/system/nvram/core/include/nvram/core/ |
H A D | storage.h | 24 #include <nvram/messages/blob.h> 38 Status LoadHeader(Blob* blob); 40 // Write the binary-encoded NVRAM header |blob| to storage. See the comment on 42 Status StoreHeader(const Blob& blob); 46 // This must place the data in |blob| that was provided by the last store 51 // It's OK if the data placed in |blob| exceeds the size of the original data, 55 Status LoadSpace(uint32_t index, Blob* blob); 60 // provided in |blob|. This must be robust against crashes, i.e. reloading the 62 // or the updated data provided in |blob|. In particular, crashes must not 66 // required, i.e. not match blob [all...] |
/system/nvram/hal/ |
H A D | memory_storage.cpp | 30 Status Load(Blob* blob) const { 35 if (!blob->Assign(blob_.data(), blob_.size())) { 42 Status Store(const Blob& blob) { argument 43 if (!blob_.Assign(blob.data(), blob.size())) { 58 // Stores the header blob. 81 Status LoadHeader(Blob* blob) { argument 82 return g_header.Load(blob); 85 Status StoreHeader(const Blob& blob) { argument 86 return g_header.Store(blob); 89 LoadSpace(uint32_t index, Blob* blob) argument 94 StoreSpace(uint32_t index, const Blob& blob) argument [all...] |
H A D | fake_nvram_storage.cpp | 78 nvram::storage::Status LoadFile(const char* name, nvram::Blob* blob) { argument 100 if (!blob->Resize(data_file_stat.st_size)) { 105 if (!android::base::ReadFully(data_file_fd.get(), blob->data(), 106 blob->size())) { 114 // Writes blob to the storage object indicated by |name|. 115 nvram::storage::Status StoreFile(const char* name, const nvram::Blob& blob) { argument 127 if (!android::base::WriteFully(data_file_fd.get(), blob.data(), 128 blob.size())) { 170 Status LoadHeader(Blob* blob) { argument 171 return LoadFile(kHeaderFileName, blob); 174 StoreHeader(const Blob& blob) argument 178 LoadSpace(uint32_t index, Blob* blob) argument 186 StoreSpace(uint32_t index, const Blob& blob) argument [all...] |
/system/update_engine/payload_generator/ |
H A D | blob_file_writer.cc | 23 off_t BlobFileWriter::StoreBlob(const brillo::Blob& blob) { argument 25 if (!utils::PWriteAll(blob_fd_, blob.data(), blob.size(), *blob_file_size_)) 29 *blob_file_size_ += blob.size();
|
H A D | blob_file_writer_unittest.cc | 43 brillo::Blob blob(blob_size); 44 FillWithData(&blob); 45 EXPECT_EQ(0, blob_file.StoreBlob(blob)); 46 EXPECT_EQ(blob_size, blob_file.StoreBlob(blob)); 56 EXPECT_EQ(blob, stored_blob);
|
H A D | annotated_operation.cc | 39 bool AnnotatedOperation::SetOperationBlob(const brillo::Blob& blob, argument 41 if (blob.empty()) { 46 off_t data_offset = blob_file->StoreBlob(blob); 49 op.set_data_length(blob.size());
|
H A D | annotated_operation.h | 38 // Writes |blob| to the end of |blob_file|. It sets the data_offset and 39 // data_length in AnnotatedOperation to match the offset and size of |blob| 41 bool SetOperationBlob(const brillo::Blob& blob, BlobFileWriter* blob_file);
|
H A D | block_mapping.cc | 34 size_t HashValue(const brillo::Blob& blob) { argument 36 return hash_fn(string(blob.begin(), blob.end())); 48 brillo::Blob blob(block_size_); 50 if (!utils::PReadAll(fd, blob.data(), block_size_, byte_offset, &bytes_read)) 54 return AddBlock(fd, byte_offset, blob); 120 brillo::Blob blob(block_size); 122 if (!utils::PReadAll(fd, blob.data(), block_size, byte_offset, &bytes_read)) 126 *equals = blob == other_block; 135 block_data = std::move(blob); [all...] |
H A D | block_mapping_unittest.cc | 65 brillo::Blob blob(block_size_); 68 blob[0] = 42; 69 EXPECT_EQ(0, bm_.AddBlock(blob)); 70 blob[0] = 5; 71 EXPECT_EQ(1, bm_.AddBlock(blob));
|
H A D | blob_file_writer.h | 35 // Store the passed |blob| in the blob file. Returns the offset at which it 37 off_t StoreBlob(const brillo::Blob& blob);
|
/system/nvram/core/ |
