in AlignHead() 211 static bool AlignTail(size_t* start, size_t* length) { in AlignTail() argument 212 size_t residual = (*start + *length) % BLOCK_SIZE; in AlignTail() 213 if (*length <= residual) { in AlignTail() 214 *length = 0; in AlignTail() 219 *length -= residual; in AlignTail() 226 static bool RemoveUsedBlocks(size_t* start, size_t* length, const SortedRangeSet& used_ranges) { in RemoveUsedBlocks() argument [all …]
|
/bootable/libbootloader/gbl/efi/src/ |
D | fuchsia_boot.rs | 51 let kernel_size = usize_add(2 * size_of::<ZbiHeader>(), kernel_header.zbi_item_header.length)?; in relocate_kernel() 60 dest_kernel_header.container_header.length = (kernel_size - size_of::<ZbiHeader>()) in relocate_kernel() 122 .length; in load_fuchsia_simple()
|
/bootable/recovery/uncrypt/ |
D | uncrypt.cpp | 569 int length; in setup_bcb() local 570 if (!android::base::ReadFully(socket, &length, 4)) { in setup_bcb() 574 length = ntohl(length); in setup_bcb() 578 content.resize(length); in setup_bcb() 579 if (!android::base::ReadFully(socket, &content[0], length)) { in setup_bcb()
|
/bootable/libbootloader/gbl/libefi/defs/protocols/ |
D | device_path_protocol.h | 26 uint8_t length[2]; member
|
/bootable/libbootloader/gbl/docs/ |
D | efi_protocols.md | 35 The DevicePath protocol is a variable length binary structure 36 made of variable length Device Path nodes.
|
/bootable/recovery/updater_sample/src/com/example/android/systemupdatersample/ |
D | UpdateConfig.java | 79 for (int i = 0; i < propertyFilesJson.length(); i++) { in fromJson() 165 return new File(mUrl.substring(7, mUrl.length())); in getUpdatePackageFile()
|
/bootable/deprecated-ota/updater/include/private/ |
D | commands.h | 170 PatchInfo(size_t offset, size_t length) : offset_(offset), length_(length) {} in PatchInfo() argument 176 size_t length() const { in length() function
|
/bootable/deprecated-ota/updater/include/updater/ |
D | updater.h | 69 return mapped_package_.length; in GetMappedPackageLength()
|