/system/keymaster/ |
H A D | asymmetric_key.cpp | 33 if (pkey.get() == NULL) 36 if (!InternalToEvp(pkey.get())) 39 *size = i2d_PrivateKey(pkey.get(), NULL /* key_data*/); 44 uint8_t* tmp = material->get(); 45 i2d_PrivateKey(pkey.get(), &tmp); 60 if (!InternalToEvp(pkey.get())) 63 int key_data_length = i2d_PUBKEY(pkey.get(), NULL); 68 if (material->get() == NULL) 71 uint8_t* tmp = material->get(); 72 if (i2d_PUBKEY(pkey.get(), [all...] |
H A D | ec_key.cpp | 29 return ec_key_.get() != NULL; 33 return EVP_PKEY_set1_EC_KEY(pkey, ec_key_.get()) == 1;
|
H A D | ec_key_factory.cpp | 60 if (ec_key.get() == NULL || pkey.get() == NULL) 64 if (group.get() == NULL) { 65 LOG_E("Unable to get EC group for key of size %d", key_size); 70 EC_GROUP_set_point_conversion_form(group.get(), POINT_CONVERSION_UNCOMPRESSED); 71 EC_GROUP_set_asn1_flag(group.get(), OPENSSL_EC_NAMED_CURVE); 74 if (EC_KEY_set_group(ec_key.get(), group.get()) != 1 || 75 EC_KEY_generate_key(ec_key.get()) != 1 || EC_KEY_check_key(ec_key.get()) < [all...] |
H A D | rsa_key_factory.cpp | 80 if (exponent.get() == NULL || rsa_key.get() == NULL || pkey.get() == NULL) 83 if (!BN_set_word(exponent.get(), public_exponent) || 84 !RSA_generate_key_ex(rsa_key.get(), key_size, exponent.get(), NULL /* callback */)) 87 if (EVP_PKEY_set1_RSA(pkey.get(), rsa_key.get()) != 1) 91 keymaster_error_t error = EvpKeyToKeyMaterial(pkey.get(), &key_material); 135 UniquePtr<RSA, RsaKey::RSA_Delete> rsa_key(EVP_PKEY_get1_RSA(pkey.get())); [all...] |
H A D | ocb_utils.cpp | 42 ae_ctx* get() { return ctx_; } function in class:keymaster::AeCtx 56 if (!derivation_data->get()) 59 uint8_t* buf = derivation_data->get(); 60 uint8_t* end = derivation_data->get() + *derivation_data_length; 82 if (!hash_buf.get()) 84 Eraser hash_eraser(hash_buf.get(), SHA256_DIGEST_LENGTH); 86 if (!derived_key.get()) 88 Eraser derived_key_eraser(derived_key.get(), AES_BLOCK_SIZE); 90 if (!ctx->get() || !hash_buf.get() || !derived_ke [all...] |
H A D | operation_table.cpp | 36 if (!table_.get()) { 38 if (!table_.get()) 65 if (!table_.get()) 76 if (!table_.get())
|
H A D | serializable.cpp | 65 if (!dest->get()) 67 return copy_from_buf(buf_ptr, end, dest->get(), *size); 76 memcpy(new_buffer, buffer_.get() + read_position_, available_read()); 77 memset_s(buffer_.get(), 0, buffer_size_); 89 if (!buffer_.get()) 102 if (!buffer_.get()) 105 memcpy(buffer_.get(), data, data_len); 125 memcpy(buffer_.get() + write_position_, src, write_length); 133 memcpy(dest, buffer_.get() + read_position_, read_length); 158 memset_s(buffer_.get(), [all...] |
H A D | rsa_key.cpp | 29 return rsa_key_.get() != NULL; 33 return EVP_PKEY_set1_RSA(pkey, rsa_key_.get()) == 1;
|
