Home
last modified time | relevance | path

Searched refs:key_data (Results 1 – 25 of 31) sorted by relevance

12

/external/vboot_reference/firmware/lib21/
Dmisc.c70 uint8_t *key_data; in vb2_load_fw_keyblock() local
82 key_data = vb2_workbuf_alloc(&wb, key_size); in vb2_load_fw_keyblock()
83 if (!key_data) in vb2_load_fw_keyblock()
87 key_data, key_size); in vb2_load_fw_keyblock()
92 rv = vb2_unpack_key(&root_key, key_data, key_size); in vb2_load_fw_keyblock()
139 memmove(key_data, packed_key, packed_key->c.total_size); in vb2_load_fw_keyblock()
140 packed_key = (struct vb2_packed_key *)key_data; in vb2_load_fw_keyblock()
143 sd->workbuf_data_key_offset = vb2_offset_of(ctx->workbuf, key_data); in vb2_load_fw_keyblock()
158 uint8_t *key_data = ctx->workbuf + sd->workbuf_data_key_offset; in vb2_load_fw_preamble() local
173 rv = vb2_unpack_key(&data_key, key_data, key_size); in vb2_load_fw_preamble()
[all …]
Dpacked_key.c14 const uint8_t *key_data, in vb2_unpack_key_data() argument
17 const uint32_t *buf32 = (const uint32_t *)key_data; in vb2_unpack_key_data()
/external/vboot_reference/firmware/lib20/
Dmisc.c22 uint8_t *key_data; in vb2_load_fw_keyblock() local
36 key_data = vb2_workbuf_alloc(&wb, key_size); in vb2_load_fw_keyblock()
37 if (!key_data) in vb2_load_fw_keyblock()
41 key_data, key_size); in vb2_load_fw_keyblock()
46 rv = vb2_unpack_key(&root_key, key_data, key_size); in vb2_load_fw_keyblock()
99 packed_key = (struct vb2_packed_key *)key_data; in vb2_load_fw_keyblock()
111 memmove(key_data + packed_key->key_offset, in vb2_load_fw_keyblock()
116 sd->workbuf_data_key_offset = vb2_offset_of(ctx->workbuf, key_data); in vb2_load_fw_keyblock()
135 uint8_t *key_data = ctx->workbuf + sd->workbuf_data_key_offset; in vb2_load_fw_preamble() local
151 rv = vb2_unpack_key(&data_key, key_data, key_size); in vb2_load_fw_preamble()
/external/wpa_supplicant_8/src/eap_peer/
Deap_tls.c23 u8 *key_data; member
131 if (data->key_data) { in eap_tls_free_key()
132 bin_clear_free(data->key_data, EAP_TLS_KEY_LEN + EAP_EMSK_LEN); in eap_tls_free_key()
133 data->key_data = NULL; in eap_tls_free_key()
182 data->key_data = eap_peer_tls_derive_key(sm, &data->ssl, in eap_tls_success()
186 if (data->key_data) { in eap_tls_success()
188 data->key_data, EAP_TLS_KEY_LEN); in eap_tls_success()
190 data->key_data + EAP_TLS_KEY_LEN, in eap_tls_success()
329 return data->key_data != NULL; in eap_tls_isKeyAvailable()
338 if (data->key_data == NULL) in eap_tls_getKey()
[all …]
Deap_peap.c57 u8 *key_data; member
171 if (data->key_data) { in eap_peap_free_key()
172 bin_clear_free(data->key_data, EAP_TLS_KEY_LEN); in eap_peap_free_key()
173 data->key_data = NULL; in eap_peap_free_key()
262 tk = data->key_data; in eap_peap_derive_cmk()
1082 data->key_data = in eap_peap_process()
1085 if (data->key_data) { in eap_peap_process()
1088 data->key_data, in eap_peap_process()
1225 return data->key_data != NULL && data->phase2_success; in eap_peap_isKeyAvailable()
1234 if (data->key_data == NULL || !data->phase2_success) in eap_peap_getKey()
[all …]
Deap_ttls.c57 u8 *key_data; member
182 if (data->key_data) { in eap_ttls_free_key()
183 bin_clear_free(data->key_data, EAP_TLS_KEY_LEN + EAP_EMSK_LEN); in eap_ttls_free_key()
184 data->key_data = NULL; in eap_ttls_free_key()
272 data->key_data = eap_peer_tls_derive_key(sm, &data->ssl, in eap_ttls_v0_derive_key()
276 if (!data->key_data) { in eap_ttls_v0_derive_key()
282 data->key_data, EAP_TLS_KEY_LEN); in eap_ttls_v0_derive_key()
284 data->key_data + EAP_TLS_KEY_LEN, in eap_ttls_v0_derive_key()
1736 return data->key_data != NULL && data->phase2_success; in eap_ttls_isKeyAvailable()
1745 if (data->key_data == NULL || !data->phase2_success) in eap_ttls_getKey()
[all …]
Deap_fast.c55 u8 key_data[EAP_FAST_KEY_LEN]; member
250 os_memset(data->key_data, 0, EAP_FAST_KEY_LEN); in eap_fast_deinit()
