/system/keymaster/include/keymaster/ |
D | android_keymaster_messages.h | 68 inline int32_t MessageVersion(uint8_t major_ver, uint8_t minor_ver, uint8_t /* subminor_ver */) { in MessageVersion() argument 105 uint8_t* Serialize(uint8_t* buf, const uint8_t* end) const override; 106 bool Deserialize(const uint8_t** buf_ptr, const uint8_t* end) override; 109 virtual uint8_t* NonErrorSerialize(uint8_t* buf, const uint8_t* end) const = 0; 110 virtual bool NonErrorDeserialize(const uint8_t** buf_ptr, const uint8_t* end) = 0; 120 uint8_t* Serialize(uint8_t* buf, const uint8_t* /* end */) const override { return buf; } in Serialize() 121 bool Deserialize(const uint8_t** /* buf_ptr */, const uint8_t* /* end */) override { in Deserialize() 131 uint8_t* Serialize(uint8_t* buf, const uint8_t* end) const override { in Serialize() 134 bool Deserialize(const uint8_t** buf_ptr, const uint8_t* end) override { in Deserialize() 149 uint8_t* Serialize(uint8_t* buf, const uint8_t* end) const override { in Serialize() [all …]
|
D | serializable.h | 46 virtual uint8_t* Serialize(uint8_t* buf, const uint8_t* end) const = 0; 52 virtual bool Deserialize(const uint8_t** buf_ptr, const uint8_t* end) = 0; 71 uint8_t* append_to_buf(uint8_t* buf, const uint8_t* end, const void* data, size_t data_len); 80 inline uint8_t* append_uint32_to_buf(uint8_t* buf, const uint8_t* end, T value) { in append_uint32_to_buf() 88 inline uint8_t* append_uint64_to_buf(uint8_t* buf, const uint8_t* end, uint64_t value) { in append_uint64_to_buf() 98 inline uint8_t* append_size_and_data_to_buf(uint8_t* buf, const uint8_t* end, const void* data, in append_size_and_data_to_buf() 111 inline uint8_t* append_uint32_array_to_buf(uint8_t* buf, const uint8_t* end, const T* data, in append_uint32_array_to_buf() 130 bool copy_from_buf(const uint8_t** buf_ptr, const uint8_t* end, void* dest, size_t size); 139 bool copy_size_and_data_from_buf(const uint8_t** buf_ptr, const uint8_t* end, size_t* size, 140 UniquePtr<uint8_t[]>* dest); [all …]
|
D | android_keymaster_utils.h | 89 uint8_t* dup_buffer(const void* buf, size_t size); 148 : buf_(reinterpret_cast<uint8_t*>(&t)), size_(sizeof(t)) {} in Eraser() 150 template <size_t N> explicit Eraser(uint8_t(&arr)[N]) : buf_(arr), size_(N) {} in Eraser() 152 Eraser(void* buf, size_t size) : buf_(static_cast<uint8_t*>(buf)), size_(size) {} in Eraser() 159 uint8_t* buf_; 186 const uint8_t* byte_ptr = reinterpret_cast<const uint8_t*>(&t); in ntoh() 202 uint8_t* byte_ptr = reinterpret_cast<uint8_t*>(&retval); in hton() 220 KeymasterKeyBlob(const uint8_t* data, size_t size) { in KeymasterKeyBlob() 229 key_material = new (std::nothrow) uint8_t[size]; in KeymasterKeyBlob() 256 const uint8_t* begin() const { return key_material; } in begin() [all …]
|
/system/keymaster/ |
