/system/security/keystore-engine/ |
H A D | methods.h | 56 void keyhandle_free(void *, void *ptr, CRYPTO_EX_DATA*, int, long, void*);
|
/system/security/keystore/ |
H A D | key_store_service.cpp | 440 const uint8_t* ptr = &data[0]; local 442 Unique_PKCS8_PRIV_KEY_INFO pkcs8(d2i_PKCS8_PRIV_KEY_INFO(NULL, &ptr, data.size()));
|
/system/sepolicy/tests/ |
H A D | sepol_wrap.cpp | 126 auto unmap = [=](void *ptr) { munmap(ptr, sb.st_size); };
|
/system/sepolicy/tools/sepolicy-analyze/ |
H A D | neverallow.c | 20 static int read_typeset(policydb_t *policydb, char **ptr, char *end, argument 25 char *p = *ptr; 176 *ptr = p; 182 static int read_classperms(policydb_t *policydb, char **ptr, char *end, argument 185 char *p = *ptr; 361 *ptr = p;
|
/system/tpm/attestation/common/ |
H A D | tpm_utility_v1.cc | 138 identity_key_blob_buffer, identity_key.ptr()); 153 sym_ca_attestation_buffer, &credential_length, credential_buffer.ptr()); 197 context_handle_, TSS_OBJECT_TYPE_RSAKEY, init_flags, key.ptr()); 281 pcrs_handle.ptr()))) { 288 Tspi_TPM_PcrRead(tpm_handle_, 0, &pcr_length, pcr_value.ptr()); 295 encrypted_data_handle.ptr()))) { 317 encrypted_data.ptr()))) { 338 encrypted_data_handle.ptr()))) { 359 decrypted_data.ptr()))) { 372 ek_public_key_object.ptr()); [all...] |
/system/tpm/tpm_manager/server/ |
H A D | tpm_connection.cc | 66 if (TPM_ERROR(result = Tspi_Context_Create(context_.ptr()))) {
|
H A D | tpm_initializer_impl.cc | 94 connection->GetTpm(), false, nullptr, local_key_handle.ptr()); 104 init_flags, local_key_handle.ptr()))) { 126 init_flags, srk_handle.ptr()))) { 171 srk_handle.ptr()))) { 179 TSS_POLICY_USAGE, policy_handle.ptr()))) { 221 TSS_POLICY_USAGE, policy_handle.ptr()))) {
|
H A D | tpm_nvram_impl.cc | 283 Tspi_NV_ReadValue(nv_handle, offset, &chunk_size, space_data.ptr()); 336 Tspi_NV_ReadValue(nv_handle, 0, &size, space_data.ptr()); 379 nullptr, &nv_list_data_length, nv_list_data.ptr()); 406 &nv_index_data_length, nv_index_data.ptr()); 452 connection->GetContext(), TSS_OBJECT_TYPE_NV, 0, nv_handle->ptr()); 481 policy_handle.ptr()); 506 TSS_PCRS_STRUCT_INFO_SHORT, pcr_handle->ptr()); 514 pcr_value.ptr());
|
H A D | tpm_status_impl.cc | 111 reinterpret_cast<BYTE*>(&sub_capability), &length, buf.ptr());
|
/system/tpm/trunks/ |
H A D | scoped_key_handle.cc | 62 TPM_HANDLE* ScopedKeyHandle::ptr() { function in class:trunks::ScopedKeyHandle
|
H A D | scoped_key_handle.h | 54 virtual TPM_HANDLE* ptr();
|
/system/update_engine/ |
H A D | certificate_checker.cc | 78 void* ptr) { 79 ServerToCheck* server_to_check = reinterpret_cast<ServerToCheck*>(ptr); 76 ProcessSSLContext(CURL* curl_handle, SSL_CTX* ssl_ctx, void* ptr) argument
|
H A D | libcurl_http_fetcher.cc | 527 size_t LibcurlHttpFetcher::LibcurlWrite(void *ptr, size_t size, size_t nmemb) { argument 553 delegate_->ReceivedBytes(this, ptr, payload_size);
|
H A D | libcurl_http_fetcher.h | 154 size_t LibcurlWrite(void *ptr, size_t size, size_t nmemb); 155 static size_t StaticLibcurlWrite(void *ptr, size_t size, argument 158 LibcurlWrite(ptr, size, nmemb);
|
/system/update_engine/common/ |
H A D | fake_prefs.cc | 29 void CheckNotNull(const string& key, void* ptr) { argument 30 EXPECT_NE(nullptr, ptr)
|
/system/update_engine/update_manager/ |
H A D | policy_utils.h | 30 #define POLICY_CHECK_VALUE_AND_FAIL(ptr, error) \ 32 if ((ptr) == nullptr) { \ 33 *(error) = #ptr " is required but is null."; \
|
/system/vold/ |
H A D | Devmapper.cpp | 297 void *Devmapper::_align(void *ptr, unsigned int a) argument 301 return (void *) (((unsigned long) ptr + agn) & ~agn);
|
H A D | Devmapper.h | 34 static void *_align(void *ptr, unsigned int a);
|