/external/vboot_reference/firmware/lib21/ |
D | misc.c | 70 uint8_t *key_data; in vb2_load_fw_keyblock() local 82 key_data = vb2_workbuf_alloc(&wb, key_size); in vb2_load_fw_keyblock() 83 if (!key_data) in vb2_load_fw_keyblock() 87 key_data, key_size); in vb2_load_fw_keyblock() 92 rv = vb2_unpack_key(&root_key, key_data, key_size); in vb2_load_fw_keyblock() 139 memmove(key_data, packed_key, packed_key->c.total_size); in vb2_load_fw_keyblock() 140 packed_key = (struct vb2_packed_key *)key_data; in vb2_load_fw_keyblock() 143 sd->workbuf_data_key_offset = vb2_offset_of(ctx->workbuf, key_data); in vb2_load_fw_keyblock() 158 uint8_t *key_data = ctx->workbuf + sd->workbuf_data_key_offset; in vb2_load_fw_preamble() local 173 rv = vb2_unpack_key(&data_key, key_data, key_size); in vb2_load_fw_preamble() [all …]
|
D | packed_key.c | 14 const uint8_t *key_data, in vb2_unpack_key_data() argument 17 const uint32_t *buf32 = (const uint32_t *)key_data; in vb2_unpack_key_data()
|
/external/vboot_reference/firmware/lib20/ |
D | misc.c | 22 uint8_t *key_data; in vb2_load_fw_keyblock() local 36 key_data = vb2_workbuf_alloc(&wb, key_size); in vb2_load_fw_keyblock() 37 if (!key_data) in vb2_load_fw_keyblock() 41 key_data, key_size); in vb2_load_fw_keyblock() 46 rv = vb2_unpack_key(&root_key, key_data, key_size); in vb2_load_fw_keyblock() 99 packed_key = (struct vb2_packed_key *)key_data; in vb2_load_fw_keyblock() 111 memmove(key_data + packed_key->key_offset, in vb2_load_fw_keyblock() 116 sd->workbuf_data_key_offset = vb2_offset_of(ctx->workbuf, key_data); in vb2_load_fw_keyblock() 135 uint8_t *key_data = ctx->workbuf + sd->workbuf_data_key_offset; in vb2_load_fw_preamble() local 151 rv = vb2_unpack_key(&data_key, key_data, key_size); in vb2_load_fw_preamble()
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap_tls.c | 23 u8 *key_data; member 131 if (data->key_data) { in eap_tls_free_key() 132 bin_clear_free(data->key_data, EAP_TLS_KEY_LEN + EAP_EMSK_LEN); in eap_tls_free_key() 133 data->key_data = NULL; in eap_tls_free_key() 200 data->key_data = eap_peer_tls_derive_key(sm, &data->ssl, label, in eap_tls_success() 204 if (data->key_data) { in eap_tls_success() 206 data->key_data, EAP_TLS_KEY_LEN); in eap_tls_success() 208 data->key_data + EAP_TLS_KEY_LEN, in eap_tls_success() 347 return data->key_data != NULL; in eap_tls_isKeyAvailable() 356 if (data->key_data == NULL) in eap_tls_getKey() [all …]
|
D | eap_peap.c | 57 u8 *key_data; member 171 if (data->key_data) { in eap_peap_free_key() 172 bin_clear_free(data->key_data, EAP_TLS_KEY_LEN + EAP_EMSK_LEN); in eap_peap_free_key() 173 data->key_data = NULL; in eap_peap_free_key() 262 tk = data->key_data; in eap_peap_derive_cmk() 1085 data->key_data = in eap_peap_process() 1090 if (data->key_data) { in eap_peap_process() 1093 data->key_data, in eap_peap_process() 1097 data->key_data + in eap_peap_process() 1235 return data->key_data != NULL && data->phase2_success; in eap_peap_isKeyAvailable() [all …]
|
D | eap_ttls.c | 57 u8 *key_data; member 182 if (data->key_data) { in eap_ttls_free_key() 183 bin_clear_free(data->key_data, EAP_TLS_KEY_LEN + EAP_EMSK_LEN); in eap_ttls_free_key() 184 data->key_data = NULL; in eap_ttls_free_key() 272 data->key_data = eap_peer_tls_derive_key(sm, &data->ssl, in eap_ttls_v0_derive_key() 277 if (!data->key_data) { in eap_ttls_v0_derive_key() 283 data->key_data, EAP_TLS_KEY_LEN); in eap_ttls_v0_derive_key() 285 data->key_data + EAP_TLS_KEY_LEN, in eap_ttls_v0_derive_key() 1753 return data->key_data != NULL && data->phase2_success; in eap_ttls_isKeyAvailable() 1762 if (data->key_data == NULL || !data->phase2_success) in eap_ttls_getKey() [all …]
|