D | android_keymaster_messages.cpp | 36 static uint8_t* serialize_key_blob(const keymaster_key_blob_t& key_blob, uint8_t* buf, in serialize_key_blob() 37 const uint8_t* end) { in serialize_key_blob() 41 static bool deserialize_key_blob(keymaster_key_blob_t* key_blob, const uint8_t** buf_ptr, in deserialize_key_blob() 42 const uint8_t* end) { in deserialize_key_blob() 45 UniquePtr<uint8_t[]> deserialized_key_material; in deserialize_key_blob() 60 uint8_t* KeymasterResponse::Serialize(uint8_t* buf, const uint8_t* end) const { in Serialize() 67 bool KeymasterResponse::Deserialize(const uint8_t** buf_ptr, const uint8_t* end) { in Deserialize() 83 uint8_t* GenerateKeyResponse::NonErrorSerialize(uint8_t* buf, const uint8_t* end) const { in NonErrorSerialize() 89 bool GenerateKeyResponse::NonErrorDeserialize(const uint8_t** buf_ptr, const uint8_t* end) { in NonErrorDeserialize() 106 uint8_t* GetKeyCharacteristicsRequest::Serialize(uint8_t* buf, const uint8_t* end) const { in Serialize() [all …]
|
D | serializable.cpp | 27 uint8_t* append_to_buf(uint8_t* buf, const uint8_t* end, const void* data, size_t data_len) { in append_to_buf() 38 bool copy_from_buf(const uint8_t** buf_ptr, const uint8_t* end, void* dest, size_t size) { in copy_from_buf() 49 bool copy_size_and_data_from_buf(const uint8_t** buf_ptr, const uint8_t* end, size_t* size, in copy_size_and_data_from_buf() 50 UniquePtr<uint8_t[]>* dest) { in copy_size_and_data_from_buf() 64 dest->reset(new (std::nothrow) uint8_t[*size]); in copy_size_and_data_from_buf() 73 uint8_t* new_buffer = new (std::nothrow) uint8_t[new_size]; in reserve() 88 buffer_.reset(new (std::nothrow) uint8_t[size]); in Reinitialize() 99 if (static_cast<const uint8_t*>(data) + data_len < data) // Pointer wrap check in Reinitialize() 101 buffer_.reset(new (std::nothrow) uint8_t[data_len]); in Reinitialize() 122 bool Buffer::write(const uint8_t* src, size_t write_length) { in write() [all …]
|
D | android_keymaster_utils.cpp | 27 uint8_t* dup_buffer(const void* buf, size_t size) { in dup_buffer() 30 uint8_t* retval = new (std::nothrow) uint8_t[size]; in dup_buffer() 37 const uint8_t* s1 = static_cast<const uint8_t*>(p1); in memcmp_s() 38 const uint8_t* s2 = static_cast<const uint8_t*>(p2); in memcmp_s() 39 uint8_t result = 0; in memcmp_s()
|
D | hmac.h | 34 bool Init(const uint8_t* key, size_t key_length); 40 bool Sign(const Buffer& data, uint8_t* digest, size_t digest_len) const; 41 bool Sign(const uint8_t* data, size_t data_len, uint8_t* digest, size_t digest_len) const; 50 bool Verify(const uint8_t* data, size_t data_len, const uint8_t* digest, 54 UniquePtr<uint8_t[]> key_;
|
D | keymaster0_engine.h | 72 static int rsa_private_transform(RSA* rsa, uint8_t* out, const uint8_t* in, size_t len); 73 static int ecdsa_sign(const uint8_t* digest, size_t digest_len, uint8_t* sig, 81 const uint8_t* data, const size_t data_length, 82 std::unique_ptr<uint8_t[], Malloc_Delete>* signature, 85 int RsaPrivateTransform(RSA* rsa, uint8_t* out, const uint8_t* in, size_t len) const; 86 int EcdsaSign(const uint8_t* digest, size_t digest_len, uint8_t* sig, unsigned int* sig_len,
|
