/hardware/samsung_slsi/exynos5/libkeymaster/ |
tlTeeKeymaster_Api.h | 85 uint32_t keydata; /**< Key data buffer passed by TLC */ member in struct:__anon19448 95 uint32_t keydata; /**< Key data buffer */ member in struct:__anon19449 109 uint32_t keydata; /**< Key data buffer */ member in struct:__anon19450 128 uint32_t keydata; /**< Key data buffer passed by TLC */ member in struct:__anon19451 138 uint32_t keydata; /**< Key data buffer */ member in struct:__anon19452 152 uint32_t keydata; /**< Key data buffer */ member in struct:__anon19453 202 uint32_t keydata; /**< Key data buffer */ member in struct:__anon19458 214 uint32_t keydata; /**< Key data buffer */ member in struct:__anon19459
|
tlcTeeKeymaster_if.c | 147 * @param keyData [in] Pointer to the key data buffer 155 uint8_t* keyData, 177 mcRet = mcMap(&sessionHandle, keyData, keyDataLength, &mapInfo); 187 pTci->rsagenkey.keydata = (uint32_t)mapInfo.sVirtualAddr; 207 mcRet = mcUnmap(&sessionHandle, keyData, &mapInfo); 239 * @param keyData [in] Pointer to key data buffer 248 const uint8_t* keyData, 274 mcRet = mcMap(&sessionHandle, (void*)keyData, keyDataLength, &keyMapInfo); 294 pTci->rsasign.keydata = (uint32_t)keyMapInfo.sVirtualAddr; 321 mcRet = mcUnmap(&sessionHandle, (void*)keyData, &keyMapInfo) [all...] |
/hardware/samsung_slsi/exynos5/mobicore/common/MobiCore/inc/ |
mcContainer.h | 64 uint32_t keydata[MC_BYTES_TO_WORDS(MC_CONT_SYMMETRIC_KEY_SIZE)]; member in struct:__anon19732 68 uint32_t keydata[MC_BYTES_TO_WORDS(MC_CONT_PUBLIC_KEY_SIZE)]; member in struct:__anon19733
|
/external/qemu/distrib/sdl-1.2.15/src/video/x11/ |
SDL_x11events.c | 589 char *keydata = keybuf; local 596 count = Xutf8LookupString(SDL_IC, &xevent.xkey, keydata, sizeof(keybuf), &xkeysym, &status); 601 keydata = SDL_malloc(count); 602 if ( keydata == NULL ) { 606 count = Xutf8LookupString(SDL_IC, &xevent.xkey, keydata, count, &xkeysym, &status); 650 utf16length = Utf8ToUtf16((Uint8 *)keydata, count, utf16data, utf16size); 652 /* The keydata contained an invalid byte 717 if (keydata != NULL && keybuf != keydata) { 718 SDL_free(keydata); [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eapol_supp/ |
eapol_supp_sm.c | 649 struct eap_key_data keydata; local 681 res = eapol_sm_get_key(sm, (u8 *) &keydata, sizeof(keydata)); 689 res = eapol_sm_get_key(sm, (u8 *) &keydata, 16); 697 os_memcpy(keydata.sign_key, keydata.encr_key, 16); 721 hmac_md5(keydata.sign_key, sign_key_len, 742 os_memcpy(ekey + IEEE8021X_KEY_IV_LEN, keydata.encr_key, 760 os_memcpy(datakey, keydata.encr_key, key_len); [all...] |
/external/wpa_supplicant_8/src/eapol_supp/ |
eapol_supp_sm.c | 630 struct eap_key_data keydata; local 666 res = eapol_sm_get_key(sm, (u8 *) &keydata, sizeof(keydata)); 674 res = eapol_sm_get_key(sm, (u8 *) &keydata, 16); 682 os_memcpy(keydata.sign_key, keydata.encr_key, 16); 706 hmac_md5(keydata.sign_key, sign_key_len, 727 os_memcpy(ekey + IEEE8021X_KEY_IV_LEN, keydata.encr_key, 745 os_memcpy(datakey, keydata.encr_key, key_len); [all...] |
/external/kernel-headers/original/linux/spi/ |
cpcap.h | 701 void *keydata; member in struct:cpcap_device 713 cpcap->keydata = data; 718 return cpcap->keydata;
|
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
peerkey.c | 783 const u8 *keydata; local 793 keydata = (const u8 *) (key + 1); 795 wpa_hexdump(MSG_DEBUG, "RSN: msg 2/4 key data", keydata, len); 796 if (wpa_supplicant_parse_ies(keydata, len, &kde) < 0 || 832 const u8 *keydata; local 844 keydata = (const u8 *) (key + 1); 846 wpa_hexdump(MSG_DEBUG, "RSN: msg 3/4 key data", keydata, len); 847 if (wpa_supplicant_parse_ies(keydata, len, &kde) < 0) { [all...] |
wpa.c | 958 wpa_hexdump(MSG_DEBUG, "WPA: IE KeyData", pos, len); 1051 const u8 *keydata, 1059 wpa_hexdump(MSG_DEBUG, "RSN: msg 1/2 key data", keydata, keydatalen); 1060 wpa_supplicant_parse_ies(keydata, keydatalen, &ie); [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
peerkey.c | 783 const u8 *keydata; local 793 keydata = (const u8 *) (key + 1); 795 wpa_hexdump(MSG_DEBUG, "RSN: msg 2/4 key data", keydata, len); 796 if (wpa_supplicant_parse_ies(keydata, len, &kde) < 0 || 832 const u8 *keydata; local 844 keydata = (const u8 *) (key + 1); 846 wpa_hexdump(MSG_DEBUG, "RSN: msg 3/4 key data", keydata, len); 847 if (wpa_supplicant_parse_ies(keydata, len, &kde) < 0) { [all...] |
wpa.c | 1055 wpa_hexdump(MSG_DEBUG, "WPA: IE KeyData", pos, len); 1145 const u8 *keydata, 1153 wpa_hexdump(MSG_DEBUG, "RSN: msg 1/2 key data", keydata, keydatalen); 1154 if (wpa_supplicant_parse_ies(keydata, keydatalen, &ie) < 0) [all...] |