/external/libchrome/crypto/ |
symmetric_key.cc | 45 uint8_t* key_data = reinterpret_cast<uint8_t*>( local 48 int rv = RAND_bytes(key_data, static_cast<int>(key_size_in_bytes)); 77 uint8_t* key_data = reinterpret_cast<uint8_t*>( local 83 key_size_in_bytes, key_data);
|
/system/core/libcrypto_utils/tests/ |
android_pubkey_test.cpp | 126 uint8_t key_data[ANDROID_PUBKEY_ENCODED_SIZE]; local 127 ASSERT_TRUE(android_pubkey_encode(key_.get(), key_data, sizeof(key_data))); 128 ASSERT_EQ(0, memcmp(kKey2048, key_data, sizeof(kKey2048)));
|
/external/vboot_reference/firmware/lib20/ |
misc.c | 22 uint8_t *key_data; local 36 key_data = vb2_workbuf_alloc(&wb, key_size); 37 if (!key_data) 41 key_data, key_size); 46 rv = vb2_unpack_key(&root_key, key_data, key_size); 99 packed_key = (struct vb2_packed_key *)key_data; 111 memmove(key_data + packed_key->key_offset, 116 sd->workbuf_data_key_offset = vb2_offset_of(ctx->workbuf, key_data); 135 uint8_t *key_data = ctx->workbuf + sd->workbuf_data_key_offset; local 151 rv = vb2_unpack_key(&data_key, key_data, key_size) [all...] |
/external/vboot_reference/firmware/lib21/ |
misc.c | 70 uint8_t *key_data; local 82 key_data = vb2_workbuf_alloc(&wb, key_size); 83 if (!key_data) 87 key_data, key_size); 92 rv = vb2_unpack_key(&root_key, key_data, key_size); 139 memmove(key_data, packed_key, packed_key->c.total_size); 140 packed_key = (struct vb2_packed_key *)key_data; 143 sd->workbuf_data_key_offset = vb2_offset_of(ctx->workbuf, key_data); 158 uint8_t *key_data = ctx->workbuf + sd->workbuf_data_key_offset; local 173 rv = vb2_unpack_key(&data_key, key_data, key_size) [all...] |
/hardware/intel/img/psb_headers/DRM/cc54/inc/ |
wv_fkp.h | 48 uint8_t key_data[KEYBOX_KEYDATA_SIZE]; // 72 bytes member in struct:wv_keybox
|
wv_mod_oem_crypto.h | 50 const uint8_t *key_data; member in struct:drm_wv_mod_key_object
|
/system/extras/verity/ |
generate_verity_key.c | 36 uint8_t key_data[ANDROID_PUBKEY_ENCODED_SIZE]; local 44 if (!android_pubkey_encode(private_key, key_data, sizeof(key_data))) 51 BIO_write(bfile, key_data, sizeof(key_data));
|
/system/keymaster/legacy_support/ |
ecdsa_keymaster1_operation.cpp | 32 Keymaster1Engine::KeyData* key_data = engine_->GetData(ecdsa_key); local 33 if (!key_data) 55 return engine_->device()->begin(engine_->device(), purpose_, &key_data->key_material, 62 Keymaster1Engine::KeyData* key_data = engine_->GetData(ecdsa_key); local 63 if (!key_data) { 67 key_data->op_handle = operation_handle_; 68 key_data->finish_params.Reinitialize(input_params); 78 Keymaster1Engine::KeyData* key_data = engine_->GetData(ecdsa_key); local 79 if (!key_data) 81 return key_data->error [all...] |
rsa_keymaster1_operation.cpp | 32 Keymaster1Engine::KeyData* key_data = engine_->GetData(rsa_key); local 33 if (!key_data) 61 key_data->expected_openssl_padding = RSA_NO_PADDING; 67 key_data->expected_openssl_padding = RSA_PKCS1_PADDING; 71 return engine_->device()->begin(engine_->device(), purpose_, &key_data->key_material, 78 Keymaster1Engine::KeyData* key_data = engine_->GetData(rsa_key); local 79 if (!key_data) { 83 key_data->op_handle = operation_handle_; 84 key_data->finish_params.Reinitialize(input_params); 94 Keymaster1Engine::KeyData* key_data = engine_->GetData(rsa_key); // key_data is owned by rs local [all...] |
keymaster1_engine.cpp | 145 KeyData* key_data = new KeyData(blob, additional_params); local 146 if (!RSA_set_ex_data(rsa.get(), rsa_index_, key_data)) { 148 delete key_data; 154 GetKeymaster1PublicKey(key_data->key_material, key_data->begin_params, error)); 185 KeyData* key_data = new KeyData(blob, additional_params); local 186 if (!EC_KEY_set_ex_data(ec_key.get(), ec_key_index_, key_data)) { 188 delete key_data; 264 keymaster_error_t Keymaster1Engine::Keymaster1Finish(const KeyData* key_data, 267 if (key_data->op_handle == 0 286 KeyData* key_data = instance_->GetData(rsa); local 311 KeyData* key_data = instance_->GetData(rsa); local 336 KeyData* key_data = instance_->GetData(ec_key); local [all...] |
/external/avb/test/ |
avb_unittest_util.h | 141 std::string key_data; local 142 EXPECT_TRUE(base::ReadFileToString(tmp_path, &key_data)); 143 return key_data;
|
