/system/keymaster/contexts/ |
soft_keymaster_context.cpp | 199 KeymasterKeyBlob* blob, 212 return SerializeIntegrityAssuredBlob(key_material, hidden, *hw_enforced, *sw_enforced, blob); 225 // 1. Software key blob. Version info, if present, is in sw_enforced. If not present, we 228 // 2. Keymaster0 hardware key blob. Version info, if present, is in sw_enforced. If not 231 // 3. Keymaster1 hardware key blob. Version info is not present and we shouldn't have been 243 keymaster_error_t SoftKeymasterContext::ParseKeyBlob(const KeymasterKeyBlob& blob, 262 // they're protected by the keymaster0 hardware implementation). The keymaster0 key blob 269 // auth sets so reasonable defaults are generated and returned along with the key blob. 271 // Determining what kind of blob has arrived is somewhat tricky. What helps is that 301 // Assume it's an integrity-assured blob (new software-only blob, or new keymaster0-backe [all...] |
/external/tensorflow/tensorflow/core/lib/db/ |
sqlite.h | 254 void BindBlob(int parameter, const StringPiece& blob) { 255 Update(sqlite3_bind_blob64(stmt_, parameter, blob.data(), blob.size(), 258 size_ += blob.size(); 260 void BindBlob(const char* parameter, const StringPiece& blob) { 261 BindBlob(GetParameterIndex(parameter), blob); local 263 void BindBlobUnsafe(int parameter, const StringPiece& blob) { 264 Update(sqlite3_bind_blob64(stmt_, parameter, blob.data(), blob.size(), 267 size_ += blob.size() [all...] |
/system/keymaster/android_keymaster/ |
authorization_set.cpp | 97 elems_[i].blob.data = new_data + (elems_[i].blob.data - indirect_data_); 222 void* tmp = malloc(src.blob.data_length); 223 memcpy(tmp, src.blob.data, src.blob.data_length); 224 dst.blob.data = reinterpret_cast<uint8_t*>(tmp); 295 if (indirect_data_capacity_ - indirect_data_size_ < elem.blob.data_length) 296 if (!reserve_indirect(2 * (indirect_data_capacity_ + elem.blob.data_length))) 299 memcpy(indirect_data_ + indirect_data_size_, elem.blob.data, elem.blob.data_length) [all...] |
/external/skia/gm/ |
dftext_blob_persp.cpp | 70 for (auto& blob : fBlobs) { 73 SkScalar w = blob->bounds().width(); 74 SkScalar h = blob->bounds().height(); 80 this->drawBlob(canvas, blob.get(), SK_ColorBLACK, x, y + h, pm, twm); 107 void drawBlob(SkCanvas* canvas, SkTextBlob* blob, SkColor color, SkScalar x, SkScalar y, 135 canvas->drawTextBlob(blob, x, y, paint);
|
/external/skqp/gm/ |
dftext_blob_persp.cpp | 70 for (auto& blob : fBlobs) { 73 SkScalar w = blob->bounds().width(); 74 SkScalar h = blob->bounds().height(); 80 this->drawBlob(canvas, blob.get(), SK_ColorBLACK, x, y + h, pm, twm); 107 void drawBlob(SkCanvas* canvas, SkTextBlob* blob, SkColor color, SkScalar x, SkScalar y, 135 canvas->drawTextBlob(blob, x, y, paint);
|
/external/harfbuzz_ng/src/ |
sample.py | 26 blob = hb.glib_blob_create (GLib.Bytes.new (fontdata)) variable 27 face = hb.face_create (blob, 0) 28 del blob
|
/frameworks/support/core/ktx/src/androidTest/java/androidx/core/database/ |
CursorTest.kt | 29 val blob = cursor.getBlob("data") 30 assertArrayEquals(byteArrayOf(0x01), blob) 71 val blob = cursor.getBlobOrNull(0) 72 assertNull(blob) 113 val blob = cursor.getBlobOrNull("data") 114 assertNull(blob)
|
/system/update_engine/payload_generator/ |
