/external/vboot_reference/firmware/lib21/ |
misc.c | 70 uint8_t *key_data; local 82 key_data = vb2_workbuf_alloc(&wb, key_size); 83 if (!key_data) 87 key_data, key_size); 92 rv = vb2_unpack_key(&root_key, key_data, key_size); 139 memmove(key_data, packed_key, packed_key->c.total_size); 140 packed_key = (struct vb2_packed_key *)key_data; 143 sd->workbuf_data_key_offset = vb2_offset_of(ctx->workbuf, key_data); 158 uint8_t *key_data = ctx->workbuf + sd->workbuf_data_key_offset; local 173 rv = vb2_unpack_key(&data_key, key_data, key_size) [all...] |
packed_key.c | 14 const uint8_t *key_data, 17 const uint32_t *buf32 = (const uint32_t *)key_data;
|
/external/vboot_reference/firmware/lib20/ |
misc.c | 22 uint8_t *key_data; local 36 key_data = vb2_workbuf_alloc(&wb, key_size); 37 if (!key_data) 41 key_data, key_size); 46 rv = vb2_unpack_key(&root_key, key_data, key_size); 99 packed_key = (struct vb2_packed_key *)key_data; 111 memmove(key_data + packed_key->key_offset, 116 sd->workbuf_data_key_offset = vb2_offset_of(ctx->workbuf, key_data); 135 uint8_t *key_data = ctx->workbuf + sd->workbuf_data_key_offset; local 151 rv = vb2_unpack_key(&data_key, key_data, key_size) [all...] |
/bionic/libc/bionic/ |
pthread_key.cpp | 76 pthread_key_data_t* key_data = __get_thread()->key_data; 81 if (SeqOfKeyInUse(seq) && seq == key_data[i].seq && key_data[i].data != NULL) { 103 void* data = key_data[i].data; 104 key_data[i].data = NULL; 157 pthread_key_data_t* data = &(__get_thread()->key_data[key]); 176 pthread_key_data_t* data = &(__get_thread()->key_data[key]);
|
pthread_internal.h | 98 pthread_key_data_t key_data[BIONIC_PTHREAD_KEY_COUNT]; member in struct:pthread_internal_t
|
/hardware/intel/img/psb_headers/DRM/cc54/inc/ |
wv_fkp.h | 48 uint8_t key_data[KEYBOX_KEYDATA_SIZE]; // 72 bytes member in struct:wv_keybox
|
wv_mod_oem_crypto.h | 40 const uint8_t *key_data; member in struct:drm_wv_mod_key_object
|
wv_drm_api.h | 114 uint8_t *key_data,
|
/system/keymaster/ |
openssl_utils.cpp | 36 keymaster_error_t convert_pkcs8_blob_to_evp(const uint8_t* key_data, size_t key_length, 39 if (key_data == NULL || key_length <= 0) 43 d2i_PKCS8_PRIV_KEY_INFO(NULL, &key_data, key_length)); 72 int key_data_size = i2d_PrivateKey(pkey, NULL /* key_data*/);
|
android_keymaster_messages.cpp | 283 delete[] key_data; 284 key_data = dup_buffer(key_material, length); 296 return append_size_and_data_to_buf(buf, end, key_data, key_data_length); 300 delete[] key_data; 301 key_data = NULL; 307 key_data = deserialized_key_material.release(); 352 delete[] key_data; 353 key_data = dup_buffer(key_material, length); 362 return append_size_and_data_to_buf(buf, end, key_data, key_data_length); 366 delete[] key_data; [all...] |
hmac_operation.cpp | 70 purpose(), symmetric_key->key_data(), symmetric_key->key_data_size(), digest, 91 HmacOperation::HmacOperation(keymaster_purpose_t purpose, const uint8_t* key_data, 138 HMAC_Init_ex(&ctx_, key_data, key_data_size, md, NULL /* engine */);
|
hmac_operation.h | 28 HmacOperation(keymaster_purpose_t purpose, const uint8_t* key_data, size_t key_data_size,
|