D | eap_fast.c | 55 u8 key_data[EAP_FAST_KEY_LEN]; member 250 os_memset(data->key_data, 0, EAP_FAST_KEY_LEN); in eap_fast_deinit() 261 if (eap_fast_derive_eap_msk(data->simck, data->key_data) < 0 || in eap_fast_derive_msk() 1701 os_memset(data->key_data, 0, EAP_FAST_KEY_LEN); 1752 key = os_memdup(data->key_data, EAP_FAST_KEY_LEN); in eap_fast_getKey()
|
/external/mesa3d/src/intel/vulkan/ |
D | anv_pipeline_cache.c | 31 const void *key_data, uint32_t key_size, in anv_shader_bin_create() argument 60 memcpy(key->data, key_data, key_size); in anv_shader_bin_create() 131 const void *key_data = blob_read_bytes(blob, key_size); in anv_shader_bin_create_from_blob() local 159 key_data, key_size, in anv_shader_bin_create_from_blob() 228 const void *key_data, uint32_t key_size) in anv_pipeline_cache_search_locked() argument 233 memcpy(key->data, key_data, key_size); in anv_pipeline_cache_search_locked() 244 const void *key_data, uint32_t key_size) in anv_pipeline_cache_search() argument 252 anv_pipeline_cache_search_locked(cache, key_data, key_size); in anv_pipeline_cache_search() 265 const void *key_data, uint32_t key_size, in anv_pipeline_cache_add_shader() argument 273 anv_pipeline_cache_search_locked(cache, key_data, key_size); in anv_pipeline_cache_add_shader() [all …]
|
/external/vboot_reference/host/lib/ |
D | host_key.c | 163 uint8_t* key_data; in PublicKeyReadKeyb() local 177 key_data = ReadFile(filename, &key_size); in PublicKeyReadKeyb() 178 if (!key_data) in PublicKeyReadKeyb() 184 free(key_data); in PublicKeyReadKeyb() 190 free(key_data); in PublicKeyReadKeyb() 193 Memcpy(GetPublicKeyData(key), key_data, key_size); in PublicKeyReadKeyb() 195 free(key_data); in PublicKeyReadKeyb()
|
/external/libchrome/crypto/ |
D | symmetric_key.cc | 45 uint8_t* key_data = reinterpret_cast<uint8_t*>( in GenerateRandomKey() local 48 int rv = RAND_bytes(key_data, static_cast<int>(key_size_in_bytes)); in GenerateRandomKey() 77 uint8_t* key_data = reinterpret_cast<uint8_t*>( in DeriveKeyFromPassword() local 83 key_size_in_bytes, key_data); in DeriveKeyFromPassword()
|
/external/grpc-grpc/src/core/tsi/alts/handshaker/ |
D | alts_tsi_handshaker.cc | 62 char* key_data; member 129 reinterpret_cast<const uint8_t*>(result->key_data), in handshaker_result_create_zero_copy_grpc_protector() 151 reinterpret_cast<const uint8_t*>(result->key_data), in handshaker_result_create_frame_protector() 184 gpr_free(result->key_data); in handshaker_result_destroy() 203 grpc_slice* key = static_cast<grpc_slice*>(resp->result.key_data.arg); in create_handshaker_result() 217 result->key_data = in create_handshaker_result() 219 memcpy(result->key_data, GRPC_SLICE_START_PTR(*key), in create_handshaker_result()
|
D | handshaker.pb.c | 75 …PB_FIELD( 3, BYTES , OPTIONAL, CALLBACK, OTHER, grpc_gcp_HandshakerResult, key_data, record_pro… 76 … , OPTIONAL, STATIC , OTHER, grpc_gcp_HandshakerResult, peer_identity, key_data, &grpc_gcp_Identi…
|
/external/vboot_reference/host/lib21/ |
D | host_key.c | 381 uint8_t *key_data, *key_buf; in vb2_public_key_read_keyb() local 387 if (vb2_read_file(filename, &key_data, &key_size)) in vb2_public_key_read_keyb() 396 free(key_data); in vb2_public_key_read_keyb() 401 free(key_data); in vb2_public_key_read_keyb() 407 memcpy(key_buf, key_data, key_size); in vb2_public_key_read_keyb() 408 free(key_data); in vb2_public_key_read_keyb()
|
/external/boringssl/src/crypto/x509/ |
D | x_pkey.c | 103 if ((x->key_data != NULL) && (x->key_free)) in X509_PKEY_free() 104 OPENSSL_free(x->key_data); in X509_PKEY_free()
|
/external/grpc-grpc/test/core/tsi/alts/handshaker/ |
