Home
last modified time | relevance | path

Searched refs:uint8_t (Results 1 – 25 of 319) sorted by relevance

12345678910>>...13

/system/keymaster/include/keymaster/
Dandroid_keymaster_messages.h68 inline int32_t MessageVersion(uint8_t major_ver, uint8_t minor_ver, uint8_t /* subminor_ver */) { in MessageVersion() argument
105 uint8_t* Serialize(uint8_t* buf, const uint8_t* end) const override;
106 bool Deserialize(const uint8_t** buf_ptr, const uint8_t* end) override;
109 virtual uint8_t* NonErrorSerialize(uint8_t* buf, const uint8_t* end) const = 0;
110 virtual bool NonErrorDeserialize(const uint8_t** buf_ptr, const uint8_t* end) = 0;
120 uint8_t* Serialize(uint8_t* buf, const uint8_t* /* end */) const override { return buf; } in Serialize()
121 bool Deserialize(const uint8_t** /* buf_ptr */, const uint8_t* /* end */) override { in Deserialize()
131 uint8_t* Serialize(uint8_t* buf, const uint8_t* end) const override { in Serialize()
134 bool Deserialize(const uint8_t** buf_ptr, const uint8_t* end) override { in Deserialize()
149 uint8_t* Serialize(uint8_t* buf, const uint8_t* end) const override { in Serialize()
[all …]
Dserializable.h46 virtual uint8_t* Serialize(uint8_t* buf, const uint8_t* end) const = 0;
52 virtual bool Deserialize(const uint8_t** buf_ptr, const uint8_t* end) = 0;
71 uint8_t* append_to_buf(uint8_t* buf, const uint8_t* end, const void* data, size_t data_len);
80 inline uint8_t* append_uint32_to_buf(uint8_t* buf, const uint8_t* end, T value) { in append_uint32_to_buf()
88 inline uint8_t* append_uint64_to_buf(uint8_t* buf, const uint8_t* end, uint64_t value) { in append_uint64_to_buf()
98 inline uint8_t* append_size_and_data_to_buf(uint8_t* buf, const uint8_t* end, const void* data, in append_size_and_data_to_buf()
111 inline uint8_t* append_uint32_array_to_buf(uint8_t* buf, const uint8_t* end, const T* data, in append_uint32_array_to_buf()
130 bool copy_from_buf(const uint8_t** buf_ptr, const uint8_t* end, void* dest, size_t size);
139 bool copy_size_and_data_from_buf(const uint8_t** buf_ptr, const uint8_t* end, size_t* size,
140 UniquePtr<uint8_t[]>* dest);
[all …]
Dandroid_keymaster_utils.h89 uint8_t* dup_buffer(const void* buf, size_t size);
148 : buf_(reinterpret_cast<uint8_t*>(&t)), size_(sizeof(t)) {} in Eraser()
150 template <size_t N> explicit Eraser(uint8_t(&arr)[N]) : buf_(arr), size_(N) {} in Eraser()
152 Eraser(void* buf, size_t size) : buf_(static_cast<uint8_t*>(buf)), size_(size) {} in Eraser()
159 uint8_t* buf_;
186 const uint8_t* byte_ptr = reinterpret_cast<const uint8_t*>(&t); in ntoh()
202 uint8_t* byte_ptr = reinterpret_cast<uint8_t*>(&retval); in hton()
220 KeymasterKeyBlob(const uint8_t* data, size_t size) { in KeymasterKeyBlob()
229 key_material = new (std::nothrow) uint8_t[size]; in KeymasterKeyBlob()
256 const uint8_t* begin() const { return key_material; } in begin()
[all …]
/system/keymaster/
Dandroid_keymaster_messages.cpp36 static uint8_t* serialize_key_blob(const keymaster_key_blob_t& key_blob, uint8_t* buf, in serialize_key_blob()
37 const uint8_t* end) { in serialize_key_blob()
41 static bool deserialize_key_blob(keymaster_key_blob_t* key_blob, const uint8_t** buf_ptr, in deserialize_key_blob()
42 const uint8_t* end) { in deserialize_key_blob()
45 UniquePtr<uint8_t[]> deserialized_key_material; in deserialize_key_blob()
60 uint8_t* KeymasterResponse::Serialize(uint8_t* buf, const uint8_t* end) const { in Serialize()
67 bool KeymasterResponse::Deserialize(const uint8_t** buf_ptr, const uint8_t* end) { in Deserialize()
