/system/keymaster/ |
keymaster1_engine.cpp | 146 KeyData* key_data = new KeyData(blob, additional_params); local 147 if (!RSA_set_ex_data(rsa.get(), rsa_index_, key_data)) { 149 delete key_data; 155 GetKeymaster1PublicKey(key_data->key_material, key_data->begin_params, error)); 188 KeyData* key_data = new KeyData(blob, additional_params); local 189 if (!EC_KEY_set_ex_data(ec_key.get(), ec_key_index_, key_data)) { 191 delete key_data; 269 keymaster_error_t Keymaster1Engine::Keymaster1Finish(const KeyData* key_data, 272 if (key_data->op_handle == 0 291 KeyData* key_data = instance_->GetData(rsa); local 316 KeyData* key_data = instance_->GetData(rsa); local 341 KeyData* key_data = instance_->GetData(ec_key); local [all...] |
ecdsa_keymaster1_operation.cpp | 33 Keymaster1Engine::KeyData* key_data = engine_->GetData(ecdsa_key); local 34 if (!key_data) 56 return engine_->device()->begin(engine_->device(), purpose_, &key_data->key_material, 63 Keymaster1Engine::KeyData* key_data = engine_->GetData(ecdsa_key); local 64 if (!key_data) { 68 key_data->op_handle = operation_handle_; 69 key_data->finish_params.Reinitialize(input_params); 79 Keymaster1Engine::KeyData* key_data = engine_->GetData(ecdsa_key); local 80 if (!key_data) 82 return key_data->error [all...] |
rsa_keymaster1_operation.cpp | 33 Keymaster1Engine::KeyData* key_data = engine_->GetData(rsa_key); local 34 if (!key_data) 62 key_data->expected_openssl_padding = RSA_NO_PADDING; 68 key_data->expected_openssl_padding = RSA_PKCS1_PADDING; 72 return engine_->device()->begin(engine_->device(), purpose_, &key_data->key_material, 79 Keymaster1Engine::KeyData* key_data = engine_->GetData(rsa_key); local 80 if (!key_data) { 84 key_data->op_handle = operation_handle_; 85 key_data->finish_params.Reinitialize(input_params); 95 Keymaster1Engine::KeyData* key_data = engine_->GetData(rsa_key); // key_data is owned by rs local [all...] |
openssl_utils.cpp | 82 keymaster_error_t convert_pkcs8_blob_to_evp(const uint8_t* key_data, size_t key_length, 85 if (key_data == NULL || key_length <= 0) 89 d2i_PKCS8_PRIV_KEY_INFO(NULL, &key_data, key_length)); 118 int key_data_size = i2d_PrivateKey(pkey, NULL /* key_data*/);
|
android_keymaster_messages.cpp | 308 delete[] key_data; 309 key_data = dup_buffer(key_material, length); 321 return append_size_and_data_to_buf(buf, end, key_data, key_data_length); 325 delete[] key_data; 326 key_data = NULL; 332 key_data = deserialized_key_material.release(); 377 delete[] key_data; 378 key_data = dup_buffer(key_material, length); 387 return append_size_and_data_to_buf(buf, end, key_data, key_data_length); 391 delete[] key_data; [all...] |
hmac_operation.cpp | 70 purpose(), symmetric_key->key_data(), symmetric_key->key_data_size(), digest, 91 HmacOperation::HmacOperation(keymaster_purpose_t purpose, const uint8_t* key_data, 138 HMAC_Init_ex(&ctx_, key_data, key_data_size, md, NULL /* engine */);
|
/external/vboot_reference/firmware/lib21/ |
misc.c | 70 uint8_t *key_data; local 82 key_data = vb2_workbuf_alloc(&wb, key_size); 83 if (!key_data) 87 key_data, key_size); 92 rv = vb2_unpack_key(&root_key, key_data, key_size); 139 memmove(key_data, packed_key, packed_key->c.total_size); 140 packed_key = (struct vb2_packed_key *)key_data; 143 sd->workbuf_data_key_offset = vb2_offset_of(ctx->workbuf, key_data); 158 uint8_t *key_data = ctx->workbuf + sd->workbuf_data_key_offset; local 173 rv = vb2_unpack_key(&data_key, key_data, key_size) [all...] |
packed_key.c | 14 const uint8_t *key_data, 17 const uint32_t *buf32 = (const uint32_t *)key_data;
|
/external/vboot_reference/firmware/lib20/ |
misc.c | 22 uint8_t *key_data; local 36 key_data = vb2_workbuf_alloc(&wb, key_size); 37 if (!key_data) 41 key_data, key_size); 46 rv = vb2_unpack_key(&root_key, key_data, key_size); 99 packed_key = (struct vb2_packed_key *)key_data; 111 memmove(key_data + packed_key->key_offset, 116 sd->workbuf_data_key_offset = vb2_offset_of(ctx->workbuf, key_data); 135 uint8_t *key_data = ctx->workbuf + sd->workbuf_data_key_offset; local 151 rv = vb2_unpack_key(&data_key, key_data, key_size) [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_tls.c | 23 u8 *key_data; member in struct:eap_tls_data 131 if (data->key_data) { 132 bin_clear_free(data->key_data, EAP_TLS_KEY_LEN + EAP_EMSK_LEN); 133 data->key_data = NULL; 182 data->key_data = eap_peer_tls_derive_key(sm, &data->ssl, 186 if (data->key_data) { 188 data->key_data, EAP_TLS_KEY_LEN); 190 data->key_data + EAP_TLS_KEY_LEN, 329 return data->key_data != NULL; 338 if (data->key_data == NULL [all...] |