D | alts_handshaker_service_api_test.cc | 28 const char key_data[] = "THIS IS KEY DATA."; in main() local 122 grpc_gcp_handshaker_resp_set_key_data(resp, key_data, strlen(key_data))); in main()
|
D | alts_handshaker_service_api_test_lib.cc | 101 const char* key_data, size_t size) { in grpc_gcp_handshaker_resp_set_key_data() argument 102 if (resp == nullptr || key_data == nullptr) { in grpc_gcp_handshaker_resp_set_key_data() 108 grpc_slice* slice = create_slice(key_data, size); in grpc_gcp_handshaker_resp_set_key_data() 109 resp->result.key_data.arg = slice; in grpc_gcp_handshaker_resp_set_key_data() 110 resp->result.key_data.funcs.encode = encode_string_or_bytes_cb; in grpc_gcp_handshaker_resp_set_key_data() 594 result &= slice_equals(static_cast<grpc_slice*>(l_result->key_data.arg), in grpc_gcp_handshaker_resp_result_equals() 595 static_cast<grpc_slice*>(r_result->key_data.arg)); in grpc_gcp_handshaker_resp_result_equals()
|
D | alts_handshaker_service_api_test_lib.h | 58 const char* key_data, size_t size);
|
/external/avb/test/ |
D | avb_unittest_util.cc | 161 std::string key_data; in PublicKeyAVB() local 162 EXPECT_TRUE(base::ReadFileToString(tmp_path, &key_data)); in PublicKeyAVB() 163 return key_data; in PublicKeyAVB()
|
/external/nos/test/system-test-harness/src/ |
D | runtests.cc | 219 vector<int> key_data(key_size / sizeof(int)); in TEST_F() local 220 for (auto &part : key_data) { in TEST_F() 223 request.set_key(key_data.data(), key_data.size() * sizeof(int)); in TEST_F() 258 AES_set_encrypt_key(reinterpret_cast<uint8_t *>(key_data.data()), in TEST_F()
|
/external/boringssl/src/crypto/lhash/ |
D | lhash_test.cc | 121 const char *key_data = in TEST() local 124 return strcmp(key_data, data); in TEST()
|
/external/wpa_supplicant_8/src/rsn_supp/ |
D | wpa.c | 100 u8 *buf, *s_key_data, *key_data; in wpa_eapol_key_send() local 120 key_data = ((u8 *) (key + 1)) + 2; in wpa_eapol_key_send() 141 aad_len[0] = key_data - buf; in wpa_eapol_key_send() 144 1, aad, aad_len, key_data) < 0) { in wpa_eapol_key_send() 150 key_data, AES_BLOCK_SIZE + key_data_len); in wpa_eapol_key_send() 562 u16 ver, const u8 *key_data, in wpa_supplicant_process_1_of_4() argument 586 key_data, key_data_len); in wpa_supplicant_process_1_of_4() 587 if (wpa_supplicant_parse_ies(key_data, key_data_len, &ie) < 0) in wpa_supplicant_process_1_of_4() 1412 u16 ver, const u8 *key_data, in wpa_supplicant_process_3_of_4() argument 1424 wpa_hexdump(MSG_DEBUG, "WPA: IE KeyData", key_data, key_data_len); in wpa_supplicant_process_3_of_4() [all …]
|
/external/vboot_reference/firmware/lib21/include/ |
D | vb2_common.h | 103 const uint8_t *key_data,
|
/external/vboot_reference/firmware/lib/include/ |
D | vboot_common.h | 83 void PublicKeyInit(VbPublicKey *key, uint8_t *key_data, uint64_t key_size);
|
/external/vboot_reference/firmware/lib/ |
D | vboot_common.c | 103 void PublicKeyInit(VbPublicKey *key, uint8_t *key_data, uint64_t key_size) in PublicKeyInit() argument 105 key->key_offset = OffsetOf(key, key_data); in PublicKeyInit()
|
/external/wpa_supplicant_8/src/ap/ |
D | wpa_auth.c | 940 const u8 *key_data; in wpa_receive() local 960 key_data = mic + mic_len + 2; in wpa_receive() 1303 wpa_parse_kde_ies(key_data, key_data_length, in wpa_receive() 1427 u8 *key_mic, *key_data; in __wpa_send_eapol() local 1480 key_data = ((u8 *) (hdr + 1)) + keyhdrlen; in __wpa_send_eapol() 1517 os_memcpy(key_data, kde, kde_len); in __wpa_send_eapol() 1565 (key_data_len - 8) / 8, buf, key_data)) { in __wpa_send_eapol() 1582 os_memcpy(key_data, buf, key_data_len); in __wpa_send_eapol() 1583 rc4_skip(ek, 32, 256, key_data, key_data_len); in __wpa_send_eapol() 2761 const u8 *eapol_key_ie, *key_data, *mic; in SM_STATE() local [all …]
|