H A D | rsa_operation.cpp | 50 if (!rsa_key->InternalToEvp(pkey.get())) { 85 if (!rsa.get()) 106 if (op.get()) { 304 if (!dest->get()) 308 memset(dest->get(), 0, padding_len); 309 if (!src.read(dest->get() + padding_len, src.available_read())) 317 if (!rsa.get()) 320 if (!output->Reinitialize(RSA_size(rsa.get()))) 335 to_encrypt = zero_padded.get(); 337 bytes_encrypted = RSA_private_encrypt(key_len, to_encrypt, output->peek_write(), rsa.get(), [all...] |
H A D | openssl_utils.cpp | 44 if (pkcs8.get() == NULL) 47 pkey->reset(EVP_PKCS82PKEY(pkcs8.get())); 48 if (!pkey->get())
|
H A D | keymaster0_engine.cpp | 171 if (!blob_copy.get()) 189 if (!blob_copy->key_material || !RSA_set_ex_data(rsa.get(), rsa_index_, blob_copy)) 196 unique_ptr<RSA, RSA_Delete> public_rsa(EVP_PKEY_get1_RSA(pkey.get())); 214 if (!blob_copy->key_material || !EC_KEY_set_ex_data(ec_key.get(), ec_key_index_, blob_copy)) 222 unique_ptr<EC_KEY, EC_Delete> public_ec_key(EVP_PKEY_get1_EC_KEY(pkey.get())); 226 if (!EC_KEY_set_group(ec_key.get(), EC_KEY_get0_group(public_ec_key.get())) || 227 !EC_KEY_set_public_key(ec_key.get(), EC_KEY_get0_public_key(public_ec_key.get()))) 326 Eraser eraser(signature.get(), signature_lengt [all...] |
/system/gatekeeper/tests/ |
H A D | gatekeeper_messages_test.cpp | 56 msg.Serialize(serialized_msg.buffer.get(), serialized_msg.buffer.get() + serialized_msg.length); 59 deserialized_msg.Deserialize(serialized_msg.buffer.get(), serialized_msg.buffer.get() 68 ASSERT_EQ(0, memcmp(msg.provided_password.buffer.get(), deserialized_password->buffer.get(), password_size)); 70 ASSERT_EQ(NULL, deserialized_msg.enrolled_password.buffer.get()); 72 ASSERT_EQ(NULL, deserialized_msg.password_handle.buffer.get()); 85 msg.Serialize(serialized_msg.buffer.get(), serialized_msg.buffer.get() [all...] |
/system/security/softkeymaster/ |
H A D | keymaster_openssl.cpp | 129 if (derData.get() == NULL) { 133 unsigned char* p = derData.get(); 212 if (pkey.get() == NULL) { 216 EVP_PKEY* tmp = pkey.get(); 237 if (DSA_generate_parameters_ex(dsa.get(), dsa_params->key_size, NULL, 0, NULL, NULL, 262 if (DSA_generate_key(dsa.get()) != 1) { 267 if (EVP_PKEY_assign_DSA(pkey, dsa.get()) == 0) { 295 if (group.get() == NULL) { 301 EC_GROUP_set_point_conversion_form(group.get(), POINT_CONVERSION_UNCOMPRESSED); 302 EC_GROUP_set_asn1_flag(group.get(), OPENSSL_EC_NAMED_CURV [all...] |
/system/core/gatekeeperd/tests/ |
H A D | gatekeeper_test.cpp | 41 memset(password.buffer.get(), 0, 16); 73 memset(provided_password.buffer.get(), 0, 16); 86 reinterpret_cast<hw_auth_token_t *>(response.auth_token.buffer.get()); 104 memset(provided_password.buffer.get(), 0, 16); 111 memcpy(password_handle.buffer.get(), enroll_response.enrolled_password_handle.buffer.get(), 121 reinterpret_cast<hw_auth_token_t *>(response.auth_token.buffer.get()); 128 memset(provided_password.buffer.get(), 0, 16); 131 memset(password.buffer.get(), 1, 16); 139 memset(password.buffer.get(), [all...] |
