/system/keymaster/ |
hmac_operation.h | 28 HmacOperation(keymaster_purpose_t purpose, const uint8_t* key_data, size_t key_data_size,
|
symmetric_key.h | 67 const uint8_t* key_data() const { return key_data_.get(); } function in class:keymaster::SymmetricKey
|
key_blob_test.cpp | 38 const uint8_t key_data[5] = {21, 22, 23, 24, 25}; member in namespace:keymaster::test 44 key_material_(key_data, array_length(key_data)) { 103 // key_data shouldn't be anywhere in the blob, ciphertext should.
|
openssl_utils.h | 85 keymaster_error_t convert_pkcs8_blob_to_evp(const uint8_t* key_data, size_t key_length,
|
android_keymaster_test.cpp | 860 uint8_t key_data[] = { local 975 uint8_t key_data[25] = { local 1905 char key_data[16] = {0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0}; local 1924 char key_data[16] = {0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0}; local 3334 uint8_t* key_data = reinterpret_cast<uint8_t*>(malloc(km1_sw.length())); local 3351 uint8_t* key_data = reinterpret_cast<uint8_t*>(malloc(km1_sw.length())); local 3368 uint8_t* key_data = reinterpret_cast<uint8_t*>(malloc(km1_sw.length())); local 3388 uint8_t* key_data = reinterpret_cast<uint8_t*>(malloc(km0_sw.length())); local 3404 uint8_t* key_data = reinterpret_cast<uint8_t*>(malloc(km0_sw.length())); local 3432 uint8_t* key_data = reinterpret_cast<uint8_t*>(malloc(km0_sw.length())); local 3454 uint8_t* key_data = reinterpret_cast<uint8_t*>(malloc(km0_sw.length())); local [all...] |
soft_keymaster_device.cpp | [all...] |
/external/vboot_reference/firmware/lib21/include/ |
vb2_common.h | 96 * These elements of *key will point inside the key_data buffer. 99 * @param key_data Packed key data (from inside a packed key buffer) 103 const uint8_t *key_data,
|
/external/wpa_supplicant_8/src/ap/ |
wpa_auth_i.h | 238 const u8 *key_data, size_t key_data_len); 241 const u8 *key_data, size_t key_data_len); 244 const u8 *key_data, size_t key_data_len);
|
/external/libchrome/crypto/ |
symmetric_key_win.cc | 46 // Imports a raw/plaintext key of |key_size| stored in |*key_data| into a new 49 // If |key_data| is intended to be used as an HMAC key, then |alg| should be 55 const void* key_data, size_t key_size, 63 memcpy(actual_key + sizeof(PlaintextBlobHeader), key_data, key_size); 531 const void* key_data, size_t key_size_in_bytes) 533 if (key_data) { 534 raw_key_.assign(reinterpret_cast<const char*>(key_data),
|
symmetric_key.h | 79 const void* key_data, size_t key_size_in_bytes);
|
/external/wpa_supplicant_8/src/rsn_supp/ |
peerkey.c | 657 u16 ver, const u8 *key_data, 672 wpa_hexdump(MSG_DEBUG, "RSN: msg 1/4 key data", key_data, key_data_len); 673 if (wpa_supplicant_parse_ies(key_data, key_data_len, &ie) < 0 || 762 u16 ver, const u8 *key_data, 774 wpa_hexdump(MSG_DEBUG, "RSN: msg 2/4 key data", key_data, key_data_len); 775 if (wpa_supplicant_parse_ies(key_data, key_data_len, &kde) < 0 || 808 u16 ver, const u8 *key_data, 823 wpa_hexdump(MSG_DEBUG, "RSN: msg 3/4 key data", key_data, key_data_len); 824 if (wpa_supplicant_parse_ies(key_data, key_data_len, &kde) < 0) { 1115 const u8 *key_data, size_t key_data_len [all...] |
wpa.c | 447 u16 ver, const u8 *key_data, 471 key_data, key_data_len); 472 if (wpa_supplicant_parse_ies(key_data, key_data_len, &ie) < 0) 1771 u8 *key_data; local [all...] |
/system/keymaster/include/keymaster/ |
android_keymaster_messages.h | 447 : KeymasterMessage(ver), key_data(nullptr) {} 448 ~ImportKeyRequest() { delete[] key_data; } 461 uint8_t* key_data; member in struct:keymaster::ImportKeyRequest 509 : KeymasterResponse(ver), key_data(nullptr) {} 510 ~ExportKeyResponse() { delete[] key_data; } 521 uint8_t* key_data; member in struct:keymaster::ExportKeyResponse
|
soft_keymaster_device.h | 149 const keymaster_blob_t* key_data, 198 const keymaster_blob_t* key_data,
|
/packages/apps/Gallery2/src/com/android/gallery3d/app/ |
StateManager.java | 39 private static final String KEY_DATA = "data"; 276 Bundle data = bundle.getBundle(KEY_DATA); 305 bundle.putBundle(KEY_DATA, entry.data);
|
/system/webservd/webservd/ |
server.cc | 66 std::string key_data; 67 if (!encryptor->DecryptWithAuthentication(encrypted_key_data, &key_data)) 69 brillo::SecureBlob key{key_data};
|
/frameworks/base/core/java/android/nfc/cardemulation/ |
HostNfcFService.java | 154 public static final String KEY_DATA = "data"; 182 byte[] packet = dataBundle.getByteArray(KEY_DATA); 192 responseBundle.putByteArray(KEY_DATA, responsePacket); 243 dataBundle.putByteArray(KEY_DATA, responsePacket);
|
/packages/apps/Gallery2/src/com/android/gallery3d/filtershow/crop/ |
CropExtras.java | 32 public static final String KEY_DATA = "data";
|
/external/boringssl/src/crypto/x509/ |
x_pkey.c | 98 if ((x->key_data != NULL) && (x->key_free)) OPENSSL_free(x->key_data);
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/dynamodb2/ |
results.py | 193 for offset, key_data in enumerate(results.get('unprocessed_keys', [])): 197 self._keys_left.insert(offset, key_data)
|
items.py | 233 key_data = {} 236 key_data[key] = self[key] 238 return key_data 472 key_data = self.get_keys() 473 return self.table.delete_item(**key_data)
|
/external/vboot_reference/firmware/lib/include/ |
vboot_common.h | 81 * Initialize a public key to refer to [key_data]. 83 void PublicKeyInit(VbPublicKey *key, uint8_t *key_data, uint64_t key_size);
|
/system/tpm/attestation/server/ |
pkcs11_key_store.h | 53 std::string* key_data) override; 56 const std::string& key_data) override;
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_ttls.c | 57 u8 *key_data; member in struct:eap_ttls_data 182 if (data->key_data) { 183 bin_clear_free(data->key_data, EAP_TLS_KEY_LEN + EAP_EMSK_LEN); 184 data->key_data = NULL; 272 data->key_data = eap_peer_tls_derive_key(sm, &data->ssl, 276 if (!data->key_data) { 282 data->key_data, EAP_TLS_KEY_LEN); 284 data->key_data + EAP_TLS_KEY_LEN, [all...] |
/bionic/libc/bionic/ |
pthread_internal.h | 105 pthread_key_data_t key_data[BIONIC_PTHREAD_KEY_COUNT]; member in class:pthread_internal_t
|