Searched refs:get (Results 1 - 25 of 46) sorted by relevance

12

/system/keymaster/
H A Dkey_blob_test.cpp86 blob_->Serialize(serialized_blob.get(), serialized_blob.get() + size);
89 uint8_t* begin = serialized_blob.get();
94 keymaster_key_blob_t encrypted_blob = {serialized_blob.get(), size};
103 blob_->Serialize(serialized_blob.get(), serialized_blob.get() + size);
109 keymaster_key_blob_t encrypted_blob = {serialized_blob.get(), size};
117 blob_->Serialize(serialized_blob.get(), serialized_blob.get() + size);
120 uint8_t* begin = serialized_blob.get();
[all...]
H A Dkey_blob.cpp37 ae_ctx* get() { return ctx_; } function in class:keymaster::KeyBlob::AeCtx
51 if (!nonce_.get() || !tag_.get()) {
78 if (!key_material_.get() || !encrypted_key_material_.get() || !nonce_.get() || !tag_.get()) {
83 memcpy(nonce_.get(), nonce, NONCE_LENGTH);
84 memcpy(key_material_.get(), key.key_material, key_material_length_);
91 if (!nonce_.get() || !tag
[all...]
H A Dasymmetric_key.cpp40 if (evp_key.get() == NULL)
43 EVP_PKEY* tmp_pkey = evp_key.get();
49 if (!EvpToInternal(evp_key.get()))
60 if (pkey.get() == NULL)
63 if (!InternalToEvp(pkey.get()))
66 *size = i2d_PrivateKey(pkey.get(), NULL /* key_data*/);
71 uint8_t* tmp = material->get();
72 i2d_PrivateKey(pkey.get(), &tmp);
87 if (!InternalToEvp(pkey.get()))
90 int key_data_length = i2d_PUBKEY(pkey.get(), NUL
[all...]
H A Dserializable.cpp46 if (dest->get() == NULL)
48 return copy_from_buf(buf_ptr, end, dest->get(), *size);
57 memcpy(new_buffer, buffer_.get() + read_position_, available_read());
58 memset_s(buffer_.get(), 0, buffer_size_);
70 if (buffer_.get() == NULL)
81 if (buffer_.get() == NULL)
84 memcpy(buffer_.get(), data, data_len);
101 memcpy(buffer_.get() + write_position_, src, write_length);
109 memcpy(dest, buffer_.get() + read_position_, read_length);
134 if (buffer_.get())
[all...]
H A Dkey.cpp92 if (pkcs8.get() == NULL) {
97 UniquePtr<EVP_PKEY, EVP_PKEY_Delete> pkey(EVP_PKCS82PKEY(pkcs8.get()));
98 if (pkey.get() == NULL) {
106 return RsaKey::ImportKey(key_description, pkey.get(), logger, error);
108 return DsaKey::ImportKey(key_description, pkey.get(), logger, error);
110 return EcdsaKey::ImportKey(key_description, pkey.get(), logger, error);
H A Dauthorization_set_test.cpp165 EXPECT_EQ(buf.get() + size, set.Serialize(buf.get(), buf.get() + size));
166 AuthorizationSet deserialized(buf.get(), size);
195 EXPECT_EQ(buf.get() + size, set.Serialize(buf.get(), buf.get() + size));
197 const uint8_t* p = buf.get();
199 EXPECT_EQ(p, buf.get() + size);
242 EXPECT_EQ(buf.get()
[all...]
H A Drsa_operation.cpp71 decrypted_data.get(), rsa_key_, RSA_NO_PADDING);
76 if (memcmp_s(decrypted_data.get(), data_.peek_read(), data_.available_read()) == 0)
H A Dgoogle_keymaster.cpp40 if (operation_table_.get() == NULL)
170 response->error = SerializeKey(key.get(), origin(), &response->key_blob, &response->enforced,
182 if (blob.get() == NULL)
197 if (key.get() == NULL)
201 if (operation.get() == NULL)
274 if (to_export.get() == NULL)
295 response->error = SerializeKey(key.get(), KM_ORIGIN_IMPORTED, &response->key_blob,
323 keymaster_key_blob_t key_data = {key_material.get(), key_material_size};
326 if (blob.get() == NULL)
333 if (blob_bytes.get()
[all...]
