/external/vboot_reference/firmware/lib21/ |
D | misc.c | 70 uint8_t *key_data; in vb2_load_fw_keyblock() local 82 key_data = vb2_workbuf_alloc(&wb, key_size); in vb2_load_fw_keyblock() 83 if (!key_data) in vb2_load_fw_keyblock() 87 key_data, key_size); in vb2_load_fw_keyblock() 92 rv = vb2_unpack_key(&root_key, key_data, key_size); in vb2_load_fw_keyblock() 139 memmove(key_data, packed_key, packed_key->c.total_size); in vb2_load_fw_keyblock() 140 packed_key = (struct vb2_packed_key *)key_data; in vb2_load_fw_keyblock() 143 sd->workbuf_data_key_offset = vb2_offset_of(ctx->workbuf, key_data); in vb2_load_fw_keyblock() 158 uint8_t *key_data = ctx->workbuf + sd->workbuf_data_key_offset; in vb2_load_fw_preamble() local 173 rv = vb2_unpack_key(&data_key, key_data, key_size); in vb2_load_fw_preamble() [all …]
|
D | packed_key.c | 14 const uint8_t *key_data, in vb2_unpack_key_data() argument 17 const uint32_t *buf32 = (const uint32_t *)key_data; in vb2_unpack_key_data()
|
/external/vboot_reference/firmware/lib20/ |
D | misc.c | 22 uint8_t *key_data; in vb2_load_fw_keyblock() local 36 key_data = vb2_workbuf_alloc(&wb, key_size); in vb2_load_fw_keyblock() 37 if (!key_data) in vb2_load_fw_keyblock() 41 key_data, key_size); in vb2_load_fw_keyblock() 46 rv = vb2_unpack_key(&root_key, key_data, key_size); in vb2_load_fw_keyblock() 99 packed_key = (struct vb2_packed_key *)key_data; in vb2_load_fw_keyblock() 111 memmove(key_data + packed_key->key_offset, in vb2_load_fw_keyblock() 116 sd->workbuf_data_key_offset = vb2_offset_of(ctx->workbuf, key_data); in vb2_load_fw_keyblock() 135 uint8_t *key_data = ctx->workbuf + sd->workbuf_data_key_offset; in vb2_load_fw_preamble() local 151 rv = vb2_unpack_key(&data_key, key_data, key_size); in vb2_load_fw_preamble()
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap_tls.c | 23 u8 *key_data; member 131 if (data->key_data) { in eap_tls_free_key() 132 bin_clear_free(data->key_data, EAP_TLS_KEY_LEN + EAP_EMSK_LEN); in eap_tls_free_key() 133 data->key_data = NULL; in eap_tls_free_key() 182 data->key_data = eap_peer_tls_derive_key(sm, &data->ssl, in eap_tls_success() 186 if (data->key_data) { in eap_tls_success() 188 data->key_data, EAP_TLS_KEY_LEN); in eap_tls_success() 190 data->key_data + EAP_TLS_KEY_LEN, in eap_tls_success() 329 return data->key_data != NULL; in eap_tls_isKeyAvailable() 338 if (data->key_data == NULL) in eap_tls_getKey() [all …]
|
D | eap_peap.c | 57 u8 *key_data; member 171 if (data->key_data) { in eap_peap_free_key() 172 bin_clear_free(data->key_data, EAP_TLS_KEY_LEN); in eap_peap_free_key() 173 data->key_data = NULL; in eap_peap_free_key() 262 tk = data->key_data; in eap_peap_derive_cmk() 1081 data->key_data = in eap_peap_process() 1084 if (data->key_data) { in eap_peap_process() 1087 data->key_data, in eap_peap_process() 1220 return data->key_data != NULL && data->phase2_success; in eap_peap_isKeyAvailable() 1229 if (data->key_data == NULL || !data->phase2_success) in eap_peap_getKey() [all …]
|
D | eap_ttls.c | 57 u8 *key_data; member 182 if (data->key_data) { in eap_ttls_free_key() 183 bin_clear_free(data->key_data, EAP_TLS_KEY_LEN + EAP_EMSK_LEN); in eap_ttls_free_key() 184 data->key_data = NULL; in eap_ttls_free_key() 272 data->key_data = eap_peer_tls_derive_key(sm, &data->ssl, in eap_ttls_v0_derive_key() 276 if (!data->key_data) { in eap_ttls_v0_derive_key() 282 data->key_data, EAP_TLS_KEY_LEN); in eap_ttls_v0_derive_key() 284 data->key_data + EAP_TLS_KEY_LEN, in eap_ttls_v0_derive_key() 1730 return data->key_data != NULL && data->phase2_success; in eap_ttls_isKeyAvailable() 1739 if (data->key_data == NULL || !data->phase2_success) in eap_ttls_getKey() [all …]
|
