/system/update_engine/payload_generator/ |
H A D | blob_file_writer.cc | 23 off_t BlobFileWriter::StoreBlob(const brillo::Blob& blob) { argument 25 if (!utils::PWriteAll(blob_fd_, blob.data(), blob.size(), *blob_file_size_)) 29 *blob_file_size_ += blob.size();
|
H A D | annotated_operation.cc | 39 bool AnnotatedOperation::SetOperationBlob(const brillo::Blob& blob, argument 41 if (blob.empty()) { 46 off_t data_offset = blob_file->StoreBlob(blob); 49 op.set_data_length(blob.size());
|
H A D | block_mapping.cc | 34 size_t HashValue(const brillo::Blob& blob) { argument 36 return hash_fn(string(blob.begin(), blob.end())); 48 brillo::Blob blob(block_size_); 50 if (!utils::PReadAll(fd, blob.data(), block_size_, byte_offset, &bytes_read)) 54 return AddBlock(fd, byte_offset, blob); 120 brillo::Blob blob(block_size); 122 if (!utils::PReadAll(fd, blob.data(), block_size, byte_offset, &bytes_read)) 126 *equals = blob == other_block; 135 block_data = std::move(blob); [all...] |
/system/nvram/messages/ |
H A D | nvram_messages.cpp | 19 #include <nvram/messages/blob.h> 177 bool Encode(const Message& msg, Blob* blob) { argument 178 BlobOutputStreamBuffer stream(blob);
|
/system/update_engine/payload_consumer/ |
H A D | extent_reader_unittest.cc | 64 void ReadExtents(vector<Extent> extents, brillo::Blob* blob) { argument 65 blob->clear(); 67 blob->insert( 68 blob->end(), 96 brillo::Blob blob(1); 97 EXPECT_TRUE(reader.Read(blob.data(), 0)); 98 EXPECT_FALSE(reader.Read(blob.data(), 1)); 105 brillo::Blob blob(1); 106 EXPECT_TRUE(reader.Read(blob.data(), 0)); 107 EXPECT_FALSE(reader.Read(blob [all...] |
/system/libufdt/tests/src/ |
H A D | ufdt_overlay_test_app.c | 47 struct fdt_header *blob = ufdt_install_blob(base_buf, blob_len); local 48 if (!blob) { 54 new_blob = ufdt_apply_overlay(blob, blob_len, overlay_buf, overlay_len); 68 // Do not dto_free(blob) - it's the same as base_buf.
|
H A D | ufdt_verify_overlay_app.cpp | 51 struct fdt_header *blob = nullptr; local 70 blob = ufdt_install_blob(final_buf, final_size); 71 if (!blob) { 76 result = ufdt_verify_dtbo(blob, final_size, overlay_buf_array, overlay_count); 83 // Do not dto_free(blob) - it's the same as final_buf.
|
/system/nvram/core/ |
H A D | persistence.cpp | 32 // Encodes an |object| as a protobuf message and writes it to |blob|. Note that 46 storage::Status EncodeObject(const Object& object, Blob* blob) { argument 47 BlobOutputStreamBuffer stream(blob); 58 // Decodes a protobuf-encoded |object| from |blob|. It is OK if the provided 59 // |blob| includes trailing data that doesn't belong to the encoded object. 67 storage::Status DecodeObject(const Blob& blob, Object* object) { argument 68 InputStreamBuffer stream(blob.data(), blob.size()); 73 NVRAM_LOG_ERR("Failed to decode object of size %zu.", blob.size()); 100 Blob blob; local 109 Blob blob; local 118 Blob blob; local 127 Blob blob; local [all...] |
/system/nvram/messages/tests/ |
H A D | nvram_messages_test.cpp | 30 Blob blob; local 31 ASSERT_TRUE(Encode(in, &blob)); 32 ASSERT_TRUE(Decode(blob.data(), blob.size(), out));
|
/system/keymaster/include/keymaster/ |
H A D | keymaster_tags.h | 240 const keymaster_blob_t& blob) { 241 return keymaster_param_blob(tag, blob.data, blob.data_length); 252 const keymaster_blob_t& blob) { 253 return keymaster_param_blob(tag, blob.data, blob.data_length); 239 Authorization(TypedTag<KM_BYTES, Tag> tag, const keymaster_blob_t& blob) argument 251 Authorization(TypedTag<KM_BIGNUM, Tag> tag, const keymaster_blob_t& blob) argument
|
