/external/libchrome/crypto/ |
H A D | symmetric_key_openssl.cc | 44 uint8_t* key_data = reinterpret_cast<uint8_t*>( local 47 int rv = RAND_bytes(key_data, static_cast<int>(key_size_in_bytes)); 75 uint8_t* key_data = reinterpret_cast<uint8_t*>( local 80 static_cast<int>(key_size_in_bytes), key_data);
|
H A D | hmac_win.cc | 141 BYTE key_data[1]; member in struct:crypto::KeyBlob 143 size_t key_blob_size = std::max(offsetof(KeyBlob, key_data) + key_length, 152 memcpy(key_blob->key_data, key, key_length); 162 SecureZeroMemory(key_blob->key_data, key_length);
|
H A D | symmetric_key_win.cc | 46 // Imports a raw/plaintext key of |key_size| stored in |*key_data| into a new 49 // If |key_data| is intended to be used as an HMAC key, then |alg| should be 55 const void* key_data, size_t key_size, 63 memcpy(actual_key + sizeof(PlaintextBlobHeader), key_data, key_size); 531 const void* key_data, size_t key_size_in_bytes) 533 if (key_data) { 534 raw_key_.assign(reinterpret_cast<const char*>(key_data), 53 ImportRawKey(HCRYPTPROV provider, ALG_ID alg, const void* key_data, size_t key_size, ScopedHCRYPTKEY* key) argument 529 SymmetricKey(HCRYPTPROV provider, HCRYPTKEY key, const void* key_data, size_t key_size_in_bytes) argument
|
/external/vboot_reference/firmware/lib20/ |
H A D | misc.c | 22 uint8_t *key_data; local 36 key_data = vb2_workbuf_alloc(&wb, key_size); 37 if (!key_data) 41 key_data, key_size); 46 rv = vb2_unpack_key(&root_key, key_data, key_size); 99 packed_key = (struct vb2_packed_key *)key_data; 111 memmove(key_data + packed_key->key_offset, 116 sd->workbuf_data_key_offset = vb2_offset_of(ctx->workbuf, key_data); 135 uint8_t *key_data = ctx->workbuf + sd->workbuf_data_key_offset; local 151 rv = vb2_unpack_key(&data_key, key_data, key_siz [all...] |
/external/vboot_reference/firmware/lib21/ |
H A D | packed_key.c | 14 const uint8_t *key_data, 17 const uint32_t *buf32 = (const uint32_t *)key_data; 13 vb2_unpack_key_data(struct vb2_public_key *key, const uint8_t *key_data, uint32_t key_size) argument
|
H A D | misc.c | 70 uint8_t *key_data; local 82 key_data = vb2_workbuf_alloc(&wb, key_size); 83 if (!key_data) 87 key_data, key_size); 92 rv = vb2_unpack_key(&root_key, key_data, key_size); 139 memmove(key_data, packed_key, packed_key->c.total_size); 140 packed_key = (struct vb2_packed_key *)key_data; 143 sd->workbuf_data_key_offset = vb2_offset_of(ctx->workbuf, key_data); 158 uint8_t *key_data = ctx->workbuf + sd->workbuf_data_key_offset; local 173 rv = vb2_unpack_key(&data_key, key_data, key_siz [all...] |
/external/vboot_reference/host/lib/ |
H A D | host_key.c | 163 uint8_t* key_data; local 177 key_data = ReadFile(filename, &key_size); 178 if (!key_data) 184 free(key_data); 190 free(key_data); 193 Memcpy(GetPublicKeyData(key), key_data, key_size); local 195 free(key_data);
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | peerkey_auth.c | 83 const u8 *key_data, size_t key_data_len) 90 if (wpa_parse_kde_ies(key_data, key_data_len, &kde) < 0) { 257 const u8 *key_data, size_t key_data_len) 263 if (wpa_parse_kde_ies(key_data, key_data_len, &kde) < 0) { 328 const u8 *key_data, size_t key_data_len) 335 if (wpa_parse_kde_ies(key_data, key_data_len, &kde) < 0) { 81 wpa_smk_m1(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_key *key, const u8 *key_data, size_t key_data_len) argument 255 wpa_smk_m3(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_key *key, const u8 *key_data, size_t key_data_len) argument 326 wpa_smk_error(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, const u8 *key_data, size_t key_data_len) argument
|
/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | peerkey.h | 45 const u8 *key_data, size_t key_data_len); 65 const u8 *key_data, size_t key_data_len) 63 peerkey_rx_eapol_4way(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_key *key, u16 key_info, u16 ver, const u8 *key_data, size_t key_data_len) argument
|