/system/security/softkeymaster/
H A Dkeymaster_openssl.cpp144 if (derData.get() == NULL) {
148 unsigned char* p = derData.get();
227 if (pkey.get() == NULL) {
231 EVP_PKEY* tmp = pkey.get();
252 if (DSA_generate_parameters_ex(dsa.get(), dsa_params->key_size, NULL, 0, NULL, NULL,
277 if (DSA_generate_key(dsa.get()) != 1) {
282 if (EVP_PKEY_assign_DSA(pkey, dsa.get()) == 0) {
313 if (group.get() == NULL) {
318 EC_GROUP_set_point_conversion_form(group.get(), POINT_CONVERSION_UNCOMPRESSED);
319 EC_GROUP_set_asn1_flag(group.get(), OPENSSL_EC_NAMED_CURV
[all...]
H A Dmodule.cpp53 if (dev.get() == NULL)
/system/keymaster/include/keymaster/
H A Dkey_blob.h83 memset_s(key_material_.get(), 0, key_material_length_);
85 memset_s(encrypted_key_material_.get(), 0, key_material_length_);
86 memset_s(nonce_.get(), 0, NONCE_LENGTH);
87 memset_s(tag_.get(), 0, TAG_LENGTH);
109 inline const uint8_t* nonce() const { return nonce_.get(); }
110 inline const uint8_t* key_material() const { return key_material_.get(); }
111 inline const uint8_t* encrypted_key_material() const { return encrypted_key_material_.get(); }
113 inline const uint8_t* tag() const { return tag_.get(); }
/system/core/libutils/tests/
H A DLruCache_test.cpp119 EXPECT_EQ(NULL, cache.get(0));
129 EXPECT_STREQ("one", cache.get(1));
130 EXPECT_STREQ("two", cache.get(2));
131 EXPECT_STREQ("three", cache.get(3));
141 EXPECT_EQ(NULL, cache.get(1));
142 EXPECT_STREQ("two", cache.get(2));
143 EXPECT_STREQ("three", cache.get(3));
154 EXPECT_EQ(NULL, cache.get(1));
155 EXPECT_STREQ("two", cache.get(2));
156 EXPECT_STREQ("three", cache.get(
[all...]
H A DBlobCache_test.cpp49 ASSERT_EQ(size_t(4), mBC->get("abcd", 4, buf, 4));
60 ASSERT_EQ(size_t(2), mBC->get("ab", 2, buf, 2));
63 ASSERT_EQ(size_t(2), mBC->get("ef", 2, buf, 2));
71 ASSERT_EQ(size_t(4), mBC->get("abcd", 4, buf+1, 4));
83 ASSERT_EQ(size_t(4), mBC->get("abcd", 4, buf, 3));
91 ASSERT_EQ(size_t(4), mBC->get("abcd", 4, NULL, 0));
98 ASSERT_EQ(size_t(4), mBC->get("abcd", 4, buf, 4));
109 ASSERT_EQ(size_t(4), mBC->get("abcd", 4, buf, 4));
123 ASSERT_EQ(size_t(0), mBC->get(key, MAX_KEY_SIZE+1, buf, 4));
139 ASSERT_EQ(size_t(0), mBC->get("abc
[all...]