/system/core/debuggerd/test/ |
H A D | dump_memory_test.cpp | 109 backtrace_mock_.reset(new BacktraceMock(map_mock_.get())); 155 dump_memory(&log_, backtrace_mock_.get(), 0x12345678, "memory near %.2s:", "r1"); 175 dump_memory(&log_, backtrace_mock_.get(), 0x12345679, "memory near %.2s:", "r1"); 194 dump_memory(&log_, backtrace_mock_.get(), 0x12345679, "memory near %.2s:", "r1"); 207 dump_memory(&log_, backtrace_mock_.get(), 0xa2345678, "memory near pc:"); 263 dump_memory(&log_, backtrace_mock_.get(), 0x12345600, "memory near pc:"); 283 dump_memory(&log_, backtrace_mock_.get(), 0x12345600, "memory near pc:"); 308 dump_memory(&log_, backtrace_mock_.get(), 0x12345600, "memory near pc:"); 334 dump_memory(&log_, backtrace_mock_.get(), 0x1000, "memory near %.2s:", "r1"); 388 dump_memory(&log_, backtrace_mock_.get(), [all...] |
/system/core/libutils/tests/ |
H A D | LruCache_test.cpp | 124 EXPECT_EQ(NULL, cache.get(0)); 134 EXPECT_STREQ("one", cache.get(1)); 135 EXPECT_STREQ("two", cache.get(2)); 136 EXPECT_STREQ("three", cache.get(3)); 146 EXPECT_EQ(NULL, cache.get(1)); 147 EXPECT_STREQ("two", cache.get(2)); 148 EXPECT_STREQ("three", cache.get(3)); 159 EXPECT_EQ(NULL, cache.get(1)); 160 EXPECT_STREQ("two", cache.get(2)); 161 EXPECT_STREQ("three", cache.get( [all...] |
H A D | BlobCache_test.cpp | 49 ASSERT_EQ(size_t(4), mBC->get("abcd", 4, buf, 4)); 60 ASSERT_EQ(size_t(2), mBC->get("ab", 2, buf, 2)); 63 ASSERT_EQ(size_t(2), mBC->get("ef", 2, buf, 2)); 71 ASSERT_EQ(size_t(4), mBC->get("abcd", 4, buf+1, 4)); 83 ASSERT_EQ(size_t(4), mBC->get("abcd", 4, buf, 3)); 91 ASSERT_EQ(size_t(4), mBC->get("abcd", 4, NULL, 0)); 98 ASSERT_EQ(size_t(4), mBC->get("abcd", 4, buf, 4)); 109 ASSERT_EQ(size_t(4), mBC->get("abcd", 4, buf, 4)); 123 ASSERT_EQ(size_t(0), mBC->get(key, MAX_KEY_SIZE+1, buf, 4)); 139 ASSERT_EQ(size_t(0), mBC->get("abc [all...] |
/system/security/keystore-engine/ |
H A D | android_engine.cpp | 324 if (rsa.get() == NULL) { 333 if (!RSA_set_ex_data(rsa.get(), g_keystore_engine->rsa_ex_index(), 346 if (result.get() == NULL || 347 !EVP_PKEY_assign_RSA(result.get(), rsa.get())) { 360 if (ec.get() == NULL) { 364 if (!EC_KEY_set_group(ec.get(), EC_KEY_get0_group(public_ecdsa)) || 365 !EC_KEY_set_public_key(ec.get(), EC_KEY_get0_public_key(public_ecdsa))) { 374 if (!EC_KEY_set_ex_data(ec.get(), g_keystore_engine->ec_key_ex_index(), 381 if (result.get() [all...] |
H A D | rsa_meth.cpp | 50 if (padded.get() == NULL) { 57 if (!RSA_padding_add_PKCS1_type_1(padded.get(), num, from, flen)) { 62 if (!RSA_padding_add_X931(padded.get(), num, from, flen)) { 67 if (!RSA_padding_add_none(padded.get(), num, from, flen)) { 93 int32_t ret = service->sign(String16(reinterpret_cast<const char*>(key_id)), padded.get(), 214 if (!RSA_set_ex_data(rsa.get(), rsa_key_handle, reinterpret_cast<void*>(strdup(key_id)))) { 219 RSA_set_method(rsa.get(), &keystore_rsa_meth); 220 RSA_blinding_off(rsa.get());
