HomeSort by relevance Sort by last modified time
    Searched defs:key_data (Results 1 - 25 of 36) sorted by null

1 2

  /external/chromium_org/crypto/
symmetric_key_openssl.cc 35 uint8* key_data = local
38 int rv = RAND_bytes(key_data, static_cast<int>(key_size_in_bytes));
57 uint8* key_data = local
63 key_data);
hmac_win.cc 140 BYTE key_data[1]; member in struct:crypto::KeyBlob
142 size_t key_blob_size = std::max(offsetof(KeyBlob, key_data) + key_length,
151 memcpy(key_blob->key_data, key, key_length);
161 SecureZeroMemory(key_blob->key_data, key_length);
  /external/chromium_org/chrome/browser/extensions/api/networking_private/
networking_private_credentials_getter_mac.cc 50 std::string key_data; local
52 wifi_service->GetKeyFromSystem(network_guid, &key_data, &error);
62 if (!crypto.EncryptByteString(public_key_data, key_data, &ciphertext)) {
  /external/chromium_org/native_client_sdk/src/tests/nacl_io_test/fake_ppapi/
fake_var_dictionary_interface.cc 31 FakeVarData* key_data = manager_->GetVarData(key); local
33 EXPECT_NE(static_cast<FakeVarData*>(NULL), key_data); local
34 const std::string& key_string = key_data->string_value;
49 FakeVarData* key_data = manager_->GetVarData(key); local
51 EXPECT_NE(static_cast<FakeVarData*>(NULL), key_data); local
53 const std::string& key_string = key_data->string_value;
63 FakeVarData* key_data = manager_->GetVarData(key); local
65 EXPECT_NE(static_cast<FakeVarData*>(NULL), key_data); local
67 const std::string& key_string = key_data->string_value;
78 FakeVarData* key_data = manager_->GetVarData(key) local
80 EXPECT_NE(static_cast<FakeVarData*>(NULL), key_data); local
    [all...]
  /external/chromium_org/net/cert/
ct_log_verifier_nss.cc 73 SECItem key_data; local
77 key_data.data = reinterpret_cast<unsigned char*>(
79 key_data.len = public_key.size();
82 SECKEY_DecodeDERSubjectPublicKeyInfo(&key_data);
  /hardware/intel/img/psb_headers/DRM/cc54/inc/
wv_fkp.h 48 uint8_t key_data[KEYBOX_KEYDATA_SIZE]; // 72 bytes member in struct:wv_keybox
wv_mod_oem_crypto.h 40 const uint8_t *key_data; member in struct:drm_wv_mod_key_object
  /external/chromium_org/chrome/browser/net/
sqlite_server_bound_cert_store_unittest.cc 167 std::string key_data; local
169 ReadTestKeyAndCert(&key_data, &cert_data);
188 add_smt.BindBlob(1, key_data.data(), key_data.size());
235 std::string key_data; local
237 ReadTestKeyAndCert(&key_data, &cert_data);
259 add_smt.BindBlob(1, key_data.data(), key_data.size());
287 ASSERT_EQ(key_data, certs[0]->private_key());
319 std::string key_data; local
407 std::string key_data; local
    [all...]
  /external/chromium_org/net/http/
des.cc 184 BYTE key_data[8]; member in struct:net::KeyBlob
192 memcpy(key_blob.key_data, key, 8);
199 SecureZeroMemory(key_blob.key_data, sizeof key_blob.key_data);
  /external/chromium_org/net/quic/crypto/
p256_key_exchange_nss.cc 215 SECItem* key_data = PK11_GetKeyData(premaster_secret.get()); local
216 if (!key_data || !key_data->data || key_data->len != kP256FieldBytes) {
221 out_result->assign(reinterpret_cast<char*>(key_data->data), key_data->len);
  /system/keymaster/
key_blob_test.cpp 43 const uint8_t key_data[5] = {21, 22, 23, 24, 25}; member in namespace:keymaster::test
49 key_.key_material = const_cast<uint8_t*>(key_data);
50 key_.key_material_size = array_size(key_data);
88 // key_data shouldn't be anywhere in the blob.
91 EXPECT_EQ(end, std::search(begin, end, key_data, key_data + array_size(key_data)));
97 EXPECT_EQ(0, memcmp(deserialized.key_material(), key_data, array_size(key_data)));
131 EXPECT_NE(0, memcmp(deserialized.key_material(), key_data, array_size(key_data)))
    [all...]
google_keymaster.cpp 281 response->key_data = out_key.release();
290 UniquePtr<Key> key(Key::ImportKey(request.key_description, request.key_format, request.key_data,
323 keymaster_key_blob_t key_data = {key_material.get(), key_material_size}; local
325 new KeyBlob(*enforced, *unenforced, hidden_auths, key_data, MasterKey(), nonce));
  /external/chromium_org/chrome/installer/util/
registry_key_backup.cc 283 scoped_ptr<KeyData> key_data; local
288 key_data.reset(new KeyData());
289 if (!key_data->Initialize(key)) {
299 key_data_.swap(key_data);
  /external/chromium_org/components/policy/core/common/cloud/
user_cloud_policy_store_unittest.cc 492 std::string key_data; local
494 ASSERT_TRUE(base::ReadFileToString(key_file(), &key_data));
495 ASSERT_TRUE(key.ParseFromString(key_data));
497 key.SerializeToString(&key_data);
498 WriteStringToFile(key_file(), key_data); local
