/system/netd/libnetdutils/include/netdutils/ |
H A D | Fd.h | 35 int get() const { return mFd; } function in class:android::netdutils::Fd 37 bool operator==(const Fd& other) const { return get() == other.get(); } 38 bool operator!=(const Fd& other) const { return get() != other.get(); } 46 return fd.get() >= 0;
|
H A D | Handle.h | 53 const T get() const { return mValue; } function in class:android::netdutils::Handle 55 bool operator==(const Handle& that) const { return get() == that.get(); } 56 bool operator!=(const Handle& that) const { return get() != that.get(); } 68 return os << handle.get();
|
H A D | MemBlock.h | 40 copy(get(), src); 53 Slice get() const noexcept { return Slice(mData.get(), mLen); } 56 const operator Slice() const noexcept { return get(); }
|
/system/libhidl/transport/memory/token/1.0/ |
H A D | IMemoryToken.hal | 26 get() generates (memory mem);
|
/system/keymaster/km_openssl/ |
H A D | nist_curve_key_exchange.cpp | 30 if (!private_key_.get() || !EC_KEY_check_key(private_key_.get())) { 59 if (!key.get() || !EC_KEY_generate_key(key.get())) { 64 NistCurveKeyExchange(key.get(), &error)); 65 if (!key_exchange.get()) error = KM_ERROR_MEMORY_ALLOCATION_FAILED; 73 const EC_GROUP* group = EC_KEY_get0_group(private_key_.get()); 81 if (!public_key_.get()) return KM_ERROR_MEMORY_ALLOCATION_FAILED; 82 if (EC_POINT_point2oct(group, EC_KEY_get0_public_key(private_key_.get()), 83 POINT_CONVERSION_UNCOMPRESSED, public_key_.get(), public_key_len [all...] |
H A D | hkdf.cpp | 35 if (salt_.get() != nullptr && salt_len_ > 0) { 36 result = prk_hmac.Init(salt_.get(), salt_len_); 39 if (zeros.get() == nullptr) 42 memset(zeros.get(), 0, digest_size_); 43 result = prk_hmac.Init(zeros.get(), digest_size_); 49 if (pseudo_random_key.get() == nullptr || digest_size_ != prk_hmac.DigestLength()) 52 prk_hmac.Sign(secret_key_.get(), secret_key_len_, pseudo_random_key.get(), digest_size_); 66 if (buf.get() == nullptr || digest.get() [all...] |
H A D | attestation_utils.cpp | 139 * makeCertChain creates a new keymaster_cert_chain_t from all the certs that get thrown at it 157 if (!result.get()) return {}; 176 if (!oid.get()) 187 if (!attest_str.get() || 188 !ASN1_OCTET_STRING_set(attest_str.get(), attest_bytes.get(), attest_bytes_len)) 192 X509_EXTENSION_create_by_OBJ(nullptr, oid.get(), 0 /* not critical */, attest_str.get())); 193 if (!extension->get()) 206 if (!ASN1_BIT_STRING_set_bit(key_usage.get(), [all...] |
H A D | ec_key.cpp | 29 return ec_key_.get() != NULL; 33 return EVP_PKEY_set1_EC_KEY(pkey, ec_key_.get()) == 1;
|
H A D | ckdf.cpp | 51 if (!ctx.get()) return KM_ERROR_MEMORY_ALLOCATION_FAILED; 65 if (!CMAC_Init(ctx.get(), key.key_material, key.key_material_size, algo, 78 if (!CMAC_Update(ctx.get(), reinterpret_cast<uint8_t*>(&net_order_i), 84 if (!CMAC_Update(ctx.get(), label.data, label.data_length)) { 90 if (!CMAC_Update(ctx.get(), &zero, sizeof(zero))) return TranslateLastOpenSslError(); 94 if (!CMAC_Update(ctx.get(), context_chunks[chunk].data, 103 if (!CMAC_Update(ctx.get(), buf, sizeof(buf))) TranslateLastOpenSslError(); 107 if (!CMAC_Final(ctx.get(), output_pos, &out_len)) return TranslateLastOpenSslError(); 111 if (!CMAC_Final(ctx.get(), cmac, &out_len)) return TranslateLastOpenSslError(); 117 CMAC_Reset(ctx.get()); [all...] |
/system/chre/util/tests/ |
H A D | singleton_test.cc | 28 ASSERT_NE(Singleton<int>::get(), nullptr); 30 EXPECT_EQ(*Singleton<int>::get(), 0x1337); 32 ASSERT_NE(Singleton<int>::get(), nullptr); 34 EXPECT_EQ(*Singleton<int>::get(), 0x1337); 41 ASSERT_NE(Singleton<int>::get(), nullptr); 43 EXPECT_EQ(*Singleton<int>::get(), 0xface);
|
/system/chre/platform/slpi/include/chre/platform/slpi/see/ |
H A D | see_client.h | 40 return SeeHelperSingleton::get();
|
/system/chre/platform/slpi/include/chre/platform/slpi/smgr/ |
H A D | smgr_client.h | 41 return SmrHelperSingleton::get();
