/external/ImageMagick/coders/ |
jnx.c | 48 #include "MagickCore/blob.h" 49 #include "MagickCore/blob-private.h" 261 *blob; 285 blob=(unsigned char *) AcquireQuantumMemory((size_t) tile_length+2, 286 sizeof(*blob)); 287 if (blob == (unsigned char *) NULL) 293 blob[0]=0xFF; 294 blob[1]=0xD8; 295 count=ReadBlob(image,tile_length,blob+2); 300 blob=(unsigned char *) RelinquishMagickMemory(blob) 257 *blob; local [all...] |
/external/autotest/client/cros/faft/utils/ |
os_interface.py | 302 def retrieve_body_version(self, blob): 303 """Given a blob, retrieve body version. 310 magic, _, kb_size = struct.unpack_from(header_format, blob) 315 _, version = struct.unpack_from(preamble_format, blob, kb_size) 318 def retrieve_datakey_version(self, blob): 319 """Given a blob, retrieve firmware data key version. 325 magic, _, version = struct.unpack_from(header_format, blob) 330 def retrieve_kernel_subkey_version(self, blob): 331 """Given a blob, retrieve kernel subkey version. 338 magic, _, kb_size = struct.unpack_from(header_format, blob) [all...] |
/hardware/interfaces/keymaster/3.0/default/ |
KeymasterDevice.cpp | 256 keymaster_param_blob(tag, &keyParams[i].blob[0], keyParams[i].blob.size()); 278 inline static keymaster_blob_t hidlVec2KmBlob(const hidl_vec<uint8_t>& blob) { 279 /* hidl unmarshals funny pointers if the the blob is empty */ 280 if (blob.size()) return {&blob[0], blob.size()}; 284 inline static keymaster_key_blob_t hidlVec2KmKeyBlob(const hidl_vec<uint8_t>& blob) { 285 /* hidl unmarshals funny pointers if the the blob is empty */ 286 if (blob.size()) return {&blob[0], blob.size()} [all...] |
/hardware/libhardware/include/hardware/ |
keymaster_defs.h | 314 keymaster_blob_t blob; /* KM_BIGNUM and KM_BYTES*/ member in union:__anon41351::__anon41352 518 param.blob.data = (uint8_t*)bytes; 519 param.blob.data_length = bytes_len; 565 if (a->blob.data_length != 0 && b->blob.data_length == 0) 567 if (a->blob.data_length == 0 && b->blob.data_length == 0) 569 if (a->blob.data_length == 0 && b->blob.data_length > 0) 572 retval = memcmp(a->blob.data, b->blob.data, a->blob.data_length < b->blob.data_lengt [all...] |
/system/update_engine/payload_generator/ |
payload_signer_unittest.cc | 102 void SignSampleData(brillo::Blob* out_signature_blob, 104 brillo::Blob data_blob(std::begin(kDataToSign), 109 brillo::Blob hash_blob; 136 brillo::Blob payload_metadata_blob; 150 brillo::Blob padded_hash_data_{std::begin(kDataHash), std::end(kDataHash)}; 166 brillo::Blob signature_blob; 185 brillo::Blob signature_blob; 202 brillo::Blob signature_blob; 230 brillo::Blob unsigned_payload_hash, unsigned_metadata_hash; 238 brillo::Blob signed_payload_hash, signed_metadata_hash [all...] |
delta_diff_utils.cc | 161 // Returns true if the given blob |data| contains gzip header magic. 162 bool ContainsGZip(const brillo::Blob& data) { 339 // to optimize it using REPLACE_BZ operations. The blob for a REPLACE_BZ of 445 brillo::Blob data; 501 bool GenerateBestFullOperation(const brillo::Blob& new_data, 503 brillo::Blob* out_blob, 513 *out_blob = brillo::Blob(); 522 brillo::Blob new_data_xz; 532 brillo::Blob new_data_bz; 534 // to compress the blob with bzip2 if we already have a good REPLACE_XZ [all...] |
/external/openssh/ |
monitor_wrap.c | 404 u_char *blob; local 410 /* Convert the key to a blob and the pass it over */ 411 if (!key_to_blob(key, &blob, &len)) 418 buffer_put_string(&m, blob, len); 420 free(blob); 449 u_char *blob; local 455 /* Convert the key to a blob and the pass it over */ 456 if (!key_to_blob(key, &blob, &len)) 460 buffer_put_string(&m, blob, len); 463 free(blob); 882 u_char *blob; local 918 u_char *blob; local 948 u_char *blob; local [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_config.h | 82 * Alternatively, a named configuration blob can be used by setting 83 * this to blob://blob_name. 123 * Alternatively, a named configuration blob can be used by setting 124 * this to blob://blob_name. 150 * Alternatively, a named configuration blob can be used by setting 151 * this to blob://blob_name. 175 * Alternatively, a named configuration blob can be used by setting 176 * this to blob://blob_name. 260 * Alternatively, a named configuration blob can be used by setting 261 * this to blob://blob_name [all...] |
