/system/security/softkeymaster/ |
H A D | keymaster_openssl.cpp | 127 if (derData.get() == NULL) { 131 unsigned char* p = derData.get(); 212 if (pkey.get() == NULL) { 216 EVP_PKEY* tmp = pkey.get(); 241 if (DSA_generate_parameters_ex(dsa.get(), dsa_params->key_size, NULL, 0, NULL, NULL, 272 if (DSA_generate_key(dsa.get()) != 1) { 277 if (EVP_PKEY_assign_DSA(pkey, dsa.get()) == 0) { 320 if (eckey.get() == NULL) { 325 if (EC_KEY_set_group(eckey.get(), group) != 1) { 330 if (EC_KEY_generate_key(eckey.get()) ! [all...] |
H A D | module.cpp | 54 if (dev.get() == NULL)
|
/system/core/libutils/tests/ |
H A D | LruCache_test.cpp | 119 EXPECT_EQ(NULL, cache.get(0)); 129 EXPECT_STREQ("one", cache.get(1)); 130 EXPECT_STREQ("two", cache.get(2)); 131 EXPECT_STREQ("three", cache.get(3)); 141 EXPECT_EQ(NULL, cache.get(1)); 142 EXPECT_STREQ("two", cache.get(2)); 143 EXPECT_STREQ("three", cache.get(3)); 154 EXPECT_EQ(NULL, cache.get(1)); 155 EXPECT_STREQ("two", cache.get(2)); 156 EXPECT_STREQ("three", cache.get( [all...] |
H A D | BlobCache_test.cpp | 49 ASSERT_EQ(size_t(4), mBC->get("abcd", 4, buf, 4)); 60 ASSERT_EQ(size_t(2), mBC->get("ab", 2, buf, 2)); 63 ASSERT_EQ(size_t(2), mBC->get("ef", 2, buf, 2)); 71 ASSERT_EQ(size_t(4), mBC->get("abcd", 4, buf+1, 4)); 83 ASSERT_EQ(size_t(4), mBC->get("abcd", 4, buf, 3)); 91 ASSERT_EQ(size_t(4), mBC->get("abcd", 4, NULL, 0)); 98 ASSERT_EQ(size_t(4), mBC->get("abcd", 4, buf, 4)); 109 ASSERT_EQ(size_t(4), mBC->get("abcd", 4, buf, 4)); 123 ASSERT_EQ(size_t(0), mBC->get(key, MAX_KEY_SIZE+1, buf, 4)); 139 ASSERT_EQ(size_t(0), mBC->get("abc [all...] |
/system/security/keystore-engine/ |
H A D | rsa_meth.cpp | 50 if (padded.get() == NULL) { 57 if (!RSA_padding_add_PKCS1_type_1(padded.get(), num, from, flen)) { 62 if (!RSA_padding_add_X931(padded.get(), num, from, flen)) { 67 if (!RSA_padding_add_none(padded.get(), num, from, flen)) { 93 int32_t ret = service->sign(String16(reinterpret_cast<const char*>(key_id)), padded.get(), 214 if (!RSA_set_ex_data(rsa.get(), rsa_key_handle, reinterpret_cast<void*>(strdup(key_id)))) { 219 RSA_set_method(rsa.get(), &keystore_rsa_meth); 220 RSA_blinding_off(rsa.get());
|
H A D | ecdsa_meth.cpp | 97 if (ecdsa_sig.get() == NULL) { 103 ecdsa_sig.get(), replyLen); 126 void* oldData = EC_KEY_insert_key_method_data(eckey.get(), 133 ECDSA_set_method(eckey.get(), &keystore_ecdsa_meth); 140 ECDSA_DATA *ecdsa = ecdsa_check(eckey.get());
|
H A D | eng_keystore.cpp | 135 if (pkey.get() == NULL) { 142 dsa_pkey_setup(e, pkey.get(), key_id); 146 rsa_pkey_setup(e, pkey.get(), key_id); 150 ecdsa_pkey_setup(e, pkey.get(), key_id); 203 if (engine.get() == NULL) { 207 if (!keystore_engine_setup(engine.get())) {
|
H A D | dsa_meth.cpp | 91 if (dsa_sig.get() == NULL) { 97 dsa_sig.get(), replyLen); 126 if (!DSA_set_ex_data(dsa.get(), dsa_key_handle, reinterpret_cast<void*>(strdup(key_id)))) { 131 DSA_set_method(dsa.get(), &keystore_dsa_meth);
|
/system/security/keystore/ |
H A D | keystore_get.cpp | 34 int32_t ret = service->get(String16(key, keyLength), value, &valueLength);
|
H A D | keystore.cpp | 710 // we read the raw blob to just to get the salt to generate 995 ResponseCode get(const char* filename, Blob* keyBlob, const BlobType type, uid_t uid) { function in class:KeyStore 1031 rc = get(filename, keyBlob, TYPE_KEY_PAIR, uid); 1113 ALOGW("can't get keymaster device"); 1130 ResponseCode responseCode = get(filepath8.string(), keyBlob, type, uid); 1139 responseCode = get(filepath8.string(), keyBlob, type, uid); 1159 return get(filepath8.string(), keyBlob, type, uid); 1286 if (b.get() == NULL) { 1291 Unique_EVP_PKEY pkey(PEM_read_bio_PrivateKey(b.get(), NULL, NULL, NULL)); 1292 if (pkey.get() 1449 int32_t get(const String16& name, uint8_t** item, size_t* itemLength) { function in class:android::KeyStoreProxy [all...] |
