/external/chromium/crypto/ |
H A D | symmetric_key_openssl.cc | 35 uint8* key_data = local 38 int rv = RAND_bytes(key_data, key_size_in_bytes); 54 uint8* key_data = local 59 key_size_in_bytes, key_data);
|
H A D | hmac_win.cc | 128 BYTE key_data[1]; member in struct:crypto::KeyBlob 130 size_t key_blob_size = std::max(offsetof(KeyBlob, key_data) + key_length, 139 memcpy(key_blob->key_data, key, key_length); 149 SecureZeroMemory(key_blob->key_data, key_length);
|
H A D | symmetric_key_mac.cc | 142 SymmetricKey::SymmetricKey(const void *key_data, size_t key_size_in_bits) argument 143 : key_(reinterpret_cast<const char*>(key_data),
|
H A D | symmetric_key_win.cc | 44 // Imports a raw/plaintext key of |key_size| stored in |*key_data| into a new 47 // If |key_data| is intended to be used as an HMAC key, then |alg| should be 53 const void* key_data, DWORD key_size, 60 memcpy(actual_key + sizeof(PlaintextBlobHeader), key_data, key_size); 528 const void* key_data, size_t key_size_in_bytes) 530 if (key_data) { 531 raw_key_.assign(reinterpret_cast<const char*>(key_data), 51 ImportRawKey(HCRYPTPROV provider, ALG_ID alg, const void* key_data, DWORD key_size, ScopedHCRYPTKEY* key) argument 526 SymmetricKey(HCRYPTPROV provider, HCRYPTKEY key, const void* key_data, size_t key_size_in_bytes) argument
|
/external/chromium_org/crypto/ |
H A D | symmetric_key_openssl.cc | 35 uint8* key_data = local 38 int rv = RAND_bytes(key_data, static_cast<int>(key_size_in_bytes)); 57 uint8* key_data = local 63 key_data);
|
H A D | hmac_win.cc | 140 BYTE key_data[1]; member in struct:crypto::KeyBlob 142 size_t key_blob_size = std::max(offsetof(KeyBlob, key_data) + key_length, 151 memcpy(key_blob->key_data, key, key_length); 161 SecureZeroMemory(key_blob->key_data, key_length);
|
H A D | symmetric_key_win.cc | 43 // Imports a raw/plaintext key of |key_size| stored in |*key_data| into a new 46 // If |key_data| is intended to be used as an HMAC key, then |alg| should be 52 const void* key_data, size_t key_size, 60 memcpy(actual_key + sizeof(PlaintextBlobHeader), key_data, key_size); 528 const void* key_data, size_t key_size_in_bytes) 530 if (key_data) { 531 raw_key_.assign(reinterpret_cast<const char*>(key_data), 50 ImportRawKey(HCRYPTPROV provider, ALG_ID alg, const void* key_data, size_t key_size, ScopedHCRYPTKEY* key) argument 526 SymmetricKey(HCRYPTPROV provider, HCRYPTKEY key, const void* key_data, size_t key_size_in_bytes) argument
|
/external/chromium_org/net/cert/ |
H A D | ct_log_verifier_nss.cc | 73 SECItem key_data; local 77 key_data.data = reinterpret_cast<unsigned char*>( 79 key_data.len = public_key.size(); 82 SECKEY_DecodeDERSubjectPublicKeyInfo(&key_data);
|
/external/chromium/chrome/browser/autofill/crypto/ |
H A D | rc4_decryptor.h | 61 void PrepareKey(const uint8 *key_data, int key_data_len) { argument 74 index2 = (key_data[index1] + state[counter] + index2) % kKeyDataSize;
|
/external/chromium_org/chrome/browser/net/ |
H A D | sqlite_server_bound_cert_store_unittest.cc | 167 std::string key_data; local 169 ReadTestKeyAndCert(&key_data, &cert_data); 188 add_smt.BindBlob(1, key_data.data(), key_data.size()); 235 std::string key_data; local 237 ReadTestKeyAndCert(&key_data, &cert_data); 259 add_smt.BindBlob(1, key_data.data(), key_data.size()); 287 ASSERT_EQ(key_data, certs[0]->private_key()); 319 std::string key_data; local 407 std::string key_data; local [all...] |
/external/chromium_org/components/autofill/core/browser/crypto/ |
H A D | rc4_decryptor.h | 66 void PrepareKey(const uint8 *key_data, int key_data_len) { argument 79 index2 = (key_data[index1] + state[counter] + index2) % kKeyDataSize;
|
/external/chromium_org/net/quic/crypto/ |
H A D | p256_key_exchange_nss.cc | 215 SECItem* key_data = PK11_GetKeyData(premaster_secret.get()); local 216 if (!key_data || !key_data->data || key_data->len != kP256FieldBytes) { 221 out_result->assign(reinterpret_cast<char*>(key_data->data), key_data->len);
|
/external/chromium/net/http/ |
H A D | des.cc | 184 BYTE key_data[8]; member in struct:net::KeyBlob 192 memcpy(key_blob.key_data, key, 8); 199 SecureZeroMemory(key_blob.key_data, sizeof key_blob.key_data);
|
/external/chromium_org/net/http/ |
H A D | des.cc | 184 BYTE key_data[8]; member in struct:net::KeyBlob 192 memcpy(key_blob.key_data, key, 8); 199 SecureZeroMemory(key_blob.key_data, sizeof key_blob.key_data);
|
/external/chromium_org/chrome/installer/util/ |
