HomeSort by relevance Sort by last modified time
    Searched defs:key_data (Results 1 - 25 of 26) sorted by null

1 2

  /external/libchrome/crypto/
symmetric_key_openssl.cc 44 uint8_t* key_data = reinterpret_cast<uint8_t*>( local
47 int rv = RAND_bytes(key_data, static_cast<int>(key_size_in_bytes));
75 uint8_t* key_data = reinterpret_cast<uint8_t*>( local
80 static_cast<int>(key_size_in_bytes), key_data);
hmac_win.cc 141 BYTE key_data[1]; member in struct:crypto::KeyBlob
143 size_t key_blob_size = std::max(offsetof(KeyBlob, key_data) + key_length,
152 memcpy(key_blob->key_data, key, key_length);
162 SecureZeroMemory(key_blob->key_data, key_length);
  /external/vboot_reference/firmware/lib20/
misc.c 22 uint8_t *key_data; local
36 key_data = vb2_workbuf_alloc(&wb, key_size);
37 if (!key_data)
41 key_data, key_size);
46 rv = vb2_unpack_key(&root_key, key_data, key_size);
99 packed_key = (struct vb2_packed_key *)key_data;
111 memmove(key_data + packed_key->key_offset,
116 sd->workbuf_data_key_offset = vb2_offset_of(ctx->workbuf, key_data);
135 uint8_t *key_data = ctx->workbuf + sd->workbuf_data_key_offset; local
151 rv = vb2_unpack_key(&data_key, key_data, key_size)
    [all...]
  /external/vboot_reference/firmware/lib21/
misc.c 70 uint8_t *key_data; local
82 key_data = vb2_workbuf_alloc(&wb, key_size);
83 if (!key_data)
87 key_data, key_size);
92 rv = vb2_unpack_key(&root_key, key_data, key_size);
139 memmove(key_data, packed_key, packed_key->c.total_size);
140 packed_key = (struct vb2_packed_key *)key_data;
143 sd->workbuf_data_key_offset = vb2_offset_of(ctx->workbuf, key_data);
158 uint8_t *key_data = ctx->workbuf + sd->workbuf_data_key_offset; local
173 rv = vb2_unpack_key(&data_key, key_data, key_size)
    [all...]
  /hardware/intel/img/psb_headers/DRM/cc54/inc/
wv_fkp.h 48 uint8_t key_data[KEYBOX_KEYDATA_SIZE]; // 72 bytes member in struct:wv_keybox
wv_mod_oem_crypto.h 40 const uint8_t *key_data; member in struct:drm_wv_mod_key_object
  /system/keymaster/
ecdsa_keymaster1_operation.cpp 33 Keymaster1Engine::KeyData* key_data = engine_->GetData(ecdsa_key); local
34 if (!key_data)
56 return engine_->device()->begin(engine_->device(), purpose_, &key_data->key_material,
63 Keymaster1Engine::KeyData* key_data = engine_->GetData(ecdsa_key); local
64 if (!key_data) {
68 key_data->op_handle = operation_handle_;
69 key_data->finish_params.Reinitialize(input_params);
79 Keymaster1Engine::KeyData* key_data = engine_->GetData(ecdsa_key); local
80 if (!key_data)
82 return key_data->error
    [all...]
rsa_keymaster1_operation.cpp 33 Keymaster1Engine::KeyData* key_data = engine_->GetData(rsa_key); local
34 if (!key_data)
62 key_data->expected_openssl_padding = RSA_NO_PADDING;
68 key_data->expected_openssl_padding = RSA_PKCS1_PADDING;
72 return engine_->device()->begin(engine_->device(), purpose_, &key_data->key_material,
79 Keymaster1Engine::KeyData* key_data = engine_->GetData(rsa_key); local
80 if (!key_data) {
84 key_data->op_handle = operation_handle_;
85 key_data->finish_params.Reinitialize(input_params);
95 Keymaster1Engine::KeyData* key_data = engine_->GetData(rsa_key); // key_data is owned by rs local
    [all...]
symmetric_key.h 67 const uint8_t* key_data() const { return key_data_.get(); } function in class:keymaster::SymmetricKey
key_blob_test.cpp 38 const uint8_t key_data[5] = {21, 22, 23, 24, 25}; member in namespace:keymaster::test
44 key_material_(key_data, array_length(key_data)) {
103 // key_data shouldn't be anywhere in the blob, ciphertext should.
keymaster1_engine.cpp 146 KeyData* key_data = new KeyData(blob, additional_params); local
147 if (!RSA_set_ex_data(rsa.get(), rsa_index_, key_data)) {
149 delete key_data;
155 GetKeymaster1PublicKey(key_data->key_material, key_data->begin_params, error));
188 KeyData* key_data = new KeyData(blob, additional_params); local
189 if (!EC_KEY_set_ex_data(ec_key.get(), ec_key_index_, key_data)) {
191 delete key_data;
269 keymaster_error_t Keymaster1Engine::Keymaster1Finish(const KeyData* key_data,
272 if (key_data->op_handle == 0
291 KeyData* key_data = instance_->GetData(rsa); local
316 KeyData* key_data = instance_->GetData(rsa); local
341 KeyData* key_data = instance_->GetData(ec_key); local
    [all...]
android_keymaster_test.cpp 860 uint8_t key_data[] = { local
975 uint8_t key_data[25] = { local
1905 char key_data[16] = {0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0}; local
1924 char key_data[16] = {0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0}; local