/external/boringssl/src/ssl/ |
D | t1_enc.c | 285 const uint8_t *key_data; in tls1_change_cipher_state() local 323 key_data = ssl->s3->tmp.key_block; in tls1_change_cipher_state() 324 client_write_mac_secret = key_data; in tls1_change_cipher_state() 325 key_data += mac_secret_len; in tls1_change_cipher_state() 326 server_write_mac_secret = key_data; in tls1_change_cipher_state() 327 key_data += mac_secret_len; in tls1_change_cipher_state() 328 client_write_key = key_data; in tls1_change_cipher_state() 329 key_data += key_len; in tls1_change_cipher_state() 330 server_write_key = key_data; in tls1_change_cipher_state() 331 key_data += key_len; in tls1_change_cipher_state() [all …]
|
/external/vboot_reference/host/lib/ |
D | host_key.c | 163 uint8_t* key_data; in PublicKeyReadKeyb() local 177 key_data = ReadFile(filename, &key_size); in PublicKeyReadKeyb() 178 if (!key_data) in PublicKeyReadKeyb() 184 free(key_data); in PublicKeyReadKeyb() 190 free(key_data); in PublicKeyReadKeyb() 193 Memcpy(GetPublicKeyData(key), key_data, key_size); in PublicKeyReadKeyb() 195 free(key_data); in PublicKeyReadKeyb()
|
/external/libchrome/crypto/ |
D | symmetric_key_openssl.cc | 44 uint8_t* key_data = reinterpret_cast<uint8_t*>( in GenerateRandomKey() local 47 int rv = RAND_bytes(key_data, static_cast<int>(key_size_in_bytes)); in GenerateRandomKey() 75 uint8_t* key_data = reinterpret_cast<uint8_t*>( in DeriveKeyFromPassword() local 80 static_cast<int>(key_size_in_bytes), key_data); in DeriveKeyFromPassword()
|
D | hmac_win.cc | 141 BYTE key_data[1]; in Init() member 143 size_t key_blob_size = std::max(offsetof(KeyBlob, key_data) + key_length, in Init() 152 memcpy(key_blob->key_data, key, key_length); in Init() 162 SecureZeroMemory(key_blob->key_data, key_length); in Init()
|
D | symmetric_key_win.cc | 55 const void* key_data, size_t key_size, in ImportRawKey() argument 63 memcpy(actual_key + sizeof(PlaintextBlobHeader), key_data, key_size); in ImportRawKey() 531 const void* key_data, size_t key_size_in_bytes) in SymmetricKey() argument 533 if (key_data) { in SymmetricKey() 534 raw_key_.assign(reinterpret_cast<const char*>(key_data), in SymmetricKey()
|
D | symmetric_key.h | 79 const void* key_data, size_t key_size_in_bytes);
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/tests/unit/utils/ |
D | test_utils.py | 244 key_data = "test" 246 valid_data = '{ "%s" : {"valid_json_format": true}}' % key_data 247 url = "/".join(["http://169.254.169.254", key_data]) 250 self.set_normal_response([key_data, invalid_data, valid_data]) 255 key_data = "test" 257 valid_data = '{ "%s" : {"valid_json_format": true}}' % key_data 258 url = "/".join(["http://169.254.169.254", key_data]) 261 self.set_normal_response([key_data, invalid_data, invalid_data])
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/dynamodb2/ |
D | items.py | 233 key_data = {} 236 key_data[key] = self[key] 238 return key_data 472 key_data = self.get_keys() 473 return self.table.delete_item(**key_data)
|
D | results.py | 193 for offset, key_data in enumerate(results.get('unprocessed_keys', [])): 197 self._keys_left.insert(offset, key_data)
|
/external/wpa_supplicant_8/src/ap/ |
D | peerkey_auth.c | 83 const u8 *key_data, size_t key_data_len) in wpa_smk_m1() argument 90 if (wpa_parse_kde_ies(key_data, key_data_len, &kde) < 0) { in wpa_smk_m1() 257 const u8 *key_data, size_t key_data_len) in wpa_smk_m3() argument 263 if (wpa_parse_kde_ies(key_data, key_data_len, &kde) < 0) { in wpa_smk_m3() 328 const u8 *key_data, size_t key_data_len) in wpa_smk_error() argument 335 if (wpa_parse_kde_ies(key_data, key_data_len, &kde) < 0) { in wpa_smk_error()
|