squashfs_filesystem.cc | 60 bool ReadSquashfsHeader(const brillo::Blob blob, 62 if (blob.size() < kSquashfsSuperBlockSize) { 66 memcpy(&header->magic, blob.data(), 4); 67 memcpy(&header->block_size, blob.data() + 12, 4); 68 memcpy(&header->compression_type, blob.data() + 20, 2); 69 memcpy(&header->major_version, blob.data() + 28, 2); 266 brillo::Blob blob(kSquashfsSuperBlockSize); 267 if (!sqfs_file->ReadAllBlocking(blob.data(), blob.size(), nullptr)) [all...] |
blob_file_writer.h | 35 // Store the passed |blob| in the blob file. Returns the offset at which it 37 off_t StoreBlob(const brillo::Blob& blob);
|
/external/libese/libese-hw/nxp/pn80t/ |
linux_spidev.c | 62 int platform_toggle_ven(void *blob, int val) { 63 struct Handle *handle = blob; 68 int platform_toggle_reset(void *blob, int val) { 69 struct Handle *handle = blob; 74 int platform_toggle_power_req(void *blob, int val) { 75 struct Handle *handle = blob; 165 int platform_release(void *blob) { 166 struct Handle *handle = blob; 173 int platform_wait(void *blob __attribute__((unused)), long usec) {
|
/external/mesa3d/src/compiler/glsl/tests/ |
cache_test.c | 192 /* If the text of this blob is changed, then blob_key_byte_zero 195 char blob[] = "This is a blob of thirty-seven bytes"; local 208 _mesa_sha1_compute(blob, sizeof(blob), blob_key); 216 disk_cache_put(cache, blob_key, blob, sizeof(blob)); 219 expect_equal_str(blob, result, "disk_cache_get of existing item (pointer)"); 220 expect_equal(size, sizeof(blob), "disk_cache_get of existing item (size)"); 257 * directory as the original blob first written to the cache [all...] |
/external/nos/host/generic/nugget/proto/nugget/app/keymaster/ |
keymaster_types.proto | 29 bytes blob = 4; 37 bytes blob = 1;
|
/frameworks/base/core/tests/coretests/src/android/database/ |
CursorWindowTest.java | 102 // put blob 103 byte[] blob = new byte[1000]; 105 Arrays.fill(blob, value); 106 assertTrue(window.putBlob(blob, 0, 6)); 107 assertTrue(Arrays.equals(blob, window.getBlob(0, 6)));
|
/hardware/interfaces/keymaster/4.0/support/ |
key_param_output.cpp | 81 for (size_t i = 0; i < param.blob.size(); ++i) { 82 os << std::hex << ::std::setw(2) << static_cast<int>(param.blob[i]) << ::std::dec; 87 for (size_t i = 0; i < param.blob.size(); ++i) { 88 os << ::std::hex << ::std::setw(2) << static_cast<int>(param.blob[i]) << ::std::dec;
|
authorization_set.cpp | 46 if (a.blob.size() == 0) return b.blob.size() != 0; 47 if (b.blob.size() == 0) return false; 49 retval = memcmp(&a.blob[0], &b.blob[0], std::min(a.blob.size(), b.blob.size())); 51 if (retval == 0) return a.blob.size() < b.blob.size(); 78 if (a.blob.size() != b.blob.size()) return false [all...] |
/prebuilts/gcc/linux-x86/host/x86_64-w64-mingw32-4.8/x86_64-w64-mingw32/include/ |
d3d10misc.h | 43 HRESULT WINAPI D3D10CreateBlob(SIZE_T data_size, ID3D10Blob **blob);
|
/system/iot/attestation/atap/libatap/ |
atap_util.h | 151 uint8_t* append_blob_to_buf(uint8_t* buf, const AtapBlob* blob); 165 bool copy_blob_from_buf(uint8_t** buf_ptr, AtapBlob* blob); 171 uint32_t blob_serialized_size(const AtapBlob* blob); 178 void free_blob(AtapBlob blob);
|
/system/keymaster/include/keymaster/legacy_support/ |
