/device/generic/goldfish/include/ |
qemud.h | 76 if (!ReadFully(fd, answer, 2) || 116 if (!ReadFully(fd, header, 4)) { 128 if (!ReadFully(fd, msg, size)) {
|
qemu_pipe.h | 33 static bool ReadFully(int fd, void* data, size_t byte_count) {
|
/system/core/qemu_pipe/ |
qemu_pipe.cpp | 27 using android::base::ReadFully; 87 if (!ReadFully(fd, header, 4)) { 102 if (!ReadFully(fd, buff, size)) {
|
/device/generic/goldfish/keymaster/ |
trusty_keymaster_ipc.cpp | 82 rc = ReadFully(handle_, &pipe_command_length, sizeof(pipe_command_length)); 89 rc = ReadFully(handle_, out, pipe_command_length);
|
/device/google/dragon/crash_collector/ |
crash_dispatcher.cc | 42 if (!android::base::ReadFully(STDIN_FILENO, buf_head, sizeof(buf_head))) {
|
/system/core/base/include/android-base/ |
file.h | 44 bool ReadFully(int fd, void* data, size_t byte_count);
|
/art/compiler/linker/ |
output_stream_test.cc | 73 bool readSuccess = in->ReadFully(&actual[0], actual.size()); 88 bool readSuccess = in->ReadFully(&actual[0], actual.size());
|
/bootable/recovery/ |
fuse_sdcard_provider.cpp | 46 if (!android::base::ReadFully(fd->fd, buffer, fetch_size)) {
|
/art/runtime/base/unix_file/ |
fd_file.cc | 267 bool FdFile::ReadFully(void* buffer, size_t byte_count) { 340 if (!input_file->ReadFully(buffer.get(), chunk_size) || 458 if (!ReadFully(&buffer1[0], len)) { 461 if (!other->ReadFully(&buffer2[0], len)) {
|
fd_file.h | 125 bool ReadFully(void* buffer, size_t byte_count) WARN_UNUSED;
|
fd_file_test.cc | 78 EXPECT_FALSE(file.ReadFully(&buffer, 4));
|
/art/runtime/gc/space/ |
image_space_fs.h | 138 if (!file->ReadFully(&num_failed_boots, sizeof(num_failed_boots))) {
|
/frameworks/base/libs/androidfw/tests/ |
ApkAssets_test.cpp | 89 ASSERT_TRUE(base::ReadFully(fd.get(), &*buffer.begin(), length));
|
/bionic/tests/ |
pty_test.cpp | 93 ASSERT_TRUE(android::base::ReadFully(arg->slave_fd, buf, to_read));
|
/bootable/recovery/tests/component/ |
uncrypt_test.cpp | 113 ASSERT_TRUE(android::base::ReadFully(sockfd, &status, sizeof(int)));
|
/bootable/recovery/uncrypt/ |
uncrypt.cpp | 351 if (!android::base::ReadFully(fd, buffers[tail].data(), to_read)) { 551 if (!android::base::ReadFully(socket, &length, 4)) { 560 if (!android::base::ReadFully(socket, &content[0], length)) { 681 if (android::base::ReadFully(socket_fd, &code, 4)) {
|
/system/core/base/ |
file_test.cpp | 108 ASSERT_TRUE(android::base::ReadFully(tf.fd, &s[0], s.size())) 115 ASSERT_FALSE(android::base::ReadFully(tf.fd, &s[0], s.size()));
|
file.cpp | 144 bool ReadFully(int fd, void* data, size_t byte_count) {
|
/system/extras/verity/fec/ |
image.cpp | 231 if (!android::base::ReadFully(fd, header, sizeof(header))) { 275 if (!android::base::ReadFully(fd, ctx->fec, ctx->fec_size)) {
|
/bootable/recovery/applypatch/ |
imgdiff.cpp | 511 if (!android::base::ReadFully(fd, zip_file->data(), sz)) { 628 if (!android::base::ReadFully(fd, img->data(), sz)) { 799 if (!android::base::ReadFully(patch_fd, patch_data->data(), sz)) { 877 if (!android::base::ReadFully(fd, bonus_data.data(), bonus_size)) { [all...] |
/bootable/recovery/bootloader_message/ |
bootloader_message.cpp | 86 if (!android::base::ReadFully(fd, p, size)) {
|
/system/core/debuggerd/ |
debuggerd_test.cpp | 618 ASSERT_TRUE(android::base::ReadFully(output_fd.get(), &read_pid, sizeof(read_pid))); 689 ASSERT_TRUE(android::base::ReadFully(output_fd.get(), &read_pid, sizeof(read_pid))); 728 ASSERT_TRUE(android::base::ReadFully(output_fd.get(), outbuf, sizeof(outbuf))); 759 ASSERT_TRUE(android::base::ReadFully(output_fd.get(), outbuf, sizeof(outbuf)));
|
/system/extras/simpleperf/ |
event_fd.cpp | 124 if (!android::base::ReadFully(perf_event_fd_, counter, sizeof(*counter))) {
|
/system/nvram/hal/ |
fake_nvram_storage.cpp | 105 if (!android::base::ReadFully(data_file_fd.get(), blob->data(),
|
/art/compiler/ |
image_test.h | 134 CHECK_EQ(file->ReadFully(&image_header, sizeof(image_header)), true); 399 ASSERT_EQ(file->ReadFully(&image_header, sizeof(image_header)), true);
|