Searched refs:get (Results 1 - 25 of 102) sorted by relevance

12345

/system/keymaster/
H A Dasymmetric_key.cpp33 if (pkey.get() == NULL)
36 if (!InternalToEvp(pkey.get()))
39 *size = i2d_PrivateKey(pkey.get(), NULL /* key_data*/);
44 uint8_t* tmp = material->get();
45 i2d_PrivateKey(pkey.get(), &tmp);
60 if (!InternalToEvp(pkey.get()))
63 int key_data_length = i2d_PUBKEY(pkey.get(), NULL);
68 if (material->get() == NULL)
71 uint8_t* tmp = material->get();
72 if (i2d_PUBKEY(pkey.get(),
[all...]
H A Dec_key.cpp29 return ec_key_.get() != NULL;
33 return EVP_PKEY_set1_EC_KEY(pkey, ec_key_.get()) == 1;
H A Dec_key_factory.cpp60 if (ec_key.get() == NULL || pkey.get() == NULL)
64 if (group.get() == NULL) {
65 LOG_E("Unable to get EC group for key of size %d", key_size);
70 EC_GROUP_set_point_conversion_form(group.get(), POINT_CONVERSION_UNCOMPRESSED);
71 EC_GROUP_set_asn1_flag(group.get(), OPENSSL_EC_NAMED_CURVE);
74 if (EC_KEY_set_group(ec_key.get(), group.get()) != 1 ||
75 EC_KEY_generate_key(ec_key.get()) != 1 || EC_KEY_check_key(ec_key.get()) <
[all...]
H A Drsa_key_factory.cpp80 if (exponent.get() == NULL || rsa_key.get() == NULL || pkey.get() == NULL)
83 if (!BN_set_word(exponent.get(), public_exponent) ||
84 !RSA_generate_key_ex(rsa_key.get(), key_size, exponent.get(), NULL /* callback */))
87 if (EVP_PKEY_set1_RSA(pkey.get(), rsa_key.get()) != 1)
91 keymaster_error_t error = EvpKeyToKeyMaterial(pkey.get(), &key_material);
135 UniquePtr<RSA, RsaKey::RSA_Delete> rsa_key(EVP_PKEY_get1_RSA(pkey.get()));
[all...]
H A Docb_utils.cpp42 ae_ctx* get() { return ctx_; } function in class:keymaster::AeCtx
56 if (!derivation_data->get())
59 uint8_t* buf = derivation_data->get();
60 uint8_t* end = derivation_data->get() + *derivation_data_length;
82 if (!hash_buf.get())
84 Eraser hash_eraser(hash_buf.get(), SHA256_DIGEST_LENGTH);
86 if (!derived_key.get())
88 Eraser derived_key_eraser(derived_key.get(), AES_BLOCK_SIZE);
90 if (!ctx->get() || !hash_buf.get() || !derived_ke
[all...]
H A Doperation_table.cpp36 if (!table_.get()) {
38 if (!table_.get())
65 if (!table_.get())
76 if (!table_.get())
H A Dserializable.cpp65 if (!dest->get())
67 return copy_from_buf(buf_ptr, end, dest->get(), *size);
76 memcpy(new_buffer, buffer_.get() + read_position_, available_read());
77 memset_s(buffer_.get(), 0, buffer_size_);
89 if (!buffer_.get())
102 if (!buffer_.get())
105 memcpy(buffer_.get(), data, data_len);
125 memcpy(buffer_.get() + write_position_, src, write_length);
133 memcpy(dest, buffer_.get() + read_position_, read_length);
158 memset_s(buffer_.get(),
[all...]
H A Drsa_key.cpp29 return rsa_key_.get() != NULL;
33 return EVP_PKEY_set1_RSA(pkey, rsa_key_.get()) == 1;
H A Drsa_operation.cpp50 if (!rsa_key->InternalToEvp(pkey.get())) {
85 if (!rsa.get())
106 if (op.get()) {
304 if (!dest->get())
308 memset(dest->get(), 0, padding_len);
309 if (!src.read(dest->get() + padding_len, src.available_read()))
317 if (!rsa.get())
320 if (!output->Reinitialize(RSA_size(rsa.get())))
335 to_encrypt = zero_padded.get();
337 bytes_encrypted = RSA_private_encrypt(key_len, to_encrypt, output->peek_write(), rsa.get(),
[all...]
H A Dopenssl_utils.cpp44 if (pkcs8.get() == NULL)
47 pkey->reset(EVP_PKCS82PKEY(pkcs8.get()));
48 if (!pkey->get())
H A Dkeymaster0_engine.cpp171 if (!blob_copy.get())
189 if (!blob_copy->key_material || !RSA_set_ex_data(rsa.get(), rsa_index_, blob_copy))
196 unique_ptr<RSA, RSA_Delete> public_rsa(EVP_PKEY_get1_RSA(pkey.get()));
214 if (!blob_copy->key_material || !EC_KEY_set_ex_data(ec_key.get(), ec_key_index_, blob_copy))
222 unique_ptr<EC_KEY, EC_Delete> public_ec_key(EVP_PKEY_get1_EC_KEY(pkey.get()));
226 if (!EC_KEY_set_group(ec_key.get(), EC_KEY_get0_group(public_ec_key.get())) ||
227 !EC_KEY_set_public_key(ec_key.get(), EC_KEY_get0_public_key(public_ec_key.get())))
326 Eraser eraser(signature.get(), signature_lengt
[all...]
