/external/libchrome/crypto/ |
symmetric_key_openssl.cc | 44 uint8_t* key_data = reinterpret_cast<uint8_t*>( local 47 int rv = RAND_bytes(key_data, static_cast<int>(key_size_in_bytes)); 75 uint8_t* key_data = reinterpret_cast<uint8_t*>( local 80 static_cast<int>(key_size_in_bytes), key_data);
|
hmac_win.cc | 141 BYTE key_data[1]; member in struct:crypto::KeyBlob 143 size_t key_blob_size = std::max(offsetof(KeyBlob, key_data) + key_length, 152 memcpy(key_blob->key_data, key, key_length); 162 SecureZeroMemory(key_blob->key_data, key_length);
|
/external/vboot_reference/firmware/lib20/ |
misc.c | 22 uint8_t *key_data; local 36 key_data = vb2_workbuf_alloc(&wb, key_size); 37 if (!key_data) 41 key_data, key_size); 46 rv = vb2_unpack_key(&root_key, key_data, key_size); 99 packed_key = (struct vb2_packed_key *)key_data; 111 memmove(key_data + packed_key->key_offset, 116 sd->workbuf_data_key_offset = vb2_offset_of(ctx->workbuf, key_data); 135 uint8_t *key_data = ctx->workbuf + sd->workbuf_data_key_offset; local 151 rv = vb2_unpack_key(&data_key, key_data, key_size) [all...] |
/external/vboot_reference/firmware/lib21/ |
misc.c | 70 uint8_t *key_data; local 82 key_data = vb2_workbuf_alloc(&wb, key_size); 83 if (!key_data) 87 key_data, key_size); 92 rv = vb2_unpack_key(&root_key, key_data, key_size); 139 memmove(key_data, packed_key, packed_key->c.total_size); 140 packed_key = (struct vb2_packed_key *)key_data; 143 sd->workbuf_data_key_offset = vb2_offset_of(ctx->workbuf, key_data); 158 uint8_t *key_data = ctx->workbuf + sd->workbuf_data_key_offset; local 173 rv = vb2_unpack_key(&data_key, key_data, key_size) [all...] |
/hardware/intel/img/psb_headers/DRM/cc54/inc/ |
wv_fkp.h | 48 uint8_t key_data[KEYBOX_KEYDATA_SIZE]; // 72 bytes member in struct:wv_keybox
|
wv_mod_oem_crypto.h | 40 const uint8_t *key_data; member in struct:drm_wv_mod_key_object
|
/system/keymaster/ |
ecdsa_keymaster1_operation.cpp | 33 Keymaster1Engine::KeyData* key_data = engine_->GetData(ecdsa_key); local 34 if (!key_data) 56 return engine_->device()->begin(engine_->device(), purpose_, &key_data->key_material, 63 Keymaster1Engine::KeyData* key_data = engine_->GetData(ecdsa_key); local 64 if (!key_data) { 68 key_data->op_handle = operation_handle_; 69 key_data->finish_params.Reinitialize(input_params); 79 Keymaster1Engine::KeyData* key_data = engine_->GetData(ecdsa_key); local 80 if (!key_data) 82 return key_data->error [all...] |
rsa_keymaster1_operation.cpp | 33 Keymaster1Engine::KeyData* key_data = engine_->GetData(rsa_key); local 34 if (!key_data) 62 key_data->expected_openssl_padding = RSA_NO_PADDING; 68 key_data->expected_openssl_padding = RSA_PKCS1_PADDING; 72 return engine_->device()->begin(engine_->device(), purpose_, &key_data->key_material, 79 Keymaster1Engine::KeyData* key_data = engine_->GetData(rsa_key); local 80 if (!key_data) { 84 key_data->op_handle = operation_handle_; 85 key_data->finish_params.Reinitialize(input_params); 95 Keymaster1Engine::KeyData* key_data = engine_->GetData(rsa_key); // key_data is owned by rs local [all...] |
symmetric_key.h | 67 const uint8_t* key_data() const { return key_data_.get(); } function in class:keymaster::SymmetricKey
|
key_blob_test.cpp | 38 const uint8_t key_data[5] = {21, 22, 23, 24, 25}; member in namespace:keymaster::test 44 key_material_(key_data, array_length(key_data)) { 103 // key_data shouldn't be anywhere in the blob, ciphertext should.
