/frameworks/opt/net/wifi/tests/wifitests/src/com/android/server/wifi/ |
MockKeyStore.java | 21 public byte[] blob; field in class:MockKeyStore.KeyBlob 24 public void update(byte[] blob, int flag) { 25 this.blob = Arrays.copyOf(blob, blob.length); 100 KeyBlob blob = new KeyBlob(); local 101 map.put(key, blob); 102 return blob; 143 KeyBlob blob = map.get(srcKey); local 144 access(destUid, destKey, true).update(blob.blob, blob.flag) [all...] |
/system/keymaster/include/keymaster/ |
android_keymaster_utils.h | 236 explicit KeymasterKeyBlob(const keymaster_key_blob_t& blob) { 238 key_material = dup_buffer(blob.key_material, blob.key_material_size); 240 key_material_size = blob.key_material_size; 243 KeymasterKeyBlob(const KeymasterKeyBlob& blob) { 245 key_material = dup_buffer(blob.key_material, blob.key_material_size); 247 key_material_size = blob.key_material_size; 250 void operator=(const KeymasterKeyBlob& blob) { 252 key_material = dup_buffer(blob.key_material, blob.key_material_size) [all...] |
soft_keymaster_context.h | 68 const KeymasterKeyBlob& key_material, KeymasterKeyBlob* blob, 74 keymaster_error_t ParseKeyBlob(const KeymasterKeyBlob& blob, 78 keymaster_error_t DeleteKey(const KeymasterKeyBlob& blob) const override; 99 keymaster_error_t ParseOldSoftkeymasterBlob(const KeymasterKeyBlob& blob, 103 keymaster_error_t ParseKeymaster1HwBlob(const KeymasterKeyBlob& blob, 108 keymaster_error_t ParseKeymaster0HwBlob(const KeymasterKeyBlob& blob,
|
keymaster_context.h | 96 * CreateKeyBlob takes authorization sets and key material and produces a key blob and hardware 98 * (Keystore, generally). The blob is integrity-checked and may be encrypted, depending on the 106 KeymasterKeyBlob* blob, AuthorizationSet* hw_enforced, 110 * UpgradeKeyBlob takes an existing blob, parses out key material and constructs a new blob with 118 * ParseKeyBlob takes a blob and extracts authorization sets and key material, returning an 119 * error if the blob fails integrity checking or decryption. Note that the returned key 120 * material may itself be an opaque blob usable only by secure hardware (in the hybrid case). 124 virtual keymaster_error_t ParseKeyBlob(const KeymasterKeyBlob& blob, 134 virtual keymaster_error_t DeleteKey(const KeymasterKeyBlob& /* blob */) const [all...] |
/external/harfbuzz_ng/test/api/ |
test-font.c | 51 hb_blob_t *blob; local 53 blob = hb_blob_create (test_data, sizeof (test_data), HB_MEMORY_MODE_READONLY, NULL, NULL); 54 face = hb_face_create (blob, 0); 55 hb_blob_destroy (blob); 88 hb_blob_t *blob; local 98 blob = hb_face_reference_table (face, HB_TAG ('a','b','c','d')); 99 g_assert (blob != hb_blob_get_empty ()); 101 data = hb_blob_get_data (blob, &len); 104 hb_blob_destroy (blob); 147 hb_blob_t *blob; local 252 hb_blob_t *blob; local 373 hb_blob_t *blob; local [all...] |
test-blob.c | 29 /* Unit tests for hb-blob.h */ 48 hb_blob_t *blob; local 60 blob = hb_blob_get_empty (); 61 g_assert (blob == hb_blob_get_empty ()); 63 len = hb_blob_get_length (blob); 66 data = hb_blob_get_data (blob, NULL); 69 data = hb_blob_get_data (blob, &len); 73 data_writable = hb_blob_get_data_writable (blob, NULL); 76 data_writable = hb_blob_get_data_writable (blob, &len); 94 hb_blob_t *blob; member in struct:__anon12555 [all...] |
/system/keymaster/ |