|
/system/netd/libnetdutils/ |
H A D | Fd.cpp | 23 return os << "Fd[" << fd.get() << "]";
|
H A D | UniqueFile.cpp | 26 const auto& sys = sSyscalls.get();
|
/system/gatekeeper/tests/ |
H A D | gatekeeper_messages_test.cpp | 56 msg.Serialize(serialized_msg.buffer.get(), serialized_msg.buffer.get() + serialized_msg.length); 59 deserialized_msg.Deserialize(serialized_msg.buffer.get(), serialized_msg.buffer.get() 68 ASSERT_EQ(0, memcmp(msg.provided_password.buffer.get(), deserialized_password->buffer.get(), password_size)); 70 ASSERT_EQ(NULL, deserialized_msg.enrolled_password.buffer.get()); 72 ASSERT_EQ(NULL, deserialized_msg.password_handle.buffer.get()); 85 msg.Serialize(serialized_msg.buffer.get(), serialized_msg.buffer.get() [all...] |
/system/chre/platform/shared/ |
H A D | chre_api_wwan.cc | 26 return chre::EventLoopManagerSingleton::get()->getWwanRequestManager() 32 return chre::EventLoopManagerSingleton::get()->getWwanRequestManager()
|
H A D | chre_api_wifi.cc | 26 return chre::EventLoopManagerSingleton::get()->getWifiRequestManager() 33 return EventLoopManagerSingleton::get()->getWifiRequestManager() 41 EventLoopManagerSingleton::get()->getWifiRequestManager() 49 EventLoopManagerSingleton::get()->getWifiRequestManager()
|
/system/chre/platform/slpi/include/chre/platform/slpi/ |
H A D | power_control_util.h | 44 success = EventLoopManagerSingleton::get()->getEventLoop(). 58 return EventLoopManagerSingleton::get()->getEventLoop().
|
/system/update_engine/update_manager/ |
H A D | real_updater_provider.h | 32 // We assume that any other object handle we get from the system state is 48 return var_last_checked_time_.get(); 52 return var_update_completed_time_.get(); 56 return var_progress_.get(); 60 return var_stage_.get(); 64 return var_new_version_.get(); 68 return var_payload_size_.get(); 72 return var_curr_channel_.get(); 76 return var_new_channel_.get(); 80 return var_p2p_enabled_.get(); [all...] |
H A D | real_state.h | 48 return config_provider_.get(); 51 return device_policy_provider_.get(); 54 return random_provider_.get(); 57 return shill_provider_.get(); 60 return system_provider_.get(); 63 return time_provider_.get(); 66 return updater_provider_.get();
|
/system/chre/platform/android/ |
H A D | init.cc | 57 chre::SocketServerSingleton::get()->run( 59 EventLoopManagerSingleton::get()->getEventLoop().stop(); 62 EventLoopManagerSingleton::get()->getEventLoop().run();
|
/system/libhidl/libhidlmemory/ |
H A D | HidlMemoryToken.cpp | 23 Return<void> HidlMemoryToken::get(get_cb _hidl_cb) { function in class:android::hardware::HidlMemoryToken
|
/system/chre/platform/slpi/see/ |
H A D | power_control_manager.cc | 27 return IslandVoteClientSingleton::get()->voteBigImage(bigImage); 34 EventLoopManagerSingleton::get()->getEventLoop().postEvent(
|
/system/update_engine/ |
H A D | real_system_state.h | 69 CHECK(update_attempter_.get()); 84 return boot_control_.get(); 90 return connection_manager_.get(); 93 inline HardwareInterface* hardware() override { return hardware_.get(); } 99 inline PrefsInterface* prefs() override { return prefs_.get(); } 102 return powerwash_safe_prefs_.get(); 110 return update_attempter_.get(); 117 inline P2PManager* p2p_manager() override { return p2p_manager_.get(); } 120 return update_manager_.get(); 124 return power_manager_.get(); [all...] |
/system/keymaster/key_blob_utils/ |
H A D | ocb_utils.cpp | 42 ae_ctx* get() { return ctx_; } function in class:keymaster::AeCtx 56 if (!derivation_data->get()) 59 uint8_t* buf = derivation_data->get(); 60 uint8_t* end = derivation_data->get() + *derivation_data_length; 82 if (!hash_buf.get()) 84 Eraser hash_eraser(hash_buf.get(), SHA256_DIGEST_LENGTH); 86 if (!derived_key.get()) 88 Eraser derived_key_eraser(derived_key.get(), AES_BLOCK_SIZE); 90 if (!ctx->get() || !hash_buf.get() || !derived_ke [all...] |