keymaster0_engine.h | 54 bool DeleteKey(const KeymasterKeyBlob& blob) const; 57 RSA* BlobToRsaKey(const KeymasterKeyBlob& blob) const; 58 EC_KEY* BlobToEcKey(const KeymasterKeyBlob& blob) const; 65 EVP_PKEY* GetKeymaster0PublicKey(const KeymasterKeyBlob& blob) const;
|
/external/nos/test/system-test-harness/src/ |
keymaster-import-wrapped-key-tests.cc | 11 #include "src/blob.h" 206 struct km_blob blob; local 209 memset(&blob, 0, sizeof(blob)); 210 blob.b.algorithm = BLOB_RSA; 211 blob.b.key.rsa.rsa.e = 65537; 212 blob.b.key.rsa.rsa.N.dmax = sizeof(wrapping_key_N) / sizeof(uint32_t); 213 blob.b.key.rsa.rsa.d.dmax = sizeof(wrapping_key_D) / sizeof(uint32_t); 215 memcpy(&blob.b.key.rsa.N_bytes, wrapping_key_N, sizeof(wrapping_key_N)); 216 memcpy(&blob.b.key.rsa.d_bytes, wrapping_key_D, sizeof(wrapping_key_D)) [all...] |
/hardware/interfaces/keymaster/3.0/vts/functional/ |
authorization_set.cpp | 54 if (a.blob.size() == 0) return b.blob.size() != 0; 55 if (b.blob.size() == 0) return false; 57 retval = memcmp(&a.blob[0], &b.blob[0], std::min(a.blob.size(), b.blob.size())); 60 return a.blob.size() < b.blob.size(); 87 if (a.blob.size() != b.blob.size()) return false [all...] |
/system/security/keystore/ |
authorization_set.cpp | 51 if (a.blob.size() == 0) 52 return b.blob.size() != 0; 53 if (b.blob.size() == 0) return false; 55 retval = memcmp(&a.blob[0], &b.blob[0], std::min(a.blob.size(), b.blob.size())); 57 if (retval == 0) return a.blob.size() < b.blob.size(); 83 if (a.blob.size() != b.blob.size()) return false [all...] |
/external/autotest/client/cros/faft/utils/ |
os_interface.py | 302 def retrieve_body_version(self, blob): 303 """Given a blob, retrieve body version. 310 magic, _, kb_size = struct.unpack_from(header_format, blob) 315 _, version = struct.unpack_from(preamble_format, blob, kb_size) 318 def retrieve_datakey_version(self, blob): 319 """Given a blob, retrieve firmware data key version. 325 magic, _, version = struct.unpack_from(header_format, blob) 330 def retrieve_kernel_subkey_version(self, blob): 331 """Given a blob, retrieve kernel subkey version. 338 magic, _, kb_size = struct.unpack_from(header_format, blob) [all...] |
saft_flashrom_util.py | 271 blob = base_image[pos[0] : pos[1] + 1] 277 pad = blob[-1] 278 blob = blob.rstrip(pad) 279 blob = blob + ((align - 1) - (len(blob) - 1) % align) * pad 280 return blob
|
/external/harfbuzz_ng/test/api/ |
test-font.c | 61 hb_blob_t *blob; local 63 blob = hb_blob_create (test_data, sizeof (test_data), HB_MEMORY_MODE_READONLY, NULL, NULL); 64 face = hb_face_create (blob, 0); 65 hb_blob_destroy (blob); 98 hb_blob_t *blob; local 108 blob = hb_face_reference_table (face, HB_TAG ('a','b','c','d')); 109 g_assert (blob != hb_blob_get_empty ()); 111 data = hb_blob_get_data (blob, &len); 114 hb_blob_destroy (blob); 157 hb_blob_t *blob; local 262 hb_blob_t *blob; local 398 hb_blob_t *blob; local [all...] |
/external/ImageMagick/coders/ |
histogram.c | 45 #include "MagickCore/blob.h" 46 #include "MagickCore/blob-private.h" 94 % supports the saving of more than one frame to the same file or blob, 383 histogram_image->blob=DetachBlob(histogram_image->blob); 384 histogram_image->blob=CloneBlobInfo(image->blob); 386 image->blob=DetachBlob(image->blob); 387 image->blob=CloneBlobInfo(histogram_image->blob) [all...] |