D | wpa_auth_i.h | 238 const u8 *key_data, size_t key_data_len); 241 const u8 *key_data, size_t key_data_len); 244 const u8 *key_data, size_t key_data_len);
|
D | wpa_auth.c | 887 const u8 *eapol_key_ie, *key_data; in wpa_receive() local 904 key_data = (const u8 *) (key192 + 1); in wpa_receive() 907 key_data = (const u8 *) (key + 1); in wpa_receive() 1125 if (wpa_parse_kde_ies(key_data, key_data_length, &kde) < 0) { in wpa_receive() 1282 wpa_smk_error(wpa_auth, sm, key_data, key_data_length); in wpa_receive() 1297 wpa_smk_m1(wpa_auth, sm, key, key_data, in wpa_receive() 1301 wpa_parse_kde_ies(key_data, key_data_length, in wpa_receive() 1340 wpa_smk_m3(wpa_auth, sm, key, key_data, key_data_length); in wpa_receive() 1422 u8 *key_data; in __wpa_send_eapol() local 1475 key_data = ((u8 *) (hdr + 1)) + keyhdrlen; in __wpa_send_eapol() [all …]
|
/external/boringssl/src/crypto/x509/ |
D | x_pkey.c | 98 if ((x->key_data != NULL) && (x->key_free)) OPENSSL_free(x->key_data); in X509_PKEY_free()
|
/external/vboot_reference/host/lib21/ |
D | host_key.c | 381 uint8_t *key_data, *key_buf; in vb2_public_key_read_keyb() local 387 if (vb2_read_file(filename, &key_data, &key_size)) in vb2_public_key_read_keyb() 396 free(key_data); in vb2_public_key_read_keyb() 401 free(key_data); in vb2_public_key_read_keyb() 407 memcpy(key_buf, key_data, key_size); in vb2_public_key_read_keyb() 408 free(key_data); in vb2_public_key_read_keyb()
|
/external/wpa_supplicant_8/src/rsn_supp/ |
D | peerkey.c | 657 u16 ver, const u8 *key_data, in wpa_supplicant_process_stk_1_of_4() argument 672 wpa_hexdump(MSG_DEBUG, "RSN: msg 1/4 key data", key_data, key_data_len); in wpa_supplicant_process_stk_1_of_4() 673 if (wpa_supplicant_parse_ies(key_data, key_data_len, &ie) < 0 || in wpa_supplicant_process_stk_1_of_4() 762 u16 ver, const u8 *key_data, in wpa_supplicant_process_stk_2_of_4() argument 774 wpa_hexdump(MSG_DEBUG, "RSN: msg 2/4 key data", key_data, key_data_len); in wpa_supplicant_process_stk_2_of_4() 775 if (wpa_supplicant_parse_ies(key_data, key_data_len, &kde) < 0 || in wpa_supplicant_process_stk_2_of_4() 808 u16 ver, const u8 *key_data, in wpa_supplicant_process_stk_3_of_4() argument 823 wpa_hexdump(MSG_DEBUG, "RSN: msg 3/4 key data", key_data, key_data_len); in wpa_supplicant_process_stk_3_of_4() 824 if (wpa_supplicant_parse_ies(key_data, key_data_len, &kde) < 0) { in wpa_supplicant_process_stk_3_of_4() 1115 const u8 *key_data, size_t key_data_len) in peerkey_rx_eapol_4way() argument [all …]
|
D | peerkey.h | 45 const u8 *key_data, size_t key_data_len); 65 const u8 *key_data, size_t key_data_len) in peerkey_rx_eapol_4way() argument
|
D | wpa.c | 447 u16 ver, const u8 *key_data, in wpa_supplicant_process_1_of_4() argument 471 key_data, key_data_len); in wpa_supplicant_process_1_of_4() 472 if (wpa_supplicant_parse_ies(key_data, key_data_len, &ie) < 0) in wpa_supplicant_process_1_of_4() 1188 u16 ver, const u8 *key_data, in wpa_supplicant_process_3_of_4() argument 1200 wpa_hexdump(MSG_DEBUG, "WPA: IE KeyData", key_data, key_data_len); in wpa_supplicant_process_3_of_4() 1201 if (wpa_supplicant_parse_ies(key_data, key_data_len, &ie) < 0) in wpa_supplicant_process_3_of_4() 1368 const u8 *key_data, in wpa_supplicant_process_1_of_2_wpa() argument 1411 os_memcpy(gd->gtk, key_data, key_data_len); in wpa_supplicant_process_1_of_2_wpa() 1436 key_data, gd->gtk)) { in wpa_supplicant_process_1_of_2_wpa() 1498 const u8 *key_data, in wpa_supplicant_process_1_of_2() argument [all …]
|
/external/vboot_reference/firmware/lib21/include/ |
D | vb2_common.h | 103 const uint8_t *key_data,
|
/external/vboot_reference/firmware/lib/include/ |
D | vboot_common.h | 83 void PublicKeyInit(VbPublicKey *key, uint8_t *key_data, uint64_t key_size);
|