/external/chromium_org/crypto/ |
signature_creator_unittest.cc | 30 std::vector<uint8> key_info; local 31 key_original->ExportPrivateKey(&key_info); 33 crypto::RSAPrivateKey::CreateFromPrivateKeyInfo(key_info)); 67 std::vector<uint8> key_info; local 68 key_original->ExportPrivateKey(&key_info); 70 crypto::RSAPrivateKey::CreateFromPrivateKeyInfo(key_info));
|
ec_signature_creator_unittest.cc | 24 std::vector<uint8> key_info; local 26 key_original->ExportEncryptedPrivateKey(std::string(), 1000, &key_info)); 32 std::string(), key_info, pubkey_info));
|
/external/wpa_supplicant_8/src/rsn_supp/ |
peerkey.h | 45 struct wpa_eapol_key *key, u16 key_info, u16 ver); 48 u16 key_info, u16 ver); 64 struct wpa_eapol_key *key, u16 key_info, u16 ver) 71 u16 key_info, u16 ver)
|
wpa.c | 89 int key_info, ver; local 112 key_info = WPA_KEY_INFO_REQUEST | ver; 114 key_info |= WPA_KEY_INFO_MIC; 116 key_info |= WPA_KEY_INFO_ERROR; 118 key_info |= WPA_KEY_INFO_KEY_TYPE; 119 WPA_PUT_BE16(reply->key_info, key_info); 132 rbuf, rlen, key_info & WPA_KEY_INFO_MIC ? 330 WPA_PUT_BE16(reply->key_info, 663 int key_info) 1037 u16 key_info, keylen, len; local 1311 u16 key_info, keydatalen; local 1498 u16 key_info = WPA_GET_BE16(key->key_info); local 1552 u16 key_info, ver; local [all...] |
peerkey.c | 71 u16 key_info; local 84 key_info = ver | WPA_KEY_INFO_SMK_MESSAGE | WPA_KEY_INFO_MIC | 87 WPA_PUT_BE16(err->key_info, key_info); 131 u16 key_info; local 145 key_info = ver | WPA_KEY_INFO_SMK_MESSAGE | WPA_KEY_INFO_MIC | 147 WPA_PUT_BE16(reply->key_info, key_info); 329 u16 key_info, ver; local 346 key_info = ver | WPA_KEY_INFO_KEY_TYPE | WPA_KEY_INFO_ACK 386 u16 key_info, ver; local 994 int key_info, ver; local [all...] |
wpa_i.h | 311 u16 ver, u16 key_info,
|
/external/chromium/crypto/ |
signature_creator_unittest.cc | 18 std::vector<uint8> key_info; local 19 key_original->ExportPrivateKey(&key_info); 21 crypto::RSAPrivateKey::CreateFromPrivateKeyInfo(key_info));
|
rsa_private_key_win.cc | 197 scoped_array<uint8> key_info(new uint8[key_info_len]); 200 reinterpret_cast<CERT_PUBLIC_KEY_INFO*>(key_info.get()), &key_info_len)) { 208 reinterpret_cast<CERT_PUBLIC_KEY_INFO*>(key_info.get()), NULL, 217 reinterpret_cast<CERT_PUBLIC_KEY_INFO*>(key_info.get()), encoded.get(),
|
/external/chromium_org/chrome/browser/devtools/adb/ |
android_rsa.cc | 189 std::vector<uint8> key_info(decoded_key.begin(), decoded_key.end()); 190 key.reset(crypto::RSAPrivateKey::CreateFromPrivateKeyInfo(key_info)); 194 std::vector<uint8> key_info; local 195 if (!key || !key->ExportPrivateKey(&key_info)) 198 std::string key_string(key_info.begin(), key_info.end());
|
/external/wpa_supplicant_8/src/ap/ |
wpa_auth.c | 751 u16 key_info, key_data_length; local 768 key_info = WPA_GET_BE16(key->key_info); 771 " key_info=0x%x type=%u key_data_length=%u", 772 MAC2STR(sm->addr), key_info, key->type, key_data_length); 813 if ((key_info & (WPA_KEY_INFO_SMK_MESSAGE | WPA_KEY_INFO_REQUEST)) == 815 if (key_info & WPA_KEY_INFO_ERROR) { 822 } else if (key_info & WPA_KEY_INFO_SMK_MESSAGE) { 825 } else if (key_info & WPA_KEY_INFO_REQUEST) { 828 } else if (!(key_info & WPA_KEY_INFO_KEY_TYPE)) 1411 u16 key_info; local [all...] |
wpa_auth_i.h | 197 struct wpa_state_machine *sm, int key_info,
|
/hardware/broadcom/wlan/bcmdhd/dhdutil/include/proto/ |
eapol.h | 107 unsigned short key_info; /* Key Information (unaligned) */ member in struct:__anon33570 121 /* WPA/802.11i/WPA2 KEY KEY_INFO bits */ 135 /* WPA-only KEY KEY_INFO bits */ 143 /* 802.11i/WPA2-only KEY KEY_INFO bits */
|
802.11.h | 1981 uint16 key_info; member in struct:dot11_wnm_sleep_subelem_gtk 3337 uint16 key_info; member in struct:dot11_gtk_ie [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
ibss_rsn.c | 707 u16 key_info; local 740 key_info = WPA_GET_BE16(key->key_info); 742 return !!(key_info & WPA_KEY_INFO_ACK);
|
/external/wpa_supplicant_8/src/common/ |
wpa_common.h | 166 /* Note: key_info, key_length, and key_data_length are unaligned */ 167 u8 key_info[2]; /* big endian */ member in struct:wpa_eapol_key
|