/trusty/user/app/keymaster/ |
D | keymaster_attributes.proto | 43 optional bytes uuid = 1 [(nanopb).max_size=32]; 44 optional bytes product_id = 2 [(nanopb).max_size=16]; 48 optional bytes brand = 1 [(nanopb).max_size=64]; 49 optional bytes device = 2 [(nanopb).max_size=64]; 50 optional bytes product = 3 [(nanopb).max_size=64]; 51 optional bytes serial = 4 [(nanopb).max_size=64]; 52 optional bytes imei = 5 [(nanopb).max_size=64]; 53 optional bytes meid = 6 [(nanopb).max_size=64]; 54 optional bytes manufacturer = 7 [(nanopb).max_size=64]; 55 optional bytes model = 8 [(nanopb).max_size=64]; [all …]
|
D | secure_storage_manager.cpp | 152 memcpy(attestation_key->key.bytes, key, key_size); in WriteKeyToStorage() 188 memcpy(result.writable_data(), attestation_key->key.bytes, in ReadKeyFromStorage() 229 memcpy(attestation_key->certs[index].content.bytes, cert, cert_size); in WriteCertToStorage() 272 memcpy(buffer, attestation_key->certs[i].content.bytes, content_size); in ReadCertChainFromStorage() 377 memcpy(attestation_uuid, km_attributes->uuid.bytes, kAttestationUuidSize); in ReadAttestationUuid() 392 memcpy(km_attributes->uuid.bytes, attestation_uuid, kAttestationUuidSize); in WriteAttestationUuid() 433 memcpy(km_attributes->product_id.bytes, product_id, kProductIdSize); in SetProductId() 456 memcpy(product_id, km_attributes->product_id.bytes, kProductIdSize); in ReadProductId() 479 memcpy(attestation_ids->brand.bytes, request.brand.begin(), in ValidateAndSetBaseAttestationIds() 489 memcpy(attestation_ids->device.bytes, request.device.begin(), in ValidateAndSetBaseAttestationIds() [all …]
|
D | trusty_remote_provisioning_context.cpp | 107 cppbor::Tstr((proto).bytes, (proto).bytes + (proto).size)); \
|
D | trusty_keymaster_context.cpp | 951 (memcmp((blob).data, (proto).bytes, (proto).size) != 0) 1015 reinterpret_cast<const char*>(ids.imei.bytes), in VerifyAndCopyDeviceIds()
|
/trusty/user/app/keymint/ |
D | ffi_bindings.rs | 113 fn deserialize(bytes: &[u8], _handles: &mut [Option<Handle>]) -> Result<Self, Self::Error> { in deserialize() 114 let (cmd, bytes) = <u32>::deserialize(bytes).map_err(|e| { in deserialize() 123 let (status, bytes) = <u32>::deserialize(bytes).map_err(|e| { in deserialize() 132 let (unwrapped_keybox_len, bytes) = <u64>::deserialize(bytes).map_err(|e| { in deserialize() 136 if unwrapped_keybox_len as usize != bytes.len() { in deserialize() 140 bytes.len() in deserialize() 145 let unwrapped_keybox = try_to_vec(bytes).map_err(|e| { in deserialize()
|
D | keys.rs | 46 fn deserialize_u32(bytes: &[u8], error_message: &str) -> Result<u32, Error> { in deserialize_u32() 47 let u32_bytes: [u8; U32_SIZE] = match bytes.try_into() { in deserialize_u32()
|
D | ipc_manager.rs | 76 fn deserialize(bytes: &[u8], _handles: &mut [Option<Handle>]) -> tipc::Result<Self> { in deserialize() 77 Ok(KMMessage(Vec::try_alloc_from(bytes)?)) in deserialize()
|
/trusty/user/base/lib/tipc/rust/src/ |
D | serialization.rs | 19 fn serialize_bytes(&mut self, bytes: &'s [u8]) -> Result<Self::Ok, Self::Error>; in serialize_bytes() 33 let bytes: &'s [u8] = slice::from_raw_parts(&*ptr, mem::size_of::<T>()); in serialize_as_bytes() localVariable 34 self.serialize_bytes(bytes) in serialize_as_bytes() 96 fn deserialize(bytes: &[u8], handles: &mut [Option<Handle>]) -> Result<Self, Self::Error>; in deserialize()
|