eap.h | 187 * set_config_blob - Set named configuration blob 189 * @blob: New value for the blob 191 * Adds a new configuration blob or replaces the current value of an 192 * existing blob. 194 void (*set_config_blob)(void *ctx, struct wpa_config_blob *blob); 197 * get_config_blob - Get a named configuration blob 199 * @name: Name of the blob 200 * Returns: Pointer to blob data or %NULL if not found
|
/external/clang/test/Index/ |
print-type.cpp | 45 struct Blob { 49 int Blob::*member_pointer; 55 auto autoBlob = new Blob(); 127 // CHECK: StructDecl=Blob:45:8 (Definition) [type=Blob] [typekind=Record] [isPOD=1] [nbFields=2] 129 // CHECK: VarDecl=member_pointer:49:12 (Definition) [type=int Blob::*] [typekind=MemberPointer] [isPOD=1] 141 // CHECK: VarDecl=autoBlob:55:6 (Definition) [type=Blob *] [typekind=Auto] [canonicaltype=Blob *] [canonicaltypekind=Pointer] [isPOD=1] 142 // CHECK: CXXNewExpr= [type=Blob *] [typekind=Pointer] [isPOD=1] [pointeetype=Blob] [pointeekind=Record [all...] |
/external/clang/lib/Frontend/ |
SerializedDiagnosticReader.cpp | 183 StringRef Blob; 184 unsigned RecID = Stream.readRecord(BlockOrCode, Record, &Blob); 195 if ((EC = visitCategoryRecord(Record[0], Blob))) 205 Record[5], Record[6], Blob))) 212 if ((EC = visitDiagFlagRecord(Record[0], Blob))) 220 if ((EC = visitFilenameRecord(Record[0], Record[1], Record[2], Blob))) 229 Location(Record[4], Record[5], Record[6], Record[7]), Blob)))
|
/external/libdrm/tests/proptest/ |
proptest.c | 56 drmModePropertyBlobPtr blob; local 58 blob = drmModeGetPropertyBlob(fd, blob_id); 59 if (!blob) { 64 blob_data = blob->data; 66 for (i = 0; i < blob->length; i++) { 73 drmModeFreePropertyBlob(blob); 106 printf(" blob");
|
/external/syslinux/doc/ |
sdi.txt | 99 * No BOOT BLOB in image 113 * BOOT BLOB is empty 124 * BOOT BLOB extends beyond file 125 You have a BOOT BLOB in your SDI file, but its size is invalid 129 * BOOT BLOB too large for memory 130 Your BOOT BLOB seems correct, however there is not enough memory 132 abnormal situation as the BOOT BLOB is usually very small. Your SDI
|
/external/llvm/include/llvm/Bitcode/ |
BitstreamWriter.h | 296 /// data that should be emitted as part of the Blob or Array operand that is 302 StringRef Blob, Optional<unsigned> Code) { 303 const char *BlobData = Blob.data(); 304 unsigned BlobLen = (unsigned) Blob.size(); 320 Op.getEncoding() != BitCodeAbbrevOp::Blob && 338 // If this record has blob data, emit it, otherwise we must have record 342 "Blob data and record entries specified for array!"); 350 // Know that blob data is consumed for assertion below. 360 } else if (Op.getEncoding() == BitCodeAbbrevOp::Blob) { 361 // If this record has blob data, emit it, otherwise we must have recor [all...] |
/external/skia/src/gpu/text/ |
GrStencilAndCoverTextContext.cpp | 133 const SkTextBlob* blob, 139 SkTextBlobRunIterator it(blob); 191 const TextBlob& blob = this->findOrCreateTextBlob(skBlob, skPaint); local 193 TextBlob::Iter iter(blob); 217 // The font-related parameters are baked into the text blob and will override this skPaint, so 225 TextBlob* blob = new TextBlob(skBlob->uniqueID(), skBlob, skPaint); local 226 this->purgeToFit(*blob); 227 fBlobIdCache.set(skBlob->uniqueID(), blob); 228 fLRUList.addToTail(blob); 229 fCacheSize += blob->cpuMemorySize() 242 TextBlob* blob = new TextBlob(key, skBlob, skPaint); local [all...] |
/system/update_engine/scripts/update_payload/ |
test_utils.py | 267 """Adds a (possibly orphan) data blob.""" 277 """Adds an install operation and associated data blob. 279 This takes care of obtaining a hash of the data blob (if so instructed) 290 data_blob: a data blob associated with this operation 291 do_hash_data_blob: whether or not to compute and add a data blob hash 313 sigs_data: signatures blob to be appended to the payload (optional; 316 if explicit signatures blob not provided) 318 account for the signature blob 328 # Do we need to generate a genuine signatures blob? 332 # First, sign some arbitrary data to obtain the size of a signature blob [all...] |
