Searched defs:key_data (Results 1 - 25 of 43) sorted by relevance

12

/external/libchrome/crypto/
H A Dsymmetric_key_openssl.cc44 uint8_t* key_data = reinterpret_cast<uint8_t*>( local
47 int rv = RAND_bytes(key_data, static_cast<int>(key_size_in_bytes));
75 uint8_t* key_data = reinterpret_cast<uint8_t*>( local
80 static_cast<int>(key_size_in_bytes), key_data);
H A Dhmac_win.cc141 BYTE key_data[1]; member in struct:crypto::KeyBlob
143 size_t key_blob_size = std::max(offsetof(KeyBlob, key_data) + key_length,
152 memcpy(key_blob->key_data, key, key_length);
162 SecureZeroMemory(key_blob->key_data, key_length);
H A Dsymmetric_key_win.cc46 // Imports a raw/plaintext key of |key_size| stored in |*key_data| into a new
49 // If |key_data| is intended to be used as an HMAC key, then |alg| should be
55 const void* key_data, size_t key_size,
63 memcpy(actual_key + sizeof(PlaintextBlobHeader), key_data, key_size);
531 const void* key_data, size_t key_size_in_bytes)
533 if (key_data) {
534 raw_key_.assign(reinterpret_cast<const char*>(key_data),
53 ImportRawKey(HCRYPTPROV provider, ALG_ID alg, const void* key_data, size_t key_size, ScopedHCRYPTKEY* key) argument
529 SymmetricKey(HCRYPTPROV provider, HCRYPTKEY key, const void* key_data, size_t key_size_in_bytes) argument
/external/vboot_reference/firmware/lib20/
H A Dmisc.c22 uint8_t *key_data; local
36 key_data = vb2_workbuf_alloc(&wb, key_size);
37 if (!key_data)
41 key_data, key_size);
46 rv = vb2_unpack_key(&root_key, key_data, key_size);
99 packed_key = (struct vb2_packed_key *)key_data;
111 memmove(key_data + packed_key->key_offset,
116 sd->workbuf_data_key_offset = vb2_offset_of(ctx->workbuf, key_data);
135 uint8_t *key_data = ctx->workbuf + sd->workbuf_data_key_offset; local
151 rv = vb2_unpack_key(&data_key, key_data, key_siz
[all...]
/external/vboot_reference/firmware/lib21/
H A Dpacked_key.c14 const uint8_t *key_data,
17 const uint32_t *buf32 = (const uint32_t *)key_data;
13 vb2_unpack_key_data(struct vb2_public_key *key, const uint8_t *key_data, uint32_t key_size) argument
H A Dmisc.c70 uint8_t *key_data; local
82 key_data = vb2_workbuf_alloc(&wb, key_size);
83 if (!key_data)
87 key_data, key_size);
92 rv = vb2_unpack_key(&root_key, key_data, key_size);
139 memmove(key_data, packed_key, packed_key->c.total_size);
140 packed_key = (struct vb2_packed_key *)key_data;
143 sd->workbuf_data_key_offset = vb2_offset_of(ctx->workbuf, key_data);
158 uint8_t *key_data = ctx->workbuf + sd->workbuf_data_key_offset; local
173 rv = vb2_unpack_key(&data_key, key_data, key_siz
[all...]
/external/vboot_reference/host/lib/
H A Dhost_key.c163 uint8_t* key_data; local
177 key_data = ReadFile(filename, &key_size);
178 if (!key_data)
184 free(key_data);
190 free(key_data);
193 Memcpy(GetPublicKeyData(key), key_data, key_size); local
195 free(key_data);
/external/wpa_supplicant_8/hostapd/src/ap/
H A Dpeerkey_auth.c83 const u8 *key_data, size_t key_data_len)
90 if (wpa_parse_kde_ies(key_data, key_data_len, &kde) < 0) {
257 const u8 *key_data, size_t key_data_len)
263 if (wpa_parse_kde_ies(key_data, key_data_len, &kde) < 0) {
328 const u8 *key_data, size_t key_data_len)
335 if (wpa_parse_kde_ies(key_data, key_data_len, &kde) < 0) {
81 wpa_smk_m1(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_key *key, const u8 *key_data, size_t key_data_len) argument
255 wpa_smk_m3(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_key *key, const u8 *key_data, size_t key_data_len) argument
326 wpa_smk_error(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, const u8 *key_data, size_t key_data_len) argument
/external/wpa_supplicant_8/hostapd/src/rsn_supp/
H A Dpeerkey.h45 const u8 *key_data, size_t key_data_len);
65 const u8 *key_data, size_t key_data_len)
63 peerkey_rx_eapol_4way(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_key *key, u16 key_info, u16 ver, const u8 *key_data, size_t key_data_len) argument
H A Dpeerkey.c657 u16 ver, const u8 *key_data,
672 wpa_hexdump(MSG_DEBUG, "RSN: msg 1/4 key data", key_data, key_data_len);
673 if (wpa_supplicant_parse_ies(key_data, key_data_len, &ie) < 0 ||
762 u16 ver, const u8 *key_data,
774 wpa_hexdump(MSG_DEBUG, "RSN: msg 2/4 key data", key_data, key_data_len);
775 if (wpa_supplicant_parse_ies(key_data, key_data_len, &kde) < 0 ||
808 u16 ver, const u8 *key_data,
823 wpa_hexdump(MSG_DEBUG, "RSN: msg 3/4 key data", key_data, key_data_len);
824 if (wpa_supplicant_parse_ies(key_data, key_data_len, &kde) < 0) {
1115 const u8 *key_data, size_
654 wpa_supplicant_process_stk_1_of_4(struct wpa_sm *sm, struct wpa_peerkey *peerkey, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument
759 wpa_supplicant_process_stk_2_of_4(struct wpa_sm *sm, struct wpa_peerkey *peerkey, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument
805 wpa_supplicant_process_stk_3_of_4(struct wpa_sm *sm, struct wpa_peerkey *peerkey, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument
1113 peerkey_rx_eapol_4way(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_key *key, u16 key_info, u16 ver, const u8 *key_data, size_t key_data_len) argument
[all...]
