/external/chromium/crypto/ |
symmetric_key_openssl.cc | 35 uint8* key_data = local 38 int rv = RAND_bytes(key_data, key_size_in_bytes); 54 uint8* key_data = local 59 key_size_in_bytes, key_data);
|
hmac_win.cc | 128 BYTE key_data[1]; member in struct:crypto::KeyBlob 130 size_t key_blob_size = std::max(offsetof(KeyBlob, key_data) + key_length, 139 memcpy(key_blob->key_data, key, key_length); 149 SecureZeroMemory(key_blob->key_data, key_length);
|
symmetric_key.h | 81 SymmetricKey(const void* key_data, size_t key_size_in_bits); 85 const void* key_data, size_t key_size_in_bytes);
|
symmetric_key_mac.cc | 142 SymmetricKey::SymmetricKey(const void *key_data, size_t key_size_in_bits) 143 : key_(reinterpret_cast<const char*>(key_data),
|
symmetric_key_win.cc | 44 // Imports a raw/plaintext key of |key_size| stored in |*key_data| into a new 47 // If |key_data| is intended to be used as an HMAC key, then |alg| should be 53 const void* key_data, DWORD key_size, 60 memcpy(actual_key + sizeof(PlaintextBlobHeader), key_data, key_size); 528 const void* key_data, size_t key_size_in_bytes) 530 if (key_data) { 531 raw_key_.assign(reinterpret_cast<const char*>(key_data),
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_tls.c | 23 u8 *key_data; member in struct:eap_tls_data 107 os_free(data->key_data); 157 os_free(data->key_data); 158 data->key_data = eap_peer_tls_derive_key(sm, &data->ssl, 162 if (data->key_data) { 164 data->key_data, EAP_TLS_KEY_LEN); 166 data->key_data + EAP_TLS_KEY_LEN, 243 os_free(data->key_data); 244 data->key_data = NULL; 266 return data->key_data != NULL [all...] |
eap_peap.c | 58 u8 *key_data; member in struct:eap_peap_data 183 os_free(data->key_data); 256 tk = data->key_data; 1086 os_free(data->key_data); 1100 data->key_data = 1103 if (data->key_data) { 1106 data->key_data, [all...] |
eap_ttls.c | 56 u8 *key_data; member in struct:eap_ttls_data 144 os_free(data->key_data); 216 os_free(data->key_data); 217 data->key_data = eap_peer_tls_derive_key(sm, &data->ssl, 220 if (!data->key_data) { 226 data->key_data, EAP_TLS_KEY_LEN); [all...] |
eap_fast.c | 55 u8 key_data[EAP_FAST_KEY_LEN]; member in struct:eap_fast_data 251 eap_fast_derive_eap_msk(data->simck, data->key_data); [all...] |
/external/chromium/net/http/ |
des.cc | 184 BYTE key_data[8]; member in struct:net::KeyBlob 192 memcpy(key_blob.key_data, key, 8); 199 SecureZeroMemory(key_blob.key_data, sizeof key_blob.key_data);
|
/external/chromium/net/base/ |
keygen_handler_mac.cc | 134 CFDataRef key_data = NULL; 136 &key_data); 141 base::mac::ScopedCFTypeRef<CFDataRef> scoped_key_data(key_data); 155 CFDataGetLength(key_data) * 8; // interpreted as a _bit_ count 157 const_cast<uint8_t*>(CFDataGetBytePtr(key_data));
|
/external/chromium/chrome/browser/autofill/crypto/ |
rc4_decryptor.h | 61 void PrepareKey(const uint8 *key_data, int key_data_len) { 74 index2 = (key_data[index1] + state[counter] + index2) % kKeyDataSize;
|
/external/openssl/crypto/asn1/ |
x_pkey.c | 118 ret->key_data=NULL; 149 if ((x->key_data != NULL) && (x->key_free)) OPENSSL_free(x->key_data);
|
/external/chromium/net/socket/ |
dns_cert_provenance_checker.cc | 297 char key_data[SHA256_LENGTH]; local 298 HASH_HashBuf(HASH_AlgSHA256, reinterpret_cast<uint8*>(key_data), 302 DCHECK_GE(sizeof(key_data), kKeySizeInBytes + kIVSizeInBytes); 303 std::string raw_key(key_data, kKeySizeInBytes); 307 std::string iv(key_data + kKeySizeInBytes, kIVSizeInBytes);
|
/packages/apps/Gallery2/src/com/android/gallery3d/filtershow/crop/ |
CropExtras.java | 32 public static final String KEY_DATA = "data";
|
CropActivity.java | 455 mResultIntent.putExtra(CropExtras.KEY_DATA, ret);
|
/packages/apps/Gallery2/src/com/android/gallery3d/app/ |
StateManager.java | 40 private static final String KEY_DATA = "data"; 281 Bundle data = bundle.getBundle(KEY_DATA); 310 bundle.putBundle(KEY_DATA, entry.data);
|
/external/kernel-headers/original/linux/ |
loop.h | 54 void *key_data; member in struct:loop_device
|
/external/openssl/crypto/des/ |
destest.c | 92 static unsigned char key_data[NUM_TESTS][8]={ variable 411 DES_set_key_unchecked(&key_data[i],&ks); 421 i+1,pt(key_data[i]),pt(in),pt(cipher_data[i]), 428 i+1,pt(key_data[i]),pt(out),pt(in),pt(outin)); 437 DES_set_key_unchecked(&key_data[i],&ks); 438 DES_set_key_unchecked(&key_data[i+1],&ks2); 439 DES_set_key_unchecked(&key_data[i+2],&ks3); 449 i+1,pt(key_data[i]),pt(in),pt(cipher_ecb2[i]), 456 i+1,pt(key_data[i]),pt(out),pt(in),pt(outin));
|
/external/wpa_supplicant_8/src/common/ |
wpa_common.h | 176 /* followed by key_data_length bytes of key_data */
|
/external/openssl/crypto/x509/ |
x509.h | 501 char *key_data; member in struct:private_key_st 502 int key_free; /* true if we should auto free key_data */ [all...] |
/external/openssl/include/openssl/ |
x509.h | 501 char *key_data; member in struct:private_key_st 502 int key_free; /* true if we should auto free key_data */ [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
config.c | 52 int key_data; member in struct:parse_data 75 data->key_data ? "[KEY DATA REMOVED]" : value); 79 if (data->key_data) { [all...] |
/packages/apps/Gallery2/src/com/android/gallery3d/filtershow/ |
FilterShowActivity.java | [all...] |
/external/wpa_supplicant_8/src/ap/ |
ieee802_1x.c | 113 u8 *key_data, size_t key_len) 158 os_memcpy((u8 *) (key + 1), key_data, key_len); [all...] |