H A D | persistence.cpp | 32 // Encodes an |object| as a protobuf message and writes it to |blob|. Note that 46 storage::Status EncodeObject(const Object& object, Blob* blob) { argument 47 BlobOutputStreamBuffer stream(blob); 58 // Decodes a protobuf-encoded |object| from |blob|. It is OK if the provided 59 // |blob| includes trailing data that doesn't belong to the encoded object. 67 storage::Status DecodeObject(const Blob& blob, Object* object) { argument 68 InputStreamBuffer stream(blob.data(), blob.size()); 73 NVRAM_LOG_ERR("Failed to decode object of size %zu.", blob.size()); 100 Blob blob; local 109 Blob blob; local 118 Blob blob; local 127 Blob blob; local [all...] |
/system/libufdt/include/ |
H A D | ufdt_overlay.h | 27 struct fdt_header *ufdt_install_blob(void *blob, size_t blob_size);
|
/system/nvram/core/tests/ |
H A D | fake_storage.cpp | 19 #include <nvram/messages/blob.h> 31 Status Load(Blob* blob) { argument 40 NVRAM_CHECK(blob->Assign(blob_.data(), blob_.size())); 44 Status Store(const Blob& blob) { argument 49 NVRAM_CHECK(blob_.Assign(blob.data(), blob.size())); 86 // Space blob storage. 127 Status LoadHeader(Blob* blob) { argument 128 return g_header.Load(blob); 131 Status StoreHeader(const Blob& blob) { argument 143 LoadSpace(uint32_t index, Blob* blob) argument 148 StoreSpace(uint32_t index, const Blob& blob) argument [all...] |
/system/nvram/messages/ |
H A D | rules.mk | 22 $(LOCAL_DIR)/blob.cpp \
|
/system/keymaster/ |
H A D | keymaster0_engine.cpp | 132 bool Keymaster0Engine::DeleteKey(const KeymasterKeyBlob& blob) const { 135 return (keymaster0_device_->delete_keypair(keymaster0_device_, blob.key_material, 136 blob.key_material_size) == 0); 158 inline keymaster_key_blob_t* duplicate_blob(const keymaster_key_blob_t& blob) { argument 159 return duplicate_blob(blob.key_material, blob.key_material_size); 162 RSA* Keymaster0Engine::BlobToRsaKey(const KeymasterKeyBlob& blob) const { 163 // Create new RSA key (with engine methods) and insert blob 168 keymaster_key_blob_t* blob_copy = duplicate_blob(blob); 173 unique_ptr<EVP_PKEY, EVP_PKEY_Delete> pkey(GetKeymaster0PublicKey(blob)); 225 keymaster_key_blob_t* blob = reinterpret_cast<keymaster_key_blob_t*>(*from_d); local 237 keymaster_key_blob_t* blob = reinterpret_cast<keymaster_key_blob_t*>(ptr); local 260 Keymaster0Sign(const void* signing_params, const keymaster_key_blob_t& blob, const uint8_t* data, const size_t data_length, unique_ptr<uint8_t[], Malloc_Delete>* signature, size_t* signature_length) const argument [all...] |
H A D | keymaster1_engine.h | 55 keymaster_error_t DeleteKey(const KeymasterKeyBlob& blob) const; 59 KeyData(const KeymasterKeyBlob& blob, const AuthorizationSet& params) argument 60 : op_handle(0), begin_params(params), key_material(blob), error(KM_ERROR_OK), 71 RSA* BuildRsaKey(const KeymasterKeyBlob& blob, const AuthorizationSet& additional_params, 73 EC_KEY* BuildEcKey(const KeymasterKeyBlob& blob, const AuthorizationSet& additional_params, 82 EVP_PKEY* GetKeymaster1PublicKey(const KeymasterKeyBlob& blob,
|
H A D | keymaster1_engine.cpp | 86 keymaster_key_blob_t blob; local 88 &blob, &characteristics); 91 unique_ptr<uint8_t, Malloc_Delete> blob_deleter(const_cast<uint8_t*>(blob.key_material)); 92 key_blob->key_material = dup_buffer(blob.key_material, blob.key_material_size); 93 key_blob->key_material_size = blob.key_material_size; 110 keymaster_key_blob_t blob; local 113 &blob, &characteristics); 116 unique_ptr<uint8_t, Malloc_Delete> blob_deleter(const_cast<uint8_t*>(blob.key_material)); 117 output_key_blob->key_material = dup_buffer(blob 136 BuildRsaKey(const KeymasterKeyBlob& blob, const AuthorizationSet& additional_params, keymaster_error_t* error) const argument 176 BuildEcKey(const KeymasterKeyBlob& blob, const AuthorizationSet& additional_params, keymaster_error_t* error) const argument 358 GetKeymaster1PublicKey(const KeymasterKeyBlob& blob, const AuthorizationSet& additional_params, keymaster_error_t* error) const argument [all...] |