/external/wpa_supplicant_8/src/ap/
H A Dpeerkey_auth.c83 const u8 *key_data, size_t key_data_len)
90 if (wpa_parse_kde_ies(key_data, key_data_len, &kde) < 0) {
257 const u8 *key_data, size_t key_data_len)
263 if (wpa_parse_kde_ies(key_data, key_data_len, &kde) < 0) {
328 const u8 *key_data, size_t key_data_len)
335 if (wpa_parse_kde_ies(key_data, key_data_len, &kde) < 0) {
81 wpa_smk_m1(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_key *key, const u8 *key_data, size_t key_data_len) argument
255 wpa_smk_m3(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_key *key, const u8 *key_data, size_t key_data_len) argument
326 wpa_smk_error(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, const u8 *key_data, size_t key_data_len) argument
/external/wpa_supplicant_8/src/rsn_supp/
H A Dpeerkey.h45 const u8 *key_data, size_t key_data_len);
65 const u8 *key_data, size_t key_data_len)
63 peerkey_rx_eapol_4way(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_key *key, u16 key_info, u16 ver, const u8 *key_data, size_t key_data_len) argument
H A Dpeerkey.c657 u16 ver, const u8 *key_data,
672 wpa_hexdump(MSG_DEBUG, "RSN: msg 1/4 key data", key_data, key_data_len);
673 if (wpa_supplicant_parse_ies(key_data, key_data_len, &ie) < 0 ||
762 u16 ver, const u8 *key_data,
774 wpa_hexdump(MSG_DEBUG, "RSN: msg 2/4 key data", key_data, key_data_len);
775 if (wpa_supplicant_parse_ies(key_data, key_data_len, &kde) < 0 ||
808 u16 ver, const u8 *key_data,
823 wpa_hexdump(MSG_DEBUG, "RSN: msg 3/4 key data", key_data, key_data_len);
824 if (wpa_supplicant_parse_ies(key_data, key_data_len, &kde) < 0) {
1115 const u8 *key_data, size_
654 wpa_supplicant_process_stk_1_of_4(struct wpa_sm *sm, struct wpa_peerkey *peerkey, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument
759 wpa_supplicant_process_stk_2_of_4(struct wpa_sm *sm, struct wpa_peerkey *peerkey, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument
805 wpa_supplicant_process_stk_3_of_4(struct wpa_sm *sm, struct wpa_peerkey *peerkey, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument
1113 peerkey_rx_eapol_4way(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_key *key, u16 key_info, u16 ver, const u8 *key_data, size_t key_data_len) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/ap/
H A Dpeerkey_auth.c83 const u8 *key_data, size_t key_data_len)
90 if (wpa_parse_kde_ies(key_data, key_data_len, &kde) < 0) {
257 const u8 *key_data, size_t key_data_len)
263 if (wpa_parse_kde_ies(key_data, key_data_len, &kde) < 0) {
328 const u8 *key_data, size_t key_data_len)
335 if (wpa_parse_kde_ies(key_data, key_data_len, &kde) < 0) {
81 wpa_smk_m1(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_key *key, const u8 *key_data, size_t key_data_len) argument
255 wpa_smk_m3(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_key *key, const u8 *key_data, size_t key_data_len) argument
326 wpa_smk_error(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, const u8 *key_data, size_t key_data_len) argument
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/
H A Dpeerkey.h45 const u8 *key_data, size_t key_data_len);
65 const u8 *key_data, size_t key_data_len)
63 peerkey_rx_eapol_4way(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_key *key, u16 key_info, u16 ver, const u8 *key_data, size_t key_data_len) argument
H A Dpeerkey.c657 u16 ver, const u8 *key_data,
672 wpa_hexdump(MSG_DEBUG, "RSN: msg 1/4 key data", key_data, key_data_len);
673 if (wpa_supplicant_parse_ies(key_data, key_data_len, &ie) < 0 ||
762 u16 ver, const u8 *key_data,
774 wpa_hexdump(MSG_DEBUG, "RSN: msg 2/4 key data", key_data, key_data_len);
775 if (wpa_supplicant_parse_ies(key_data, key_data_len, &kde) < 0 ||
808 u16 ver, const u8 *key_data,
823 wpa_hexdump(MSG_DEBUG, "RSN: msg 3/4 key data", key_data, key_data_len);
824 if (wpa_supplicant_parse_ies(key_data, key_data_len, &kde) < 0) {
1115 const u8 *key_data, size_
654 wpa_supplicant_process_stk_1_of_4(struct wpa_sm *sm, struct wpa_peerkey *peerkey, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument
759 wpa_supplicant_process_stk_2_of_4(struct wpa_sm *sm, struct wpa_peerkey *peerkey, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument
805 wpa_supplicant_process_stk_3_of_4(struct wpa_sm *sm, struct wpa_peerkey *peerkey, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument
1113 peerkey_rx_eapol_4way(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_key *key, u16 key_info, u16 ver, const u8 *key_data, size_t key_data_len) argument
[all...]