D | service.rs | 253 pub fn from_bytes(bytes: &[u8; Self::UUID_BYTE_LEN]) -> Self { in from_bytes() 256 let uuid = unsafe { std::mem::transmute_copy(bytes) }; 260 pub fn try_from_bytes(bytes: &[u8]) -> Result<Self> { in try_from_bytes() 261 let bytes: &[u8; Self::UUID_BYTE_LEN] = bytes.try_into().or(Err(TipcError::OutOfBounds))?; in try_from_bytes() localVariable 262 Ok(Self::from_bytes(bytes)) in try_from_bytes() 1377 bytes: &[u8], in deserialize() 1380 Ok(i32::from_ne_bytes(bytes[0..4].try_into().map_err(|_| TipcError::OutOfBounds)?)) in deserialize()
|
D | handle.rs | 386 fn serialize_bytes(&mut self, bytes: &'a [u8]) -> Result<Self::Ok, Self::Error> { in serialize_bytes() 387 self.buffers.try_push(bytes).or(Err(TipcError::AllocError)) in serialize_bytes()
|
/trusty/user/base/lib/hwwsk/rust/src/ |
D | lib.rs | 85 fn deserialize(bytes: &[u8], handles: &mut [Option<Handle>]) -> Result<Self, Self::Error> { in deserialize() 87 if bytes.len() < header_size { in deserialize() 95 let hdr = unsafe { &*(bytes.as_ptr() as *const hwwsk_req_hdr) }; in deserialize() 101 GenerateKeyReq::deserialize(&bytes[header_size..], handles)?, in deserialize() 104 Ok(HwWskCmd::Export(ExportKeyReq::deserialize(&bytes[header_size..], handles)?)) in deserialize() 145 fn deserialize(bytes: &[u8], _handles: &mut [Option<Handle>]) -> Result<Self, Self::Error> { in deserialize() 147 if bytes.len() < header_size { in deserialize() 156 unsafe { &*(bytes.as_ptr() as *const hwwsk_generate_key_req) }; in deserialize() 160 raw_key: Vec::try_alloc_from(&bytes[header_size..])?, in deserialize() 184 fn deserialize(bytes: &[u8], _handles: &mut [Option<Handle>]) -> Result<Self, Self::Error> { in deserialize() [all …]
|
/trusty/user/app/sample/rust-hello-world/ |
D | lib.rs | 65 fn deserialize(bytes: &[u8], _handles: &mut [Option<Handle>]) -> Result<Self, TipcError> { in deserialize() 66 if bytes.len() < 2 { in deserialize() 69 } else if bytes.len() - MESSAGE_OFFSET != bytes[1].into() { in deserialize() 75 tag: Tag::from(bytes[0]), in deserialize() 76 length: bytes[1], in deserialize() 77 message: bytes[MESSAGE_OFFSET..].to_vec(), in deserialize()
|
/trusty/user/base/lib/trusty-std/src/ffi/ |
D | c_str.rs | 151 let bytes = SpecIntoVec::into_vec(t)?; in try_new() localVariable 152 match memchr::memchr(0, &bytes) { in try_new() 153 Some(i) => Err(TryNewError::NulError(i, bytes)), in try_new() 154 None => Ok(unsafe { CString::try_from_vec_unchecked(bytes)? }), in try_new()
|
/trusty/user/base/lib/hwkey/rust/src/ |
D | lib.rs | 586 fn deserialize(bytes: &[u8], _handles: &mut [Option<Handle>]) -> Result<Self, Self::Error> { in deserialize() 588 if bytes.len() < header_size { in deserialize() 596 let msg = unsafe { &*(bytes.as_ptr() as *const hwkey_msg) }; in deserialize() 598 let response_payload = Vec::try_alloc_from(&bytes[header_size..])?; in deserialize() 623 fn deserialize(bytes: &[u8], _handles: &mut [Option<Handle>]) -> Result<Self, Self::Error> { in deserialize() 625 if bytes.len() < header_size { in deserialize() 632 let msg = unsafe { &*(bytes.as_ptr() as *const hwkey_derive_versioned_msg) }; in deserialize() 635 if bytes.len() - header_size != msg.key_len as usize { in deserialize() 638 bytes.len() - header_size, in deserialize() 644 let response_payload = Vec::try_alloc_from(&bytes[header_size..])?; in deserialize()
|
/trusty/user/base/lib/system_state/rust/src/ |