83 uint8_t* GenerateKeyResponse::NonErrorSerialize(uint8_t* buf, const uint8_t* end) const { in NonErrorSerialize()
89 bool GenerateKeyResponse::NonErrorDeserialize(const uint8_t** buf_ptr, const uint8_t* end) { in NonErrorDeserialize()
106 uint8_t* GetKeyCharacteristicsRequest::Serialize(uint8_t* buf, const uint8_t* end) const { in Serialize()
[all …]
Dserializable.cpp27 uint8_t* append_to_buf(uint8_t* buf, const uint8_t* end, const void* data, size_t data_len) { in append_to_buf()
38 bool copy_from_buf(const uint8_t** buf_ptr, const uint8_t* end, void* dest, size_t size) { in copy_from_buf()
49 bool copy_size_and_data_from_buf(const uint8_t** buf_ptr, const uint8_t* end, size_t* size, in copy_size_and_data_from_buf()
50 UniquePtr<uint8_t[]>* dest) { in copy_size_and_data_from_buf()
64 dest->reset(new (std::nothrow) uint8_t[*size]); in copy_size_and_data_from_buf()
73 uint8_t* new_buffer = new (std::nothrow) uint8_t[new_size]; in reserve()
88 buffer_.reset(new (std::nothrow) uint8_t[size]); in Reinitialize()
99 if (static_cast<const uint8_t*>(data) + data_len < data) // Pointer wrap check in Reinitialize()
101 buffer_.reset(new (std::nothrow) uint8_t[data_len]); in Reinitialize()
122 bool Buffer::write(const uint8_t* src, size_t write_length) { in write()
[all …]
Dandroid_keymaster_utils.cpp27 uint8_t* dup_buffer(const void* buf, size_t size) { in dup_buffer()
30 uint8_t* retval = new (std::nothrow) uint8_t[size]; in dup_buffer()
37 const uint8_t* s1 = static_cast<const uint8_t*>(p1); in memcmp_s()
38 const uint8_t* s2 = static_cast<const uint8_t*>(p2); in memcmp_s()
39 uint8_t result = 0; in memcmp_s()
Dhmac.h34 bool Init(const uint8_t* key, size_t key_length);
40 bool Sign(const Buffer& data, uint8_t* digest, size_t digest_len) const;
41 bool Sign(const uint8_t* data, size_t data_len, uint8_t* digest, size_t digest_len) const;
50 bool Verify(const uint8_t* data, size_t data_len, const uint8_t* digest,
54 UniquePtr<uint8_t[]> key_;
Dkeymaster0_engine.h72 static int rsa_private_transform(RSA* rsa, uint8_t* out, const uint8_t* in, size_t len);
73 static int ecdsa_sign(const uint8_t* digest, size_t digest_len, uint8_t* sig,
81 const uint8_t* data, const size_t data_length,
82 std::unique_ptr<uint8_t[], Malloc_Delete>* signature,
85 int RsaPrivateTransform(RSA* rsa, uint8_t* out, const uint8_t* in, size_t len) const;
86 int EcdsaSign(const uint8_t* digest, size_t digest_len, uint8_t* sig, unsigned int* sig_len,
Dhmac.cpp38 bool HmacSha256::Init(const uint8_t* key, size_t key_len) { in Init()
50 bool HmacSha256::Sign(const Buffer& data, uint8_t* out_digest, size_t digest_len) const { in Sign()
54 bool HmacSha256::Sign(const uint8_t* data, size_t data_len, uint8_t* out_digest, in Sign()
58 uint8_t tmp[SHA256_DIGEST_LENGTH]; in Sign()
59 uint8_t* digest = tmp; in Sign()
77 bool HmacSha256::Verify(const uint8_t* data, size_t data_len, const uint8_t* digest, in Verify()
82 uint8_t computed_digest[SHA256_DIGEST_LENGTH]; in Verify()
/system/gatekeeper/include/gatekeeper/
Dgatekeeper_messages.h50 buffer.reset(new uint8_t[length]); in SizedBuffer()
62 SizedBuffer(uint8_t buf[], uint32_t len) { in SizedBuffer()
67 UniquePtr<uint8_t[]> buffer;
93 uint32_t Serialize(uint8_t *payload, const uint8_t *end) const;
98 gatekeeper_error_t Deserialize(const uint8_t *payload, const uint8_t *end);
123 virtual void nonErrorSerialize(uint8_t *) const { } in nonErrorSerialize()
128 virtual gatekeeper_error_t nonErrorDeserialize(const uint8_t *, const uint8_t *) { in nonErrorDeserialize()
147 virtual void nonErrorSerialize(uint8_t *buffer) const;