/system/gatekeeper/tests/
H A Dgatekeeper_messages_test.cpp56 msg.Serialize(serialized_msg.buffer.get(), serialized_msg.buffer.get() + serialized_msg.length);
59 deserialized_msg.Deserialize(serialized_msg.buffer.get(), serialized_msg.buffer.get()
68 ASSERT_EQ(0, memcmp(msg.provided_password.buffer.get(), deserialized_password->buffer.get(), password_size));
70 ASSERT_EQ(NULL, deserialized_msg.enrolled_password.buffer.get());
72 ASSERT_EQ(NULL, deserialized_msg.password_handle.buffer.get());
85 msg.Serialize(serialized_msg.buffer.get(), serialized_msg.buffer.get()
[all...]
/system/security/softkeymaster/
H A Dkeymaster_openssl.cpp129 if (derData.get() == NULL) {
133 unsigned char* p = derData.get();
212 if (pkey.get() == NULL) {
216 EVP_PKEY* tmp = pkey.get();
237 if (DSA_generate_parameters_ex(dsa.get(), dsa_params->key_size, NULL, 0, NULL, NULL,
262 if (DSA_generate_key(dsa.get()) != 1) {
267 if (EVP_PKEY_assign_DSA(pkey, dsa.get()) == 0) {
295 if (group.get() == NULL) {
301 EC_GROUP_set_point_conversion_form(group.get(), POINT_CONVERSION_UNCOMPRESSED);
302 EC_GROUP_set_asn1_flag(group.get(), OPENSSL_EC_NAMED_CURV
[all...]
/system/core/gatekeeperd/tests/
H A Dgatekeeper_test.cpp41 memset(password.buffer.get(), 0, 16);
73 memset(provided_password.buffer.get(), 0, 16);
86 reinterpret_cast<hw_auth_token_t *>(response.auth_token.buffer.get());
104 memset(provided_password.buffer.get(), 0, 16);
111 memcpy(password_handle.buffer.get(), enroll_response.enrolled_password_handle.buffer.get(),
121 reinterpret_cast<hw_auth_token_t *>(response.auth_token.buffer.get());
128 memset(provided_password.buffer.get(), 0, 16);
131 memset(password.buffer.get(), 1, 16);
139 memset(password.buffer.get(),
[all...]
/system/core/debuggerd/test/
H A Ddump_memory_test.cpp109 backtrace_mock_.reset(new BacktraceMock(map_mock_.get()));
155 dump_memory(&log_, backtrace_mock_.get(), 0x12345678, "memory near %.2s:", "r1");
175 dump_memory(&log_, backtrace_mock_.get(), 0x12345679, "memory near %.2s:", "r1");
194 dump_memory(&log_, backtrace_mock_.get(), 0x12345679, "memory near %.2s:", "r1");
207 dump_memory(&log_, backtrace_mock_.get(), 0xa2345678, "memory near pc:");
263 dump_memory(&log_, backtrace_mock_.get(), 0x12345600, "memory near pc:");
283 dump_memory(&log_, backtrace_mock_.get(), 0x12345600, "memory near pc:");
308 dump_memory(&log_, backtrace_mock_.get(), 0x12345600, "memory near pc:");
334 dump_memory(&log_, backtrace_mock_.get(), 0x1000, "memory near %.2s:", "r1");
388 dump_memory(&log_, backtrace_mock_.get(),
[all...]
/system/core/libutils/tests/
H A DLruCache_test.cpp124 EXPECT_EQ(NULL, cache.get(0));
134 EXPECT_STREQ("one", cache.get(1));
135 EXPECT_STREQ("two", cache.get(2));
136 EXPECT_STREQ("three", cache.get(3));
146 EXPECT_EQ(NULL, cache.get(1));
147 EXPECT_STREQ("two", cache.get(2));
148 EXPECT_STREQ("three", cache.get(3));
159 EXPECT_EQ(NULL, cache.get(1));
160 EXPECT_STREQ("two", cache.get(2));
161 EXPECT_STREQ("three", cache.get(
[all...]
H A DBlobCache_test.cpp49 ASSERT_EQ(size_t(4), mBC->get("abcd", 4, buf, 4));
60 ASSERT_EQ(size_t(2), mBC->get("ab", 2, buf, 2));
63 ASSERT_EQ(size_t(2), mBC->get("ef", 2, buf, 2));
71 ASSERT_EQ(size_t(4), mBC->get("abcd", 4, buf+1, 4));
83 ASSERT_EQ(size_t(4), mBC->get("abcd", 4, buf, 3));
91 ASSERT_EQ(size_t(4), mBC->get("abcd", 4, NULL, 0));
98 ASSERT_EQ(size_t(4), mBC->get("abcd", 4, buf, 4));
109 ASSERT_EQ(size_t(4), mBC->get("abcd", 4, buf, 4));
123 ASSERT_EQ(size_t(0), mBC->get(key, MAX_KEY_SIZE+1, buf, 4));
139 ASSERT_EQ(size_t(0), mBC->get("abc
[all...]