/external/wpa_supplicant_8/src/eapol_supp/ |
eapol_supp_sm.h | 165 * set_config_blob - Set or add a named configuration blob 167 * @blob: New value for the blob 169 * Adds a new configuration blob or replaces the current value of an 170 * existing blob. 172 void (*set_config_blob)(void *ctx, struct wpa_config_blob *blob); 175 * get_config_blob - Get a named configuration blob 177 * @name: Name of the blob 178 * Returns: Pointer to blob data or %NULL if not found
|
/frameworks/av/media/libstagefright/foundation/ |
MetaData.cpp | 417 android::Parcel::WritableBlob blob; local 422 ret = parcel.writeBlob(size, false, &blob); 426 memcpy(blob.data(), data, size); 427 blob.release(); 452 // copy data from Blob, which may be inline in Parcel storage, 455 android::Parcel::ReadableBlob blob; local 456 ret = parcel.readBlob(size, &blob); 460 setData(key, type, blob.data(), size); 461 blob.release();
|
/system/nvram/messages/include/nvram/messages/ |
io.h | 25 #include <nvram/messages/blob.h> 121 // Writes a blob of |size| bytes provided in |data| to the underlying buffer. 198 // |Blob|, growing it as necessary. 202 // |blob|, which will get resized as necessary. Note that |blob| must remain 204 explicit BlobOutputStreamBuffer(Blob* blob); 207 // Truncate the blob to match the current output size. 215 Blob* blob_;
|
/external/autotest/client/common_lib/cros/fake_device_server/ |
registration_tickets.py | 25 device: PATCH .../<id> with json blob # Populate ticket with device info 160 """Updates the given ticket with the incoming json blob. 165 Caller must define a json blob to patch the ticket with. 183 """Replaces the given ticket with the incoming json blob. 188 Caller must define a json blob to patch the ticket with.
|
/external/libese/libese-hw/nxp/pn80t/ |
nq_nci.c | 63 int platform_toggle_reset(void *blob, int val) { 64 const struct PlatformHandle *handle = blob; 90 int platform_release(void *blob) { 91 struct PlatformHandle *handle = blob; 98 int platform_wait(void *UNUSED(blob), long usec) {
|
/external/tpm2/ |
ContextLoad.c | 22 // TPM_RC_SIZE incorrect context blob size 46 // Check context blob size 54 // Get integrity from context blob 95 // Get a pointer to the object in the context blob 160 // Context blob may only have an object handle or a session handle.
|
/frameworks/base/services/core/java/com/android/server/ |
SyntheticPasswordManager.java | 59 * for each SP blob under the user (stored under the corresponding handle): 326 * Create a new password based SP blob based on the supplied authentication token, such that 330 * This method only creates SP blob wrapping around the given synthetic password and does not 424 byte[] blob = new byte[content.length + 1 + 1]; 425 blob[0] = SYNTHETIC_PASSWORD_VERSION; 426 blob[1] = type; 427 System.arraycopy(content, 0, blob, 2, content.length); 428 saveState(SP_BLOB_NAME, blob, handle, userId); 433 * blob handle generated previously. If the decryption is successful, initiate a GateKeeper 483 * blob handle generated previously. If the decryption is successful, initiate a GateKeepe [all...] |
/frameworks/native/opengl/libs/EGL/ |
egl_cache.h | 54 // setBlob attempts to insert a new key/value blob pair into the cache. 60 // getBlob attempts to retrieve the value blob associated with a given key 61 // blob from cache. This will be called by the hardware vendor's EGL 80 // key/value blob pairs. If the BlobCache object has not yet been created, 101 // mBlobCache is the cache in which the key/value blob pairs are stored. It
|
/hardware/qcom/keymaster/ |
keymaster_qcom.h | 49 #define KM_MAGIC_NUM (0x4B4D4B42) /* "KMKB" Key Master Key Blob in hex */ 101 * key_blob : key blob data 102 * key_blob_len : Total length of key blob information 136 * key_blob : key blob data 137 * key_blob_len : Total length of key blob information
|