/external/vboot_reference/firmware/lib/
H A Dvboot_common.c103 void PublicKeyInit(VbPublicKey *key, uint8_t *key_data, uint64_t key_size) argument
105 key->key_offset = OffsetOf(key, key_data);
/external/vboot_reference/host/lib21/
H A Dhost_key.c381 uint8_t *key_data, *key_buf; local
387 if (vb2_read_file(filename, &key_data, &key_size))
396 free(key_data);
401 free(key_data);
407 memcpy(key_buf, key_data, key_size);
408 free(key_data);
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_tls.c23 u8 *key_data; member in struct:eap_tls_data
131 if (data->key_data) {
132 bin_clear_free(data->key_data, EAP_TLS_KEY_LEN + EAP_EMSK_LEN);
133 data->key_data = NULL;
182 data->key_data = eap_peer_tls_derive_key(sm, &data->ssl,
186 if (data->key_data) {
188 data->key_data, EAP_TLS_KEY_LEN);
190 data->key_data + EAP_TLS_KEY_LEN,
329 return data->key_data != NULL;
338 if (data->key_data
[all...]
H A Deap_peap.c57 u8 *key_data; member in struct:eap_peap_data
171 if (data->key_data) {
172 bin_clear_free(data->key_data, EAP_TLS_KEY_LEN);
173 data->key_data = NULL;
262 tk = data->key_data;
1081 data->key_data =
1084 if (data->key_data) {
1087 data->key_data,
1220 return data->key_data != NULL && data->phase2_success;
1229 if (data->key_data
[all...]
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_tls.c23 u8 *key_data; member in struct:eap_tls_data
131 if (data->key_data) {
132 bin_clear_free(data->key_data, EAP_TLS_KEY_LEN + EAP_EMSK_LEN);
133 data->key_data = NULL;
182 data->key_data = eap_peer_tls_derive_key(sm, &data->ssl,
186 if (data->key_data) {
188 data->key_data, EAP_TLS_KEY_LEN);
190 data->key_data + EAP_TLS_KEY_LEN,
329 return data->key_data != NULL;
338 if (data->key_data
[all...]
H A Deap_peap.c57 u8 *key_data; member in struct:eap_peap_data
171 if (data->key_data) {
172 bin_clear_free(data->key_data, EAP_TLS_KEY_LEN);
173 data->key_data = NULL;
262 tk = data->key_data;
1081 data->key_data =
1084 if (data->key_data) {
1087 data->key_data,
1220 return data->key_data != NULL && data->phase2_success;
1229 if (data->key_data
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_tls.c23 u8 *key_data; member in struct:eap_tls_data
131 if (data->key_data) {
132 bin_clear_free(data->key_data, EAP_TLS_KEY_LEN + EAP_EMSK_LEN);
133 data->key_data = NULL;
182 data->key_data = eap_peer_tls_derive_key(sm, &data->ssl,
186 if (data->key_data) {
188 data->key_data, EAP_TLS_KEY_LEN);
190 data->key_data + EAP_TLS_KEY_LEN,
329 return data->key_data != NULL;
338 if (data->key_data
[all...]
H A Deap_peap.c57 u8 *key_data; member in struct:eap_peap_data
171 if (data->key_data) {
172 bin_clear_free(data->key_data, EAP_TLS_KEY_LEN);
173 data->key_data = NULL;
262 tk = data->key_data;
1081 data->key_data =
1084 if (data->key_data) {
1087 data->key_data,
1220 return data->key_data != NULL && data->phase2_success;
1229 if (data->key_data
[all...]
/external/boringssl/src/ssl/
H A Dt1_enc.c285 const uint8_t *key_data; local
323 key_data = ssl->s3->tmp.key_block;
324 client_write_mac_secret = key_data;
325 key_data += mac_secret_len;
326 server_write_mac_secret = key_data;
327 key_data += mac_secret_len;
328 client_write_key = key_data;
329 key_data += key_len;
330 server_write_key = key_data;
331 key_data
[all...]

Completed in 382 milliseconds

12