openssl_utils.h | 72 keymaster_error_t convert_pkcs8_blob_to_evp(const uint8_t* key_data, size_t key_length,
|
symmetric_key.h | 67 const uint8_t* key_data() const { return key_data_.get(); } function in class:keymaster::SymmetricKey
|
/external/boringssl/src/crypto/x509/ |
x_pkey.c | 98 if ((x->key_data != NULL) && (x->key_free)) OPENSSL_free(x->key_data);
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_tls.c | 23 u8 *key_data; member in struct:eap_tls_data 130 if (data->key_data) { 131 bin_clear_free(data->key_data, EAP_TLS_KEY_LEN + EAP_EMSK_LEN); 132 data->key_data = NULL; 194 data->key_data = eap_peer_tls_derive_key(sm, &data->ssl, 198 if (data->key_data) { 200 data->key_data, EAP_TLS_KEY_LEN); 202 data->key_data + EAP_TLS_KEY_LEN, 303 return data->key_data != NULL; 312 if (data->key_data == NULL [all...] |
eap_peap.c | 57 u8 *key_data; member in struct:eap_peap_data 175 if (data->key_data) { 176 bin_clear_free(data->key_data, EAP_TLS_KEY_LEN); 177 data->key_data = NULL; 264 tk = data->key_data; 1032 data->key_data = 1035 if (data->key_data) { 1038 data->key_data, [all...] |
/external/vboot_reference/host/lib/ |
host_key.c | 163 uint8_t* key_data; local 177 key_data = ReadFile(filename, &key_size); 178 if (!key_data) 184 free(key_data); 190 free(key_data); 193 Memcpy(GetPublicKeyData(key), key_data, key_size); local 195 free(key_data);
|
/external/vboot_reference/firmware/lib21/include/ |
vb2_common.h | 96 * These elements of *key will point inside the key_data buffer. 99 * @param key_data Packed key data (from inside a packed key buffer) 103 const uint8_t *key_data,
|
/external/wpa_supplicant_8/src/rsn_supp/ |
peerkey.h | 45 const u8 *key_data, size_t key_data_len); 65 const u8 *key_data, size_t key_data_len)
|
wpa.c | 426 u16 ver, const u8 *key_data, 450 key_data, key_data_len); 451 if (wpa_supplicant_parse_ies(key_data, key_data_len, &ie) < 0) 1127 u16 ver, const u8 *key_data, 1695 u8 *key_data; local [all...] |
/external/boringssl/src/ssl/ |
t1_enc.c | 309 const uint8_t *key_data; local 336 key_data = s->s3->tmp.key_block; 337 client_write_mac_secret = key_data; 338 key_data += mac_secret_len; 339 server_write_mac_secret = key_data; 340 key_data += mac_secret_len; 341 client_write_key = key_data; 342 key_data += key_len; 343 server_write_key = key_data; 344 key_data += key_len [all...] |
/external/wpa_supplicant_8/src/ap/ |
peerkey_auth.c | 83 const u8 *key_data, size_t key_data_len) 90 if (wpa_parse_kde_ies(key_data, key_data_len, &kde) < 0) { 257 const u8 *key_data, size_t key_data_len) 263 if (wpa_parse_kde_ies(key_data, key_data_len, &kde) < 0) { 328 const u8 *key_data, size_t key_data_len) 335 if (wpa_parse_kde_ies(key_data, key_data_len, &kde) < 0) {
|
wpa_auth_i.h | 236 const u8 *key_data, size_t key_data_len); 239 const u8 *key_data, size_t key_data_len); 242 const u8 *key_data, size_t key_data_len);
|
/external/vboot_reference/host/lib21/ |
host_key.c | 381 uint8_t *key_data, *key_buf; local 387 if (vb2_read_file(filename, &key_data, &key_size)) 396 free(key_data); 401 free(key_data); 407 memcpy(key_buf, key_data, key_size); 408 free(key_data);
|