Searched refs:blob (Results 1 - 25 of 63) sorted by relevance

123

/system/nvram/core/include/nvram/core/
H A Dstorage.h24 #include <nvram/messages/blob.h>
38 Status LoadHeader(Blob* blob);
40 // Write the binary-encoded NVRAM header |blob| to storage. See the comment on
42 Status StoreHeader(const Blob& blob);
46 // This must place the data in |blob| that was provided by the last store
51 // It's OK if the data placed in |blob| exceeds the size of the original data,
55 Status LoadSpace(uint32_t index, Blob* blob);
60 // provided in |blob|. This must be robust against crashes, i.e. reloading the
62 // or the updated data provided in |blob|. In particular, crashes must not
66 // required, i.e. not match blob
[all...]
/system/nvram/hal/
H A Dmemory_storage.cpp30 Status Load(Blob* blob) const {
35 if (!blob->Assign(blob_.data(), blob_.size())) {
42 Status Store(const Blob& blob) { argument
43 if (!blob_.Assign(blob.data(), blob.size())) {
58 // Stores the header blob.
81 Status LoadHeader(Blob* blob) { argument
82 return g_header.Load(blob);
85 Status StoreHeader(const Blob& blob) { argument
86 return g_header.Store(blob);
89 LoadSpace(uint32_t index, Blob* blob) argument
94 StoreSpace(uint32_t index, const Blob& blob) argument
[all...]
H A Dfake_nvram_storage.cpp78 nvram::storage::Status LoadFile(const char* name, nvram::Blob* blob) { argument
100 if (!blob->Resize(data_file_stat.st_size)) {
105 if (!android::base::ReadFully(data_file_fd.get(), blob->data(),
106 blob->size())) {
114 // Writes blob to the storage object indicated by |name|.
115 nvram::storage::Status StoreFile(const char* name, const nvram::Blob& blob) { argument
127 if (!android::base::WriteFully(data_file_fd.get(), blob.data(),
128 blob.size())) {
170 Status LoadHeader(Blob* blob) { argument
171 return LoadFile(kHeaderFileName, blob);
174 StoreHeader(const Blob& blob) argument
178 LoadSpace(uint32_t index, Blob* blob) argument
186 StoreSpace(uint32_t index, const Blob& blob) argument
[all...]
/system/update_engine/payload_generator/
H A Dblob_file_writer.cc23 off_t BlobFileWriter::StoreBlob(const brillo::Blob& blob) { argument
25 if (!utils::PWriteAll(blob_fd_, blob.data(), blob.size(), *blob_file_size_))
29 *blob_file_size_ += blob.size();
H A Dblob_file_writer_unittest.cc43 brillo::Blob blob(blob_size);
44 FillWithData(&blob);
45 EXPECT_EQ(0, blob_file.StoreBlob(blob));
46 EXPECT_EQ(blob_size, blob_file.StoreBlob(blob));
56 EXPECT_EQ(blob, stored_blob);
H A Dannotated_operation.cc39 bool AnnotatedOperation::SetOperationBlob(const brillo::Blob& blob, argument
41 if (blob.empty()) {
46 off_t data_offset = blob_file->StoreBlob(blob);
49 op.set_data_length(blob.size());
H A Dannotated_operation.h38 // Writes |blob| to the end of |blob_file|. It sets the data_offset and
39 // data_length in AnnotatedOperation to match the offset and size of |blob|
41 bool SetOperationBlob(const brillo::Blob& blob, BlobFileWriter* blob_file);
H A Dblock_mapping.cc34 size_t HashValue(const brillo::Blob& blob) { argument
36 return hash_fn(string(blob.begin(), blob.end()));
48 brillo::Blob blob(block_size_);
50 if (!utils::PReadAll(fd, blob.data(), block_size_, byte_offset, &bytes_read))
54 return AddBlock(fd, byte_offset, blob);
120 brillo::Blob blob(block_size);
122 if (!utils::PReadAll(fd, blob.data(), block_size, byte_offset, &bytes_read))
126 *equals = blob == other_block;
135 block_data = std::move(blob);
[all...]
H A Dblock_mapping_unittest.cc65 brillo::Blob blob(block_size_);
68 blob[0] = 42;
69 EXPECT_EQ(0, bm_.AddBlock(blob));
70 blob[0] = 5;
71 EXPECT_EQ(1, bm_.AddBlock(blob));
H A Dblob_file_writer.h35 // Store the passed |blob| in the blob file. Returns the offset at which it
37 off_t StoreBlob(const brillo::Blob& blob);
/system/nvram/core/
H A Dpersistence.cpp32 // Encodes an |object| as a protobuf message and writes it to |blob|. Note that
46 storage::Status EncodeObject(const Object& object, Blob* blob) { argument
47 BlobOutputStreamBuffer stream(blob);
58 // Decodes a protobuf-encoded |object| from |blob|. It is OK if the provided
59 // |blob| includes trailing data that doesn't belong to the encoded object.