avbtool_unittest.cc | 144 std::string key_data = local 153 EXPECT_GT(h.auxiliary_data_block_size, key_data.size()); 155 memcmp(key_data.data(), 157 key_data.size())); [all...] |
/external/vboot_reference/host/lib/ |
host_key.c | 163 uint8_t* key_data; local 177 key_data = ReadFile(filename, &key_size); 178 if (!key_data) 184 free(key_data); 190 free(key_data); 193 Memcpy(GetPublicKeyData(key), key_data, key_size); local 195 free(key_data);
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_tls.c | 23 u8 *key_data; member in struct:eap_tls_data 131 if (data->key_data) { 132 bin_clear_free(data->key_data, EAP_TLS_KEY_LEN + EAP_EMSK_LEN); 133 data->key_data = NULL; 182 data->key_data = eap_peer_tls_derive_key(sm, &data->ssl, 186 if (data->key_data) { 188 data->key_data, EAP_TLS_KEY_LEN); 190 data->key_data + EAP_TLS_KEY_LEN, 329 return data->key_data != NULL; 338 if (data->key_data == NULL [all...] |
eap_peap.c | 57 u8 *key_data; member in struct:eap_peap_data 171 if (data->key_data) { 172 bin_clear_free(data->key_data, EAP_TLS_KEY_LEN); 173 data->key_data = NULL; 262 tk = data->key_data; 1082 data->key_data = 1085 if (data->key_data) { 1088 data->key_data, [all...] |
eap_fast.c | 55 u8 key_data[EAP_FAST_KEY_LEN]; member in struct:eap_fast_data 250 os_memset(data->key_data, 0, EAP_FAST_KEY_LEN); 261 if (eap_fast_derive_eap_msk(data->simck, data->key_data) < 0 || [all...] |
eap_ttls.c | 57 u8 *key_data; member in struct:eap_ttls_data 182 if (data->key_data) { 183 bin_clear_free(data->key_data, EAP_TLS_KEY_LEN + EAP_EMSK_LEN); 184 data->key_data = NULL; 272 data->key_data = eap_peer_tls_derive_key(sm, &data->ssl, 276 if (!data->key_data) { 282 data->key_data, EAP_TLS_KEY_LEN); 284 data->key_data + EAP_TLS_KEY_LEN, [all...] |
/system/keymaster/tests/ |
key_blob_test.cpp | 38 const uint8_t key_data[5] = {21, 22, 23, 24, 25}; member in namespace:keymaster::test 44 key_material_(key_data, array_length(key_data)) { 103 // key_data shouldn't be anywhere in the blob, ciphertext should.
|
/bionic/libc/bionic/ |
pthread_internal.h | 110 pthread_key_data_t key_data[BIONIC_PTHREAD_KEY_COUNT]; member in class:pthread_internal_t
|
/external/mesa3d/src/intel/vulkan/ |
anv_pipeline_cache.c | 46 const void *key_data, uint32_t key_size, 89 memcpy(key->data, key_data, key_size); 229 const void *key_data, uint32_t key_size) 234 memcpy(key->data, key_data, key_size); 245 const void *key_data, uint32_t key_size) 253 anv_pipeline_cache_search_locked(cache, key_data, key_size); 266 const void *key_data, uint32_t key_size, 274 anv_pipeline_cache_search_locked(cache, key_data, key_size); 279 anv_shader_bin_create(cache->device, key_data, key_size, 293 const void *key_data, uint32_t key_size 386 const void *key_data = p + sizeof(key); local [all...] |
/external/vboot_reference/host/lib21/ |
host_key.c | 381 uint8_t *key_data, *key_buf; local 387 if (vb2_read_file(filename, &key_data, &key_size)) 396 free(key_data); 401 free(key_data); 407 memcpy(key_buf, key_data, key_size); 408 free(key_data);
|
/system/tpm/attestation/server/ |
attestation_service.cc | 650 std::string key_data; local 651 if (!key_store_->Read(username, key_label, &key_data)) { 655 if (key && !key->ParseFromString(key_data)) { 707 std::string key_data; local 708 if (!key.SerializeToString(&key_data)) { 712 if (!key_store_->Write(username, key_label, key_data)) {
|
/system/core/fs_mgr/ |
fs_mgr_verity.cpp | 90 uint8_t key_data[ANDROID_PUBKEY_ENCODED_SIZE]; local 98 if (!fread(key_data, sizeof(key_data), 1, f)) { 107 if (!android_pubkey_decode(key_data, sizeof(key_data), &key)) {
|
/system/keymaster/include/keymaster/ |
android_keymaster_messages.h | 455 : KeymasterMessage(ver), key_data(nullptr) {} 456 ~ImportKeyRequest() { delete[] key_data; } 469 uint8_t* key_data; member in struct:keymaster::ImportKeyRequest 517 : KeymasterResponse(ver), key_data(nullptr) {} 518 ~ExportKeyResponse() { delete[] key_data; } 529 uint8_t* key_data; member in struct:keymaster::ExportKeyResponse [all...] |
/external/wpa_supplicant_8/src/ap/ |
wpa_auth.c | 907 const u8 *key_data; local 927 key_data = mic + mic_len + 2; 940 "key_data overflow (%d > %lu)", 1377 u8 *key_mic, *key_data; local 2607 const u8 *eapol_key_ie, *key_data, *mic; local [all...] |