/system/security/keystore-engine/
H A Dandroid_engine.cpp324 if (rsa.get() == NULL) {
333 if (!RSA_set_ex_data(rsa.get(), g_keystore_engine->rsa_ex_index(),
346 if (result.get() == NULL ||
347 !EVP_PKEY_assign_RSA(result.get(), rsa.get())) {
360 if (ec.get() == NULL) {
364 if (!EC_KEY_set_group(ec.get(), EC_KEY_get0_group(public_ecdsa)) ||
365 !EC_KEY_set_public_key(ec.get(), EC_KEY_get0_public_key(public_ecdsa))) {
374 if (!EC_KEY_set_ex_data(ec.get(), g_keystore_engine->ec_key_ex_index(),
381 if (result.get()
[all...]
H A Drsa_meth.cpp50 if (padded.get() == NULL) {
57 if (!RSA_padding_add_PKCS1_type_1(padded.get(), num, from, flen)) {
62 if (!RSA_padding_add_X931(padded.get(), num, from, flen)) {
67 if (!RSA_padding_add_none(padded.get(), num, from, flen)) {
93 int32_t ret = service->sign(String16(reinterpret_cast<const char*>(key_id)), padded.get(),
214 if (!RSA_set_ex_data(rsa.get(), rsa_key_handle, reinterpret_cast<void*>(strdup(key_id)))) {
219 RSA_set_method(rsa.get(), &keystore_rsa_meth);
220 RSA_blinding_off(rsa.get());
H A Decdsa_meth.cpp97 if (ecdsa_sig.get() == NULL) {
103 ecdsa_sig.get(), replyLen);
126 void* oldData = EC_KEY_insert_key_method_data(eckey.get(),
133 ECDSA_set_method(eckey.get(), &keystore_ecdsa_meth);
140 ECDSA_DATA *ecdsa = ecdsa_check(eckey.get());
H A Deng_keystore.cpp135 if (pkey.get() == NULL) {
142 dsa_pkey_setup(e, pkey.get(), key_id);
146 rsa_pkey_setup(e, pkey.get(), key_id);
150 ecdsa_pkey_setup(e, pkey.get(), key_id);
203 if (engine.get() == NULL) {
207 if (!keystore_engine_setup(engine.get())) {
/system/media/camera/docs/
H A Dmetadata_parser_xml.py145 'type_notes': entry.attrs.get('type_notes')
175 d['visibility'] = entry.get('visibility')
180 d['synthetic'] = entry.get('synthetic') == 'true'
185 d['hwlevel'] = entry.get('hwlevel')
190 d['deprecated'] = entry.get('deprecated') == 'true'
195 d['optional'] = entry.get('optional') == 'true'
200 d['type_name'] = entry.get('typedef')
205 if entry.get('enum', 'false') == 'true':
218 if value.attrs.get('deprecated', 'false') == 'true':
221 if value.attrs.get('optiona
[all...]
/system/gatekeeper/
H A Dgatekeeper_messages.cpp43 memcpy(*buffer, to_append->buffer.get(), to_append->length);
59 memcpy(target->buffer.get(), *buffer, target->length);
150 if (password_handle.buffer.get()) {
154 if (provided_password.buffer.get()) {
155 memset_s(provided_password.buffer.get(), 0, provided_password.length);
175 if (password_handle.buffer.get()) {
179 if (provided_password.buffer.get()) {
180 memset_s(provided_password.buffer.get(), 0, provided_password.length);
226 if (auth_token.buffer.get()) {
269 if (provided_password.buffer.get()) {
[all...]
H A Dgatekeeper.cpp26 if (!request.provided_password.buffer.get()) {
34 if (request.password_handle.buffer.get() == NULL) {
39 reinterpret_cast<password_handle_t *>(request.password_handle.buffer.get());
93 salt, user_id, flags, HANDLE_VERSION, request.provided_password.buffer.get(),
105 if (!request.provided_password.buffer.get() || !request.password_handle.buffer.get()) {
111 request.password_handle.buffer.get());
154 memcpy(auth_token.buffer.get(), auth_token_buffer.get(), auth_token_len);
174 password_handle_buffer->buffer.get());
[all...]
/system/core/gatekeeperd/
H A DSoftGateKeeperDevice.cpp41 memcpy(desired_password_buffer.buffer.get(), desired_password, desired_password_length);
45 memcpy(current_password_handle_buffer.buffer.get(), current_password_handle,
51 memcpy(current_password_buffer.buffer.get(), current_password, current_password_length);
83 memcpy(password_handle_buffer.buffer.get(), enrolled_password_handle,
86 memcpy(provided_password_buffer.buffer.get(), provided_password, provided_password_length);

Completed in 271 milliseconds

12345