D | hmac.cpp | 38 bool HmacSha256::Init(const uint8_t* key, size_t key_len) { in Init() 50 bool HmacSha256::Sign(const Buffer& data, uint8_t* out_digest, size_t digest_len) const { in Sign() 54 bool HmacSha256::Sign(const uint8_t* data, size_t data_len, uint8_t* out_digest, in Sign() 58 uint8_t tmp[SHA256_DIGEST_LENGTH]; in Sign() 59 uint8_t* digest = tmp; in Sign() 77 bool HmacSha256::Verify(const uint8_t* data, size_t data_len, const uint8_t* digest, in Verify() 82 uint8_t computed_digest[SHA256_DIGEST_LENGTH]; in Verify()
|
/system/gatekeeper/include/gatekeeper/ |
D | gatekeeper_messages.h | 50 buffer.reset(new uint8_t[length]); in SizedBuffer() 62 SizedBuffer(uint8_t buf[], uint32_t len) { in SizedBuffer() 67 UniquePtr<uint8_t[]> buffer; 93 uint32_t Serialize(uint8_t *payload, const uint8_t *end) const; 98 gatekeeper_error_t Deserialize(const uint8_t *payload, const uint8_t *end); 123 virtual void nonErrorSerialize(uint8_t *) const { } in nonErrorSerialize() 128 virtual gatekeeper_error_t nonErrorDeserialize(const uint8_t *, const uint8_t *) { in nonErrorDeserialize() 147 virtual void nonErrorSerialize(uint8_t *buffer) const; 148 virtual gatekeeper_error_t nonErrorDeserialize(const uint8_t *payload, const uint8_t *end); 163 virtual void nonErrorSerialize(uint8_t *buffer) const; [all …]
|
D | gatekeeper.h | 64 virtual bool GetAuthTokenKey(const uint8_t **auth_token_key, uint32_t *length) 78 virtual void GetPasswordKey(const uint8_t **password_key, uint32_t *length) = 0; 89 virtual void ComputePasswordSignature(uint8_t *signature, uint32_t signature_length, 90 const uint8_t *key, uint32_t key_length, const uint8_t *password, 106 virtual void ComputeSignature(uint8_t *signature, uint32_t signature_length, 107 const uint8_t *key, uint32_t key_length, const uint8_t *message, 179 void MintAuthToken(UniquePtr<uint8_t> *auth_token, uint32_t *length, uint64_t timestamp, 186 secure_id_t secure_id, secure_id_t authenticator_id, uint8_t handle_version, 187 const uint8_t *password, uint32_t password_length);
|
/system/bt/hci/src/ |
D | hci_packet_factory.c | 34 static BT_HDR *make_command(uint16_t opcode, size_t parameter_size, uint8_t **stream_out); 46 static BT_HDR *make_host_buffer_size(uint16_t acl_size, uint8_t sco_size, uint16_t acl_count, uint1… in make_host_buffer_size() 47 uint8_t *stream; in make_host_buffer_size() 48 const uint8_t parameter_size = 2 + 1 + 2 + 2; // from each of the parameters in make_host_buffer_size() 70 static BT_HDR *make_read_local_extended_features(uint8_t page_number) { in make_read_local_extended_features() 71 uint8_t *stream; in make_read_local_extended_features() 72 const uint8_t parameter_size = 1; in make_read_local_extended_features() 79 static BT_HDR *make_write_simple_pairing_mode(uint8_t mode) { in make_write_simple_pairing_mode() 80 uint8_t *stream; in make_write_simple_pairing_mode() 81 const uint8_t parameter_size = 1; in make_write_simple_pairing_mode() [all …]
|