261 if (eap_fast_derive_eap_msk(data->simck, data->key_data) < 0 || in eap_fast_derive_msk()
1701 os_memset(data->key_data, 0, EAP_FAST_KEY_LEN);
1757 os_memcpy(key, data->key_data, EAP_FAST_KEY_LEN); in eap_fast_getKey()
/external/vboot_reference/host/lib/
Dhost_key.c163 uint8_t* key_data; in PublicKeyReadKeyb() local
177 key_data = ReadFile(filename, &key_size); in PublicKeyReadKeyb()
178 if (!key_data) in PublicKeyReadKeyb()
184 free(key_data); in PublicKeyReadKeyb()
190 free(key_data); in PublicKeyReadKeyb()
193 Memcpy(GetPublicKeyData(key), key_data, key_size); in PublicKeyReadKeyb()
195 free(key_data); in PublicKeyReadKeyb()
/external/boringssl/src/ssl/
Dt1_enc.cc406 const uint8_t *key_data = hs->key_block; in tls1_change_cipher_state() local
407 const uint8_t *client_write_mac_secret = key_data; in tls1_change_cipher_state()
408 key_data += mac_secret_len; in tls1_change_cipher_state()
409 const uint8_t *server_write_mac_secret = key_data; in tls1_change_cipher_state()
410 key_data += mac_secret_len; in tls1_change_cipher_state()
411 const uint8_t *client_write_key = key_data; in tls1_change_cipher_state()
412 key_data += key_len; in tls1_change_cipher_state()
413 const uint8_t *server_write_key = key_data; in tls1_change_cipher_state()
414 key_data += key_len; in tls1_change_cipher_state()
415 const uint8_t *client_write_iv = key_data; in tls1_change_cipher_state()
[all …]
/external/mesa3d/src/intel/vulkan/
Danv_pipeline_cache.c46 const void *key_data, uint32_t key_size, in anv_shader_bin_create() argument
89 memcpy(key->data, key_data, key_size); in anv_shader_bin_create()
229 const void *key_data, uint32_t key_size) in anv_pipeline_cache_search_locked() argument
234 memcpy(key->data, key_data, key_size); in anv_pipeline_cache_search_locked()
245 const void *key_data, uint32_t key_size) in anv_pipeline_cache_search() argument
253 anv_pipeline_cache_search_locked(cache, key_data, key_size); in anv_pipeline_cache_search()
266 const void *key_data, uint32_t key_size, in anv_pipeline_cache_add_shader() argument
274 anv_pipeline_cache_search_locked(cache, key_data, key_size); in anv_pipeline_cache_add_shader()
279 anv_shader_bin_create(cache->device, key_data, key_size, in anv_pipeline_cache_add_shader()
293 const void *key_data, uint32_t key_size, in anv_pipeline_cache_upload_kernel() argument
[all …]
/external/wpa_supplicant_8/src/rsn_supp/
Dpeerkey.h45 const u8 *key_data, size_t key_data_len);
47 struct wpa_eapol_key *key, const u8 *key_data,
65 const u8 *key_data, size_t key_data_len) in peerkey_rx_eapol_4way() argument
71 struct wpa_eapol_key *key, const u8 *key_data, in peerkey_rx_eapol_smk() argument
Dpeerkey.c178 const struct wpa_eapol_key *key, const u8 *key_data, in wpa_supplicant_process_smk_m2() argument
196 if (wpa_supplicant_parse_ies(key_data, key_data_len, &kde) < 0) { in wpa_supplicant_process_smk_m2()
514 const struct wpa_eapol_key *key, const u8 *key_data, in wpa_supplicant_process_smk_m45() argument
527 if (wpa_supplicant_parse_ies(key_data, key_data_len, &kde) < 0) { in wpa_supplicant_process_smk_m45()
593 const u8 *key_data, size_t key_data_len) in wpa_supplicant_process_smk_error() argument
608 if (wpa_supplicant_parse_ies(key_data, key_data_len, &kde) < 0) { in wpa_supplicant_process_smk_error()
655 u16 ver, const u8 *key_data, in wpa_supplicant_process_stk_1_of_4() argument
670 wpa_hexdump(MSG_DEBUG, "RSN: msg 1/4 key data", key_data, key_data_len); in wpa_supplicant_process_stk_1_of_4()
671 if (wpa_supplicant_parse_ies(key_data, key_data_len, &ie) < 0 || in wpa_supplicant_process_stk_1_of_4()
761 u16 ver, const u8 *key_data, in wpa_supplicant_process_stk_2_of_4() argument
[all …]
Dwpa.c93 u8 *buf, *s_key_data, *key_data; in wpa_eapol_key_send() local
113 key_data = ((u8 *) (key + 1)) + 2; in wpa_eapol_key_send()
