Searched refs:ptr (Results 151 - 168 of 168) sorted by path

1234567

/system/security/keystore-engine/
H A Dmethods.h56 void keyhandle_free(void *, void *ptr, CRYPTO_EX_DATA*, int, long, void*);
/system/security/keystore/
H A Dkey_store_service.cpp440 const uint8_t* ptr = &data[0]; local
442 Unique_PKCS8_PRIV_KEY_INFO pkcs8(d2i_PKCS8_PRIV_KEY_INFO(NULL, &ptr, data.size()));
/system/sepolicy/tests/
H A Dsepol_wrap.cpp126 auto unmap = [=](void *ptr) { munmap(ptr, sb.st_size); };
/system/sepolicy/tools/sepolicy-analyze/
H A Dneverallow.c20 static int read_typeset(policydb_t *policydb, char **ptr, char *end, argument
25 char *p = *ptr;
176 *ptr = p;
182 static int read_classperms(policydb_t *policydb, char **ptr, char *end, argument
185 char *p = *ptr;
361 *ptr = p;
/system/tpm/attestation/common/
H A Dtpm_utility_v1.cc138 identity_key_blob_buffer, identity_key.ptr());
153 sym_ca_attestation_buffer, &credential_length, credential_buffer.ptr());
197 context_handle_, TSS_OBJECT_TYPE_RSAKEY, init_flags, key.ptr());
281 pcrs_handle.ptr()))) {
288 Tspi_TPM_PcrRead(tpm_handle_, 0, &pcr_length, pcr_value.ptr());
295 encrypted_data_handle.ptr()))) {
317 encrypted_data.ptr()))) {
338 encrypted_data_handle.ptr()))) {
359 decrypted_data.ptr()))) {
372 ek_public_key_object.ptr());
[all...]
/system/tpm/tpm_manager/server/
H A Dtpm_connection.cc66 if (TPM_ERROR(result = Tspi_Context_Create(context_.ptr()))) {
H A Dtpm_initializer_impl.cc94 connection->GetTpm(), false, nullptr, local_key_handle.ptr());
104 init_flags, local_key_handle.ptr()))) {
126 init_flags, srk_handle.ptr()))) {
171 srk_handle.ptr()))) {
179 TSS_POLICY_USAGE, policy_handle.ptr()))) {
221 TSS_POLICY_USAGE, policy_handle.ptr()))) {
H A Dtpm_nvram_impl.cc283 Tspi_NV_ReadValue(nv_handle, offset, &chunk_size, space_data.ptr());
336 Tspi_NV_ReadValue(nv_handle, 0, &size, space_data.ptr());
379 nullptr, &nv_list_data_length, nv_list_data.ptr());
406 &nv_index_data_length, nv_index_data.ptr());
452 connection->GetContext(), TSS_OBJECT_TYPE_NV, 0, nv_handle->ptr());
481 policy_handle.ptr());
506 TSS_PCRS_STRUCT_INFO_SHORT, pcr_handle->ptr());
514 pcr_value.ptr());
H A Dtpm_status_impl.cc111 reinterpret_cast<BYTE*>(&sub_capability), &length, buf.ptr());
/system/tpm/trunks/
H A Dscoped_key_handle.cc62 TPM_HANDLE* ScopedKeyHandle::ptr() { function in class:trunks::ScopedKeyHandle
H A Dscoped_key_handle.h54 virtual TPM_HANDLE* ptr();
/system/update_engine/
H A Dcertificate_checker.cc78 void* ptr) {
79 ServerToCheck* server_to_check = reinterpret_cast<ServerToCheck*>(ptr);
76 ProcessSSLContext(CURL* curl_handle, SSL_CTX* ssl_ctx, void* ptr) argument
H A Dlibcurl_http_fetcher.cc527 size_t LibcurlHttpFetcher::LibcurlWrite(void *ptr, size_t size, size_t nmemb) { argument
553 delegate_->ReceivedBytes(this, ptr, payload_size);
H A Dlibcurl_http_fetcher.h154 size_t LibcurlWrite(void *ptr, size_t size, size_t nmemb);
155 static size_t StaticLibcurlWrite(void *ptr, size_t size, argument
158 LibcurlWrite(ptr, size, nmemb);
/system/update_engine/common/
H A Dfake_prefs.cc29 void CheckNotNull(const string& key, void* ptr) { argument
30 EXPECT_NE(nullptr, ptr)
/system/update_engine/update_manager/
H A Dpolicy_utils.h30 #define POLICY_CHECK_VALUE_AND_FAIL(ptr, error) \
32 if ((ptr) == nullptr) { \
33 *(error) = #ptr " is required but is null."; \
/system/vold/
H A DDevmapper.cpp297 void *Devmapper::_align(void *ptr, unsigned int a) argument
301 return (void *) (((unsigned long) ptr + agn) & ~agn);
H A DDevmapper.h34 static void *_align(void *ptr, unsigned int a);

Completed in 8435 milliseconds

1234567