H A D | registry_key_backup.cc | 278 scoped_ptr<KeyData> key_data; local 283 key_data.reset(new KeyData()); 284 if (!key_data->Initialize(key)) { 294 key_data_.swap(key_data);
|
/external/chromium_org/content/renderer/webcrypto/ |
H A D | webcrypto_impl.cc | 253 const unsigned char* key_data, 261 if (!ImportKeyJwk(key_data, 272 key_data, 339 const unsigned char* key_data, 371 // Input 'key_data' contains the JWK. To build a Web Crypto Key, the JWK 486 base::StringPiece json_string(reinterpret_cast<const char*>(key_data), 251 importKey( blink::WebCryptoKeyFormat format, const unsigned char* key_data, unsigned key_data_size, const blink::WebCryptoAlgorithm& algorithm_or_null, bool extractable, blink::WebCryptoKeyUsageMask usage_mask, blink::WebCryptoResult result) argument 338 ImportKeyJwk( const unsigned char* key_data, unsigned key_data_size, const blink::WebCryptoAlgorithm& algorithm_or_null, bool extractable, blink::WebCryptoKeyUsageMask usage_mask, blink::WebCryptoKey* key) argument
|
H A D | webcrypto_impl_openssl.cc | 29 SymKeyHandle(const unsigned char* key_data, unsigned key_data_size) argument 30 : key_(key_data, key_data + key_data_size) {} 334 const unsigned char* key_data, 363 raw_key_data = key_data; 332 ImportKeyInternal( blink::WebCryptoKeyFormat format, const unsigned char* key_data, unsigned key_data_size, const blink::WebCryptoAlgorithm& algorithm_or_null, bool extractable, blink::WebCryptoKeyUsageMask usage_mask, blink::WebCryptoKey* key) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_tls.c | 23 u8 *key_data; member in struct:eap_tls_data 107 os_free(data->key_data); 157 os_free(data->key_data); 158 data->key_data = eap_peer_tls_derive_key(sm, &data->ssl, 162 if (data->key_data) { 164 data->key_data, EAP_TLS_KEY_LEN); 166 data->key_data + EAP_TLS_KEY_LEN, 243 os_free(data->key_data); 244 data->key_data = NULL; 266 return data->key_data ! [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_tls.c | 23 u8 *key_data; member in struct:eap_tls_data 107 os_free(data->key_data); 157 os_free(data->key_data); 158 data->key_data = eap_peer_tls_derive_key(sm, &data->ssl, 162 if (data->key_data) { 164 data->key_data, EAP_TLS_KEY_LEN); 166 data->key_data + EAP_TLS_KEY_LEN, 243 os_free(data->key_data); 244 data->key_data = NULL; 266 return data->key_data ! [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_tls.c | 23 u8 *key_data; member in struct:eap_tls_data 107 os_free(data->key_data); 157 os_free(data->key_data); 158 data->key_data = eap_peer_tls_derive_key(sm, &data->ssl, 162 if (data->key_data) { 164 data->key_data, EAP_TLS_KEY_LEN); 166 data->key_data + EAP_TLS_KEY_LEN, 243 os_free(data->key_data); 244 data->key_data = NULL; 266 return data->key_data ! [all...] |
/external/chromium/net/socket/ |
H A D | dns_cert_provenance_checker.cc | 297 char key_data[SHA256_LENGTH]; local 298 HASH_HashBuf(HASH_AlgSHA256, reinterpret_cast<uint8*>(key_data), 302 DCHECK_GE(sizeof(key_data), kKeySizeInBytes + kIVSizeInBytes); 303 std::string raw_key(key_data, kKeySizeInBytes); 307 std::string iv(key_data + kKeySizeInBytes, kIVSizeInBytes);
|
/external/chromium_org/chrome/browser/extensions/api/input_ime/ |
H A D | input_ime_api.cc | 162 chromeos::input_method::KeyEventHandle* key_data) OVERRIDE { 168 key_data); 391 chromeos::input_method::KeyEventHandle* key_data = request->second.second; local 400 engine->KeyEventDone(key_data, handled); 405 chromeos::input_method::KeyEventHandle* key_data) { 409 request_map_[request_id] = std::make_pair(engine_id, key_data); 403 AddRequest( const std::string& engine_id, chromeos::input_method::KeyEventHandle* key_data) argument
|
/external/chromium_org/third_party/leveldatabase/src/util/ |
H A D | cache.cc | 35 char key_data[1]; // Beginning of key member in struct:leveldb::__anon12024::LRUHandle 43 return Slice(key_data, key_length); 238 memcpy(e->key_data, key.data(), key.size());
|
/external/chromium_org/third_party/openssl/openssl/crypto/des/ |
H A D | destest.c | 92 static unsigned char key_data[NUM_TESTS][8]={ variable 411 DES_set_key_unchecked(&key_data[i],&ks); 421 i+1,pt(key_data[i]),pt(in),pt(cipher_data[i]), 428 i+1,pt(key_data[i]),pt(out),pt(in),pt(outin)); 437 DES_set_key_unchecked(&key_data[i],&ks); 438 DES_set_key_unchecked(&key_data[i+1],&ks2); 439 DES_set_key_unchecked(&key_data[i+2],&ks3); 449 i+1,pt(key_data[i]),pt(in),pt(cipher_ecb2[i]), 456 i+1,pt(key_data[i]),pt(out),pt(in),pt(outin));
|
/external/kernel-headers/original/linux/ |
H A D | loop.h | 54 void *key_data; member in struct:loop_device
|