/system/security/keystore-engine/
H A Drsa_meth.cpp50 if (padded.get() == NULL) {
57 if (!RSA_padding_add_PKCS1_type_1(padded.get(), num, from, flen)) {
62 if (!RSA_padding_add_X931(padded.get(), num, from, flen)) {
67 if (!RSA_padding_add_none(padded.get(), num, from, flen)) {
93 int32_t ret = service->sign(String16(reinterpret_cast<const char*>(key_id)), padded.get(),
214 if (!RSA_set_ex_data(rsa.get(), rsa_key_handle, reinterpret_cast<void*>(strdup(key_id)))) {
219 RSA_set_method(rsa.get(), &keystore_rsa_meth);
220 RSA_blinding_off(rsa.get());
H A Decdsa_meth.cpp97 if (ecdsa_sig.get() == NULL) {
103 ecdsa_sig.get(), replyLen);
126 void* oldData = EC_KEY_insert_key_method_data(eckey.get(),
133 ECDSA_set_method(eckey.get(), &keystore_ecdsa_meth);
140 ECDSA_DATA *ecdsa = ecdsa_check(eckey.get());
H A Deng_keystore.cpp135 if (pkey.get() == NULL) {
142 dsa_pkey_setup(e, pkey.get(), key_id);
146 rsa_pkey_setup(e, pkey.get(), key_id);
150 ecdsa_pkey_setup(e, pkey.get(), key_id);
203 if (engine.get() == NULL) {
207 if (!keystore_engine_setup(engine.get())) {
H A Ddsa_meth.cpp91 if (dsa_sig.get() == NULL) {
97 dsa_sig.get(), replyLen);
126 if (!DSA_set_ex_data(dsa.get(), dsa_key_handle, reinterpret_cast<void*>(strdup(key_id)))) {
131 DSA_set_method(dsa.get(), &keystore_dsa_meth);
/system/media/camera/docs/
H A Dmetadata_parser_xml.py145 'type_notes': entry.attrs.get('type_notes')
175 d['visibility'] = entry.get('visibility')
180 d['synthetic'] = entry.get('synthetic') == 'true'
185 d['hwlevel'] = entry.get('hwlevel')
190 d['deprecated'] = entry.get('deprecated') == 'true'
195 d['optional'] = entry.get('optional') == 'true'
200 d['type_name'] = entry.get('typedef')
205 if entry.get('enum', 'false') == 'true':
217 if value.attrs.get('optional', 'false') == 'true':
220 if value.attrs.get('hidde
[all...]
H A Dmetadata_model.py288 self._types.append(Typedef(type_name, self, kwargs.get('languages')))
381 tag = tag_dict.get(tag_id)
393 type_node = type_dict.get(p._type_name)
402 target_entry = self._entry_map[target_kind].get(p.name)
423 ons = root.get(ons_name, OuterNamespace(ons_name, self))
448 does_exist = sections_dict.get(p.get_section())
450 sec = sections_dict.get(p.get_section(), \
526 ins = ins_dict.get(ins_str, InnerNamespace(ins_str, parent))
556 entry = entry_dict.get(p.name, p)
990 [ EnumValue(val, self, ids.get(va
[all...]
H A DCameraMetadataEnums.mako58 and not (entry.typedef and entry.typedef.languages.get('java')) \
68 and not (entry.typedef and entry.typedef.languages.get('java')) \
H A Dmetadata_validate.py245 entry_container = entry.attrs.get('container')
257 enum = entry.attrs.get('enum')
267 value_id = value.attrs.get('id')
H A Dmetadata-check-dependencies29 elif [[ "$OSTYPE" == "linux-gnu" ]] && which apt-get >& /dev/null
31 packager="apt-get"
39 elif [[ $packager == "apt-get" ]]
41 echo "sudo apt-get install $1"
63 elif [[ $packager == "apt-get" ]]
93 elif [[ $packager == "apt-get" ]]
/system/security/keystore/
H A Dkeystore_get.cpp34 int32_t ret = service->get(String16(key, keyLength), value, &valueLength);
/system/core/libbacktrace/
H A Dbacktrace_test.cpp102 printf("The process did not get to a stopping point in 1 second.\n");
147 ASSERT_TRUE(backtrace.get() != NULL);
150 VerifyLevelDump(backtrace.get());
167 ASSERT_TRUE(backtrace.get() != NULL);
170 VerifyMaxDump(backtrace.get());
184 ASSERT_TRUE(backtrace.get() != NULL);
187 VerifyFunc(backtrace.get());
231 ASSERT_TRUE(all.get() != NULL);
236 ASSERT_TRUE(ign1.get() != NULL);
241 ASSERT_TRUE(ign2.get() !
[all...]
/system/core/libutils/
H A DLooper.cpp127 pthread_setspecific(gTLSKey, looper.get());
300 this, handler.get(), message.what);
327 this, response.request.callback.get(), fd, events, data);
411 events, callback.get(), data);
414 if (!callback.get()) {
504 this, uptime, handler.get(), message.what);
536 ALOGD("%p ~ removeMessages - handler=%p", this, handler.get());
553 ALOGD("%p ~ removeMessages - handler=%p, what=%d", this, handler.get(), what);

Completed in 294 milliseconds

12