521 std::string key_data; local
523 ASSERT_TRUE(base::ReadFileToString(key_file(), &key_data));
524 ASSERT_TRUE(key.ParseFromString(key_data));
526 key.SerializeToString(&key_data);
527 WriteStringToFile(key_file(), key_data); local
    [all...]
user_cloud_policy_store.cc 142 std::string key_data; local
143 if (!key_info.SerializeToString(&key_data)) {
148 WriteStringToFile(key_path, key_data);
  /external/chromium_org/components/wifi/
wifi_test.cc 217 std::string key_data; local
218 wifi_service_->GetKeyFromSystem(network_guid, &key_data, &error);
219 VLOG(0) << key_data << error;
  /external/wpa_supplicant_8/src/eap_peer/
eap_tls.c 23 u8 *key_data; member in struct:eap_tls_data
130 if (data->key_data) {
131 bin_clear_free(data->key_data, EAP_TLS_KEY_LEN + EAP_EMSK_LEN);
132 data->key_data = NULL;
194 data->key_data = eap_peer_tls_derive_key(sm, &data->ssl,
198 if (data->key_data) {
200 data->key_data, EAP_TLS_KEY_LEN);
202 data->key_data + EAP_TLS_KEY_LEN,
301 return data->key_data != NULL;
310 if (data->key_data == NULL
    [all...]
eap_peap.c 57 u8 *key_data; member in struct:eap_peap_data
175 if (data->key_data) {
176 bin_clear_free(data->key_data, EAP_TLS_KEY_LEN);
177 data->key_data = NULL;
264 tk = data->key_data;
1031 data->key_data =
1034 if (data->key_data) {
1037 data->key_data,
    [all...]
  /external/chromium_org/chrome/utility/
chrome_content_utility_client.cc 527 std::string key_data; local
529 wifi_service->GetKeyFromSystem(network_guid, &key_data, &error);
532 bool success = error.empty() && !key_data.empty();
535 success = crypto.EncryptByteString(public_key, key_data, &ciphertext);
  /external/chromium_org/third_party/leveldatabase/src/util/
cache.cc 35 char key_data[1]; // Beginning of key member in struct:leveldb::__anon16116::LRUHandle
43 return Slice(key_data, key_length);
238 memcpy(e->key_data, key.data(), key.size());
  /external/chromium_org/chrome/browser/extensions/api/input_ime/
input_ime_api.cc 86 void CallbackKeyEventHandle(chromeos::input_method::KeyEventHandle* key_data,
89 reinterpret_cast<base::Callback<void(bool consumed)>*>(key_data);
182 chromeos::input_method::KeyEventHandle* key_data) OVERRIDE {
191 CallbackKeyEventHandle(key_data, false);
199 ime_event_router->AddRequest(engine_id, key_data);
438 chromeos::input_method::KeyEventHandle* key_data = request->second.second; local
441 CallbackKeyEventHandle(key_data, handled);
446 chromeos::input_method::KeyEventHandle* key_data) {
450 request_map_[request_id] = std::make_pair(engine_id, key_data);
566 const std::vector<linked_ptr<input_ime::KeyboardEvent> >& key_data local
    [all...]
  /external/chromium_org/third_party/openssl/openssl/crypto/des/
destest.c 92 static unsigned char key_data[NUM_TESTS][8]={ variable
411 DES_set_key_unchecked(&key_data[i],&ks);
421 i+1,pt(key_data[i]),pt(in),pt(cipher_data[i]),
428 i+1,pt(key_data[i]),pt(out),pt(in),pt(outin));
437 DES_set_key_unchecked(&key_data[i],&ks);
438 DES_set_key_unchecked(&key_data[i+1],&ks2);
439 DES_set_key_unchecked(&key_data[i+2],&ks3);
449 i+1,pt(key_data[i]),pt(in),pt(cipher_ecb2[i]),
456 i+1,pt(key_data[i]),pt(out),pt(in),pt(outin));
  /external/openssl/crypto/des/
destest.c 92 static unsigned char key_data[NUM_TESTS][8]={ variable
411 DES_set_key_unchecked(&key_data[i],&ks);
421 i+1,pt(key_data[i]),pt(in),pt(cipher_data[i]),
428 i+1,pt(key_data[i]),pt(out),pt(in),pt(outin));
437 DES_set_key_unchecked(&key_data[i],&ks);
438 DES_set_key_unchecked(&key_data[i+1],&ks2);
439 DES_set_key_unchecked(&key_data[i+2],&ks3);
449 i+1,pt(key_data[i]),pt(in),pt(cipher_ecb2[i]),
456 i+1,pt(key_data[i]),pt(out),pt(in),pt(outin));
  /system/keymaster/include/keymaster/
google_keymaster_messages.h 230 ImportKeyRequest() : key_data(NULL) {}
231 ~ImportKeyRequest() { delete[] key_data; }
241 uint8_t* key_data; member in struct:keymaster::ImportKeyRequest
282 ExportKeyResponse() : key_data(NULL) {}
283 ~ExportKeyResponse() { delete[] key_data; }
291 uint8_t* key_data; member in struct:keymaster::ExportKeyResponse
  /external/chromium_org/content/child/webcrypto/
webcrypto_impl.cc 235 const unsigned char* key_data,
243 key_data(key_data, key_data + key_data_size),
250 const std::vector<uint8> key_data; member in struct:content::__anon11822::ImportKeyState
458 webcrypto::CryptoData(state->key_data),
650 const unsigned char* key_data,
657 key_data,
755 const unsigned char* key_data,
765 webcrypto::CryptoData(key_data, key_data_size)
    [all...]

Completed in 987 milliseconds

1 2