D | lib.rs | 182 fn deserialize(bytes: &[u8], _handles: &mut [Option<Handle>]) -> Result<Self, Self::Error> { in deserialize() 183 if bytes.len() < mem::size_of::<system_state_resp>() { in deserialize() 190 let header = unsafe { &*(bytes.as_ptr() as *const system_state_resp) }; in deserialize() 193 if bytes.len() in deserialize()
|
/trusty/user/app/sample/binder-test/client/ |
D | main.cpp | 207 std::vector<uint8_t> bytes{uint8_t{255}, uint8_t{0}, uint8_t{127}}; in TEST_F() local 208 CHECK_REVERSE(ReverseByte, bytes); in TEST_F() 237 std::vector<ByteEnum> bytes{ByteEnum::BAR, ByteEnum::FOO, ByteEnum::BAZ}; in TEST_F() local 238 CHECK_REVERSE(ReverseByteEnum, bytes); in TEST_F() 242 std::vector<ByteEnum> bytes{std::begin(android::enum_range<ByteEnum>()), in TEST_F() local 244 CHECK_REVERSE(ReverseByteEnum, bytes); in TEST_F()
|
/trusty/user/base/lib/dlmalloc/ |
D | dlmalloc.c | 1019 DLMALLOC_EXPORT size_t dlmalloc_set_footprint_limit(size_t bytes); 1328 DLMALLOC_EXPORT void* mspace_malloc(mspace msp, size_t bytes); 1361 DLMALLOC_EXPORT void* mspace_memalign(mspace msp, size_t alignment, size_t bytes); 4556 void* dlmalloc(size_t bytes) { in dlmalloc() argument 4587 if (bytes <= MAX_SMALL_REQUEST) { in dlmalloc() 4590 nb = (bytes < MIN_REQUEST)? MIN_CHUNK_SIZE : pad_request(bytes); in dlmalloc() 4640 else if (bytes >= MAX_REQUEST) in dlmalloc() 4643 nb = pad_request(bytes); in dlmalloc() 4687 return hwasan_tag_memory(mem, bytes); in dlmalloc() 4910 static void* internal_memalign(mstate m, size_t alignment, size_t bytes) { in internal_memalign() argument [all …]
|
/trusty/user/base/lib/keymaster/test/ |
D | keymaster_test.c | 87 static uint64_t calculate_checksum(void* bytes, size_t len) { in calculate_checksum() argument 92 memcpy(&tmp, bytes + i, sizeof(tmp)); in calculate_checksum()
|
/trusty/user/app/sample/memref-test/rust/ |
D | memref_test.rs | 178 fn deserialize(bytes: &[u8], _handles: &mut [Option<Handle>]) -> Result<Self, Self::Error> { in deserialize() 179 Ok(ReadResponse { value: bytes[0] }) in deserialize()
|
/trusty/user/app/storage/test/storage-unittest-aidl/unittests/ |
D | helpers.rs | 88 let bytes = pattern.to_ne_bytes(); in fill_pattern32() localVariable 90 chunk[i] = bytes[i]; in fill_pattern32()
|
/trusty/user/base/lib/hwbcc/rust/src/ |
D | lib.rs | 161 fn deserialize(bytes: &[u8], handles: &mut [Option<Handle>]) -> Result<Self, Self::Error> { in deserialize() 170 if bytes.len() < header_size { in deserialize() 178 let (header, payload) = bytes.split_at(header_size); in deserialize()
|
/trusty/user/base/lib/apploader_package/include/apploader/ |
D | cbor.h | 448 size_t bytes() const { return mBytes; } in bytes() function 476 countBytes(enc.bytes()); in countBytes() 512 if (ensureCapacity(enc.bytes())) { in encodeTag() 529 if (ensureCapacity(enc.bytes())) { in encodeArray() 546 if (ensureCapacity(enc.bytes())) { in encodeMap()
|
/trusty/user/app/secretkeeper/ |
D | lib.rs | 72 fn deserialize(bytes: &[u8], _handles: &mut [Option<Handle>]) -> tipc::Result<Self> { in deserialize() 73 Ok(SkMessage(Vec::try_alloc_from(bytes)?)) in deserialize()
|
/trusty/host/common/scripts/metrics_atoms_protoc_plugin/ |
D | metrics_atoms_protoc_plugin.py | 359 def process_data(data: bytes, pkg: str = '') -> None: argument
|
/trusty/device/arm/generic-arm64/project/qemu/ |
D | qemu.py | 487 return bytes()
|