/system/vold/ |
H A D | Utils.h | 124 int get() const { return fd_; } function in class:android::vold::ScopedFd 134 DIR* get() const { return dir_; } function in class:android::vold::ScopedDir
|
H A D | AutoCloseFD.h | 46 int get() const {return fd;} function in class:AutoCloseFD
|
/system/ca-certificates/google/ |
H A D | extract_from_pem.py | 21 import M2Crypto # sudo apt-get install python-m2crypto namespace
|
/system/core/include/utils/ |
H A D | StrongPointer.h | 93 inline T* get() const { return m_ptr; } function in class:android::sp
|
H A D | LruCache.h | 49 const TValue& get(const TKey& key); 169 const TValue& LruCache<TKey, TValue>::get(const TKey& key) { function in class:android::LruCache 238 for (auto entry : *mSet.get()) {
|
/system/core/libpixelflinger/codeflinger/tinyutils/ |
H A D | smartpointer.h | 76 inline T* get() const { return m_ptr; } function in class:android::tinyutils::sp
|
/system/tpm/trunks/ |
H A D | scoped_key_handle.cc | 68 TPM_HANDLE ScopedKeyHandle::get() const { function in class:trunks::ScopedKeyHandle
|
/system/core/base/include/android-base/ |
H A D | unique_fd.h | 31 // if (ufd.get() == -1) return error; 77 int get() const { return value_; } function in class:android::base::final 78 operator int() const { return get(); }
|
/system/keymaster/ |
H A D | ocb_utils.cpp | 42 ae_ctx* get() { return ctx_; } function in class:keymaster::AeCtx 56 if (!derivation_data->get()) 59 uint8_t* buf = derivation_data->get(); 60 uint8_t* end = derivation_data->get() + *derivation_data_length; 82 if (!hash_buf.get()) 84 Eraser hash_eraser(hash_buf.get(), SHA256_DIGEST_LENGTH); 86 if (!derived_key.get()) 88 Eraser derived_key_eraser(derived_key.get(), AES_BLOCK_SIZE); 90 if (!ctx->get() || !hash_buf.get() || !derived_ke [all...] |
H A D | keymaster_enforcement.cpp | 388 EVP_MD_CTX* get() { return &ctx_; } function in class:keymaster::EvpMdCtx 400 if (EVP_DigestInit_ex(ctx.get(), EVP_sha256(), nullptr /* ENGINE */) && 401 EVP_DigestUpdate(ctx.get(), key_blob.key_material, key_blob.key_material_size) && 402 EVP_DigestFinal_ex(ctx.get(), hash, &hash_len)) {
|
/system/extras/mmap-perf/ |
H A D | mmapPerf.cpp | 23 int get() { return m_fd; } function in class:Fd 64 fallocate(m_fileFd.get(), 0, 0, size); 66 m_ptr = mmap(nullptr, size, PROT_READ | PROT_WRITE, MAP_SHARED, m_fileFd.get(), 0);
|
/system/core/libutils/ |
H A D | BlobCache.cpp | 136 size_t BlobCache::get(const void* key, size_t keySize, void* value, function in class:android::BlobCache 139 ALOGV("get: not searching because the key is too large: %zu (limit %zu)", 147 ALOGV("get: no cache entry found for key of size %zu", keySize); 156 ALOGV("get: copying %zu bytes to caller's buffer", valueBlobSize); 159 ALOGV("get: caller's buffer is too small for value: %zu (needs %zu)", 222 // We have padding bytes. Those will get written to storage, and contribute to the CRC,
|
/system/netd/tests/ |
H A D | netd_test.cpp | 162 const addrinfo* get() const { return ai_; } function in class:AddrInfo 238 ASSERT_TRUE(d.get() != nullptr); 249 ASSERT_TRUE(d.get() != nullptr);
|
/system/security/keystore/ |
H A D | keystore.cpp | 151 ResponseCode rc = get(filename, &blob, ::TYPE_ANY, userId); 153 /* get can fail if the blob is encrypted and the state is 212 ResponseCode KeyStore::get(const char* filename, Blob* keyBlob, const BlobType type, uid_t userId) { function in class:KeyStore 249 rc = get(filename, keyBlob, TYPE_KEY_PAIR, userId); 275 ResponseCode rc = get(filename, &keyBlob, type, userId); 415 if (!pkcs8.get()) { 418 Unique_EVP_PKEY pkey(EVP_PKCS82PKEY(pkcs8.get())); 419 if (!pkey.get()) { 448 * There should be no way to get here. Fallback shouldn't ever really happen 474 ALOGW("can't get keymaste [all...] |
H A D | IKeystoreService.cpp | 69 if (data.get()) { 70 memcpy(data.get(), buf, length); 91 memcpy(buf, data.get(), dataLength); 113 if (exportData.get()) { 114 memcpy(exportData.get(), buf, length); 131 memcpy(buf, exportData.get(), dataLength); 449 if (!readKeymasterBlob(in, blob.get())) { 483 virtual int32_t get(const String16& name, int32_t uid, uint8_t** item, size_t* itemLength) function in class:android::BpKeystoreService 491 ALOGD("get() could not contact remote: %d\n", status); 504 ALOGE("out of memory allocating output array in get"); [all...] |
H A D | key_store_service.cpp | 66 int32_t KeyStoreService::get(const String16& name, int32_t uid, uint8_t** item, function in class:android::KeyStoreService 314 if (pubExpBn.get() == NULL) { 318 exponent = BN_get_word(pubExpBn.get()); 350 if (!pkcs8.get()) { 353 Unique_EVP_PKEY pkey(EVP_PKCS82PKEY(pkcs8.get())); 354 if (!pkey.get()) { 540 mKeyStore->get(sourceFile.string(), &keyBlob, TYPE_ANY, get_user_id(srcUid)); 851 err = getOperationCharacteristics(key, dev, opParams, characteristics.get()); 860 err = getOperationCharacteristics(key, dev, opParams, characteristics.get()); 867 int32_t authResult = getAuthToken(characteristics.get(), [all...] |