148 virtual gatekeeper_error_t nonErrorDeserialize(const uint8_t *payload, const uint8_t *end);
163 virtual void nonErrorSerialize(uint8_t *buffer) const;
[all …]
Dgatekeeper.h64 virtual bool GetAuthTokenKey(const uint8_t **auth_token_key, uint32_t *length)
78 virtual void GetPasswordKey(const uint8_t **password_key, uint32_t *length) = 0;
89 virtual void ComputePasswordSignature(uint8_t *signature, uint32_t signature_length,
90 const uint8_t *key, uint32_t key_length, const uint8_t *password,
106 virtual void ComputeSignature(uint8_t *signature, uint32_t signature_length,
107 const uint8_t *key, uint32_t key_length, const uint8_t *message,
179 void MintAuthToken(UniquePtr<uint8_t> *auth_token, uint32_t *length, uint64_t timestamp,
186 secure_id_t secure_id, secure_id_t authenticator_id, uint8_t handle_version,
187 const uint8_t *password, uint32_t password_length);
/system/bt/hci/src/
Dhci_packet_factory.c34 static BT_HDR *make_command(uint16_t opcode, size_t parameter_size, uint8_t **stream_out);
46 static BT_HDR *make_host_buffer_size(uint16_t acl_size, uint8_t sco_size, uint16_t acl_count, uint1… in make_host_buffer_size()
47 uint8_t *stream; in make_host_buffer_size()
48 const uint8_t parameter_size = 2 + 1 + 2 + 2; // from each of the parameters in make_host_buffer_size()
70 static BT_HDR *make_read_local_extended_features(uint8_t page_number) { in make_read_local_extended_features()
71 uint8_t *stream; in make_read_local_extended_features()
72 const uint8_t parameter_size = 1; in make_read_local_extended_features()
79 static BT_HDR *make_write_simple_pairing_mode(uint8_t mode) { in make_write_simple_pairing_mode()
80 uint8_t *stream; in make_write_simple_pairing_mode()
81 const uint8_t parameter_size = 1; in make_write_simple_pairing_mode()
[all …]
Dhci_packet_parser.c34 static uint8_t *read_command_complete_header(
50uint8_t *stream = read_command_complete_header(response, HCI_READ_BUFFER_SIZE, 5 /* bytes after */… in parse_read_buffer_size_response()
63uint8_t *stream = read_command_complete_header(response, HCI_READ_LOCAL_VERSION_INFO, 8 /* bytes a… in parse_read_local_version_info_response()
78uint8_t *stream = read_command_complete_header(response, HCI_READ_BD_ADDR, sizeof(bt_bdaddr_t) /* … in parse_read_bd_addr_response()
87 uint8_t *supported_commands_ptr, in parse_read_local_supported_commands_response()
90uint8_t *stream = read_command_complete_header(response, HCI_READ_LOCAL_SUPPORTED_CMDS, supported_… in parse_read_local_supported_commands_response()
99 uint8_t *page_number_ptr, in parse_read_local_extended_features_response()
100 uint8_t *max_page_number_ptr, in parse_read_local_extended_features_response()
104uint8_t *stream = read_command_complete_header(response, HCI_READ_LOCAL_EXT_FEATURES, 2 + sizeof(b… in parse_read_local_extended_features_response()
121 uint8_t *white_list_size_ptr) { in parse_ble_read_white_list_size_response()
[all …]
/system/security/softkeymaster/include/keymaster/
Dsoftkeymaster.h23 const void* key_params, uint8_t** keyBlob, size_t* keyBlobLength);
25 int openssl_import_keypair(const keymaster0_device_t* dev, const uint8_t* key,
26 const size_t key_length, uint8_t** key_blob, size_t* key_blob_length);
28 int openssl_get_keypair_public(const struct keymaster0_device* dev, const uint8_t* key_blob,
29 const size_t key_blob_length, uint8_t** x509_data,
32 int openssl_sign_data(const keymaster0_device_t* dev, const void* params, const uint8_t* keyBlob,
33 const size_t keyBlobLength, const uint8_t* data, const size_t dataLength,
34 uint8_t** signedData, size_t* signedDataLength);
