/external/chromium_org/crypto/ |
symmetric_key_openssl.cc | 35 uint8* key_data = local 38 int rv = RAND_bytes(key_data, static_cast<int>(key_size_in_bytes)); 57 uint8* key_data = local 63 key_data);
|
hmac_win.cc | 140 BYTE key_data[1]; member in struct:crypto::KeyBlob 142 size_t key_blob_size = std::max(offsetof(KeyBlob, key_data) + key_length, 151 memcpy(key_blob->key_data, key, key_length); 161 SecureZeroMemory(key_blob->key_data, key_length);
|
/external/chromium_org/chrome/browser/extensions/api/networking_private/ |
networking_private_credentials_getter_mac.cc | 50 std::string key_data; local 52 wifi_service->GetKeyFromSystem(network_guid, &key_data, &error); 62 if (!crypto.EncryptByteString(public_key_data, key_data, &ciphertext)) {
|
/external/chromium_org/native_client_sdk/src/tests/nacl_io_test/fake_ppapi/ |
fake_var_dictionary_interface.cc | 31 FakeVarData* key_data = manager_->GetVarData(key); local 33 EXPECT_NE(static_cast<FakeVarData*>(NULL), key_data); local 34 const std::string& key_string = key_data->string_value; 49 FakeVarData* key_data = manager_->GetVarData(key); local 51 EXPECT_NE(static_cast<FakeVarData*>(NULL), key_data); local 53 const std::string& key_string = key_data->string_value; 63 FakeVarData* key_data = manager_->GetVarData(key); local 65 EXPECT_NE(static_cast<FakeVarData*>(NULL), key_data); local 67 const std::string& key_string = key_data->string_value; 78 FakeVarData* key_data = manager_->GetVarData(key) local 80 EXPECT_NE(static_cast<FakeVarData*>(NULL), key_data); local [all...] |
/external/chromium_org/net/cert/ |
ct_log_verifier_nss.cc | 73 SECItem key_data; local 77 key_data.data = reinterpret_cast<unsigned char*>( 79 key_data.len = public_key.size(); 82 SECKEY_DecodeDERSubjectPublicKeyInfo(&key_data);
|
/hardware/intel/img/psb_headers/DRM/cc54/inc/ |
wv_fkp.h | 48 uint8_t key_data[KEYBOX_KEYDATA_SIZE]; // 72 bytes member in struct:wv_keybox
|
wv_mod_oem_crypto.h | 40 const uint8_t *key_data; member in struct:drm_wv_mod_key_object
|
/external/chromium_org/chrome/browser/net/ |
sqlite_server_bound_cert_store_unittest.cc | 167 std::string key_data; local 169 ReadTestKeyAndCert(&key_data, &cert_data); 188 add_smt.BindBlob(1, key_data.data(), key_data.size()); 235 std::string key_data; local 237 ReadTestKeyAndCert(&key_data, &cert_data); 259 add_smt.BindBlob(1, key_data.data(), key_data.size()); 287 ASSERT_EQ(key_data, certs[0]->private_key()); 319 std::string key_data; local 407 std::string key_data; local [all...] |
/external/chromium_org/net/http/ |
des.cc | 184 BYTE key_data[8]; member in struct:net::KeyBlob 192 memcpy(key_blob.key_data, key, 8); 199 SecureZeroMemory(key_blob.key_data, sizeof key_blob.key_data);
|
/external/chromium_org/net/quic/crypto/ |
p256_key_exchange_nss.cc | 215 SECItem* key_data = PK11_GetKeyData(premaster_secret.get()); local 216 if (!key_data || !key_data->data || key_data->len != kP256FieldBytes) { 221 out_result->assign(reinterpret_cast<char*>(key_data->data), key_data->len);
|
/system/keymaster/ |
key_blob_test.cpp | 43 const uint8_t key_data[5] = {21, 22, 23, 24, 25}; member in namespace:keymaster::test 49 key_.key_material = const_cast<uint8_t*>(key_data); 50 key_.key_material_size = array_size(key_data); 88 // key_data shouldn't be anywhere in the blob. 91 EXPECT_EQ(end, std::search(begin, end, key_data, key_data + array_size(key_data))); 97 EXPECT_EQ(0, memcmp(deserialized.key_material(), key_data, array_size(key_data))); 131 EXPECT_NE(0, memcmp(deserialized.key_material(), key_data, array_size(key_data))) [all...] |
google_keymaster.cpp | 281 response->key_data = out_key.release(); 290 UniquePtr<Key> key(Key::ImportKey(request.key_description, request.key_format, request.key_data, 323 keymaster_key_blob_t key_data = {key_material.get(), key_material_size}; local 325 new KeyBlob(*enforced, *unenforced, hidden_auths, key_data, MasterKey(), nonce));
|
/external/chromium_org/chrome/installer/util/ |
registry_key_backup.cc | 283 scoped_ptr<KeyData> key_data; local 288 key_data.reset(new KeyData()); 289 if (!key_data->Initialize(key)) { 299 key_data_.swap(key_data);
|
/external/chromium_org/components/policy/core/common/cloud/ |
user_cloud_policy_store_unittest.cc | 492 std::string key_data; local 494 ASSERT_TRUE(base::ReadFileToString(key_file(), &key_data)); 495 ASSERT_TRUE(key.ParseFromString(key_data)); 497 key.SerializeToString(&key_data); 498 WriteStringToFile(key_file(), key_data); local 521 std::string key_data; local 523 ASSERT_TRUE(base::ReadFileToString(key_file(), &key_data)); 524 ASSERT_TRUE(key.ParseFromString(key_data)); 526 key.SerializeToString(&key_data); 527 WriteStringToFile(key_file(), key_data); local [all...] |