67 storage::Status DecodeObject(const Blob& blob, Object* object) { argument
68 InputStreamBuffer stream(blob.data(), blob.size());
73 NVRAM_LOG_ERR("Failed to decode object of size %zu.", blob.size());
100 Blob blob; local
109 Blob blob; local
118 Blob blob; local
127 Blob blob; local
[all...]
/system/libufdt/include/
H A Dufdt_overlay.h27 struct fdt_header *ufdt_install_blob(void *blob, size_t blob_size);
/system/nvram/core/tests/
H A Dfake_storage.cpp19 #include <nvram/messages/blob.h>
31 Status Load(Blob* blob) { argument
40 NVRAM_CHECK(blob->Assign(blob_.data(), blob_.size()));
44 Status Store(const Blob& blob) { argument
49 NVRAM_CHECK(blob_.Assign(blob.data(), blob.size()));
86 // Space blob storage.
127 Status LoadHeader(Blob* blob) { argument
128 return g_header.Load(blob);
131 Status StoreHeader(const Blob& blob) { argument
143 LoadSpace(uint32_t index, Blob* blob) argument
148 StoreSpace(uint32_t index, const Blob& blob) argument
[all...]
/system/nvram/messages/
H A Drules.mk22 $(LOCAL_DIR)/blob.cpp \
/system/keymaster/
H A Dkeymaster0_engine.cpp132 bool Keymaster0Engine::DeleteKey(const KeymasterKeyBlob& blob) const {
135 return (keymaster0_device_->delete_keypair(keymaster0_device_, blob.key_material,
136 blob.key_material_size) == 0);
158 inline keymaster_key_blob_t* duplicate_blob(const keymaster_key_blob_t& blob) { argument
159 return duplicate_blob(blob.key_material, blob.key_material_size);
162 RSA* Keymaster0Engine::BlobToRsaKey(const KeymasterKeyBlob& blob) const {
163 // Create new RSA key (with engine methods) and insert blob
168 keymaster_key_blob_t* blob_copy = duplicate_blob(blob);
173 unique_ptr<EVP_PKEY, EVP_PKEY_Delete> pkey(GetKeymaster0PublicKey(blob));
225 keymaster_key_blob_t* blob = reinterpret_cast<keymaster_key_blob_t*>(*from_d); local
237 keymaster_key_blob_t* blob = reinterpret_cast<keymaster_key_blob_t*>(ptr); local
260 Keymaster0Sign(const void* signing_params, const keymaster_key_blob_t& blob, const uint8_t* data, const size_t data_length, unique_ptr<uint8_t[], Malloc_Delete>* signature, size_t* signature_length) const argument
[all...]
H A Dkeymaster1_engine.h55 keymaster_error_t DeleteKey(const KeymasterKeyBlob& blob) const;
59 KeyData(const KeymasterKeyBlob& blob, const AuthorizationSet& params) argument
60 : op_handle(0), begin_params(params), key_material(blob), error(KM_ERROR_OK),
71 RSA* BuildRsaKey(const KeymasterKeyBlob& blob, const AuthorizationSet& additional_params,
73 EC_KEY* BuildEcKey(const KeymasterKeyBlob& blob, const AuthorizationSet& additional_params,
82 EVP_PKEY* GetKeymaster1PublicKey(const KeymasterKeyBlob& blob,
H A Dkeymaster1_engine.cpp86 keymaster_key_blob_t blob; local
88 &blob, &characteristics);
91 unique_ptr<uint8_t, Malloc_Delete> blob_deleter(const_cast<uint8_t*>(blob.key_material));
92 key_blob->key_material = dup_buffer(blob.key_material, blob.key_material_size);
93 key_blob->key_material_size = blob.key_material_size;
110 keymaster_key_blob_t blob; local
113 &blob, &characteristics);
116 unique_ptr<uint8_t, Malloc_Delete> blob_deleter(const_cast<uint8_t*>(blob.key_material));
117 output_key_blob->key_material = dup_buffer(blob
136 BuildRsaKey(const KeymasterKeyBlob& blob, const AuthorizationSet& additional_params, keymaster_error_t* error) const argument
176 BuildEcKey(const KeymasterKeyBlob& blob, const AuthorizationSet& additional_params, keymaster_error_t* error) const argument
358 GetKeymaster1PublicKey(const KeymasterKeyBlob& blob, const AuthorizationSet& additional_params, keymaster_error_t* error) const argument
[all...]