3334 uint8_t* key_data = reinterpret_cast<uint8_t*>(malloc(km1_sw.length())); local
3351 uint8_t* key_data = reinterpret_cast<uint8_t*>(malloc(km1_sw.length())); local
3368 uint8_t* key_data = reinterpret_cast<uint8_t*>(malloc(km1_sw.length())); local
3388 uint8_t* key_data = reinterpret_cast<uint8_t*>(malloc(km0_sw.length())); local
3404 uint8_t* key_data = reinterpret_cast<uint8_t*>(malloc(km0_sw.length())); local
3432 uint8_t* key_data = reinterpret_cast<uint8_t*>(malloc(km0_sw.length())); local
3454 uint8_t* key_data = reinterpret_cast<uint8_t*>(malloc(km0_sw.length())); local
    [all...]
  /external/vboot_reference/host/lib/
host_key.c 163 uint8_t* key_data; local
177 key_data = ReadFile(filename, &key_size);
178 if (!key_data)
184 free(key_data);
190 free(key_data);
193 Memcpy(GetPublicKeyData(key), key_data, key_size); local
195 free(key_data);
  /bionic/libc/bionic/
pthread_internal.h 105 pthread_key_data_t key_data[BIONIC_PTHREAD_KEY_COUNT]; member in class:pthread_internal_t
  /external/wpa_supplicant_8/src/eap_peer/
eap_tls.c 23 u8 *key_data; member in struct:eap_tls_data
131 if (data->key_data) {
132 bin_clear_free(data->key_data, EAP_TLS_KEY_LEN + EAP_EMSK_LEN);
133 data->key_data = NULL;
182 data->key_data = eap_peer_tls_derive_key(sm, &data->ssl,
186 if (data->key_data) {
188 data->key_data, EAP_TLS_KEY_LEN);
190 data->key_data + EAP_TLS_KEY_LEN,
329 return data->key_data != NULL;
338 if (data->key_data == NULL
    [all...]
eap_peap.c 57 u8 *key_data; member in struct:eap_peap_data
171 if (data->key_data) {
172 bin_clear_free(data->key_data, EAP_TLS_KEY_LEN);
173 data->key_data = NULL;
262 tk = data->key_data;
1081 data->key_data =
1084 if (data->key_data) {
1087 data->key_data,
    [all...]
eap_fast.c 55 u8 key_data[EAP_FAST_KEY_LEN]; member in struct:eap_fast_data
250 os_memset(data->key_data, 0, EAP_FAST_KEY_LEN);
261 if (eap_fast_derive_eap_msk(data->simck, data->key_data) < 0 ||
    [all...]
eap_ttls.c 57 u8 *key_data; member in struct:eap_ttls_data
182 if (data->key_data) {
183 bin_clear_free(data->key_data, EAP_TLS_KEY_LEN + EAP_EMSK_LEN);
184 data->key_data = NULL;
272 data->key_data = eap_peer_tls_derive_key(sm, &data->ssl,
276 if (!data->key_data) {
282 data->key_data, EAP_TLS_KEY_LEN);
284 data->key_data + EAP_TLS_KEY_LEN,
    [all...]
  /external/boringssl/src/ssl/
t1_enc.c 285 const uint8_t *key_data; local
323 key_data = ssl->s3->tmp.key_block;
324 client_write_mac_secret = key_data;
325 key_data += mac_secret_len;
326 server_write_mac_secret = key_data;
327 key_data += mac_secret_len;
328 client_write_key = key_data;
329 key_data += key_len;
330 server_write_key = key_data;
331 key_data += key_len
    [all...]
  /external/vboot_reference/host/lib21/
host_key.c 381 uint8_t *key_data, *key_buf; local
387 if (vb2_read_file(filename, &key_data, &key_size))
396 free(key_data);
401 free(key_data);
407 memcpy(key_buf, key_data, key_size);
408 free(key_data);
  /system/tpm/attestation/server/
attestation_service.cc 707 std::string key_data; local
708 if (!key_store_->Read(username, key_label, &key_data)) {
712 if (key && !key->ParseFromString(key_data)) {
770 std::string key_data; local
771 if (!key.SerializeToString(&key_data)) {
775 if (!key_store_->Write(username, key_label, key_data)) {
  /external/wpa_supplicant_8/src/rsn_supp/
wpa.c 447 u16 ver, const u8 *key_data,
471 key_data, key_data_len);
472 if (wpa_supplicant_parse_ies(key_data, key_data_len, &ie) < 0)
1771 u8 *key_data; local
    [all...]
  /system/keymaster/include/keymaster/
android_keymaster_messages.h 447 : KeymasterMessage(ver), key_data(nullptr) {}
448 ~ImportKeyRequest() { delete[] key_data; }
461 uint8_t* key_data; member in struct:keymaster::ImportKeyRequest
509 : KeymasterResponse(ver), key_data(nullptr) {}
510 ~ExportKeyResponse() { delete[] key_data; }
521 uint8_t* key_data; member in struct:keymaster::ExportKeyResponse
  /external/wpa_supplicant_8/src/ap/
wpa_auth.c 887 const u8 *eapol_key_ie, *key_data; local
904 key_data = (const u8 *) (key192 + 1);
907 key_data = (const u8 *) (key + 1);
915 "key_data overflow (%d > %lu)",
1125 if (wpa_parse_kde_ies(key_data, key_data_length, &kde) < 0) {
1422 u8 *key_data; local
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/
config.c 58 int key_data; member in struct:parse_data
81 data->key_data ? "[KEY DATA REMOVED]" : value);
85 if (data->key_data) {
    [all...]

Completed in 448 milliseconds

1 2