/external/tpm2/ |
H A D | CreatePrimary.c | 16 // TPM_RC_ATTRIBUTES sensitiveDataOrigin is CLEAR when 'sensitive.data' is an Empty 17 // Buffer, or is SET when 'sensitive.data' is not empty; fixedTPM, 20 // restricted, decrypt and sign attributes; attempt to inject sensitive data 28 // TPM_RC_SIZE size of public auth policy or sensitive auth value does not match 29 // digest size of the name algorithm sensitive data size for the keyed 43 TPMT_SENSITIVE sensitive; local 49 != (in->inSensitive.t.sensitive.data.t.size == 0 )) 61 // Validate the sensitive area values 62 if( MemoryRemoveTrailingZeros(&in->inSensitive.t.sensitive.userAuth) 75 &in->inSensitive.t.sensitive, [all...] |
H A D | ECDH_KeyGen.c | 24 TPM2B_ECC_PARAMETER sensitive; local 45 &out->pubPoint.t.point, &sensitive); 53 &sensitive, &eccKey->publicArea.unique.ecc);
|
H A D | LoadExternal.c | 16 // both public and sensitive portions are loaded 38 TPMT_SENSITIVE *sensitive; local 53 // For loading an object with both public and sensitive 59 // An external object with a sensitive area must have fixedTPM == CLEAR 79 // If a sensitive area was provided, load it 81 sensitive = &in->inPrivate.t.sensitiveArea; 83 sensitive = NULL; 88 sensitive, &out->name, TPM_RH_NULL, skipChecks,
|
H A D | Create.c | 17 // TPM_RC_ATTRIBUTES sensitiveDataOrigin is CLEAR when 'sensitive.data' is an Empty 18 // Buffer, or is SET when 'sensitive.data' is not empty; fixedTPM, 21 // restricted, decrypt and sign attributes; attempt to inject sensitive data 29 // sensitive creation area; may also be returned if the TPM does not 35 // TPM_RC_SIZE size of public auth policy or sensitive auth value does not match 36 // digest size of the name algorithm sensitive data size for the keyed 42 // decryption key in the storage hierarchy with both public and sensitive 57 TPMT_SENSITIVE sensitive; local 73 != (in->inSensitive.t.sensitive.data.t.size == 0)) 85 // Validate the sensitive are [all...] |
H A D | Duplicate.c | 33 TPMT_SENSITIVE sensitive; local 106 // Copy sensitive area 107 sensitive = object->sensitive; 109 // Prepare output private data from sensitive 110 SensitiveToDuplicate(&sensitive, &object->name, in->newParentHandle,
|
H A D | Load.c | 39 TPMT_SENSITIVE sensitive; local 79 // Retrieve sensitive data. PrivateToSensitive() may return TPM_RC_INTEGRITY or 84 &sensitive); 96 result = ObjectLoad(hierarchy, &in->inPublic.t.publicArea, &sensitive,
|
H A D | ObjectChangeAuth.c | 26 TPMT_SENSITIVE sensitive; local 60 // Copy internal sensitive area 61 sensitive = object->sensitive; 63 sensitive.authValue = in->newAuth; 65 // Prepare output private data from sensitive 66 SensitiveToPrivate(&sensitive, &object->name, in->parentHandle,
|
H A D | Import.c | 35 // secret; or unmarshaling sensitive value from duplicate failed the 52 // type of parentHandle; or unmarshaling sensitive value from duplicate 77 TPMT_SENSITIVE sensitive; local 141 // Retrieve sensitive from private. 146 &in->encryptionKey, &sensitive); 168 &sensitive, NULL, in->parentHandle, FALSE, 180 // Prepare output private data from sensitive 181 SensitiveToPrivate(&sensitive, &name, in->parentHandle,
|