|
H A D | ecdsa_meth.cpp | 97 if (ecdsa_sig.get() == NULL) { 103 ecdsa_sig.get(), replyLen); 126 void* oldData = EC_KEY_insert_key_method_data(eckey.get(), 133 ECDSA_set_method(eckey.get(), &keystore_ecdsa_meth); 140 ECDSA_DATA *ecdsa = ecdsa_check(eckey.get());
|
H A D | eng_keystore.cpp | 135 if (pkey.get() == NULL) { 142 dsa_pkey_setup(e, pkey.get(), key_id); 146 rsa_pkey_setup(e, pkey.get(), key_id); 150 ecdsa_pkey_setup(e, pkey.get(), key_id); 203 if (engine.get() == NULL) { 207 if (!keystore_engine_setup(engine.get())) {
|
/system/media/camera/docs/ |
H A D | metadata_parser_xml.py | 145 'type_notes': entry.attrs.get('type_notes') 175 d['visibility'] = entry.get('visibility') 180 d['synthetic'] = entry.get('synthetic') == 'true' 185 d['hwlevel'] = entry.get('hwlevel') 190 d['deprecated'] = entry.get('deprecated') == 'true' 195 d['optional'] = entry.get('optional') == 'true' 200 d['type_name'] = entry.get('typedef') 205 if entry.get('enum', 'false') == 'true': 218 if value.attrs.get('deprecated', 'false') == 'true': 221 if value.attrs.get('optiona [all...] |
/system/gatekeeper/ |
H A D | gatekeeper_messages.cpp | 43 memcpy(*buffer, to_append->buffer.get(), to_append->length); 59 memcpy(target->buffer.get(), *buffer, target->length); 150 if (password_handle.buffer.get()) { 154 if (provided_password.buffer.get()) { 155 memset_s(provided_password.buffer.get(), 0, provided_password.length); 175 if (password_handle.buffer.get()) { 179 if (provided_password.buffer.get()) { 180 memset_s(provided_password.buffer.get(), 0, provided_password.length); 226 if (auth_token.buffer.get()) { 269 if (provided_password.buffer.get()) { [all...] |
H A D | gatekeeper.cpp | 26 if (!request.provided_password.buffer.get()) { 34 if (request.password_handle.buffer.get() == NULL) { 39 reinterpret_cast<password_handle_t *>(request.password_handle.buffer.get()); 93 salt, user_id, flags, HANDLE_VERSION, request.provided_password.buffer.get(), 105 if (!request.provided_password.buffer.get() || !request.password_handle.buffer.get()) { 111 request.password_handle.buffer.get()); 154 memcpy(auth_token.buffer.get(), auth_token_buffer.get(), auth_token_len); 174 password_handle_buffer->buffer.get()); [all...] |
/system/core/gatekeeperd/ |
H A D | SoftGateKeeperDevice.cpp | 41 memcpy(desired_password_buffer.buffer.get(), desired_password, desired_password_length); 45 memcpy(current_password_handle_buffer.buffer.get(), current_password_handle, 51 memcpy(current_password_buffer.buffer.get(), current_password, current_password_length); 83 memcpy(password_handle_buffer.buffer.get(), enrolled_password_handle, 86 memcpy(provided_password_buffer.buffer.get(), provided_password, provided_password_length);
|