/external/skia/tests/ |
TextBlobCacheTest.cpp | 34 const auto& blob = blobs[i]; local 35 const SkRect& bounds = blob->bounds(); 38 canvas->drawTextBlob(blob, 0, SkIntToScalar(yOffset), paint);
|
/external/skqp/gm/ |
mixedtextblobs.cpp | 20 static void draw_blob(SkCanvas* canvas, const SkTextBlob* blob, const SkPaint& skPaint, 30 canvas->drawTextBlob(blob, 0, 0, paint); 33 canvas->drawTextBlob(blob, 0, 0, paint);
|
/external/skqp/src/gpu/text/ |
GrStencilAndCoverTextContext.h | 61 const SkTextBlob* blob, 115 static const Key& GetKey(const TextBlob* blob) { return blob->key(); } 118 SkASSERT(key.count() > 1); // 1-length keys should be using the blob-id hash map. 127 // 1-length keys are unterstood to be the blob id and must use the other constructor.
|
GrStencilAndCoverTextContext.cpp | 117 const SkTextBlob* blob, 123 SkTextBlobRunIterator it(blob); 175 const TextBlob& blob = this->findOrCreateTextBlob(skBlob, skPaint); local 177 TextBlob::Iter iter(blob); 201 // The font-related parameters are baked into the text blob and will override this skPaint, so 209 TextBlob* blob = new TextBlob(skBlob->uniqueID(), skBlob, skPaint); local 210 this->purgeToFit(*blob); 211 fBlobIdCache.set(skBlob->uniqueID(), blob); 212 fLRUList.addToTail(blob); 213 fCacheSize += blob->cpuMemorySize() 226 TextBlob* blob = new TextBlob(key, skBlob, skPaint); local [all...] |
/external/skqp/tests/ |
TextBlobCacheTest.cpp | 34 const auto& blob = blobs[i]; local 35 const SkRect& bounds = blob->bounds(); 38 canvas->drawTextBlob(blob, 0, SkIntToScalar(yOffset), paint);
|
/system/bt/service/ |
gatt_server_old.cc | 88 std::vector<uint8_t> blob; member in struct:bluetooth::gatt::Characteristic 90 // Support synchronized blob updates by latching under mutex. 170 // If the added characteristic is blob 215 // Latch next_blob to blob on a 'fresh' read. 218 std::swap(ch.blob, ch.next_blob); 223 std::min(ch.blob.size(), ch.blob_section * kMaxGattAttributeSize); 224 const size_t blob_remaining = ch.blob.size() - blob_offset_octets; 238 std::copy(ch.blob.begin() + blob_offset_octets + attribute_offset_octets, 239 ch.blob.begin() + blob_offset_octets + attribute_size, 266 ch.blob.resize(attribute_offset + value.size()) [all...] |
/system/keymaster/km_openssl/ |
hmac_operation.cpp | 134 KeymasterKeyBlob blob = key.key_material_move(); local 135 HMAC_Init_ex(&ctx_, blob.key_material, blob.key_material_size, md, NULL /* engine */);
|
/system/keymaster/ng/include/ |
keystore_hidl_support.h | 91 inline static hidl_vec<uint8_t> blob2hidlVec(const std::vector<uint8_t>& blob) { 93 result.setToExternal(const_cast<uint8_t*>(blob.data()), static_cast<size_t>(blob.size()));
|
/system/keymaster/tests/ |
android_keymaster_test_utils.h | 99 std::string(reinterpret_cast<const char*>(set[pos].blob.data), 100 set[pos].blob.data_length) == val; 107 std::string(reinterpret_cast<const char*>(set[pos].blob.data), 108 set[pos].blob.data_length) == val; 326 void set_key_blob(KeymasterKeyBlob blob) { blob_ = blob.release(); } 372 static void munge_blob(uint8_t* blob, size_t blob_length) { 373 if (blob && blob_length > 0 && *blob == 'P') 374 *blob = 'Q'; // Mind your Ps and Qs [all...] |
/system/security/keystore/ |
keystore_utils.cpp | 34 #include "blob.h" 109 hidl_vec<uint8_t> blob2hidlVec(const Blob& blob) { 111 result.setToExternal(const_cast<uint8_t*>(blob.getValue()), blob.getLength());
|
keystore_aidl_hidl_marshalling_utils.h | 64 android::status_t writeKeymasterBlob(const hidl_vec<uint8_t>& blob, android::Parcel* out); 67 android::status_t writeBlobAsByteArray(const NullOr<const hidl_vec<uint8_t>&>& blob,
|
KeyStore.cpp | 217 Blob blob; local 218 ResponseCode rc = get(filename, &blob, ::TYPE_ANY, userId); 233 shouldDelete = blob.isEncrypted(); 303 ResponseCode KeyStore::get(const char* filename, Blob* keyBlob, const BlobType type, uid_t userId) { 321 * it must be read it again since the blob is encrypted each time 361 ResponseCode KeyStore::put(const char* filename, Blob* keyBlob, uid_t userId) { 370 Blob keyBlob; 558 hidl_vec<uint8_t> blob; local 565 blob = keyBlob [all...] |