36 int openssl_verify_data(const keymaster0_device_t* dev, const void* params, const uint8_t* keyBlob,
37 const size_t keyBlobLength, const uint8_t* signedData,
[all …]
/system/bt/btif/include/
Dbtif_sock_sdp.h24 static const uint8_t UUID_OBEX_OBJECT_PUSH[] = {0x00, 0x00, 0x11, 0x05, 0x00, 0x00, 0x10, 0x00,
26 static const uint8_t UUID_PBAP_PSE[] = {0x00, 0x00, 0x11, 0x2F, 0x00, 0x00, 0x10, 0x00,
28 static const uint8_t UUID_MAP_MAS[] = {0x00, 0x00, 0x11, 0x32, 0x00, 0x00, 0x10, 0x00,
30 static const uint8_t UUID_SAP[] = {0x00, 0x00, 0x11, 0x2D, 0x00, 0x00, 0x10, 0x00,
32 static const uint8_t UUID_SPP[] = {0x00, 0x00, 0x11, 0x01, 0x00, 0x00, 0x10, 0x00,
35 static inline bool is_uuid_empty(const uint8_t* uuid) in is_uuid_empty()
37 static uint8_t empty_uuid[16]; in is_uuid_empty()
41 int add_rfc_sdp_rec(const char* name, const uint8_t* uuid, int scn);
44 int get_reserved_rfc_channel(const uint8_t* uuid);
Dbtif_api.h270 bt_status_t btif_dm_pin_reply( const bt_bdaddr_t *bd_addr, uint8_t accept,
271 uint8_t pin_len, bt_pin_code_t *pin_code);
283 uint8_t accept, uint32_t passkey);
295 bt_ssp_variant_t variant, uint8_t accept,
354 bt_status_t btif_dut_mode_configure(uint8_t enable);
365 bt_status_t btif_dut_mode_send(uint16_t opcode, uint8_t *buf, uint8_t len);
376 bt_status_t btif_le_test_mode(uint16_t opcode, uint8_t *buf, uint8_t len);
398 bt_status_t btif_config_hci_snoop_log(uint8_t enable);
/system/core/libpixelflinger/include/pixelflinger/
Dformat.h105 uint8_t size; // bytes per pixel
106 uint8_t bitsPerPixel;
109 uint8_t ah; // alpha high bit position + 1
110 uint8_t al; // alpha low bit position
111 uint8_t rh; // red high bit position + 1
112 uint8_t rl; // red low bit position
113 uint8_t gh; // green high bit position + 1
114 uint8_t gl; // green low bit position
115 uint8_t bh; // blue high bit position + 1
116 uint8_t bl; // blue low bit position
[all …]
/system/core/gatekeeperd/
DIGateKeeperService.cpp37 const uint8_t *currentPasswordHandle = in onTransact()
38 static_cast<const uint8_t *>(data.readInplace(currentPasswordHandleSize)); in onTransact()
42 const uint8_t *currentPassword = in onTransact()
43 static_cast<const uint8_t *>(data.readInplace(currentPasswordSize)); in onTransact()
47 const uint8_t *desiredPassword = in onTransact()
48 static_cast<const uint8_t *>(data.readInplace(desiredPasswordSize)); in onTransact()
51 uint8_t *out = NULL; in onTransact()
79 const uint8_t *currentPasswordHandle = in onTransact()
80 static_cast<const uint8_t *>(data.readInplace(currentPasswordHandleSize)); in onTransact()
84 const uint8_t *currentPassword = in onTransact()
[all …]
DSoftGateKeeper.h37 uint8_t digest[SHA256_DIGEST_LENGTH];
52 key_.reset(new uint8_t[SIGNATURE_LENGTH_BYTES]); in SoftGateKeeper()
59 virtual bool GetAuthTokenKey(const uint8_t **auth_token_key, in GetAuthTokenKey()
62 uint8_t *auth_token_key_copy = new uint8_t[SIGNATURE_LENGTH_BYTES]; in GetAuthTokenKey()
70 virtual void GetPasswordKey(const uint8_t **password_key, uint32_t *length) { in GetPasswordKey()
72 uint8_t *password_key_copy = new uint8_t[SIGNATURE_LENGTH_BYTES]; in GetPasswordKey()
79 virtual void ComputePasswordSignature(uint8_t *signature, uint32_t signature_length, in ComputePasswordSignature()
80 const uint8_t *, uint32_t, const uint8_t *password, in ComputePasswordSignature() argument
83 crypto_scrypt(password, password_length, reinterpret_cast<uint8_t *>(&salt), in ComputePasswordSignature()
89 RAND_pseudo_bytes((uint8_t *) random, requested_length); in GetRandom()
[all …]