keymaster1_engine.cpp | 86 keymaster_key_blob_t blob; local 88 &blob, &characteristics); 91 unique_ptr<uint8_t, Malloc_Delete> blob_deleter(const_cast<uint8_t*>(blob.key_material)); 92 key_blob->key_material = dup_buffer(blob.key_material, blob.key_material_size); 93 key_blob->key_material_size = blob.key_material_size; 110 keymaster_key_blob_t blob; local 113 &blob, &characteristics); 116 unique_ptr<uint8_t, Malloc_Delete> blob_deleter(const_cast<uint8_t*>(blob.key_material)); 117 output_key_blob->key_material = dup_buffer(blob.key_material, blob.key_material_size) [all...] |
openssl_utils.cpp | 65 void convert_bn_to_blob(BIGNUM* bn, keymaster_blob_t* blob) { 66 blob->data_length = BN_num_bytes(bn); 67 blob->data = new uint8_t[blob->data_length]; 68 BN_bn2bin(bn, const_cast<uint8_t*>(blob->data));
|
authorization_set.cpp | 97 elems_[i].blob.data = new_data + (elems_[i].blob.data - indirect_data_); 196 void* tmp = malloc(src.blob.data_length); 197 memcpy(tmp, src.blob.data, src.blob.data_length); 198 dst.blob.data = reinterpret_cast<uint8_t*>(tmp); 269 if (indirect_data_capacity_ - indirect_data_size_ < elem.blob.data_length) 270 if (!reserve_indirect(2 * (indirect_data_capacity_ + elem.blob.data_length))) 273 memcpy(indirect_data_ + indirect_data_size_, elem.blob.data, elem.blob.data_length) [all...] |
/external/fonttools/Lib/fontTools/misc/ |
py23.py | 53 def transcode(blob): 54 if not isinstance(blob, str): 55 blob = blob.decode('latin-1') 56 return blob
|
/system/update_engine/payload_generator/ |
block_mapping_unittest.cc | 65 brillo::Blob blob(block_size_); 68 blob[0] = 42; 69 EXPECT_EQ(0, bm_.AddBlock(blob)); 70 blob[0] = 5; 71 EXPECT_EQ(1, bm_.AddBlock(blob)); 89 brillo::Blob block(block_size_, 'a');
|
blob_file_writer.h | 35 // Store the passed |blob| in the blob file. Returns the offset at which it 37 off_t StoreBlob(const brillo::Blob& blob);
|
/external/skia/tests/ |
TextBlobCacheTest.cpp | 32 explicit TextBlobWrapper(const SkTextBlob* blob) : fBlob(blob) {} 33 TextBlobWrapper(const TextBlobWrapper& blob) : fBlob(SkRef(blob.fBlob.get())) {} 42 const SkTextBlob* blob = blobs[i].fBlob.get(); local 43 const SkRect& bounds = blob->bounds(); 46 canvas->drawTextBlob(blob, 0, SkIntToScalar(yOffset), paint);
|
/packages/services/Car/libvehiclenetwork/native/ |
IVehicleNetwork.cpp | 74 ReadableBlobHolder blob(new Parcel::ReadableBlob()); 75 if (blob.blob == NULL) { 80 status = reply.readBlob(size, blob.blob); 82 ALOGE("listProperties, cannot read blob %d", status); 90 if(!configs->ParseFromArray(blob.blob->data(), size)) { 174 WritableBlobHolder blob(new Parcel::WritableBlob()); 175 ASSERT_OR_HANDLE_NO_MEMORY(blob.blob, return NO_MEMORY) [all...] |
/prebuilts/gcc/linux-x86/host/x86_64-w64-mingw32-4.8/x86_64-w64-mingw32/include/ |
d3dcompiler.h | 81 HRESULT WINAPI D3DStripShader(const void *data, SIZE_T data_size, UINT flags, ID3DBlob **blob); 103 HRESULT WINAPI D3DGetBlobPart(const void *data, SIZE_T data_size, D3D_BLOB_PART part, UINT flags, ID3DBlob **blob); 104 HRESULT WINAPI D3DGetInputSignatureBlob(const void *data, SIZE_T data_size, ID3DBlob **blob); 105 HRESULT WINAPI D3DGetOutputSignatureBlob(const void *data, SIZE_T data_size, ID3DBlob **blob); 106 HRESULT WINAPI D3DGetInputAndOutputSignatureBlob(const void *data, SIZE_T data_size, ID3DBlob **blob); 107 HRESULT WINAPI D3DGetDebugInfo(const void *data, SIZE_T data_size, ID3DBlob **blob); 111 HRESULT WINAPI D3DCreateBlob(SIZE_T data_size, ID3DBlob **blob);