D | hci_packet_parser.c | 34 static uint8_t *read_command_complete_header( 50 …uint8_t *stream = read_command_complete_header(response, HCI_READ_BUFFER_SIZE, 5 /* bytes after */… in parse_read_buffer_size_response() 63 …uint8_t *stream = read_command_complete_header(response, HCI_READ_LOCAL_VERSION_INFO, 8 /* bytes a… in parse_read_local_version_info_response() 78 …uint8_t *stream = read_command_complete_header(response, HCI_READ_BD_ADDR, sizeof(bt_bdaddr_t) /* … in parse_read_bd_addr_response() 87 uint8_t *supported_commands_ptr, in parse_read_local_supported_commands_response() 90 …uint8_t *stream = read_command_complete_header(response, HCI_READ_LOCAL_SUPPORTED_CMDS, supported_… in parse_read_local_supported_commands_response() 99 uint8_t *page_number_ptr, in parse_read_local_extended_features_response() 100 uint8_t *max_page_number_ptr, in parse_read_local_extended_features_response() 104 …uint8_t *stream = read_command_complete_header(response, HCI_READ_LOCAL_EXT_FEATURES, 2 + sizeof(b… in parse_read_local_extended_features_response() 121 uint8_t *white_list_size_ptr) { in parse_ble_read_white_list_size_response() [all …]
|
/system/security/softkeymaster/include/keymaster/ |
D | softkeymaster.h | 23 const void* key_params, uint8_t** keyBlob, size_t* keyBlobLength); 25 int openssl_import_keypair(const keymaster0_device_t* dev, const uint8_t* key, 26 const size_t key_length, uint8_t** key_blob, size_t* key_blob_length); 28 int openssl_get_keypair_public(const struct keymaster0_device* dev, const uint8_t* key_blob, 29 const size_t key_blob_length, uint8_t** x509_data, 32 int openssl_sign_data(const keymaster0_device_t* dev, const void* params, const uint8_t* keyBlob, 33 const size_t keyBlobLength, const uint8_t* data, const size_t dataLength, 34 uint8_t** signedData, size_t* signedDataLength); 36 int openssl_verify_data(const keymaster0_device_t* dev, const void* params, const uint8_t* keyBlob, 37 const size_t keyBlobLength, const uint8_t* signedData, [all …]
|
/system/bt/btif/include/ |
D | btif_sock_sdp.h | 24 static const uint8_t UUID_OBEX_OBJECT_PUSH[] = {0x00, 0x00, 0x11, 0x05, 0x00, 0x00, 0x10, 0x00, 26 static const uint8_t UUID_PBAP_PSE[] = {0x00, 0x00, 0x11, 0x2F, 0x00, 0x00, 0x10, 0x00, 28 static const uint8_t UUID_MAP_MAS[] = {0x00, 0x00, 0x11, 0x32, 0x00, 0x00, 0x10, 0x00, 30 static const uint8_t UUID_SAP[] = {0x00, 0x00, 0x11, 0x2D, 0x00, 0x00, 0x10, 0x00, 32 static const uint8_t UUID_SPP[] = {0x00, 0x00, 0x11, 0x01, 0x00, 0x00, 0x10, 0x00, 35 static inline bool is_uuid_empty(const uint8_t* uuid) in is_uuid_empty() 37 static uint8_t empty_uuid[16]; in is_uuid_empty() 41 int add_rfc_sdp_rec(const char* name, const uint8_t* uuid, int scn); 44 int get_reserved_rfc_channel(const uint8_t* uuid);
|
D | btif_api.h | 270 bt_status_t btif_dm_pin_reply( const bt_bdaddr_t *bd_addr, uint8_t accept, 271 uint8_t pin_len, bt_pin_code_t *pin_code); 283 uint8_t accept, uint32_t passkey); 295 bt_ssp_variant_t variant, uint8_t accept, 354 bt_status_t btif_dut_mode_configure(uint8_t enable); 365 bt_status_t btif_dut_mode_send(uint16_t opcode, uint8_t *buf, uint8_t len); 376 bt_status_t btif_le_test_mode(uint16_t opcode, uint8_t *buf, uint8_t len); 398 bt_status_t btif_config_hci_snoop_log(uint8_t enable);
