/system/keymaster/ |
H A D | key_blob_test.cpp | 86 blob_->Serialize(serialized_blob.get(), serialized_blob.get() + size); 89 uint8_t* begin = serialized_blob.get(); 94 keymaster_key_blob_t encrypted_blob = {serialized_blob.get(), size}; 103 blob_->Serialize(serialized_blob.get(), serialized_blob.get() + size); 109 keymaster_key_blob_t encrypted_blob = {serialized_blob.get(), size}; 117 blob_->Serialize(serialized_blob.get(), serialized_blob.get() + size); 120 uint8_t* begin = serialized_blob.get(); [all...] |
H A D | key_blob.cpp | 37 ae_ctx* get() { return ctx_; } function in class:keymaster::KeyBlob::AeCtx 51 if (!nonce_.get() || !tag_.get()) { 78 if (!key_material_.get() || !encrypted_key_material_.get() || !nonce_.get() || !tag_.get()) { 83 memcpy(nonce_.get(), nonce, NONCE_LENGTH); 84 memcpy(key_material_.get(), key.key_material, key_material_length_); 91 if (!nonce_.get() || !tag [all...] |
H A D | asymmetric_key.cpp | 40 if (evp_key.get() == NULL) 43 EVP_PKEY* tmp_pkey = evp_key.get(); 49 if (!EvpToInternal(evp_key.get())) 60 if (pkey.get() == NULL) 63 if (!InternalToEvp(pkey.get())) 66 *size = i2d_PrivateKey(pkey.get(), NULL /* key_data*/); 71 uint8_t* tmp = material->get(); 72 i2d_PrivateKey(pkey.get(), &tmp); 87 if (!InternalToEvp(pkey.get())) 90 int key_data_length = i2d_PUBKEY(pkey.get(), NUL [all...] |
H A D | serializable.cpp | 46 if (dest->get() == NULL) 48 return copy_from_buf(buf_ptr, end, dest->get(), *size); 57 memcpy(new_buffer, buffer_.get() + read_position_, available_read()); 58 memset_s(buffer_.get(), 0, buffer_size_); 70 if (buffer_.get() == NULL) 81 if (buffer_.get() == NULL) 84 memcpy(buffer_.get(), data, data_len); 101 memcpy(buffer_.get() + write_position_, src, write_length); 109 memcpy(dest, buffer_.get() + read_position_, read_length); 134 if (buffer_.get()) [all...] |
H A D | key.cpp | 92 if (pkcs8.get() == NULL) { 97 UniquePtr<EVP_PKEY, EVP_PKEY_Delete> pkey(EVP_PKCS82PKEY(pkcs8.get())); 98 if (pkey.get() == NULL) { 106 return RsaKey::ImportKey(key_description, pkey.get(), logger, error); 108 return DsaKey::ImportKey(key_description, pkey.get(), logger, error); 110 return EcdsaKey::ImportKey(key_description, pkey.get(), logger, error);
|
H A D | authorization_set_test.cpp | 165 EXPECT_EQ(buf.get() + size, set.Serialize(buf.get(), buf.get() + size)); 166 AuthorizationSet deserialized(buf.get(), size); 195 EXPECT_EQ(buf.get() + size, set.Serialize(buf.get(), buf.get() + size)); 197 const uint8_t* p = buf.get(); 199 EXPECT_EQ(p, buf.get() + size); 242 EXPECT_EQ(buf.get() [all...] |
H A D | rsa_operation.cpp | 71 decrypted_data.get(), rsa_key_, RSA_NO_PADDING); 76 if (memcmp_s(decrypted_data.get(), data_.peek_read(), data_.available_read()) == 0)
|
H A D | google_keymaster.cpp | 40 if (operation_table_.get() == NULL) 170 response->error = SerializeKey(key.get(), origin(), &response->key_blob, &response->enforced, 182 if (blob.get() == NULL) 197 if (key.get() == NULL) 201 if (operation.get() == NULL) 274 if (to_export.get() == NULL) 295 response->error = SerializeKey(key.get(), KM_ORIGIN_IMPORTED, &response->key_blob, 323 keymaster_key_blob_t key_data = {key_material.get(), key_material_size}; 326 if (blob.get() == NULL) 333 if (blob_bytes.get() [all...] |
