/external/icu/icu4c/source/common/ |
uloc_keytype.cpp | 71 LocExtKeyData* keyData = (LocExtKeyData*)obj; 72 if (keyData->typeMap != NULL) { 73 uhash_close(keyData->typeMap); 75 uprv_free(keyData); 375 LocExtKeyData* keyData = (LocExtKeyData*)uprv_malloc(sizeof(LocExtKeyData)); 376 if (keyData == NULL) { 380 keyData->bcpId = bcpKeyId; 381 keyData->legacyId = legacyKeyId; 382 keyData->specialTypes = specialTypes; 383 keyData->typeMap = typeDataMap [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/util/ |
KeyUtil.java | 11 public static byte[] getEncodedSubjectPublicKeyInfo(AlgorithmIdentifier algId, ASN1Encodable keyData) 15 return getEncodedSubjectPublicKeyInfo(new SubjectPublicKeyInfo(algId, keyData)); 23 public static byte[] getEncodedSubjectPublicKeyInfo(AlgorithmIdentifier algId, byte[] keyData) 27 return getEncodedSubjectPublicKeyInfo(new SubjectPublicKeyInfo(algId, keyData));
|
/external/icu/android_icu4j/src/main/java/android/icu/impl/locale/ |
KeyTypeData.java | 59 private static class KeyData { 65 KeyData(String legacyId, String bcpId, Map<String, Type> typeMap, 86 KeyData keyData = KEYMAP.get(key); 87 if (keyData != null) { 88 return keyData.bcpId; 95 KeyData keyData = KEYMAP.get(key); 96 if (keyData != null) { 97 return keyData.legacyId [all...] |
/external/icu/icu4j/main/classes/core/src/com/ibm/icu/impl/locale/ |
KeyTypeData.java | 57 private static class KeyData { 63 KeyData(String legacyId, String bcpId, Map<String, Type> typeMap, 84 KeyData keyData = KEYMAP.get(key); 85 if (keyData != null) { 86 return keyData.bcpId; 93 KeyData keyData = KEYMAP.get(key); 94 if (keyData != null) { 95 return keyData.legacyId [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/x509/ |
SubjectPublicKeyInfo.java | 26 private DERBitString keyData; 55 this.keyData = new DERBitString(publicKey); 63 this.keyData = new DERBitString(publicKey); 82 this.keyData = DERBitString.getInstance(e.nextElement()); 110 ASN1InputStream aIn = new ASN1InputStream(keyData.getOctets()); 127 ASN1InputStream aIn = new ASN1InputStream(keyData.getOctets()); 139 return keyData; 155 v.add(keyData);
|
/system/keymaster/ |
keymaster1_engine.cpp | 146 KeyData* key_data = new KeyData(blob, additional_params); 188 KeyData* key_data = new KeyData(blob, additional_params); 219 Keymaster1Engine::KeyData* Keymaster1Engine::GetData(EVP_PKEY* key) const { 236 Keymaster1Engine::KeyData* Keymaster1Engine::GetData(const RSA* rsa) const { 239 return reinterpret_cast<KeyData*>(RSA_get_ex_data(rsa, rsa_index_)); 242 Keymaster1Engine::KeyData* Keymaster1Engine::GetData(const EC_KEY* ec_key) const { 245 return reinterpret_cast<KeyData*>(EC_KEY_get_ex_data(ec_key, ec_key_index_)); 252 KeyData* data = reinterpret_cast<KeyData*>(*from_d) [all...] |
keymaster1_engine.h | 58 struct KeyData { 59 KeyData(const KeymasterKeyBlob& blob, const AuthorizationSet& params) 76 KeyData* GetData(EVP_PKEY* key) const; 77 KeyData* GetData(const RSA* rsa) const; 78 KeyData* GetData(const EC_KEY* rsa) const; 95 keymaster_error_t Keymaster1Finish(const KeyData* key_data, const keymaster_blob_t& input,
|
ecdsa_keymaster1_operation.cpp | 33 Keymaster1Engine::KeyData* key_data = engine_->GetData(ecdsa_key); 63 Keymaster1Engine::KeyData* key_data = engine_->GetData(ecdsa_key); 79 Keymaster1Engine::KeyData* key_data = engine_->GetData(ecdsa_key);
|
rsa_keymaster1_operation.cpp | 33 Keymaster1Engine::KeyData* key_data = engine_->GetData(rsa_key); 79 Keymaster1Engine::KeyData* key_data = engine_->GetData(rsa_key); 95 Keymaster1Engine::KeyData* key_data = engine_->GetData(rsa_key); // key_data is owned by rsa
|
/frameworks/base/keystore/java/android/security/ |
SystemKeyStore.java | 48 public static String toHexString(byte[] keyData) { 49 if (keyData == null) { 52 int keyLen = keyData.length; 53 int expectedStringLen = keyData.length * 2; 55 for (int i = 0; i < keyData.length; i++) { 56 String hexStr = Integer.toString(keyData[i] & 0x00FF, 16);
|