/system/keymaster/include/keymaster/legacy_support/ |
H A D | keymaster1_engine.h | 55 keymaster_error_t DeleteKey(const KeymasterKeyBlob& blob) const; 59 KeyData(const KeymasterKeyBlob& blob, const AuthorizationSet& params) argument 60 : op_handle(0), begin_params(params), key_material(blob), error(KM_ERROR_OK), 71 RSA* BuildRsaKey(const KeymasterKeyBlob& blob, const AuthorizationSet& additional_params, 73 EC_KEY* BuildEcKey(const KeymasterKeyBlob& blob, const AuthorizationSet& additional_params, 82 EVP_PKEY* GetKeymaster1PublicKey(const KeymasterKeyBlob& blob,
|
/system/keymaster/ng/include/ |
H A D | keystore_hidl_support.h | 91 inline static hidl_vec<uint8_t> blob2hidlVec(const std::vector<uint8_t>& blob) { argument 93 result.setToExternal(const_cast<uint8_t*>(blob.data()), static_cast<size_t>(blob.size()));
|
/system/nvram/hal/ |
H A D | fake_nvram_storage.cpp | 78 nvram::storage::Status LoadFile(const char* name, nvram::Blob* blob) { argument 100 if (!blob->Resize(data_file_stat.st_size)) { 105 if (!android::base::ReadFully(data_file_fd.get(), blob->data(), 106 blob->size())) { 114 // Writes blob to the storage object indicated by |name|. 115 nvram::storage::Status StoreFile(const char* name, const nvram::Blob& blob) { argument 127 if (!android::base::WriteFully(data_file_fd.get(), blob.data(), 128 blob.size())) { 170 Status LoadHeader(Blob* blob) { argument 171 return LoadFile(kHeaderFileName, blob); 174 StoreHeader(const Blob& blob) argument 178 LoadSpace(uint32_t index, Blob* blob) argument 186 StoreSpace(uint32_t index, const Blob& blob) argument [all...] |
H A D | memory_storage.cpp | 30 Status Load(Blob* blob) const { 35 if (!blob->Assign(blob_.data(), blob_.size())) { 42 Status Store(const Blob& blob) { argument 43 if (!blob_.Assign(blob.data(), blob.size())) { 58 // Stores the header blob. 81 Status LoadHeader(Blob* blob) { argument 82 return g_header.Load(blob); 85 Status StoreHeader(const Blob& blob) { argument 86 return g_header.Store(blob); 89 LoadSpace(uint32_t index, Blob* blob) argument 94 StoreSpace(uint32_t index, const Blob& blob) argument [all...] |
/system/security/keystore/ |
H A D | KeyStore.h | 26 #include "blob.h" 70 sp<Keymaster> getDevice(const Blob& blob) { return mKmDevices[blob.getSecurityLevel()]; } argument 159 bool upgradeBlob(const char* filename, Blob* blob, const uint8_t oldVersion, 163 * Takes a blob that is an PEM-encoded RSA key as a byte array and converts it to a DER-encoded 164 * PKCS#8 for import into a keymaster. Then it overwrites the original blob with the new blob 167 ResponseCode importBlobAsKey(Blob* blob, const char* filename, uid_t uid);
|
H A D | keystore_utils.cpp | 34 #include "blob.h" 109 hidl_vec<uint8_t> blob2hidlVec(const Blob& blob) { argument 111 result.setToExternal(const_cast<uint8_t*>(blob.getValue()), blob.getLength());
|
H A D | keystore_aidl_hidl_marshalling_utils.cpp | 44 android::status_t writeKeymasterBlob(const hidl_vec<uint8_t>& blob, android::Parcel* out) { argument 45 int32_t size = int32_t(std::min<size_t>(blob.size(), std::numeric_limits<int32_t>::max())); 52 return out->write(blob.data(), size); 55 android::status_t writeKeymasterBlob(const ::std::vector<int32_t>& blob, android::Parcel* out) { argument 57 int32_t size = int32_t(std::min<size_t>(blob.size(), std::numeric_limits<int32_t>::max())); 64 return out->write(blob.data(), size); 93 result.blob = readKeymasterBlob(in); // byte array 126 rc = writeKeymasterBlob(param.blob, out);
|
/system/iot/attestation/atap/test/ |