H A D | peerkey.c | 657 u16 ver, const u8 *key_data, 672 wpa_hexdump(MSG_DEBUG, "RSN: msg 1/4 key data", key_data, key_data_len); 673 if (wpa_supplicant_parse_ies(key_data, key_data_len, &ie) < 0 || 762 u16 ver, const u8 *key_data, 774 wpa_hexdump(MSG_DEBUG, "RSN: msg 2/4 key data", key_data, key_data_len); 775 if (wpa_supplicant_parse_ies(key_data, key_data_len, &kde) < 0 || 808 u16 ver, const u8 *key_data, 823 wpa_hexdump(MSG_DEBUG, "RSN: msg 3/4 key data", key_data, key_data_len); 824 if (wpa_supplicant_parse_ies(key_data, key_data_len, &kde) < 0) { 1115 const u8 *key_data, size_ 654 wpa_supplicant_process_stk_1_of_4(struct wpa_sm *sm, struct wpa_peerkey *peerkey, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument 759 wpa_supplicant_process_stk_2_of_4(struct wpa_sm *sm, struct wpa_peerkey *peerkey, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument 805 wpa_supplicant_process_stk_3_of_4(struct wpa_sm *sm, struct wpa_peerkey *peerkey, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument 1113 peerkey_rx_eapol_4way(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_key *key, u16 key_info, u16 ver, const u8 *key_data, size_t key_data_len) argument [all...] |
/external/wpa_supplicant_8/src/ap/ |
H A D | peerkey_auth.c | 83 const u8 *key_data, size_t key_data_len) 90 if (wpa_parse_kde_ies(key_data, key_data_len, &kde) < 0) { 257 const u8 *key_data, size_t key_data_len) 263 if (wpa_parse_kde_ies(key_data, key_data_len, &kde) < 0) { 328 const u8 *key_data, size_t key_data_len) 335 if (wpa_parse_kde_ies(key_data, key_data_len, &kde) < 0) { 81 wpa_smk_m1(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_key *key, const u8 *key_data, size_t key_data_len) argument 255 wpa_smk_m3(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_key *key, const u8 *key_data, size_t key_data_len) argument 326 wpa_smk_error(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, const u8 *key_data, size_t key_data_len) argument
|
/external/wpa_supplicant_8/src/rsn_supp/ |
H A D | peerkey.h | 45 const u8 *key_data, size_t key_data_len); 65 const u8 *key_data, size_t key_data_len) 63 peerkey_rx_eapol_4way(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_key *key, u16 key_info, u16 ver, const u8 *key_data, size_t key_data_len) argument
|
H A D | peerkey.c | 657 u16 ver, const u8 *key_data, 672 wpa_hexdump(MSG_DEBUG, "RSN: msg 1/4 key data", key_data, key_data_len); 673 if (wpa_supplicant_parse_ies(key_data, key_data_len, &ie) < 0 || 762 u16 ver, const u8 *key_data, 774 wpa_hexdump(MSG_DEBUG, "RSN: msg 2/4 key data", key_data, key_data_len); 775 if (wpa_supplicant_parse_ies(key_data, key_data_len, &kde) < 0 || 808 u16 ver, const u8 *key_data, 823 wpa_hexdump(MSG_DEBUG, "RSN: msg 3/4 key data", key_data, key_data_len); 824 if (wpa_supplicant_parse_ies(key_data, key_data_len, &kde) < 0) { 1115 const u8 *key_data, size_ 654 wpa_supplicant_process_stk_1_of_4(struct wpa_sm *sm, struct wpa_peerkey *peerkey, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument 759 wpa_supplicant_process_stk_2_of_4(struct wpa_sm *sm, struct wpa_peerkey *peerkey, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument 805 wpa_supplicant_process_stk_3_of_4(struct wpa_sm *sm, struct wpa_peerkey *peerkey, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument 1113 peerkey_rx_eapol_4way(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_key *key, u16 key_info, u16 ver, const u8 *key_data, size_t key_data_len) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | peerkey_auth.c | 83 const u8 *key_data, size_t key_data_len) 90 if (wpa_parse_kde_ies(key_data, key_data_len, &kde) < 0) { 257 const u8 *key_data, size_t key_data_len) 263 if (wpa_parse_kde_ies(key_data, key_data_len, &kde) < 0) { 328 const u8 *key_data, size_t key_data_len) 335 if (wpa_parse_kde_ies(key_data, key_data_len, &kde) < 0) { 81 wpa_smk_m1(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_key *key, const u8 *key_data, size_t key_data_len) argument 255 wpa_smk_m3(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_key *key, const u8 *key_data, size_t key_data_len) argument 326 wpa_smk_error(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, const u8 *key_data, size_t key_data_len) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/ |
H A D | peerkey.h | 45 const u8 *key_data, size_t key_data_len); 65 const u8 *key_data, size_t key_data_len) 63 peerkey_rx_eapol_4way(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_key *key, u16 key_info, u16 ver, const u8 *key_data, size_t key_data_len) argument
|