|
keymaster1_engine.cpp | 146 KeyData* key_data = new KeyData(blob, additional_params); local 147 if (!RSA_set_ex_data(rsa.get(), rsa_index_, key_data)) { 149 delete key_data; 155 GetKeymaster1PublicKey(key_data->key_material, key_data->begin_params, error)); 188 KeyData* key_data = new KeyData(blob, additional_params); local 189 if (!EC_KEY_set_ex_data(ec_key.get(), ec_key_index_, key_data)) { 191 delete key_data; 269 keymaster_error_t Keymaster1Engine::Keymaster1Finish(const KeyData* key_data, 272 if (key_data->op_handle == 0 291 KeyData* key_data = instance_->GetData(rsa); local 316 KeyData* key_data = instance_->GetData(rsa); local 341 KeyData* key_data = instance_->GetData(ec_key); local [all...] |
android_keymaster_test.cpp | 860 uint8_t key_data[] = { local 975 uint8_t key_data[25] = { local 1905 char key_data[16] = {0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0}; local 1924 char key_data[16] = {0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0}; local 3334 uint8_t* key_data = reinterpret_cast<uint8_t*>(malloc(km1_sw.length())); local 3351 uint8_t* key_data = reinterpret_cast<uint8_t*>(malloc(km1_sw.length())); local 3368 uint8_t* key_data = reinterpret_cast<uint8_t*>(malloc(km1_sw.length())); local 3388 uint8_t* key_data = reinterpret_cast<uint8_t*>(malloc(km0_sw.length())); local 3404 uint8_t* key_data = reinterpret_cast<uint8_t*>(malloc(km0_sw.length())); local 3432 uint8_t* key_data = reinterpret_cast<uint8_t*>(malloc(km0_sw.length())); local 3454 uint8_t* key_data = reinterpret_cast<uint8_t*>(malloc(km0_sw.length())); local [all...] |
/external/vboot_reference/host/lib/ |
host_key.c | 163 uint8_t* key_data; local 177 key_data = ReadFile(filename, &key_size); 178 if (!key_data) 184 free(key_data); 190 free(key_data); 193 Memcpy(GetPublicKeyData(key), key_data, key_size); local 195 free(key_data);
|
/bionic/libc/bionic/ |
pthread_internal.h | 105 pthread_key_data_t key_data[BIONIC_PTHREAD_KEY_COUNT]; member in class:pthread_internal_t
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_tls.c | 23 u8 *key_data; member in struct:eap_tls_data 131 if (data->key_data) { 132 bin_clear_free(data->key_data, EAP_TLS_KEY_LEN + EAP_EMSK_LEN); 133 data->key_data = NULL; 182 data->key_data = eap_peer_tls_derive_key(sm, &data->ssl, 186 if (data->key_data) { 188 data->key_data, EAP_TLS_KEY_LEN); 190 data->key_data + EAP_TLS_KEY_LEN, 329 return data->key_data != NULL; 338 if (data->key_data == NULL [all...] |
eap_peap.c | 57 u8 *key_data; member in struct:eap_peap_data 171 if (data->key_data) { 172 bin_clear_free(data->key_data, EAP_TLS_KEY_LEN); 173 data->key_data = NULL; 262 tk = data->key_data; 1081 data->key_data = 1084 if (data->key_data) { 1087 data->key_data, [all...] |
eap_fast.c | 55 u8 key_data[EAP_FAST_KEY_LEN]; member in struct:eap_fast_data 250 os_memset(data->key_data, 0, EAP_FAST_KEY_LEN); 261 if (eap_fast_derive_eap_msk(data->simck, data->key_data) < 0 || [all...] |
eap_ttls.c | 57 u8 *key_data; member in struct:eap_ttls_data 182 if (data->key_data) { 183 bin_clear_free(data->key_data, EAP_TLS_KEY_LEN + EAP_EMSK_LEN); 184 data->key_data = NULL; 272 data->key_data = eap_peer_tls_derive_key(sm, &data->ssl, 276 if (!data->key_data) { 282 data->key_data, EAP_TLS_KEY_LEN); 284 data->key_data + EAP_TLS_KEY_LEN, [all...] |
/external/boringssl/src/ssl/ |
t1_enc.c | 285 const uint8_t *key_data; local 323 key_data = ssl->s3->tmp.key_block; 324 client_write_mac_secret = key_data; 325 key_data += mac_secret_len; 326 server_write_mac_secret = key_data; 327 key_data += mac_secret_len; 328 client_write_key = key_data; 329 key_data += key_len; 330 server_write_key = key_data; 331 key_data += key_len [all...] |
/external/vboot_reference/host/lib21/ |
host_key.c | 381 uint8_t *key_data, *key_buf; local 387 if (vb2_read_file(filename, &key_data, &key_size)) 396 free(key_data); 401 free(key_data); 407 memcpy(key_buf, key_data, key_size); 408 free(key_data);
|
/system/tpm/attestation/server/ |
attestation_service.cc | 707 std::string key_data; local 708 if (!key_store_->Read(username, key_label, &key_data)) { 712 if (key && !key->ParseFromString(key_data)) { 770 std::string key_data; local 771 if (!key.SerializeToString(&key_data)) { 775 if (!key_store_->Write(username, key_label, key_data)) {
|
/external/wpa_supplicant_8/src/rsn_supp/ |
wpa.c | 447 u16 ver, const u8 *key_data, 471 key_data, key_data_len); 472 if (wpa_supplicant_parse_ies(key_data, key_data_len, &ie) < 0) 1771 u8 *key_data; local [all...] |
/system/keymaster/include/keymaster/ |
android_keymaster_messages.h | 447 : KeymasterMessage(ver), key_data(nullptr) {} 448 ~ImportKeyRequest() { delete[] key_data; } 461 uint8_t* key_data; member in struct:keymaster::ImportKeyRequest 509 : KeymasterResponse(ver), key_data(nullptr) {} 510 ~ExportKeyResponse() { delete[] key_data; } 521 uint8_t* key_data; member in struct:keymaster::ExportKeyResponse
|
/external/wpa_supplicant_8/src/ap/ |
wpa_auth.c | 887 const u8 *eapol_key_ie, *key_data; local 904 key_data = (const u8 *) (key192 + 1); 907 key_data = (const u8 *) (key + 1); 915 "key_data overflow (%d > %lu)", 1125 if (wpa_parse_kde_ies(key_data, key_data_length, &kde) < 0) { 1422 u8 *key_data; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
config.c | 58 int key_data; member in struct:parse_data 81 data->key_data ? "[KEY DATA REMOVED]" : value); 85 if (data->key_data) { [all...] |