H A D | atap_util_unittest.cpp | 44 static void validate_blob(const uint8_t* buf, AtapBlob* blob) { argument 45 EXPECT_EQ(blob->data_length, *(uint32_t*)&buf[0]); 46 EXPECT_EQ(0, memcmp(&buf[4], blob->data, blob->data_length)); 49 static void alloc_test_blob(AtapBlob* blob) { argument 50 blob->data_length = 20; 51 blob->data = (uint8_t*)atap_malloc(20); 52 atap_memset(blob->data, 0x77, blob->data_length); 112 AtapBlob blob; local [all...] |
/system/keymaster/contexts/ |
H A D | keymaster2_passthrough_context.cpp | 69 keymaster_error_t Keymaster2PassthroughContext::ParseKeyBlob(const KeymasterKeyBlob& blob, argument 83 auto rc = device_->get_key_characteristics(device_, &blob, clientIdPtr, applicationDataPtr, 103 KeymasterKeyBlob key_material = blob; 109 keymaster_error_t Keymaster2PassthroughContext::DeleteKey(const KeymasterKeyBlob& blob) const { 110 return device_->delete_key(device_, &blob);
|
/system/keymaster/km_openssl/ |
H A D | hmac_operation.cpp | 134 KeymasterKeyBlob blob = key.key_material_move(); local 135 HMAC_Init_ex(&ctx_, blob.key_material, blob.key_material_size, md, NULL /* engine */);
|
/system/keymaster/tests/ |
H A D | key_blob_test.cpp | 103 // key_data shouldn't be anywhere in the blob, ciphertext should. 306 keymaster_key_blob_t blob = {buf.get() + i, kBufSize - i}; local 307 KeymasterKeyBlob key_blob(blob); 309 // Integrity-assured blob. 314 // Auth-encrypted OCB blob. 324 << "Somehow sucessfully parsed a blob with seed " << now << " at offset " << i; 330 keymaster_key_blob_t blob = {buf, 0}; local 331 KeymasterKeyBlob key_blob(blob); 346 keymaster_key_blob_t blob = {buf, 0}; local 347 blob [all...] |
H A D | wrapped_key_test.cpp | 56 string blob2string(keymaster_blob_t& blob) { argument 57 string s(reinterpret_cast<const char*>(blob.data), blob.data_length); 61 string keyblob2string(keymaster_key_blob_t& blob) { argument 62 string s(reinterpret_cast<const char*>(blob.key_material), blob.key_material_size);
|
/system/nvram/core/tests/ |
H A D | fake_storage.cpp | 19 #include <nvram/messages/blob.h> 31 Status Load(Blob* blob) { argument 40 NVRAM_CHECK(blob->Assign(blob_.data(), blob_.size())); 44 Status Store(const Blob& blob) { argument 49 NVRAM_CHECK(blob_.Assign(blob.data(), blob.size())); 86 // Space blob storage. 127 Status LoadHeader(Blob* blob) { argument 128 return g_header.Load(blob); 131 Status StoreHeader(const Blob& blob) { argument 143 LoadSpace(uint32_t index, Blob* blob) argument 148 StoreSpace(uint32_t index, const Blob& blob) argument [all...] |
/system/nvram/messages/include/nvram/messages/ |
H A D | proto.hpp | 86 #include <nvram/messages/blob.h> 153 static bool Encode(const Blob& blob, ProtoWriter* writer) { argument 154 return writer->WriteLengthDelimited(blob.data(), blob.size()); 157 static bool Decode(Blob& blob, ProtoReader* reader) { argument 158 return blob.Resize(reader->field_size()) && 159 reader->ReadLengthDelimited(blob.data(), blob.size());
|
/system/iot/attestation/atap/libatap/ |
H A D | atap_util.c | 51 uint8_t* append_blob_to_buf(uint8_t* buf, const AtapBlob* blob) { argument 52 atap_assert(blob->data_length == 0 || blob->data); 53 buf = append_uint32_to_buf(buf, blob->data_length); 54 if (blob->data_length > 0) { 55 buf = append_to_buf(buf, blob->data, blob->data_length); 112 bool copy_blob_from_buf(uint8_t** buf_ptr, AtapBlob* blob) { argument 113 atap_memset(blob, 0, sizeof(AtapBlob)); 114 copy_uint32_from_buf(buf_ptr, &blob 164 blob_serialized_size(const AtapBlob* blob) argument 198 free_blob(AtapBlob blob) argument [all...] |