Lines Matching defs:NULL

116     keymaster::SoftKeymasterDevice* softkeymaster = NULL;
117 rc = hw_get_module_by_class(KEYSTORE_HARDWARE_MODULE_ID, NULL, &mod);
140 *dev = NULL;
264 char *sctx = NULL;
278 NULL) == 0;
850 salt = NULL;
864 if (salt == NULL) {
910 while ((file = readdir(dir)) != NULL) {
932 if (salt != NULL) {
1125 if (userState == NULL) {
1136 while ((file = readdir(dir)) != NULL) {
1233 if (mDevice->delete_keypair != NULL && !keyBlob.isFallback()) {
1268 while ((file = readdir(dir)) != NULL) {
1285 if (match != NULL) {
1300 if (existing == NULL) {
1322 return getGrant(filename, uid) != NULL;
1331 if (mDevice->import_keypair == NULL) {
1354 Blob keyBlob(data, dataLength, NULL, 0, TYPE_KEY_PAIR);
1364 if (mDevice == NULL) {
1448 * Returns NULL if the UserState doesn't already exist.
1459 return NULL;
1463 * Returns NULL if the UserState doesn't already exist.
1498 return NULL;
1552 if (b.get() == NULL) {
1557 Unique_EVP_PKEY pkey(PEM_read_bio_PrivateKey(b.get(), NULL, NULL, NULL));
1558 if (pkey.get() == NULL) {
1564 int len = i2d_PKCS8_PRIV_KEY_INFO(pkcs8.get(), NULL);
1645 while ((file = readdir(dir)) != NULL) {
1669 if (otherdir == NULL) {
1729 *item = NULL;
1753 Blob keyBlob(item, itemLength, NULL, 0, ::TYPE_GENERIC);
1952 if (expArg != NULL) {
1955 expArg->size(), NULL));
1956 if (pubExpBn.get() == NULL) {
1980 int32_t rc = generateKey(name, params, NULL, 0, targetUid, flags,
1981 /*outCharacteristics*/ NULL);
1992 Unique_PKCS8_PRIV_KEY_INFO pkcs8(d2i_PKCS8_PRIV_KEY_INFO(NULL, &ptr, length));
2016 /*outCharacteristics*/ NULL);
2028 return doLegacySignVerify(name, data, length, out, outLength, NULL, 0, KM_PURPOSE_SIGN);
2036 return doLegacySignVerify(name, data, dataLength, NULL, NULL, signature, signatureLength,
2053 exportKey(name, KM_KEY_FORMAT_X509, NULL, NULL, &result);
2221 device->add_rng_entropy != NULL) {
2249 keymaster_key_characteristics_t *out = NULL;
2255 if (device == NULL) {
2260 device->generate_key != NULL) {
2274 if (rc && fallback->generate_key != NULL) {
2304 Blob keyBlob(blob.key_material, blob.key_material_size, NULL, 0, ::TYPE_KEYMASTER_10);
2336 keymaster_key_characteristics_t *out = NULL;
2363 keymaster_key_characteristics_t *out = NULL;
2370 if (device == NULL) {
2374 device->import_key != NULL) {
2377 if (rc && fallback->import_key != NULL) {
2396 Blob keyBlob(blob.key_material, blob.key_material_size, NULL, 0, ::TYPE_KEYMASTER_10);
2429 keymaster_blob_t output = {NULL, 0};
2472 const hw_auth_token_t* authToken = NULL;
2517 keymaster_key_param_set_t outParams = {NULL, 0};
2588 keymaster_blob_t output = {NULL, 0};
2589 keymaster_key_param_set_t outParams = {NULL, 0};
2652 keymaster_blob_t output = {NULL, 0};
2653 keymaster_key_param_set_t outParams = {NULL, 0};
2685 if (!mOperationMap.getOperation(token, &handle, &keyid, &purpose, &dev, NULL)) {
2711 const hw_auth_token_t* authToken = NULL;
2889 keymaster_key_characteristics_t* result = NULL;
2966 const hw_auth_token_t* authToken = NULL;
2971 const keymaster_key_characteristics_t* characteristics = NULL;
3025 uint64_t now = keymaster::java_time(time(NULL));
3040 return NULL;
3050 int32_t rc = getKeyCharacteristics(name, NULL, NULL, &characteristics);
3074 begin(appToken, name, purpose, true, inArgs, NULL, 0, &result);
3105 finish(token, inArgs, signature, signatureLength, NULL, 0, &result);