DSoftGateKeeperDevice.h48 const uint8_t *current_password_handle, uint32_t current_password_handle_length,
49 const uint8_t *current_password, uint32_t current_password_length,
50 const uint8_t *desired_password, uint32_t desired_password_length,
51 uint8_t **enrolled_password_handle, uint32_t *enrolled_password_handle_length);
67 const uint8_t *enrolled_password_handle, uint32_t enrolled_password_handle_length,
68 const uint8_t *provided_password, uint32_t provided_password_length,
69 uint8_t **auth_token, uint32_t *auth_token_length, bool *request_reenroll);
DIGateKeeperService.h59 const uint8_t *current_password_handle, uint32_t current_password_handle_length,
60 const uint8_t *current_password, uint32_t current_password_length,
61 const uint8_t *desired_password, uint32_t desired_password_length,
62 uint8_t **enrolled_password_handle, uint32_t *enrolled_password_handle_length) = 0;
72 virtual int verify(uint32_t uid, const uint8_t *enrolled_password_handle,
74 const uint8_t *provided_password, uint32_t provided_password_length,
86 const uint8_t *enrolled_password_handle, uint32_t enrolled_password_handle_length,
87 const uint8_t *provided_password, uint32_t provided_password_length,
88 uint8_t **auth_token, uint32_t *auth_token_length, bool *request_reenroll) = 0;
/system/core/libziparchive/
Dentry_name_utils_test.cc23 const uint8_t zeroes[] = { 0x41, 0x52, 0x00, 0x53, 0x45 }; in TEST()
26 const uint8_t zeroes_continuation_chars[] = { 0xc2, 0xa1, 0xc2, 0x00 }; in TEST()
33 const uint8_t invalid[] = { 0x41, 0xfe }; in TEST()
37 const uint8_t invalid2[] = { 0x41, 0x91 }; in TEST()
44 const uint8_t truncated[] = { 0xe0, 0xb4, 0x85, 0xe0, 0xb4 }; in TEST()
49 const uint8_t truncated2[] = { 0xc2, 0xc2, 0xa1 }; in TEST()
56 const uint8_t bad[] = { 0xc2, 0xa1, 0xc2, 0x41 }; in TEST()
61 const uint8_t bad2[] = { 0xc2, 0xa1, 0xc2, 0xfe }; in TEST()
/system/core/include/diskconfig/
Ddiskconfig.h57 uint8_t head;
58 uint8_t sector;
59 uint8_t cylinder;
65 uint8_t status; /* byte 0 */
67 uint8_t type; /* byte 4 */
74 uint8_t code[440]; /* bytes 0-439 */
83 uint8_t flags;
84 uint8_t type;
91 uint8_t scheme;
103 uint8_t data[0];
/system/bt/btcore/test/
Ddevice_class_test.cpp52 uint8_t dc_stream[] = { 0x00, 0x00, 0x00, 0x00}; in TEST_F()
59 uint8_t dc_stream[][sizeof(bt_device_class_t)] = { in TEST_F()
69 device_class_from_stream(&dc, (uint8_t*)&dc_stream[i]); in TEST_F()
71 uint8_t *to_stream = (uint8_t *)&dc; in TEST_F()
82 uint8_t dc_stream0[] = { 0x00, 0x00, 0x00, 0xaa }; in TEST_F()
85 uint8_t dc_stream1[] = { 0x00, 0x00, 0x00, 0x00 }; in TEST_F()
98 uint8_t dc_stream0[] = { 0xaa, 0x55, 0xaa, 0x55 }; in TEST_F()
99 uint8_t dc_stream1[] = { 0x00, 0x00, 0x00, 0x00 }; in TEST_F()
115 uint8_t dc_stream0[] = { 0x01, 0x23, 0x45, 0x67 }; in TEST_F()
116 uint8_t dc_stream1[] = { 0x00, 0x00, 0x00, 0x00 }; in TEST_F()
[all …]
/system/bt/osi/test/
Dringbuffer_test.cpp19 uint8_t buffer[10] = {0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0A}; in TEST()
24 uint8_t peek[10] = {0}; in TEST()
37 uint8_t aa[] = {0xAA, 0xAA, 0xAA, 0xAA, 0xAA, 0xAA, 0xAA}; in TEST()
38 uint8_t bb[] = {0xBB, 0xBB, 0xBB, 0xBB, 0xBB}; in TEST()
39 uint8_t peek[5] = {0}; in TEST()
68 uint8_t aa[] = {0xAA, 0xAA, 0xAA, 0xAA, 0xAA, 0xAA, 0xAA, 0xAA}; in TEST()
74 uint8_t bb[] = {0xBB, 0xBB, 0xBB, 0xBB, 0xBB}; in TEST()
79uint8_t content[] = {0xAA, 0xAA, 0xAA, 0xAA, 0xAA, 0xAA, 0xAA, 0xAA, 0xBB, 0xBB, 0xBB, 0xBB, 0xBB}; in TEST()
80 uint8_t peek[16] = {0}; in TEST()
93 uint8_t cc[] = {0xCC, 0xCC, 0xCC, 0xCC, 0xCC, 0xCC, 0xCC, 0xCC, 0xCC}; in TEST()
[all …]

12345678910>>...13