/system/security/softkeymaster/ |
H A D | keymaster_openssl.cpp | 144 if (derData.get() == NULL) { 148 unsigned char* p = derData.get(); 227 if (pkey.get() == NULL) { 231 EVP_PKEY* tmp = pkey.get(); 252 if (DSA_generate_parameters_ex(dsa.get(), dsa_params->key_size, NULL, 0, NULL, NULL, 277 if (DSA_generate_key(dsa.get()) != 1) { 282 if (EVP_PKEY_assign_DSA(pkey, dsa.get()) == 0) { 313 if (group.get() == NULL) { 318 EC_GROUP_set_point_conversion_form(group.get(), POINT_CONVERSION_UNCOMPRESSED); 319 EC_GROUP_set_asn1_flag(group.get(), OPENSSL_EC_NAMED_CURV [all...] |
H A D | module.cpp | 53 if (dev.get() == NULL)
|
/system/keymaster/include/keymaster/ |
H A D | key_blob.h | 83 memset_s(key_material_.get(), 0, key_material_length_); 85 memset_s(encrypted_key_material_.get(), 0, key_material_length_); 86 memset_s(nonce_.get(), 0, NONCE_LENGTH); 87 memset_s(tag_.get(), 0, TAG_LENGTH); 109 inline const uint8_t* nonce() const { return nonce_.get(); } 110 inline const uint8_t* key_material() const { return key_material_.get(); } 111 inline const uint8_t* encrypted_key_material() const { return encrypted_key_material_.get(); } 113 inline const uint8_t* tag() const { return tag_.get(); }
|
/system/core/libutils/tests/ |
H A D | LruCache_test.cpp | 119 EXPECT_EQ(NULL, cache.get(0)); 129 EXPECT_STREQ("one", cache.get(1)); 130 EXPECT_STREQ("two", cache.get(2)); 131 EXPECT_STREQ("three", cache.get(3)); 141 EXPECT_EQ(NULL, cache.get(1)); 142 EXPECT_STREQ("two", cache.get(2)); 143 EXPECT_STREQ("three", cache.get(3)); 154 EXPECT_EQ(NULL, cache.get(1)); 155 EXPECT_STREQ("two", cache.get(2)); 156 EXPECT_STREQ("three", cache.get( [all...] |
H A D | BlobCache_test.cpp | 49 ASSERT_EQ(size_t(4), mBC->get("abcd", 4, buf, 4)); 60 ASSERT_EQ(size_t(2), mBC->get("ab", 2, buf, 2)); 63 ASSERT_EQ(size_t(2), mBC->get("ef", 2, buf, 2)); 71 ASSERT_EQ(size_t(4), mBC->get("abcd", 4, buf+1, 4)); 83 ASSERT_EQ(size_t(4), mBC->get("abcd", 4, buf, 3)); 91 ASSERT_EQ(size_t(4), mBC->get("abcd", 4, NULL, 0)); 98 ASSERT_EQ(size_t(4), mBC->get("abcd", 4, buf, 4)); 109 ASSERT_EQ(size_t(4), mBC->get("abcd", 4, buf, 4)); 123 ASSERT_EQ(size_t(0), mBC->get(key, MAX_KEY_SIZE+1, buf, 4)); 139 ASSERT_EQ(size_t(0), mBC->get("abc [all...] |
/system/security/keystore-engine/ |
H A D | rsa_meth.cpp | 50 if (padded.get() == NULL) { 57 if (!RSA_padding_add_PKCS1_type_1(padded.get(), num, from, flen)) { 62 if (!RSA_padding_add_X931(padded.get(), num, from, flen)) { 67 if (!RSA_padding_add_none(padded.get(), num, from, flen)) { 93 int32_t ret = service->sign(String16(reinterpret_cast<const char*>(key_id)), padded.get(), 214 if (!RSA_set_ex_data(rsa.get(), rsa_key_handle, reinterpret_cast<void*>(strdup(key_id)))) { 219 RSA_set_method(rsa.get(), &keystore_rsa_meth); 220 RSA_blinding_off(rsa.get());
|
H A D | ecdsa_meth.cpp | 97 if (ecdsa_sig.get() == NULL) { 103 ecdsa_sig.get(), replyLen); 126 void* oldData = EC_KEY_insert_key_method_data(eckey.get(), 133 ECDSA_set_method(eckey.get(), &keystore_ecdsa_meth); 140 ECDSA_DATA *ecdsa = ecdsa_check(eckey.get());
|