H A D | authorization_set.cpp | 97 elems_[i].blob.data = new_data + (elems_[i].blob.data - indirect_data_); 222 void* tmp = malloc(src.blob.data_length); 223 memcpy(tmp, src.blob.data, src.blob.data_length); 224 dst.blob.data = reinterpret_cast<uint8_t*>(tmp); 295 if (indirect_data_capacity_ - indirect_data_size_ < elem.blob.data_length) 296 if (!reserve_indirect(2 * (indirect_data_capacity_ + elem.blob.data_length))) 299 memcpy(indirect_data_ + indirect_data_size_, elem.blob.data, elem.blob [all...] |
H A D | keymaster0_engine.h | 53 bool DeleteKey(const KeymasterKeyBlob& blob) const; 56 RSA* BlobToRsaKey(const KeymasterKeyBlob& blob) const; 57 EC_KEY* BlobToEcKey(const KeymasterKeyBlob& blob) const; 64 EVP_PKEY* GetKeymaster0PublicKey(const KeymasterKeyBlob& blob) const;
|
/system/tpm/attestation/server/ |
H A D | pkcs11_key_store_test.cc | 311 std::string blob; local 312 EXPECT_FALSE(key_store.Read(kDefaultUser, "test", &blob)); 313 EXPECT_FALSE(key_store.Write(kDefaultUser, "test", blob)); 314 EXPECT_FALSE(key_store.Read("", "test", &blob)); 315 EXPECT_FALSE(key_store.Write("", "test", blob)); 322 std::string blob; local 323 EXPECT_FALSE(key_store.Read(kDefaultUser, "test", &blob)); 325 EXPECT_TRUE(key_store.Read(kDefaultUser, "test", &blob)); 326 EXPECT_EQ("test_data", blob); 328 EXPECT_FALSE(key_store.Read(kDefaultUser, "test2", &blob)); 347 std::string blob; local 375 std::string blob; local 387 std::string blob; local 397 std::string blob; local 407 std::string blob; local 428 std::string blob; local 451 std::string blob; local 560 std::string blob; local [all...] |
/system/security/keystore/ |
H A D | authorization_set.cpp | 51 if (a.blob.size() == 0) 52 return b.blob.size() != 0; 53 if (b.blob.size() == 0) return false; 55 retval = memcmp(&a.blob[0], &b.blob[0], std::min(a.blob.size(), b.blob.size())); 57 if (retval == 0) return a.blob.size() < b.blob.size(); 83 if (a.blob 203 serializeParamValue(OutStreams& out, const hidl_vec<uint8_t>& blob) argument 325 deserializeParamValue(InStreams& in, hidl_vec<uint8_t>* blob) argument [all...] |
H A D | keystore_utils.h | 33 #include "blob.h" 64 inline static hidl_vec<uint8_t> blob2hidlVec(const Blob& blob) { argument 66 result.setToExternal(const_cast<uint8_t*>(blob.getValue()), blob.getLength());
|
/system/libufdt/tests/src/ |
H A D | ufdt_overlay_test_app.c | 47 struct fdt_header *blob = ufdt_install_blob(base_buf, blob_len); local 48 if (!blob) { 54 new_blob = ufdt_apply_overlay(blob, blob_len, overlay_buf, overlay_len); 68 // Do not dto_free(blob) - it's the same as base_buf.
|
/system/keymaster/include/keymaster/ |
H A D | soft_keymaster_context.h | 68 const KeymasterKeyBlob& key_material, KeymasterKeyBlob* blob, 74 keymaster_error_t ParseKeyBlob(const KeymasterKeyBlob& blob, 78 keymaster_error_t DeleteKey(const KeymasterKeyBlob& blob) const override; 99 keymaster_error_t ParseOldSoftkeymasterBlob(const KeymasterKeyBlob& blob, 103 keymaster_error_t ParseKeymaster1HwBlob(const KeymasterKeyBlob& blob, 108 keymaster_error_t ParseKeymaster0HwBlob(const KeymasterKeyBlob& blob,
|
H A D | android_keymaster_utils.h | 241 explicit KeymasterKeyBlob(const keymaster_key_blob_t& blob) { argument 243 key_material = dup_buffer(blob.key_material, blob.key_material_size); 245 key_material_size = blob.key_material_size; 248 KeymasterKeyBlob(const KeymasterKeyBlob& blob) { argument 250 key_material = dup_buffer(blob.key_material, blob.key_material_size); 252 key_material_size = blob.key_material_size; 255 void operator=(const KeymasterKeyBlob& blob) { argument 257 key_material = dup_buffer(blob [all...] |