KeyStore.java | 449 public int importKey(String alias, KeymasterArguments args, int format, byte[] keyData, 452 return mBinder.importKey(alias, args, format, keyData, uid, flags, 460 public int importKey(String alias, KeymasterArguments args, int format, byte[] keyData, 462 return importKey(alias, args, format, keyData, UID_SELF, flags, outCharacteristics);
|
/external/cros/system_api/dbus/cryptohome/ |
key.proto | 63 message KeyData { 70 // All keys must be labeled when persisted to disk, but when KeyData 72 // (so that the caller doesn't need the full KeyData first). 89 // is only required if KeyData is changing. If only the |secret| is changing, 91 optional KeyData data = 1;
|
rpc.proto | 119 // Setting this value means that the KeyData is filled as it 179 repeated KeyData key_data = 1;
|
/frameworks/base/core/java/android/text/method/ |
DialerKeyListener.java | 20 import android.view.KeyCharacterMap.KeyData; 82 KeyData kd = new KeyData();
|
/hardware/ti/omap4-aah/security/tf_sdk/include/ |
OEMCrypto.h | 322 * keyData (out) - pointer to the buffer to hold the Key Data field from the Keybox 324 * of bytes in KeyData. 328 * OEMCrypto_ERROR_SHORT_BUFFER if the buffer is too small to return the KeyData 329 * OEMCrypto_ERROR_NO_KEYDATA failed to return KeyData 331 OEMCryptoResult OEMCrypto_GetKeyData(OEMCrypto_UINT8* keyData,
|
/cts/tests/tests/view/src/android/view/cts/ |
KeyEventTest.java | 26 import android.view.KeyCharacterMap.KeyData; 101 KeyData keyData = new KeyData(); 102 assertTrue(keyEvent.getKeyData(keyData)); 104 assertEquals('Z', keyData.displayLabel); 105 assertEquals(0, keyData.number); 106 assertEquals('z', keyData.meta[0]); 107 assertEquals('Z', keyData.meta[1]); 108 assertEquals(0, keyData.meta[3]) [all...] |
KeyCharacterMapTest.java | 24 import android.view.KeyCharacterMap.KeyData; 325 KeyData result = new KeyData();
|
/external/iw/ |
util.c | 395 char *keydata; local 413 keydata = arg + pos; 414 switch (strlen(keydata)) { 416 keydata = hex2bin(keydata, keybuf); 422 keydata = hex2bin(keydata, keybuf); 431 if (!keydata) 434 NLA_PUT(msg, NL80211_KEY_DATA, keylen, keydata);
|
/hardware/qcom/keymaster/ |
keymaster_qcom.cpp | 371 UniquePtr<unsigned char[]> keydata(new unsigned char[resp->key_blob_len]); 372 if (keydata.get() == NULL) { 376 unsigned char* p = keydata.get(); 378 *keyBlob = keydata.release(); 454 UniquePtr<unsigned char[]> keydata(new unsigned char[resp->key_blob_len]); 455 if (keydata.get() == NULL) { 459 unsigned char* p = keydata.get(); 461 *keyBlob = keydata.release();
|
/frameworks/base/core/java/android/security/ |
IKeystoreService.aidl | 65 in byte[] keyData, int uid, int flags, out KeyCharacteristics characteristics);
|
/prebuilts/gcc/linux-x86/host/x86_64-w64-mingw32-4.8/x86_64-w64-mingw32/include/ |
ntddcdvd.h | 145 UCHAR KeyData[0];
|
/frameworks/base/core/java/android/view/ |
KeyCharacterMap.java | 524 public static class KeyData { 554 * @param results A {@link KeyData} instance that will be filled with the results. 561 public boolean getKeyData(int keyCode, KeyData results) { 562 if (results.meta.length < KeyData.META_LENGTH) { 564 "results.meta.length must be >= " + KeyData.META_LENGTH);
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/rsa/rsa/ |
cli.py | 169 keydata = keyfile.read() 171 return self.key_class.load_pkcs1(keydata, keyform)
|
/external/wpa_supplicant_8/src/eapol_supp/ |
eapol_supp_sm.c | 665 struct eap_key_data keydata; local 703 res = eapol_sm_get_key(sm, (u8 *) &keydata, sizeof(keydata)); 711 res = eapol_sm_get_key(sm, (u8 *) &keydata, 16); 719 os_memcpy(keydata.sign_key, keydata.encr_key, 16); 743 hmac_md5(keydata.sign_key, sign_key_len, 771 os_memcpy(ekey + IEEE8021X_KEY_IV_LEN, keydata.encr_key, 790 os_memcpy(datakey, keydata.encr_key, key_len); [all...] |
/external/llvm/include/llvm/ADT/ |
StringMap.h | 190 static StringMapEntry &GetStringMapEntryFromKeyData(const char *KeyData) { 191 char *Ptr = const_cast<char*>(KeyData) - sizeof(StringMapEntry<ValueTy>);
|