H A D | keystore_cli.cpp | 188 SINGLE_ARG_DATA_RETURN(get);
|
/system/media/camera/docs/ |
H A D | metadata_parser_xml.py | 128 'type_notes': entry.attrs.get('type_notes') 158 d['visibility'] = entry.get('visibility') 163 d['optional'] = entry.get('optional') == 'true' 168 d['type_name'] = entry.get('typedef') 173 if entry.get('enum', 'false') == 'true': 184 if value.attrs.get('optional', 'false') == 'true': 191 if value.attrs.get('id') is not None: 203 if entry.attrs.get('container') is not None:
|
H A D | metadata_model.py | 288 self._types.append(Typedef(type_name, self, kwargs.get('languages'))) 381 tag = tag_dict.get(tag_id) 393 type_node = type_dict.get(p._type_name) 402 target_entry = self._entry_map[target_kind].get(p.name) 423 ons = root.get(ons_name, OuterNamespace(ons_name, self)) 448 does_exist = sections_dict.get(p.get_section()) 450 sec = sections_dict.get(p.get_section(), \ 526 ins = ins_dict.get(ins_str, InnerNamespace(ins_str, parent)) 556 entry = entry_dict.get(p.name, p) 984 [ EnumValue(val, self, ids.get(va [all...] |
H A D | CameraMetadataEnums.mako | 58 and not (entry.typedef and entry.typedef.languages.get('java')) \ 68 and not (entry.typedef and entry.typedef.languages.get('java')) \
|
H A D | metadata_validate.py | 227 entry_container = entry.attrs.get('container') 239 enum = entry.attrs.get('enum') 249 value_id = value.attrs.get('id')
|
H A D | metadata-check-dependencies | 29 elif [[ "$OSTYPE" == "linux-gnu" ]] && which apt-get >& /dev/null 31 packager="apt-get" 39 elif [[ $packager == "apt-get" ]] 41 echo "sudo apt-get install $1" 63 elif [[ $packager == "apt-get" ]] 93 elif [[ $packager == "apt-get" ]]
|
H A D | CameraCharacteristicsTest.mako | 68 assertNotNull(String.format("Can't get camera characteristics from: ID %s", ids[i]), 72 Integer hwLevel = props.get(CameraCharacteristics.INFO_SUPPORTED_HARDWARE_LEVEL); 80 props.get(CameraCharacteristics.${jkey_identifier(entry.name)})); 83 assertNotNull(String.format("Can't get camera characteristics keys from: ID %s",
|
H A D | CameraMetadataKeys.mako | 37 % if entry.enum and not (entry.typedef and entry.typedef.languages.get('java')):
|
/system/core/libutils/ |
H A D | Looper.cpp | 127 pthread_setspecific(gTLSKey, looper.get()); 300 this, handler.get(), message.what); 327 this, response.request.callback.get(), fd, events, data); 411 events, callback.get(), data); 414 if (!callback.get()) { 504 this, uptime, handler.get(), message.what); 536 ALOGD("%p ~ removeMessages - handler=%p", this, handler.get()); 553 ALOGD("%p ~ removeMessages - handler=%p, what=%d", this, handler.get(), what);
|
/system/core/include/utils/ |
H A D | UniquePtr.h | 71 T* get() const { return mPtr; } function in class:UniquePtr 119 T* get() const { return mPtr; } function in class:UniquePtr
|
H A D | BlobCache.h | 64 // get retrieves from the cache the binary value associated with a given 72 // Note that when calling get multiple times with the same key, the later 80 size_t get(const void* key, size_t keySize, void* value, size_t valueSize); 109 // A random function helper to get around MinGW not having nrand48()
|
H A D | LruCache.h | 46 const TValue& get(const TKey& key); 122 const TValue& LruCache<TKey, TValue>::get(const TKey& key) { function in class:android::LruCache
|
H A D | StrongPointer.h | 89 inline T* get() const { return m_ptr; } function in class:android::sp
|
/system/core/libpixelflinger/codeflinger/tinyutils/ |
H A D | smartpointer.h | 76 inline T* get() const { return m_ptr; } function in class:android::tinyutils::sp
|
/system/security/keystore/include/keystore/ |
H A D | IKeystoreService.h | 74 virtual int32_t get(const String16& name, uint8_t** item, size_t* itemLength) = 0;
|