HomeSort by relevance Sort by last modified time
    Searched full:key_data (Results 26 - 50 of 86) sorted by null

12 3 4

  /system/keymaster/
hmac_operation.h 28 HmacOperation(keymaster_purpose_t purpose, const uint8_t* key_data, size_t key_data_size,
symmetric_key.h 67 const uint8_t* key_data() const { return key_data_.get(); } function in class:keymaster::SymmetricKey
key_blob_test.cpp 38 const uint8_t key_data[5] = {21, 22, 23, 24, 25}; member in namespace:keymaster::test
44 key_material_(key_data, array_length(key_data)) {
103 // key_data shouldn't be anywhere in the blob, ciphertext should.
openssl_utils.h 85 keymaster_error_t convert_pkcs8_blob_to_evp(const uint8_t* key_data, size_t key_length,
android_keymaster_test.cpp 860 uint8_t key_data[] = { local
975 uint8_t key_data[25] = { local
1905 char key_data[16] = {0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0}; local
1924 char key_data[16] = {0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0}; local
3334 uint8_t* key_data = reinterpret_cast<uint8_t*>(malloc(km1_sw.length())); local
3351 uint8_t* key_data = reinterpret_cast<uint8_t*>(malloc(km1_sw.length())); local
3368 uint8_t* key_data = reinterpret_cast<uint8_t*>(malloc(km1_sw.length())); local
3388 uint8_t* key_data = reinterpret_cast<uint8_t*>(malloc(km0_sw.length())); local
3404 uint8_t* key_data = reinterpret_cast<uint8_t*>(malloc(km0_sw.length())); local
3432 uint8_t* key_data = reinterpret_cast<uint8_t*>(malloc(km0_sw.length())); local
3454 uint8_t* key_data = reinterpret_cast<uint8_t*>(malloc(km0_sw.length())); local
    [all...]
soft_keymaster_device.cpp     [all...]
  /external/vboot_reference/firmware/lib21/include/
vb2_common.h 96 * These elements of *key will point inside the key_data buffer.
99 * @param key_data Packed key data (from inside a packed key buffer)
103 const uint8_t *key_data,
  /external/wpa_supplicant_8/src/ap/
wpa_auth_i.h 238 const u8 *key_data, size_t key_data_len);
241 const u8 *key_data, size_t key_data_len);
244 const u8 *key_data, size_t key_data_len);
  /external/libchrome/crypto/
symmetric_key_win.cc 46 // Imports a raw/plaintext key of |key_size| stored in |*key_data| into a new
49 // If |key_data| is intended to be used as an HMAC key, then |alg| should be
55 const void* key_data, size_t key_size,
63 memcpy(actual_key + sizeof(PlaintextBlobHeader), key_data, key_size);
531 const void* key_data, size_t key_size_in_bytes)
533 if (key_data) {
534 raw_key_.assign(reinterpret_cast<const char*>(key_data),
symmetric_key.h 79 const void* key_data, size_t key_size_in_bytes);
  /external/wpa_supplicant_8/src/rsn_supp/
peerkey.c 657 u16 ver, const u8 *key_data,
672 wpa_hexdump(MSG_DEBUG, "RSN: msg 1/4 key data", key_data, key_data_len);
673 if (wpa_supplicant_parse_ies(key_data, key_data_len, &ie) < 0 ||
762 u16 ver, const u8 *key_data,
774 wpa_hexdump(MSG_DEBUG, "RSN: msg 2/4 key data", key_data, key_data_len);
775 if (wpa_supplicant_parse_ies(key_data, key_data_len, &kde) < 0 ||
808 u16 ver, const u8 *key_data,
823 wpa_hexdump(MSG_DEBUG, "RSN: msg 3/4 key data", key_data, key_data_len);
824 if (wpa_supplicant_parse_ies(key_data, key_data_len, &kde) < 0) {
1115 const u8 *key_data, size_t key_data_len
    [all...]
wpa.c 447 u16 ver, const u8 *key_data,
471 key_data, key_data_len);
472 if (wpa_supplicant_parse_ies(key_data, key_data_len, &ie) < 0)
1771 u8 *key_data; local
    [all...]
  /system/keymaster/include/keymaster/
android_keymaster_messages.h 447 : KeymasterMessage(ver), key_data(nullptr) {}
448 ~ImportKeyRequest() { delete[] key_data; }
461 uint8_t* key_data; member in struct:keymaster::ImportKeyRequest
509 : KeymasterResponse(ver), key_data(nullptr) {}
510 ~ExportKeyResponse() { delete[] key_data; }
521 uint8_t* key_data; member in struct:keymaster::ExportKeyResponse
soft_keymaster_device.h 149 const keymaster_blob_t* key_data,
198 const keymaster_blob_t* key_data,
  /packages/apps/Gallery2/src/com/android/gallery3d/app/
StateManager.java 39 private static final String KEY_DATA = "data";
276 Bundle data = bundle.getBundle(KEY_DATA);
305 bundle.putBundle(KEY_DATA, entry.data);
  /system/webservd/webservd/
server.cc 66 std::string key_data;
67 if (!encryptor->DecryptWithAuthentication(encrypted_key_data, &key_data))
69 brillo::SecureBlob key{key_data};
  /frameworks/base/core/java/android/nfc/cardemulation/
HostNfcFService.java 154 public static final String KEY_DATA = "data";
182 byte[] packet = dataBundle.getByteArray(KEY_DATA);
192 responseBundle.putByteArray(KEY_DATA, responsePacket);
243 dataBundle.putByteArray(KEY_DATA, responsePacket);
  /packages/apps/Gallery2/src/com/android/gallery3d/filtershow/crop/
CropExtras.java 32 public static final String KEY_DATA = "data";
  /external/boringssl/src/crypto/x509/
x_pkey.c 98 if ((x->key_data != NULL) && (x->key_free)) OPENSSL_free(x->key_data);
  /external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/dynamodb2/
results.py 193 for offset, key_data in enumerate(results.get('unprocessed_keys', [])):
197 self._keys_left.insert(offset, key_data)
items.py 233 key_data = {}
236 key_data[key] = self[key]
238 return key_data
472 key_data = self.get_keys()
473 return self.table.delete_item(**key_data)
  /external/vboot_reference/firmware/lib/include/
vboot_common.h 81 * Initialize a public key to refer to [key_data].
83 void PublicKeyInit(VbPublicKey *key, uint8_t *key_data, uint64_t key_size);
  /system/tpm/attestation/server/
pkcs11_key_store.h 53 std::string* key_data) override;
56 const std::string& key_data) override;
  /external/wpa_supplicant_8/src/eap_peer/
eap_ttls.c 57 u8 *key_data; member in struct:eap_ttls_data
182 if (data->key_data) {
183 bin_clear_free(data->key_data, EAP_TLS_KEY_LEN + EAP_EMSK_LEN);
184 data->key_data = NULL;
272 data->key_data = eap_peer_tls_derive_key(sm, &data->ssl,
276 if (!data->key_data) {
282 data->key_data, EAP_TLS_KEY_LEN);
284 data->key_data + EAP_TLS_KEY_LEN,
    [all...]
  /bionic/libc/bionic/
pthread_internal.h 105 pthread_key_data_t key_data[BIONIC_PTHREAD_KEY_COUNT]; member in class:pthread_internal_t

Completed in 2209 milliseconds

12 3 4