user_cloud_policy_store.cc | 142 std::string key_data; local 143 if (!key_info.SerializeToString(&key_data)) { 148 WriteStringToFile(key_path, key_data);
|
/external/chromium_org/components/wifi/ |
wifi_test.cc | 217 std::string key_data; local 218 wifi_service_->GetKeyFromSystem(network_guid, &key_data, &error); 219 VLOG(0) << key_data << error;
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_tls.c | 23 u8 *key_data; member in struct:eap_tls_data 130 if (data->key_data) { 131 bin_clear_free(data->key_data, EAP_TLS_KEY_LEN + EAP_EMSK_LEN); 132 data->key_data = NULL; 194 data->key_data = eap_peer_tls_derive_key(sm, &data->ssl, 198 if (data->key_data) { 200 data->key_data, EAP_TLS_KEY_LEN); 202 data->key_data + EAP_TLS_KEY_LEN, 301 return data->key_data != NULL; 310 if (data->key_data == NULL [all...] |
eap_peap.c | 57 u8 *key_data; member in struct:eap_peap_data 175 if (data->key_data) { 176 bin_clear_free(data->key_data, EAP_TLS_KEY_LEN); 177 data->key_data = NULL; 264 tk = data->key_data; 1031 data->key_data = 1034 if (data->key_data) { 1037 data->key_data, [all...] |
/external/chromium_org/chrome/utility/ |
chrome_content_utility_client.cc | 527 std::string key_data; local 529 wifi_service->GetKeyFromSystem(network_guid, &key_data, &error); 532 bool success = error.empty() && !key_data.empty(); 535 success = crypto.EncryptByteString(public_key, key_data, &ciphertext);
|
/external/chromium_org/third_party/leveldatabase/src/util/ |
cache.cc | 35 char key_data[1]; // Beginning of key member in struct:leveldb::__anon16116::LRUHandle 43 return Slice(key_data, key_length); 238 memcpy(e->key_data, key.data(), key.size());
|
/external/chromium_org/chrome/browser/extensions/api/input_ime/ |
input_ime_api.cc | 86 void CallbackKeyEventHandle(chromeos::input_method::KeyEventHandle* key_data, 89 reinterpret_cast<base::Callback<void(bool consumed)>*>(key_data); 182 chromeos::input_method::KeyEventHandle* key_data) OVERRIDE { 191 CallbackKeyEventHandle(key_data, false); 199 ime_event_router->AddRequest(engine_id, key_data); 438 chromeos::input_method::KeyEventHandle* key_data = request->second.second; local 441 CallbackKeyEventHandle(key_data, handled); 446 chromeos::input_method::KeyEventHandle* key_data) { 450 request_map_[request_id] = std::make_pair(engine_id, key_data); 566 const std::vector<linked_ptr<input_ime::KeyboardEvent> >& key_data local [all...] |
/external/chromium_org/third_party/openssl/openssl/crypto/des/ |
destest.c | 92 static unsigned char key_data[NUM_TESTS][8]={ variable 411 DES_set_key_unchecked(&key_data[i],&ks); 421 i+1,pt(key_data[i]),pt(in),pt(cipher_data[i]), 428 i+1,pt(key_data[i]),pt(out),pt(in),pt(outin)); 437 DES_set_key_unchecked(&key_data[i],&ks); 438 DES_set_key_unchecked(&key_data[i+1],&ks2); 439 DES_set_key_unchecked(&key_data[i+2],&ks3); 449 i+1,pt(key_data[i]),pt(in),pt(cipher_ecb2[i]), 456 i+1,pt(key_data[i]),pt(out),pt(in),pt(outin));
|
/external/openssl/crypto/des/ |
destest.c | 92 static unsigned char key_data[NUM_TESTS][8]={ variable 411 DES_set_key_unchecked(&key_data[i],&ks); 421 i+1,pt(key_data[i]),pt(in),pt(cipher_data[i]), 428 i+1,pt(key_data[i]),pt(out),pt(in),pt(outin)); 437 DES_set_key_unchecked(&key_data[i],&ks); 438 DES_set_key_unchecked(&key_data[i+1],&ks2); 439 DES_set_key_unchecked(&key_data[i+2],&ks3); 449 i+1,pt(key_data[i]),pt(in),pt(cipher_ecb2[i]), 456 i+1,pt(key_data[i]),pt(out),pt(in),pt(outin));
|
/system/keymaster/include/keymaster/ |
google_keymaster_messages.h | 230 ImportKeyRequest() : key_data(NULL) {} 231 ~ImportKeyRequest() { delete[] key_data; } 241 uint8_t* key_data; member in struct:keymaster::ImportKeyRequest 282 ExportKeyResponse() : key_data(NULL) {} 283 ~ExportKeyResponse() { delete[] key_data; } 291 uint8_t* key_data; member in struct:keymaster::ExportKeyResponse
|
/external/chromium_org/content/child/webcrypto/ |
webcrypto_impl.cc | 235 const unsigned char* key_data, 243 key_data(key_data, key_data + key_data_size), 250 const std::vector<uint8> key_data; member in struct:content::__anon11822::ImportKeyState 458 webcrypto::CryptoData(state->key_data), 650 const unsigned char* key_data, 657 key_data, 755 const unsigned char* key_data, 765 webcrypto::CryptoData(key_data, key_data_size) [all...] |