H A D | peerkey.c | 657 u16 ver, const u8 *key_data, 672 wpa_hexdump(MSG_DEBUG, "RSN: msg 1/4 key data", key_data, key_data_len); 673 if (wpa_supplicant_parse_ies(key_data, key_data_len, &ie) < 0 || 762 u16 ver, const u8 *key_data, 774 wpa_hexdump(MSG_DEBUG, "RSN: msg 2/4 key data", key_data, key_data_len); 775 if (wpa_supplicant_parse_ies(key_data, key_data_len, &kde) < 0 || 808 u16 ver, const u8 *key_data, 823 wpa_hexdump(MSG_DEBUG, "RSN: msg 3/4 key data", key_data, key_data_len); 824 if (wpa_supplicant_parse_ies(key_data, key_data_len, &kde) < 0) { 1115 const u8 *key_data, size_ 654 wpa_supplicant_process_stk_1_of_4(struct wpa_sm *sm, struct wpa_peerkey *peerkey, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument 759 wpa_supplicant_process_stk_2_of_4(struct wpa_sm *sm, struct wpa_peerkey *peerkey, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument 805 wpa_supplicant_process_stk_3_of_4(struct wpa_sm *sm, struct wpa_peerkey *peerkey, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument 1113 peerkey_rx_eapol_4way(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_key *key, u16 key_info, u16 ver, const u8 *key_data, size_t key_data_len) argument [all...] |
/external/vboot_reference/firmware/lib/ |
H A D | vboot_common.c | 103 void PublicKeyInit(VbPublicKey *key, uint8_t *key_data, uint64_t key_size) argument 105 key->key_offset = OffsetOf(key, key_data);
|
/external/vboot_reference/host/lib21/ |
H A D | host_key.c | 381 uint8_t *key_data, *key_buf; local 387 if (vb2_read_file(filename, &key_data, &key_size)) 396 free(key_data); 401 free(key_data); 407 memcpy(key_buf, key_data, key_size); 408 free(key_data);
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_tls.c | 23 u8 *key_data; member in struct:eap_tls_data 131 if (data->key_data) { 132 bin_clear_free(data->key_data, EAP_TLS_KEY_LEN + EAP_EMSK_LEN); 133 data->key_data = NULL; 182 data->key_data = eap_peer_tls_derive_key(sm, &data->ssl, 186 if (data->key_data) { 188 data->key_data, EAP_TLS_KEY_LEN); 190 data->key_data + EAP_TLS_KEY_LEN, 329 return data->key_data != NULL; 338 if (data->key_data [all...] |
H A D | eap_peap.c | 57 u8 *key_data; member in struct:eap_peap_data 171 if (data->key_data) { 172 bin_clear_free(data->key_data, EAP_TLS_KEY_LEN); 173 data->key_data = NULL; 262 tk = data->key_data; 1081 data->key_data = 1084 if (data->key_data) { 1087 data->key_data, 1220 return data->key_data != NULL && data->phase2_success; 1229 if (data->key_data [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_tls.c | 23 u8 *key_data; member in struct:eap_tls_data 131 if (data->key_data) { 132 bin_clear_free(data->key_data, EAP_TLS_KEY_LEN + EAP_EMSK_LEN); 133 data->key_data = NULL; 182 data->key_data = eap_peer_tls_derive_key(sm, &data->ssl, 186 if (data->key_data) { 188 data->key_data, EAP_TLS_KEY_LEN); 190 data->key_data + EAP_TLS_KEY_LEN, 329 return data->key_data != NULL; 338 if (data->key_data [all...] |
H A D | eap_peap.c | 57 u8 *key_data; member in struct:eap_peap_data 171 if (data->key_data) { 172 bin_clear_free(data->key_data, EAP_TLS_KEY_LEN); 173 data->key_data = NULL; 262 tk = data->key_data; 1081 data->key_data = 1084 if (data->key_data) { 1087 data->key_data, 1220 return data->key_data != NULL && data->phase2_success; 1229 if (data->key_data [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_tls.c | 23 u8 *key_data; member in struct:eap_tls_data 131 if (data->key_data) { 132 bin_clear_free(data->key_data, EAP_TLS_KEY_LEN + EAP_EMSK_LEN); 133 data->key_data = NULL; 182 data->key_data = eap_peer_tls_derive_key(sm, &data->ssl, 186 if (data->key_data) { 188 data->key_data, EAP_TLS_KEY_LEN); 190 data->key_data + EAP_TLS_KEY_LEN, 329 return data->key_data != NULL; 338 if (data->key_data [all...] |
H A D | eap_peap.c | 57 u8 *key_data; member in struct:eap_peap_data 171 if (data->key_data) { 172 bin_clear_free(data->key_data, EAP_TLS_KEY_LEN); 173 data->key_data = NULL; 262 tk = data->key_data; 1081 data->key_data = 1084 if (data->key_data) { 1087 data->key_data, 1220 return data->key_data != NULL && data->phase2_success; 1229 if (data->key_data [all...] |
/external/boringssl/src/ssl/ |
H A D | t1_enc.c | 285 const uint8_t *key_data; local 323 key_data = ssl->s3->tmp.key_block; 324 client_write_mac_secret = key_data; 325 key_data += mac_secret_len; 326 server_write_mac_secret = key_data; 327 key_data += mac_secret_len; 328 client_write_key = key_data; 329 key_data += key_len; 330 server_write_key = key_data; 331 key_data [all...] |