/bootable/recovery/ |
verifier.cpp | 208 size_t so_far = 0; local 209 while (so_far < signed_len) { 210 size_t size = signed_len - so_far; 213 if (need_sha1) SHA_update(&sha1_ctx, addr + so_far, size); 214 if (need_sha256) SHA256_update(&sha256_ctx, addr + so_far, size); 215 so_far += size; 217 double f = so_far / (double)signed_len; 218 if (f > frac + 0.02 || size == so_far) {
|
/bootable/recovery/uncrypt/ |
uncrypt.c | 274 size_t so_far = 0; local 275 while (so_far < sb.st_blksize && pos < sb.st_size) { 276 ssize_t this_read = read(fd, buffers[tail] + so_far, sb.st_blksize - so_far); 281 so_far += this_read;
|
/build/tools/releasetools/ |
ota_from_target_files | 1174 so_far = system_diff.EmitVerification(script) variable 1233 so_far = system_diff.EmitPatches(script, total_patch_size, 0) variable 1236 so_far = vendor_diff.EmitPatches(script, total_patch_size, so_far) variable [all...] |
blockimgdiff.py | 813 so_far = RangeSet() 815 assert not so_far.overlaps(i) 816 so_far = so_far.union(i) 817 assert so_far == total
|
/bootable/recovery/applypatch/ |
applypatch.c | 477 size_t so_far = 0; local 478 while (so_far < to_read) { 479 ssize_t read_count = read(fd, buffer+so_far, to_read-so_far); 493 so_far += read_count; [all...] |
/bootable/recovery/updater/ |
blockimg.c | 84 size_t so_far = 0; local 85 while (so_far < size) { 86 ssize_t r = read(fd, data+so_far, size-so_far); 91 so_far += r;
|