H A D | eng_keystore.cpp | 135 if (pkey.get() == NULL) { 142 dsa_pkey_setup(e, pkey.get(), key_id); 146 rsa_pkey_setup(e, pkey.get(), key_id); 150 ecdsa_pkey_setup(e, pkey.get(), key_id); 203 if (engine.get() == NULL) { 207 if (!keystore_engine_setup(engine.get())) {
|
H A D | dsa_meth.cpp | 91 if (dsa_sig.get() == NULL) { 97 dsa_sig.get(), replyLen); 126 if (!DSA_set_ex_data(dsa.get(), dsa_key_handle, reinterpret_cast<void*>(strdup(key_id)))) { 131 DSA_set_method(dsa.get(), &keystore_dsa_meth);
|
/system/media/camera/docs/ |
H A D | metadata_parser_xml.py | 145 'type_notes': entry.attrs.get('type_notes') 175 d['visibility'] = entry.get('visibility') 180 d['synthetic'] = entry.get('synthetic') == 'true' 185 d['hwlevel'] = entry.get('hwlevel') 190 d['deprecated'] = entry.get('deprecated') == 'true' 195 d['optional'] = entry.get('optional') == 'true' 200 d['type_name'] = entry.get('typedef') 205 if entry.get('enum', 'false') == 'true': 217 if value.attrs.get('optional', 'false') == 'true': 220 if value.attrs.get('hidde [all...] |
H A D | metadata_model.py | 288 self._types.append(Typedef(type_name, self, kwargs.get('languages'))) 381 tag = tag_dict.get(tag_id) 393 type_node = type_dict.get(p._type_name) 402 target_entry = self._entry_map[target_kind].get(p.name) 423 ons = root.get(ons_name, OuterNamespace(ons_name, self)) 448 does_exist = sections_dict.get(p.get_section()) 450 sec = sections_dict.get(p.get_section(), \ 526 ins = ins_dict.get(ins_str, InnerNamespace(ins_str, parent)) 556 entry = entry_dict.get(p.name, p) 990 [ EnumValue(val, self, ids.get(va [all...] |
H A D | CameraMetadataEnums.mako | 58 and not (entry.typedef and entry.typedef.languages.get('java')) \ 68 and not (entry.typedef and entry.typedef.languages.get('java')) \
|
H A D | metadata_validate.py | 245 entry_container = entry.attrs.get('container') 257 enum = entry.attrs.get('enum') 267 value_id = value.attrs.get('id')
|
H A D | metadata-check-dependencies | 29 elif [[ "$OSTYPE" == "linux-gnu" ]] && which apt-get >& /dev/null 31 packager="apt-get" 39 elif [[ $packager == "apt-get" ]] 41 echo "sudo apt-get install $1" 63 elif [[ $packager == "apt-get" ]] 93 elif [[ $packager == "apt-get" ]]
|
/system/security/keystore/ |
H A D | keystore_get.cpp | 34 int32_t ret = service->get(String16(key, keyLength), value, &valueLength);
|
/system/core/libbacktrace/ |
H A D | backtrace_test.cpp | 102 printf("The process did not get to a stopping point in 1 second.\n"); 147 ASSERT_TRUE(backtrace.get() != NULL); 150 VerifyLevelDump(backtrace.get()); 167 ASSERT_TRUE(backtrace.get() != NULL); 170 VerifyMaxDump(backtrace.get()); 184 ASSERT_TRUE(backtrace.get() != NULL); 187 VerifyFunc(backtrace.get()); 231 ASSERT_TRUE(all.get() != NULL); 236 ASSERT_TRUE(ign1.get() != NULL); 241 ASSERT_TRUE(ign2.get() ! [all...] |
/system/core/libutils/ |
H A D | Looper.cpp | 127 pthread_setspecific(gTLSKey, looper.get()); 300 this, handler.get(), message.what); 327 this, response.request.callback.get(), fd, events, data); 411 events, callback.get(), data); 414 if (!callback.get()) { 504 this, uptime, handler.get(), message.what); 536 ALOGD("%p ~ removeMessages - handler=%p", this, handler.get()); 553 ALOGD("%p ~ removeMessages - handler=%p, what=%d", this, handler.get(), what);
|