|
/system/core/libpixelflinger/include/pixelflinger/ |
D | format.h | 105 uint8_t size; // bytes per pixel 106 uint8_t bitsPerPixel; 109 uint8_t ah; // alpha high bit position + 1 110 uint8_t al; // alpha low bit position 111 uint8_t rh; // red high bit position + 1 112 uint8_t rl; // red low bit position 113 uint8_t gh; // green high bit position + 1 114 uint8_t gl; // green low bit position 115 uint8_t bh; // blue high bit position + 1 116 uint8_t bl; // blue low bit position [all …]
|
/system/core/gatekeeperd/ |
D | IGateKeeperService.cpp | 37 const uint8_t *currentPasswordHandle = in onTransact() 38 static_cast<const uint8_t *>(data.readInplace(currentPasswordHandleSize)); in onTransact() 42 const uint8_t *currentPassword = in onTransact() 43 static_cast<const uint8_t *>(data.readInplace(currentPasswordSize)); in onTransact() 47 const uint8_t *desiredPassword = in onTransact() 48 static_cast<const uint8_t *>(data.readInplace(desiredPasswordSize)); in onTransact() 51 uint8_t *out = NULL; in onTransact() 79 const uint8_t *currentPasswordHandle = in onTransact() 80 static_cast<const uint8_t *>(data.readInplace(currentPasswordHandleSize)); in onTransact() 84 const uint8_t *currentPassword = in onTransact() [all …]
|
D | SoftGateKeeper.h | 37 uint8_t digest[SHA256_DIGEST_LENGTH]; 52 key_.reset(new uint8_t[SIGNATURE_LENGTH_BYTES]); in SoftGateKeeper() 59 virtual bool GetAuthTokenKey(const uint8_t **auth_token_key, in GetAuthTokenKey() 62 uint8_t *auth_token_key_copy = new uint8_t[SIGNATURE_LENGTH_BYTES]; in GetAuthTokenKey() 70 virtual void GetPasswordKey(const uint8_t **password_key, uint32_t *length) { in GetPasswordKey() 72 uint8_t *password_key_copy = new uint8_t[SIGNATURE_LENGTH_BYTES]; in GetPasswordKey() 79 virtual void ComputePasswordSignature(uint8_t *signature, uint32_t signature_length, in ComputePasswordSignature() 80 const uint8_t *, uint32_t, const uint8_t *password, in ComputePasswordSignature() argument 83 crypto_scrypt(password, password_length, reinterpret_cast<uint8_t *>(&salt), in ComputePasswordSignature() 89 RAND_pseudo_bytes((uint8_t *) random, requested_length); in GetRandom() [all …]
|
D | SoftGateKeeperDevice.h | 48 const uint8_t *current_password_handle, uint32_t current_password_handle_length, 49 const uint8_t *current_password, uint32_t current_password_length, 50 const uint8_t *desired_password, uint32_t desired_password_length, 51 uint8_t **enrolled_password_handle, uint32_t *enrolled_password_handle_length); 67 const uint8_t *enrolled_password_handle, uint32_t enrolled_password_handle_length, 68 const uint8_t *provided_password, uint32_t provided_password_length, 69 uint8_t **auth_token, uint32_t *auth_token_length, bool *request_reenroll);
|
