/hardware/samsung_slsi/exynos5/libkeymaster/ |
tlTeeKeymaster_Api.h | 85 uint32_t keydata; /**< Key data buffer passed by TLC */ member in struct:__anon42776 95 uint32_t keydata; /**< Key data buffer */ member in struct:__anon42777 109 uint32_t keydata; /**< Key data buffer */ member in struct:__anon42778 128 uint32_t keydata; /**< Key data buffer passed by TLC */ member in struct:__anon42779 138 uint32_t keydata; /**< Key data buffer */ member in struct:__anon42780 152 uint32_t keydata; /**< Key data buffer */ member in struct:__anon42781 202 uint32_t keydata; /**< Key data buffer */ member in struct:__anon42786 214 uint32_t keydata; /**< Key data buffer */ member in struct:__anon42787
|
tlcTeeKeymaster_if.c | 147 * @param keyData [in] Pointer to the key data buffer 155 uint8_t* keyData, 177 mcRet = mcMap(&sessionHandle, keyData, keyDataLength, &mapInfo); 187 pTci->rsagenkey.keydata = (uint32_t)mapInfo.sVirtualAddr; 207 mcRet = mcUnmap(&sessionHandle, keyData, &mapInfo); 239 * @param keyData [in] Pointer to key data buffer 248 const uint8_t* keyData, 274 mcRet = mcMap(&sessionHandle, (void*)keyData, keyDataLength, &keyMapInfo); 294 pTci->rsasign.keydata = (uint32_t)keyMapInfo.sVirtualAddr; 321 mcRet = mcUnmap(&sessionHandle, (void*)keyData, &keyMapInfo) [all...] |
/hardware/samsung_slsi/exynos5/mobicore/common/MobiCore/inc/ |
mcContainer.h | 64 uint32_t keydata[MC_BYTES_TO_WORDS(MC_CONT_SYMMETRIC_KEY_SIZE)]; member in struct:__anon43060 68 uint32_t keydata[MC_BYTES_TO_WORDS(MC_CONT_PUBLIC_KEY_SIZE)]; member in struct:__anon43061
|
/external/qemu/distrib/sdl-1.2.15/src/video/x11/ |
SDL_x11events.c | 589 char *keydata = keybuf; local 596 count = Xutf8LookupString(SDL_IC, &xevent.xkey, keydata, sizeof(keybuf), &xkeysym, &status); 601 keydata = SDL_malloc(count); 602 if ( keydata == NULL ) { 606 count = Xutf8LookupString(SDL_IC, &xevent.xkey, keydata, count, &xkeysym, &status); 650 utf16length = Utf8ToUtf16((Uint8 *)keydata, count, utf16data, utf16size); 652 /* The keydata contained an invalid byte 717 if (keydata != NULL && keybuf != keydata) { 718 SDL_free(keydata); [all...] |
/hardware/qcom/keymaster/ |
keymaster_qcom.cpp | 371 UniquePtr<unsigned char[]> keydata(new unsigned char[resp->key_blob_len]); 372 if (keydata.get() == NULL) { 376 unsigned char* p = keydata.get(); 378 *keyBlob = keydata.release(); 454 UniquePtr<unsigned char[]> keydata(new unsigned char[resp->key_blob_len]); 455 if (keydata.get() == NULL) { 459 unsigned char* p = keydata.get(); 461 *keyBlob = keydata.release();
|
/external/wpa_supplicant_8/src/eapol_supp/ |
eapol_supp_sm.c | 645 struct eap_key_data keydata; local 681 res = eapol_sm_get_key(sm, (u8 *) &keydata, sizeof(keydata)); 689 res = eapol_sm_get_key(sm, (u8 *) &keydata, 16); 697 os_memcpy(keydata.sign_key, keydata.encr_key, 16); 721 hmac_md5(keydata.sign_key, sign_key_len, 742 os_memcpy(ekey + IEEE8021X_KEY_IV_LEN, keydata.encr_key, 760 os_memcpy(datakey, keydata.encr_key, key_len); [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
wpa.c | 1084 wpa_hexdump(MSG_DEBUG, "WPA: IE KeyData", key_data, key_data_len); [all...] |
/external/chromium_org/net/third_party/nss/ssl/ |
ssl3con.c | 3806 SECItem * keydata; local [all...] |