/external/vboot_reference/tests/ |
vb21_common_tests.c | 258 struct vb2_keyblock *kbuf; local 279 TEST_SUCC(vb2_keyblock_create(&kbuf, &pubk3, prik, 2, 0x4321, desc), 282 buf = (uint8_t *)kbuf; 283 buf_size = kbuf->c.total_size; 290 kbuf = (struct vb2_keyblock *)buf; 292 TEST_SUCC(vb2_verify_keyblock(kbuf, buf_size, &pubk, &wb), 296 TEST_SUCC(vb2_verify_keyblock(kbuf, buf_size, &pubk2, &wb), 300 TEST_EQ(vb2_verify_keyblock(kbuf, buf_size, &pubk3, &wb), 305 kbuf->c.magic = VB2_MAGIC_PACKED_KEY; 306 TEST_EQ(vb2_verify_keyblock(kbuf, buf_size, &pubk, &wb) [all...] |
/external/vboot_reference/firmware/lib/ |
vboot_kernel.c | 44 uint8_t* kbuf = NULL; local 137 kbuf = (uint8_t*)VbExMalloc(KBUF_SIZE); 138 if (!kbuf) 185 if (0 != VbExStreamRead(stream, KBUF_SIZE, kbuf)) { 192 key_block = (VbKeyBlockHeader*)kbuf; 281 (kbuf + key_block->key_block_size); 341 * read into kbuf. 387 Memcpy(body_readptr, kbuf + body_offset, body_copied); 488 if (kbuf) 489 VbExFree(kbuf); [all...] |
/external/compiler-rt/lib/sanitizer_common/ |
sanitizer_linux.cc | 233 struct kernel_stat kbuf; 234 int res = internal_syscall(SYSCALL(stat), path, &kbuf); 235 kernel_stat_to_stat(&kbuf, (struct stat *)buf); 257 struct kernel_stat kbuf; 258 int res = internal_syscall(SYSCALL(lstat), path, &kbuf); 259 kernel_stat_to_stat(&kbuf, (struct stat *)buf); 276 struct kernel_stat kbuf; local 277 int res = internal_syscall(SYSCALL(fstat), fd, &kbuf); 278 kernel_stat_to_stat(&kbuf, (struct stat *)buf); [all...] |
/external/python/cpython2/Modules/ |
bsddbmodule.c | 563 char *kdata=NULL,kbuf[4096]; local 575 if (krec.size > sizeof(kbuf)) kdata = malloc(krec.size); 576 else kdata = kbuf; 602 if (kdata != kbuf) free(kdata);
|