/external/libdrm/tests/modeprint/ |
modeprint.c | 117 drmModePropertyBlobPtr blob; local 119 blob = drmModeGetPropertyBlob(fd, value); 120 if (blob) { 121 printf("blob is %d length, %08X\n", blob->length, *(uint32_t *)blob->data); 122 drmModeFreePropertyBlob(blob); 124 printf("error getting blob %" PRIu64 "\n", value);
|
/system/keymaster/key_blob_utils/ |
software_keyblobs.cpp | 173 const KeymasterKeyBlob& blob, KeymasterKeyBlob* key_material, AuthorizationSet* hw_enforced, 177 const uint8_t* p = blob.key_material; 178 const uint8_t* end = blob.key_material + blob.key_material_size; 184 LOG_W("key blob appears to be truncated (if an old SW key)", 0); 205 LOG_W("key blob appears to be truncated (if an old SW key)", 0); 243 keymaster_error_t ParseOcbAuthEncryptedBlob(const KeymasterKeyBlob& blob, 250 keymaster_error_t error = DeserializeAuthEncryptedBlob(blob, &encrypted_key_material,
|
/external/dtc/tests/ |
tests.h | 124 void save_blob(const char *filename, void *blob); 125 void *open_blob_rw(void *blob);
|
/frameworks/av/media/libmediaextractor/ |
MetaDataBase.cpp | 475 android::Parcel::WritableBlob blob; local 480 ret = parcel.writeBlob(size, false, &blob); 484 memcpy(blob.data(), data, size); 485 blob.release(); 510 // copy data from Blob, which may be inline in Parcel storage, 513 android::Parcel::ReadableBlob blob; local 514 ret = parcel.readBlob(size, &blob); 518 setData(key, type, blob.data(), size); 519 blob.release();
|
/system/keymaster/include/keymaster/contexts/ |
keymaster1_passthrough_context.h | 66 * UpgradeKeyBlob takes an existing blob, parses out key material and constructs a new blob with 74 * ParseKeyBlob takes a blob and extracts authorization sets and key material, returning an 75 * error if the blob fails integrity checking or decryption. Note that the returned key 76 * material may itself be an opaque blob usable only by secure hardware (in the hybrid case). 80 keymaster_error_t ParseKeyBlob(const KeymasterKeyBlob& blob, 88 keymaster_error_t DeleteKey(const KeymasterKeyBlob& /* blob */) const override; 116 KeymasterKeyBlob* blob,
|
/system/nvram/messages/include/nvram/messages/ |
nvram_messages.h | 22 #include <nvram/messages/blob.h> 67 Blob authorization_value; 87 Blob authorization_value; 100 Blob buffer; 101 Blob authorization_value; 109 Blob authorization_value; 113 Blob buffer; 119 Blob authorization_value; 127 Blob authorization_value; 182 // Encode |msg| to |blob|. Returns true if successful [all...] |
/system/keymaster/ng/ |
AndroidKeymaster3Device.cpp | 118 keymaster_param_blob(tag, &keyParams[i].blob[0], keyParams[i].blob.size()); 136 inline hidl_vec<uint8_t> kmBlob2hidlVec(const keymaster_key_blob_t& blob) { 138 result.setToExternal(const_cast<unsigned char*>(blob.key_material), blob.key_material_size); 142 inline hidl_vec<uint8_t> kmBlob2hidlVec(const keymaster_blob_t& blob) { 144 result.setToExternal(const_cast<unsigned char*>(blob.data), blob.data_length); 197 result[i].blob.setToExternal(const_cast<unsigned char*>(params[i].blob.data) [all...] |
/cts/tests/tests/database/src/android/database/cts/ |
AbstractWindowedCursorTest.java | 170 byte[] blob = new byte[BLOB_SIZE]; 171 Arrays.fill(blob, TEST_VALUE); 172 assertTrue(mWindow.putBlob(blob, ROW_INDEX0, COLUMN_INDEX1)); 179 assertTrue(Arrays.equals(blob, targetBuffer));
|
/external/harfbuzz_ng/src/ |
hb-face.h | 35 #include "hb-blob.h" 47 hb_face_create (hb_blob_t *blob,
|
hb-gobject-structs.cc | 69 HB_DEFINE_OBJECT_TYPE (blob)
|
hb-ot-post-table.hh | 89 blob = Sanitizer<post>::sanitize (face->reference_table (HB_OT_TAG_post)); 90 const post *table = Sanitizer<post>::lock_instance (blob); 91 unsigned int table_length = hb_blob_get_length (blob); 235 hb_blob_t *blob; member in struct:OT::post::accelerator_t
|
/external/wpa_supplicant_8/wpa_supplicant/dbus/ |
dbus_old_handlers.c | 1255 struct wpa_config_blob *blob; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/examples/ |
wpas-dbus-new-signals.py | 99 def blobAdded(blob): 100 print "BlobAdded(%s)" % (blob) 102 def blobRemoved(blob): 103 print "BlobRemoved(%s)" % (blob)
|