134 aad_len[0] = key_data - buf; in wpa_eapol_key_send()
137 1, aad, aad_len, key_data) < 0) { in wpa_eapol_key_send()
143 key_data, AES_BLOCK_SIZE + key_data_len); in wpa_eapol_key_send()
519 u16 ver, const u8 *key_data, in wpa_supplicant_process_1_of_4() argument
543 key_data, key_data_len); in wpa_supplicant_process_1_of_4()
544 if (wpa_supplicant_parse_ies(key_data, key_data_len, &ie) < 0) in wpa_supplicant_process_1_of_4()
1315 u16 ver, const u8 *key_data, in wpa_supplicant_process_3_of_4() argument
1327 wpa_hexdump(MSG_DEBUG, "WPA: IE KeyData", key_data, key_data_len); in wpa_supplicant_process_3_of_4()
[all …]
/external/libchrome/crypto/
Dsymmetric_key.cc45 uint8_t* key_data = reinterpret_cast<uint8_t*>( in GenerateRandomKey() local
48 int rv = RAND_bytes(key_data, static_cast<int>(key_size_in_bytes)); in GenerateRandomKey()
77 uint8_t* key_data = reinterpret_cast<uint8_t*>( in DeriveKeyFromPassword() local
83 key_size_in_bytes, key_data); in DeriveKeyFromPassword()
Dsymmetric_key.h82 const void* key_data, size_t key_size_in_bytes);
/external/wpa_supplicant_8/src/ap/
Dpeerkey_auth.c72 const u8 *key_data, size_t key_data_len) in wpa_smk_m1() argument
79 if (wpa_parse_kde_ies(key_data, key_data_len, &kde) < 0) { in wpa_smk_m1()
245 const u8 *key_data, size_t key_data_len) in wpa_smk_m3() argument
251 if (wpa_parse_kde_ies(key_data, key_data_len, &kde) < 0) { in wpa_smk_m3()
315 const u8 *key_data, size_t key_data_len) in wpa_smk_error() argument
322 if (wpa_parse_kde_ies(key_data, key_data_len, &kde) < 0) { in wpa_smk_error()
Dwpa_auth_i.h236 const u8 *key_data, size_t key_data_len);
239 const u8 *key_data, size_t key_data_len);
242 const u8 *key_data, size_t key_data_len);
Dwpa_auth.c901 const u8 *key_data; in wpa_receive() local
921 key_data = mic + mic_len + 2; in wpa_receive()
1274 wpa_smk_error(wpa_auth, sm, key_data, key_data_length); in wpa_receive()
1289 wpa_smk_m1(wpa_auth, sm, key, key_data, in wpa_receive()
1293 wpa_parse_kde_ies(key_data, key_data_length, in wpa_receive()
1332 wpa_smk_m3(wpa_auth, sm, key, key_data, key_data_length); in wpa_receive()
1413 u8 *key_mic, *key_data; in __wpa_send_eapol() local
1469 key_data = ((u8 *) (hdr + 1)) + keyhdrlen; in __wpa_send_eapol()
1508 os_memcpy(key_data, kde, kde_len); in __wpa_send_eapol()
1554 (key_data_len - 8) / 8, buf, key_data)) { in __wpa_send_eapol()
[all …]
/external/boringssl/src/crypto/x509/
Dx_pkey.c103 if ((x->key_data != NULL) && (x->key_free)) in X509_PKEY_free()
104 OPENSSL_free(x->key_data); in X509_PKEY_free()
/external/avb/test/
Davb_unittest_util.h141 std::string key_data; in PublicKeyAVB() local
142 EXPECT_TRUE(base::ReadFileToString(tmp_path, &key_data)); in PublicKeyAVB()
143 return key_data; in PublicKeyAVB()
Davbtool_unittest.cc144 std::string key_data = in TEST_F() local
153 EXPECT_GT(h.auxiliary_data_block_size, key_data.size()); in TEST_F()
155 memcmp(key_data.data(), in TEST_F()
157 key_data.size())); in TEST_F()
/external/vboot_reference/host/lib21/
Dhost_key.c381 uint8_t *key_data, *key_buf; in vb2_public_key_read_keyb() local
387 if (vb2_read_file(filename, &key_data, &key_size)) in vb2_public_key_read_keyb()
396 free(key_data); in vb2_public_key_read_keyb()
401 free(key_data); in vb2_public_key_read_keyb()
407 memcpy(key_buf, key_data, key_size); in vb2_public_key_read_keyb()
408 free(key_data); in vb2_public_key_read_keyb()
/external/vboot_reference/firmware/lib21/include/
Dvb2_common.h103 const uint8_t *key_data,
/external/vboot_reference/firmware/lib/include/
Dvboot_common.h83 void PublicKeyInit(VbPublicKey *key, uint8_t *key_data, uint64_t key_size);
/external/vboot_reference/firmware/lib/
Dvboot_common.c103 void PublicKeyInit(VbPublicKey *key, uint8_t *key_data, uint64_t key_size) in PublicKeyInit() argument
105 key->key_offset = OffsetOf(key, key_data); in PublicKeyInit()

12