H A D | Object.c | 287 // TPM_RC_BINDING if the public and sensitive parts of the object are not matched 296 TPMT_SENSITIVE *sensitive, // IN: sensitive area (may be null) 313 if(sensitive != NULL) 314 object->sensitive = *sensitive; 324 if(sensitive != NULL) 326 // Check if public type matches sensitive type 332 object->attributes.publicOnly = (sensitive == NULL); 470 CryptStartHMACSequence2B(hashAlg, &keyObject->sensitive 293 ObjectLoad( TPMI_RH_HIERARCHY hierarchy, TPMT_PUBLIC *publicArea, TPMT_SENSITIVE *sensitive, TPM2B_NAME *name, TPM_HANDLE parentHandle, BOOL skipChecks, TPMI_DH_OBJECT *handle ) argument [all...] |
H A D | Object_spt.c | 61 // Get the size of TPM2B_IV in canonical form that will be append to the start of the sensitive data. It 96 // This function retrieves the symmetric protection key parameters for the sensitive data The parameters 99 // requires encrypting or decrypting of the sensitive area of an object or a credential blob 145 // The sensitive area parameter is a buffer that holds a space for the integrity value and the marshaled 146 // sensitive area. The caller should skip over the area set aside for the integrity value and compute the hash 147 // of the remainder of the object. The size field of sensitive is in unmarshaled form and the sensitive area 162 UINT32 sensitiveSize, // IN: size of the marshaled sensitive data 163 BYTE *sensitiveData, // IN: sensitive area 179 // Adding the marshaled sensitive are 857 SensitiveToPrivate( TPMT_SENSITIVE *sensitive, TPM2B_NAME *name, TPM_HANDLE parentHandle, TPM_ALG_ID nameAlg, TPM2B_PRIVATE *outPrivate ) argument 1021 SensitiveToDuplicate( TPMT_SENSITIVE *sensitive, TPM2B_NAME *name, TPM_HANDLE parentHandle, TPM_ALG_ID nameAlg, TPM2B_SEED *seed, TPMT_SYM_DEF_OBJECT *symDef, TPM2B_DATA *innerSymKey, TPM2B_PRIVATE *outPrivate ) argument [all...] |
H A D | CryptUtil.c | 638 &signKey->sensitive.sensitive.bits.b, 669 &signKey->sensitive.sensitive.bits.b, &hmacState); 690 // TPM_RC_SIZE sensitive data size is larger than allowed for the scheme 696 TPMS_SENSITIVE_CREATE *sensitiveCreate, // IN: sensitive creation data 697 TPMT_SENSITIVE *sensitive, // OUT: sensitive area 731 sensitive->sensitive 693 CryptGenerateKeyedHash( TPMT_PUBLIC *publicArea, TPMS_SENSITIVE_CREATE *sensitiveCreate, TPMT_SENSITIVE *sensitive, TPM_ALG_ID kdfHashAlg, TPM2B_SEED *seed, TPM2B_NAME *name ) argument 846 CryptGenerateKeyRSA( TPMT_PUBLIC *publicArea, TPMT_SENSITIVE *sensitive, TPM_ALG_ID hashAlg, TPM2B_SEED *seed, TPM2B_NAME *name, UINT32 *counter ) argument 901 TPMT_SENSITIVE *sensitive = &rsaKey->sensitive; local 1404 CryptGenerateKeyECC( TPMT_PUBLIC *publicArea, TPMT_SENSITIVE *sensitive, TPM_ALG_ID hashAlg, TPM2B_SEED *seed, TPM2B_NAME *name, UINT32 *counter ) argument 1860 CryptGenerateNewSymmetric( TPMS_SENSITIVE_CREATE *sensitiveCreate, TPMT_SENSITIVE *sensitive, TPM_ALG_ID hashAlg, TPM2B_SEED *seed, TPM2B_NAME *name ) argument 1932 CryptGenerateKeySymmetric( TPMT_PUBLIC *publicArea, TPMS_SENSITIVE_CREATE *sensitiveCreate, TPMT_SENSITIVE *sensitive, TPM_ALG_ID hashAlg, TPM2B_SEED *seed, TPM2B_NAME *name ) argument 2782 CryptComputeSymmetricUnique( TPMI_ALG_HASH nameAlg, TPMT_SENSITIVE *sensitive, TPM2B_DIGEST *unique ) argument 3054 TPMT_SENSITIVE *sensitive; local [all...] |