/external/vboot_reference/host/lib/ |
host_key.c | 163 uint8_t* key_data; local 177 key_data = ReadFile(filename, &key_size); 178 if (!key_data) 184 free(key_data); 190 free(key_data); 193 Memcpy(GetPublicKeyData(key), key_data, key_size); local 195 free(key_data);
|
/external/libchrome/crypto/ |
symmetric_key_openssl.cc | 44 uint8_t* key_data = reinterpret_cast<uint8_t*>( local 47 int rv = RAND_bytes(key_data, static_cast<int>(key_size_in_bytes)); 75 uint8_t* key_data = reinterpret_cast<uint8_t*>( local 80 static_cast<int>(key_size_in_bytes), key_data);
|
hmac_win.cc | 141 BYTE key_data[1]; member in struct:crypto::KeyBlob 143 size_t key_blob_size = std::max(offsetof(KeyBlob, key_data) + key_length, 152 memcpy(key_blob->key_data, key, key_length); 162 SecureZeroMemory(key_blob->key_data, key_length);
|
/frameworks/base/services/voiceinteraction/java/com/android/server/soundtrigger/ |
SoundTriggerDbHelper.java | 49 public static final String KEY_DATA = "data"; 58 + GenericSoundModelContract.KEY_DATA + " BLOB" + " )"; 88 values.put(GenericSoundModelContract.KEY_DATA, soundModel.data); 113 GenericSoundModelContract.KEY_DATA));
|
/hardware/intel/img/psb_headers/DRM/cc54/inc/ |
wv_mod_oem_crypto.h | 40 const uint8_t *key_data; member in struct:drm_wv_mod_key_object
|
wv_fkp.h | 48 uint8_t key_data[KEYBOX_KEYDATA_SIZE]; // 72 bytes member in struct:wv_keybox
|
/bionic/libc/bionic/ |
pthread_key.cpp | 76 pthread_key_data_t* key_data = __get_thread()->key_data; 81 if (SeqOfKeyInUse(seq) && seq == key_data[i].seq && key_data[i].data != NULL) { 103 void* data = key_data[i].data; 104 key_data[i].data = NULL; 157 pthread_key_data_t* data = &(__get_thread()->key_data[key]); 176 pthread_key_data_t* data = &(__get_thread()->key_data[key]);
|
/external/wpa_supplicant_8/src/rsn_supp/ |
peerkey.h | 45 const u8 *key_data, size_t key_data_len); 65 const u8 *key_data, size_t key_data_len)
|
/system/tpm/attestation/server/ |
mock_key_store.h | 36 std::string* key_data)); 39 const std::string& key_data));
|
key_store.h | 35 // |username|. On success true is returned and |key_data| is populated. 38 std::string* key_data) = 0; 45 const std::string& key_data) = 0;
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/tests/unit/utils/ |
test_utils.py | 242 # here "key_data" will be stored in the "self._leaves" 244 key_data = "test" 246 valid_data = '{ "%s" : {"valid_json_format": true}}' % key_data 247 url = "/".join(["http://169.254.169.254", key_data]) 250 self.set_normal_response([key_data, invalid_data, valid_data]) 255 key_data = "test" 257 valid_data = '{ "%s" : {"valid_json_format": true}}' % key_data 258 url = "/".join(["http://169.254.169.254", key_data]) 261 self.set_normal_response([key_data, invalid_data, invalid_data])
|
/external/boringssl/src/ssl/ |
t1_enc.c | 285 const uint8_t *key_data; local 323 key_data = ssl->s3->tmp.key_block; 324 client_write_mac_secret = key_data; 325 key_data += mac_secret_len; 326 server_write_mac_secret = key_data; 327 key_data += mac_secret_len; 328 client_write_key = key_data; 329 key_data += key_len; 330 server_write_key = key_data; 331 key_data += key_len [all...] |
/external/vboot_reference/host/lib21/ |
host_key.c | 381 uint8_t *key_data, *key_buf; local 387 if (vb2_read_file(filename, &key_data, &key_size)) 396 free(key_data); 401 free(key_data); 407 memcpy(key_buf, key_data, key_size); 408 free(key_data);
|
/external/wpa_supplicant_8/src/ap/ |
peerkey_auth.c | 83 const u8 *key_data, size_t key_data_len) 90 if (wpa_parse_kde_ies(key_data, key_data_len, &kde) < 0) { 257 const u8 *key_data, size_t key_data_len) 263 if (wpa_parse_kde_ies(key_data, key_data_len, &kde) < 0) { 328 const u8 *key_data, size_t key_data_len) 335 if (wpa_parse_kde_ies(key_data, key_data_len, &kde) < 0) {
|
/frameworks/base/services/voiceinteraction/java/com/android/server/voiceinteraction/ |
DatabaseHelper.java | 51 public static final String KEY_DATA = "data"; 65 + SoundModelContract.KEY_DATA + " BLOB," 112 values.put(SoundModelContract.KEY_DATA, soundModel.data); 199 byte[] data = c.getBlob(c.getColumnIndex(SoundModelContract.KEY_DATA));
|