H A Dauthorization_set.cpp97 elems_[i].blob.data = new_data + (elems_[i].blob.data - indirect_data_);
222 void* tmp = malloc(src.blob.data_length);
223 memcpy(tmp, src.blob.data, src.blob.data_length);
224 dst.blob.data = reinterpret_cast<uint8_t*>(tmp);
295 if (indirect_data_capacity_ - indirect_data_size_ < elem.blob.data_length)
296 if (!reserve_indirect(2 * (indirect_data_capacity_ + elem.blob.data_length)))
299 memcpy(indirect_data_ + indirect_data_size_, elem.blob.data, elem.blob
[all...]
H A Dkeymaster0_engine.h53 bool DeleteKey(const KeymasterKeyBlob& blob) const;
56 RSA* BlobToRsaKey(const KeymasterKeyBlob& blob) const;
57 EC_KEY* BlobToEcKey(const KeymasterKeyBlob& blob) const;
64 EVP_PKEY* GetKeymaster0PublicKey(const KeymasterKeyBlob& blob) const;
/system/tpm/attestation/server/
H A Dpkcs11_key_store_test.cc311 std::string blob; local
312 EXPECT_FALSE(key_store.Read(kDefaultUser, "test", &blob));
313 EXPECT_FALSE(key_store.Write(kDefaultUser, "test", blob));
314 EXPECT_FALSE(key_store.Read("", "test", &blob));
315 EXPECT_FALSE(key_store.Write("", "test", blob));
322 std::string blob; local
323 EXPECT_FALSE(key_store.Read(kDefaultUser, "test", &blob));
325 EXPECT_TRUE(key_store.Read(kDefaultUser, "test", &blob));
326 EXPECT_EQ("test_data", blob);
328 EXPECT_FALSE(key_store.Read(kDefaultUser, "test2", &blob));
347 std::string blob; local
375 std::string blob; local
387 std::string blob; local
397 std::string blob; local
407 std::string blob; local
428 std::string blob; local
451 std::string blob; local
560 std::string blob; local
[all...]
/system/security/keystore/
H A Dauthorization_set.cpp51 if (a.blob.size() == 0)
52 return b.blob.size() != 0;
53 if (b.blob.size() == 0) return false;
55 retval = memcmp(&a.blob[0], &b.blob[0], std::min(a.blob.size(), b.blob.size()));
57 if (retval == 0) return a.blob.size() < b.blob.size();
83 if (a.blob
203 serializeParamValue(OutStreams& out, const hidl_vec<uint8_t>& blob) argument
325 deserializeParamValue(InStreams& in, hidl_vec<uint8_t>* blob) argument
[all...]
H A Dkeystore_utils.h33 #include "blob.h"
64 inline static hidl_vec<uint8_t> blob2hidlVec(const Blob& blob) { argument
66 result.setToExternal(const_cast<uint8_t*>(blob.getValue()), blob.getLength());
/system/libufdt/tests/src/
H A Dufdt_overlay_test_app.c47 struct fdt_header *blob = ufdt_install_blob(base_buf, blob_len); local
48 if (!blob) {
54 new_blob = ufdt_apply_overlay(blob, blob_len, overlay_buf, overlay_len);
68 // Do not dto_free(blob) - it's the same as base_buf.
/system/keymaster/include/keymaster/
H A Dsoft_keymaster_context.h68 const KeymasterKeyBlob& key_material, KeymasterKeyBlob* blob,
74 keymaster_error_t ParseKeyBlob(const KeymasterKeyBlob& blob,
78 keymaster_error_t DeleteKey(const KeymasterKeyBlob& blob) const override;
99 keymaster_error_t ParseOldSoftkeymasterBlob(const KeymasterKeyBlob& blob,
103 keymaster_error_t ParseKeymaster1HwBlob(const KeymasterKeyBlob& blob,
108 keymaster_error_t ParseKeymaster0HwBlob(const KeymasterKeyBlob& blob,
H A Dandroid_keymaster_utils.h241 explicit KeymasterKeyBlob(const keymaster_key_blob_t& blob) { argument
243 key_material = dup_buffer(blob.key_material, blob.key_material_size);
245 key_material_size = blob.key_material_size;
248 KeymasterKeyBlob(const KeymasterKeyBlob& blob) { argument
250 key_material = dup_buffer(blob.key_material, blob.key_material_size);
252 key_material_size = blob.key_material_size;
255 void operator=(const KeymasterKeyBlob& blob) { argument
257 key_material = dup_buffer(blob
[all...]

Completed in 318 milliseconds

123