H A D | Global.h | 168 // An OBJECT structure holds the object public, sensitive, and meta-data associated. This structure is 180 TPMT_SENSITIVE sensitive; // sensitive area of an object member in struct:__anon16910
|
H A D | tpm_types.h | 1058 TPMS_SENSITIVE_CREATE sensitive; member in struct:__anon17126::__anon17127 1505 TPMU_SENSITIVE_COMPOSITE sensitive; member in struct:__anon17172 1521 TPMT_SENSITIVE sensitive; member in struct:__anon17175
|
/external/libchrome/crypto/third_party/nss/ |
H A D | pk11akey.cc | 55 PRBool sensitive, 84 public_value, permanent, sensitive, CKK_EC, 48 ImportEncryptedECPrivateKeyInfoAndReturnKey( PK11SlotInfo* slot, SECKEYEncryptedPrivateKeyInfo* epki, SECItem* password, SECItem* nickname, SECItem* public_value, PRBool permanent, PRBool sensitive, SECKEYPrivateKey** private_key, void* wincx) argument
|
/external/openssh/ |
H A D | sshconnect1.c | 689 Sensitive *sensitive) 721 for (i = 0; i < sensitive->nkeys; i++) { 722 if (sensitive->keys[i] != NULL && 723 sensitive->keys[i]->type == KEY_RSA1 && 725 sensitive->keys[i])) 688 ssh_userauth1(const char *local_user, const char *server_user, char *host, Sensitive *sensitive) argument
|
H A D | sshconnect.c | 1332 ssh_login(Sensitive *sensitive, const char *orighost, argument 1356 ssh_userauth2(local_user, server_user, host, sensitive); 1360 ssh_userauth1(local_user, server_user, host, sensitive);
|
H A D | sshconnect2.c | 270 Sensitive *sensitive; member in struct:cauthctxt 360 Sensitive *sensitive) 400 authctxt.sensitive = sensitive; 1610 for (i = 0; i < authctxt->sensitive->nkeys; i++) { 1611 if (authctxt->sensitive->keys[i] == NULL || 1612 authctxt->sensitive->keys[i]->type == KEY_RSA1 || 1613 authctxt->sensitive->keys[i]->type == KEY_UNSPEC) 1616 sshkey_ssh_name(authctxt->sensitive->keys[i]), 1620 private = authctxt->sensitive 359 ssh_userauth2(const char *local_user, const char *server_user, char *host, Sensitive *sensitive) argument [all...] |
/external/fio/ |
H A D | gfio.c | 180 static const char *get_button_tooltip(struct button_spec *s, int sensitive) argument 182 if (s->tooltiptext[sensitive]) 183 return s->tooltiptext[sensitive];
|
/external/webrtc/webrtc/base/ |
H A D | httpcommon.cc | 772 // TODO: convert sensitive to a secure buffer that gets securely deleted 775 char * sensitive = new char[len]; local 776 size_t pos = strcpyn(sensitive, len, username.data(), username.size()); 777 pos += strcpyn(sensitive + pos, len - pos, ":"); 778 password.CopyTo(sensitive + pos, true); 782 // TODO: create a sensitive-source version of Base64::encode 783 response.append(Base64::Encode(sensitive)); 784 memset(sensitive, 0, len); 785 delete [] sensitive; 816 // TODO: convert sensitive t 819 char * sensitive = new char[len]; // A1 local 960 char * sensitive = new char[len]; local [all...] |
/external/guice/extensions/struts2/lib/ |
H A D | commons-io-1.3.2.jar | META-INF/ META-INF/MANIFEST.MF org/ org/apache/ org/apache/commons/ org/apache/commons/io/ ... |
/external/libphonenumber/demo/war/WEB-INF/lib/ |
H A D | commons-io-1.4.jar | META-INF/ META-INF/MANIFEST.MF org/ org/apache/ org/apache/commons/ org/apache/commons/io/ ... |
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/ |
H A D | org.eclipse.swt.gtk.linux.x86_3.6.1.v3657a.jar | META-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ... |