/external/boringssl/src/crypto/evp/ |
evp_test.cc | 182 const std::string &key_name = t->GetParameter(); local 183 if (key_map->count(key_name) > 0) { 184 t->PrintLine("Duplicate key '%s'.", key_name.c_str()); 187 (*key_map)[key_name] = std::move(pkey); 220 const std::string &key_name = t->GetParameter(); local 221 if (key_map->count(key_name) == 0) { 222 t->PrintLine("Could not find key '%s'.", key_name.c_str()); 225 EVP_PKEY *key = (*key_map)[key_name].get();
|
/system/tpm/attestation/server/ |
pkcs11_key_store_test.cc | 576 std::string key_name = std::string("prefix") + base::IntToString(i); local 577 key_store.Write(kDefaultUser, key_name, std::string(key_name)); 584 std::string key_name = std::string("prefix") + base::IntToString(i); local 585 EXPECT_FALSE(key_store.Read(kDefaultUser, key_name, &blob));
|
pkcs11_key_store.cc | 95 const std::string& key_name, 107 CK_OBJECT_HANDLE key_handle = FindObject(session.handle(), key_name); 109 LOG(WARNING) << "Pkcs11KeyStore: Key does not exist: " << key_name; 116 LOG(ERROR) << "Pkcs11KeyStore: Failed to read key data: " << key_name; 123 LOG(ERROR) << "Pkcs11KeyStore: Failed to read key data: " << key_name; 131 const std::string& key_name, 134 if (!Delete(username, key_name)) { 147 std::string mutable_key_name(key_name); 166 LOG(ERROR) << "Pkcs11KeyStore: Failed to write key data: " << key_name; 173 const std::string& key_name) { 509 std::string key_name; local [all...] |
/system/tpm/trunks/ |
tpm_generated_test.cc | 243 TPM2B_NAME key_name; local 249 &creation_ticket, &key_name, &authorization); 259 EXPECT_EQ(key_name.size, 3); 260 EXPECT_EQ(key_name.name[0], 'K'); 261 EXPECT_EQ(key_name.name[1], 'E'); 262 EXPECT_EQ(key_name.name[2], 'Y');
|
tpm_utility_test.cc | 604 std::string key_name; local 642 std::string key_name; local [all...] |
tpm_utility_impl.cc | 444 std::string key_name; local 445 result = ComputeKeyName(public_area, &key_name); 455 result = factory_.GetTpm()->RSA_EncryptSync(key_handle, key_name, in_message, 511 std::string key_name; local 512 result = ComputeKeyName(public_area, &key_name); 522 result = factory_.GetTpm()->RSA_DecryptSync(key_handle, key_name, in_message, 578 std::string key_name; local 579 result = ComputeKeyName(public_area, &key_name); 592 factory_.GetTpm()->SignSync(key_handle, key_name, tpm_digest, in_scheme, 650 std::string key_name; local 709 std::string key_name; local 950 TPM2B_NAME key_name; local 1662 TPM2B_NAME key_name; local [all...] |
/external/libchrome/base/trace_event/ |
trace_event_argument.cc | 58 std::string key_name; local 62 key_name = reinterpret_cast<const char*>(static_cast<uintptr_t>(ptr_value)); 64 res = pickle_iterator.ReadString(&key_name); 67 return key_name;
|
/external/boringssl/src/ssl/ |
ssl_session.c | 611 uint8_t key_name[16]; local 613 if (tctx->tlsext_ticket_key_cb(ssl, key_name, iv, &ctx, &hctx, 625 OPENSSL_memcpy(key_name, tctx->tlsext_tick_key_name, 16); 629 if (!CBB_add_bytes(out, key_name, 16) || [all...] |
/development/cmds/monkey/src/com/android/commands/monkey/ |
MonkeySourceScript.java | 682 String key_name = args[0]; local 683 int keyCode = MonkeySourceRandom.getKeyCode(key_name); [all...] |
/external/syslinux/com32/menu/ |
readconfig.c | 753 char *key_name, *k, *ek; local 756 p = get_word(skipspace(p + 9), &key_name); 758 k = key_name; 772 refstr_put(key_name);
|
/external/v8/src/ |
api.cc | 4275 auto key_name = i::Handle<i::Name>::cast(key_obj); local 4297 i::Handle<i::String> key_name = Utils::OpenHandle(*key); local [all...] |