D | IGateKeeperService.h | 59 const uint8_t *current_password_handle, uint32_t current_password_handle_length, 60 const uint8_t *current_password, uint32_t current_password_length, 61 const uint8_t *desired_password, uint32_t desired_password_length, 62 uint8_t **enrolled_password_handle, uint32_t *enrolled_password_handle_length) = 0; 72 virtual int verify(uint32_t uid, const uint8_t *enrolled_password_handle, 74 const uint8_t *provided_password, uint32_t provided_password_length, 86 const uint8_t *enrolled_password_handle, uint32_t enrolled_password_handle_length, 87 const uint8_t *provided_password, uint32_t provided_password_length, 88 uint8_t **auth_token, uint32_t *auth_token_length, bool *request_reenroll) = 0;
|
/system/core/libziparchive/ |
D | entry_name_utils_test.cc | 23 const uint8_t zeroes[] = { 0x41, 0x52, 0x00, 0x53, 0x45 }; in TEST() 26 const uint8_t zeroes_continuation_chars[] = { 0xc2, 0xa1, 0xc2, 0x00 }; in TEST() 33 const uint8_t invalid[] = { 0x41, 0xfe }; in TEST() 37 const uint8_t invalid2[] = { 0x41, 0x91 }; in TEST() 44 const uint8_t truncated[] = { 0xe0, 0xb4, 0x85, 0xe0, 0xb4 }; in TEST() 49 const uint8_t truncated2[] = { 0xc2, 0xc2, 0xa1 }; in TEST() 56 const uint8_t bad[] = { 0xc2, 0xa1, 0xc2, 0x41 }; in TEST() 61 const uint8_t bad2[] = { 0xc2, 0xa1, 0xc2, 0xfe }; in TEST()
|
/system/core/include/diskconfig/ |
D | diskconfig.h | 57 uint8_t head; 58 uint8_t sector; 59 uint8_t cylinder; 65 uint8_t status; /* byte 0 */ 67 uint8_t type; /* byte 4 */ 74 uint8_t code[440]; /* bytes 0-439 */ 83 uint8_t flags; 84 uint8_t type; 91 uint8_t scheme; 103 uint8_t data[0];
|
/system/bt/btcore/test/ |
D | device_class_test.cpp | 52 uint8_t dc_stream[] = { 0x00, 0x00, 0x00, 0x00}; in TEST_F() 59 uint8_t dc_stream[][sizeof(bt_device_class_t)] = { in TEST_F() 69 device_class_from_stream(&dc, (uint8_t*)&dc_stream[i]); in TEST_F() 71 uint8_t *to_stream = (uint8_t *)&dc; in TEST_F() 82 uint8_t dc_stream0[] = { 0x00, 0x00, 0x00, 0xaa }; in TEST_F() 85 uint8_t dc_stream1[] = { 0x00, 0x00, 0x00, 0x00 }; in TEST_F() 98 uint8_t dc_stream0[] = { 0xaa, 0x55, 0xaa, 0x55 }; in TEST_F() 99 uint8_t dc_stream1[] = { 0x00, 0x00, 0x00, 0x00 }; in TEST_F() 115 uint8_t dc_stream0[] = { 0x01, 0x23, 0x45, 0x67 }; in TEST_F() 116 uint8_t dc_stream1[] = { 0x00, 0x00, 0x00, 0x00 }; in TEST_F() [all …]
|
/system/bt/osi/test/ |
D | ringbuffer_test.cpp | 19 uint8_t buffer[10] = {0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0A}; in TEST() 24 uint8_t peek[10] = {0}; in TEST() 37 uint8_t aa[] = {0xAA, 0xAA, 0xAA, 0xAA, 0xAA, 0xAA, 0xAA}; in TEST() 38 uint8_t bb[] = {0xBB, 0xBB, 0xBB, 0xBB, 0xBB}; in TEST() 39 uint8_t peek[5] = {0}; in TEST() 68 uint8_t aa[] = {0xAA, 0xAA, 0xAA, 0xAA, 0xAA, 0xAA, 0xAA, 0xAA}; in TEST() 74 uint8_t bb[] = {0xBB, 0xBB, 0xBB, 0xBB, 0xBB}; in TEST() 79 …uint8_t content[] = {0xAA, 0xAA, 0xAA, 0xAA, 0xAA, 0xAA, 0xAA, 0xAA, 0xBB, 0xBB, 0xBB, 0xBB, 0xBB}; in TEST() 80 uint8_t peek[16] = {0}; in TEST() 93 uint8_t cc[] = {0xCC, 0xCC, 0xCC, 0xCC, 0xCC, 0xCC, 0xCC, 0xCC, 0xCC}; in TEST() [all …]
|