/system/keymaster/ |
google_keymaster_messages.cpp | 63 delete[] key_blob.key_material; 72 buf = append_size_and_data_to_buf(buf, end, key_blob.key_material, key_blob.key_material_size); 78 delete[] key_blob.key_material; 79 key_blob.key_material = NULL; 85 key_blob.key_material = deserialized_key_material.release(); 90 delete[] key_blob.key_material; 93 void GetKeyCharacteristicsRequest::SetKeyMaterial(const void* key_material, size_t length) { 94 delete[] key_blob.key_material; 95 key_blob.key_material = dup_buffer(key_material, length) [all...] |
google_softkeymaster.h | 40 blob.key_material = master_key_;
|
key_blob_test.cpp | 49 key_.key_material = const_cast<uint8_t*>(key_data); 51 master_key_.key_material = const_cast<uint8_t*>(master_key_data); 97 EXPECT_EQ(0, memcmp(deserialized.key_material(), key_data, array_size(key_data))); 131 EXPECT_NE(0, memcmp(deserialized.key_material(), key_data, array_size(key_data))); 151 EXPECT_NE(0, memcmp(deserialized.key_material(), key_data, array_size(key_data))); 174 EXPECT_NE(0, memcmp(deserialized.key_material(), key_data, array_size(key_data))); 184 wrong_master.key_material = wrong_master_data; 191 EXPECT_NE(0, memcmp(deserialized.key_material(), key_data, array_size(key_data)));
|
key.h | 44 virtual keymaster_error_t key_material(UniquePtr<uint8_t[]>*, size_t* size) const = 0;
|
google_keymaster_messages_test.cpp | 125 rsp.key_blob.key_material = dup_array(TEST_DATA); 138 rsp.key_blob.key_material = dup_array(TEST_DATA); 157 EXPECT_EQ(0, memcmp(deserialized->key_blob.key_material, "foo", 3)); 180 EXPECT_EQ(0, memcmp(deserialized->key_blob.key_material, "foo", 3)); 270 EXPECT_EQ(0, memcmp(msg.key_blob.key_material, deserialized->key_blob.key_material, 286 EXPECT_EQ(0, memcmp("foo", deserialized->key_blob.key_material, 3));
|
key_blob.cpp | 84 memcpy(key_material_.get(), key.key_material, key_material_length_); 97 const uint8_t* p = key.key_material; 98 if (!Deserialize(&p, key.key_material + key.key_material_size)) 154 int ae_err = ae_encrypt(ctx->get(), nonce_.get(), key_material(), key_material_length(), 221 if (AES_set_encrypt_key(master_key.key_material, master_key.key_material_size * 8, &aes_key) !=
|
google_keymaster.cpp | 314 UniquePtr<uint8_t[]> key_material; 316 error = key->key_material(&key_material, &key_material_size); 323 keymaster_key_blob_t key_data = {key_material.get(), key_material_size}; 338 keymaster_blob->key_material = blob_bytes.release();
|
asymmetric_key.cpp | 44 const uint8_t* key_material = blob.key_material(); local 45 if (d2i_PrivateKey(evp_key_type(), &tmp_pkey, &key_material, blob.key_material_length()) == 55 keymaster_error_t AsymmetricKey::key_material(UniquePtr<uint8_t[]>* material, size_t* size) const { function in class:keymaster::AsymmetricKey
|
asymmetric_key.h | 38 virtual keymaster_error_t key_material(UniquePtr<uint8_t[]>* material, size_t* size) const;
|
/system/keymaster/include/keymaster/ |
google_keymaster_messages.h | 121 key_blob.key_material = NULL; 136 GetKeyCharacteristicsRequest() { key_blob.key_material = NULL; } 139 void SetKeyMaterial(const void* key_material, size_t length); 141 SetKeyMaterial(blob.key_material, blob.key_material_size); 162 BeginOperationRequest() { key_blob.key_material = NULL; } 163 ~BeginOperationRequest() { delete[] key_blob.key_material; } 165 void SetKeyMaterial(const void* key_material, size_t length); 167 SetKeyMaterial(blob.key_material, blob.key_material_size); 233 void SetKeyMaterial(const void* key_material, size_t length); 246 ImportKeyResponse() { key_blob.key_material = NULL; [all...] |
key_blob.h | 64 * keymaster_blob.key_material. 97 * key_material() will return a pointer to an uninitialized buffer. Sets error if there is a 110 inline const uint8_t* key_material() const { return key_material_.get(); } function in class:keymaster::KeyBlob
|
google_keymaster.h | 111 keymaster_error_t WrapKey(const uint8_t* key_material, size_t key_material_length,
|
keymaster_defs.h | 296 const uint8_t* key_material; member in struct:__anon81499
|
/external/chromium_org/remoting/protocol/ |
auth_util.cc | 46 unsigned char key_material[kAuthDigestLength]; local 48 label, false, "", key_material, kAuthDigestLength); 56 if (!response.Init(key_material, kAuthDigestLength)) {
|
/external/chromium_org/third_party/openssl/openssl/ssl/ |
s2_enc.c | 100 OPENSSL_assert(s->s2->key_material_length <= sizeof s->s2->key_material); 106 EVP_EncryptInit_ex(ws,c,NULL,&(s->s2->key_material[(client)?num:0]), 108 EVP_DecryptInit_ex(rs,c,NULL,&(s->s2->key_material[(client)?0:num]), 110 s->s2->read_key= &(s->s2->key_material[(client)?0:num]); 111 s->s2->write_key= &(s->s2->key_material[(client)?num:0]);
|
s2_lib.c | 466 km=s->s2->key_material; 479 if (((km - s->s2->key_material) + md_size) > 480 (int)sizeof(s->s2->key_material))
|
ssl2.h | 204 unsigned char key_material[SSL2_MAX_KEY_MATERIAL_LENGTH*2]; member in struct:ssl2_state_st
|
s2_clnt.c | 865 EVP_SignUpdate(&ctx,s->s2->key_material,
|
/external/openssl/ssl/ |
s2_enc.c | 100 OPENSSL_assert(s->s2->key_material_length <= sizeof s->s2->key_material); 106 EVP_EncryptInit_ex(ws,c,NULL,&(s->s2->key_material[(client)?num:0]), 108 EVP_DecryptInit_ex(rs,c,NULL,&(s->s2->key_material[(client)?0:num]), 110 s->s2->read_key= &(s->s2->key_material[(client)?0:num]); 111 s->s2->write_key= &(s->s2->key_material[(client)?num:0]);
|
s2_lib.c | 466 km=s->s2->key_material; 479 if (((km - s->s2->key_material) + md_size) > 480 (int)sizeof(s->s2->key_material))
|
ssl2.h | 204 unsigned char key_material[SSL2_MAX_KEY_MATERIAL_LENGTH*2]; member in struct:ssl2_state_st
|
/external/chromium_org/third_party/openssl/openssl/include/openssl/ |
ssl2.h | 204 unsigned char key_material[SSL2_MAX_KEY_MATERIAL_LENGTH*2]; member in struct:ssl2_state_st
|
/external/openssl/include/openssl/ |
ssl2.h | 204 unsigned char key_material[SSL2_MAX_KEY_MATERIAL_LENGTH*2]; member in struct:ssl2_state_st
|
/external/wpa_supplicant_8/src/tls/ |
tlsv1_common.h | 228 size_t key_material; member in struct:tls_cipher_data
|
tlsv1_record.c | 59 rl->key_material_len = data->key_material;
|