|
d3d10misc.h | 42 HRESULT WINAPI D3D10CreateBlob(SIZE_T data_size, ID3D10Blob **blob);
|
/external/skia/src/gpu/text/ |
GrTextUtils.cpp | 40 void GrTextUtils::DrawBmpText(GrAtlasTextBlob* blob, int runIndex, 54 // Ensure the blob is set for bitmaptext 55 blob->setHasBitmap(); 60 SkGlyphCache* cache = blob->setupCache(runIndex, props, SkPaint::FakeGamma::On, 71 blob, runIndex, fontCache, &currStrike, glyph, 80 void GrTextUtils::DrawBmpPosText(GrAtlasTextBlob* blob, int runIndex, 96 // Ensure the blob is set for bitmaptext 97 blob->setHasBitmap(); 102 SkGlyphCache* cache = blob->setupCache(runIndex, props, SkPaint::FakeGamma::On, 113 blob, runIndex, fontCache, &currStrike, glyph [all...] |
/external/harfbuzz_ng/src/ |
sample.py | 25 blob = hb.glib_blob_create (GLib.Bytes.new (fontdata)) variable 26 face = hb.face_create (blob, 0) 27 del blob
|
/external/harfbuzz_ng/test/fuzzing/ |
hb-fuzzer.cc | 8 hb_blob_t *blob = hb_blob_create((const char *)data, size, local 10 hb_face_t *face = hb_face_create(blob, 0); 37 hb_blob_destroy(blob);
|
/system/security/keystore/ |
blob.h | 29 /* Here is the file format. There are two parts in blob.value, the secret and 31 * can be found in blob.length. The description is stored after the secret in 32 * plaintext, and its size is specified in blob.info. The total size of the two 34 * the second is the blob's type, and the third byte is flags. Fields other 35 * than blob.info, blob.length, and blob.value are modified by encryptBlob() 52 struct __attribute__((packed)) blob { struct 77 class Blob { 79 Blob(const uint8_t* value, size_t valueLength, const uint8_t* info, uint8_t infoLength [all...] |
/frameworks/base/core/tests/coretests/src/android/database/ |
CursorWindowTest.java | 102 // put blob 103 byte[] blob = new byte[1000]; 105 Arrays.fill(blob, value); 106 assertTrue(window.putBlob(blob, 0, 6)); 107 assertTrue(Arrays.equals(blob, window.getBlob(0, 6)));
|
/external/autotest/client/cros/faft/utils/ |
os_interface.py | 302 def retrieve_body_version(self, blob): 303 """Given a blob, retrieve body version. 310 magic, _, kb_size = struct.unpack_from(header_format, blob) 315 _, version = struct.unpack_from(preamble_format, blob, kb_size) 318 def retrieve_datakey_version(self, blob): 319 """Given a blob, retrieve firmware data key version. 325 magic, _, version = struct.unpack_from(header_format, blob) 330 def retrieve_kernel_subkey_version(self, blob): 331 """Given a blob, retrieve kernel subkey version. 338 magic, _, kb_size = struct.unpack_from(header_format, blob) [all...] |
flashrom_handler.py | 160 blob = self.fum.get_section(self.image, subsection_name) 161 if blob: 164 f.write(blob) 167 blob = self.fum.get_section(self.image, section.get_body_name()) 168 if blob: 170 s.update(blob) 259 into the section blob, either body or signature. 277 blob = self.fum.get_section(self.image, subsection_name) 279 # Modify the byte in it within 2% of the section blob. 280 modified_index = len(blob) / 5 [all...] |
saft_flashrom_util.py | 262 blob = base_image[pos[0] : pos[1] + 1] 268 pad = blob[-1] 269 blob = blob.rstrip(pad) 270 blob = blob + ((align - 1) - (len(blob) - 1) % align) * pad 271 return blob
|
/external/google-breakpad/src/client/linux/crash_generation/ |
crash_generation_client.cc | 51 virtual bool RequestDump(const void* blob, size_t blob_size) { 58 iov.iov_base = const_cast<void*>(blob);
|