/system/security/keystore/ |
keyblob_utils.cpp | 22 * to a hardware keymaster implementation, the first 4 bytes of the key_blob 45 uint8_t* add_softkey_header(uint8_t* key_blob, size_t key_blob_length) { 50 memcpy(key_blob, SOFT_KEY_MAGIC, sizeof(SOFT_KEY_MAGIC)); 52 return key_blob + sizeof(SOFT_KEY_MAGIC); 55 bool is_softkey(const uint8_t* key_blob, const size_t key_blob_length) { 60 return !memcmp(key_blob, SOFT_KEY_MAGIC, sizeof(SOFT_KEY_MAGIC));
|
/external/wpa_supplicant_8/src/crypto/ |
crypto_cryptoapi.c | 164 } key_blob; local 167 key_blob.hdr.bType = PLAINTEXTKEYBLOB; 168 key_blob.hdr.bVersion = CUR_BLOB_VERSION; 169 key_blob.hdr.reserved = 0; 170 key_blob.hdr.aiKeyAlg = CALG_DES; 171 key_blob.len = 8; 177 key_blob.key[i] = (tmp >> i) | next | 1; 180 key_blob.key[i] = next | 1; 189 if (!CryptImportKey(prov, (BYTE *) &key_blob, sizeof(key_blob), 0, 0 243 } key_blob; local 361 } key_blob; local 516 } key_blob; local [all...] |
/system/security/keystore/include/keystore/ |
keystore.h | 67 uint8_t* add_softkey_header(uint8_t* key_blob, size_t key_blob_length); 72 bool is_softkey(const uint8_t* key_blob, const size_t key_blob_length);
|
/external/chromium/net/http/ |
des.cc | 186 KeyBlob key_blob; local 187 key_blob.header.bType = PLAINTEXTKEYBLOB; 188 key_blob.header.bVersion = CUR_BLOB_VERSION; 189 key_blob.header.reserved = 0; 190 key_blob.header.aiKeyAlg = CALG_DES; 191 key_blob.key_size = 8; // 64 bits 192 memcpy(key_blob.key_data, key, 8); 196 reinterpret_cast<BYTE*>(&key_blob), 197 sizeof key_blob, 0, 0, key.receive()); 199 SecureZeroMemory(key_blob.key_data, sizeof key_blob.key_data) [all...] |
/external/chromium_org/net/http/ |
des.cc | 186 KeyBlob key_blob; local 187 key_blob.header.bType = PLAINTEXTKEYBLOB; 188 key_blob.header.bVersion = CUR_BLOB_VERSION; 189 key_blob.header.reserved = 0; 190 key_blob.header.aiKeyAlg = CALG_DES; 191 key_blob.key_size = 8; // 64 bits 192 memcpy(key_blob.key_data, key, 8); 196 reinterpret_cast<BYTE*>(&key_blob), 197 sizeof key_blob, 0, 0, key.receive()); 199 SecureZeroMemory(key_blob.key_data, sizeof key_blob.key_data) [all...] |
/hardware/libhardware/include/hardware/ |
keymaster.h | 165 uint8_t** key_blob, size_t* key_blob_length); 177 uint8_t** key_blob, size_t* key_blob_length); 187 const uint8_t* key_blob, const size_t key_blob_length, 199 const uint8_t* key_blob, const size_t key_blob_length); 220 const uint8_t* key_blob, const size_t key_blob_length, 232 const uint8_t* key_blob, const size_t key_blob_length,
|
/external/chromium/crypto/ |
hmac_win.cc | 133 KeyBlob* key_blob = reinterpret_cast<KeyBlob*>(&key_blob_storage[0]); local 134 key_blob->header.bType = PLAINTEXTKEYBLOB; 135 key_blob->header.bVersion = CUR_BLOB_VERSION; 136 key_blob->header.reserved = 0; 137 key_blob->header.aiKeyAlg = CALG_RC2; 138 key_blob->key_size = key_length; 139 memcpy(key_blob->key_data, key, key_length); 149 SecureZeroMemory(key_blob->key_data, key_length);
|
/system/security/softkeymaster/include/keymaster/ |
softkeymaster.h | 28 uint8_t** key_blob, size_t* key_blob_length); 31 const uint8_t* key_blob, const size_t key_blob_length,
|
/hardware/qcom/keymaster/ |
keymaster_qcom.h | 77 * (by secure app) is in shared buffer at offset of "key_blob" and is opaque 92 * (by secure app) is in shared buffer at offset of "key_blob" and is opaque 95 * key_blob : key blob data 101 qcom_km_key_blob_t key_blob; member in struct:keymaster_gen_keypair_resp 112 * "key_blob" and is opaque 127 * (by secure app) is in shared buffer at offset of "key_blob" and is opaque 130 * key_blob : key blob data 136 qcom_km_key_blob_t key_blob; member in struct:keymaster_import_keypair_resp 149 * key_blob : Key data information (in shared buffer) 156 qcom_km_key_blob_t key_blob; member in struct:keymaster_sign_data_cmd 195 qcom_km_key_blob_t key_blob; member in struct:keymaster_verify_data_cmd [all...] |
keymaster_qcom.cpp | 376 memcpy(p, (unsigned char *)(&resp->key_blob), resp->key_blob_len); 459 memcpy(p, (unsigned char *)(&resp->key_blob), resp->key_blob_len); 526 memcpy((unsigned char *)(&send_cmd->key_blob), keyBlob, keyBlobLength); 626 memcpy((unsigned char *)(&send_cmd->key_blob), keyBlob, keyBlobLength);
|
/hardware/libhardware/tests/keymaster/ |
keymaster_test.cpp | 401 uint8_t* key_blob; local 405 sDevice->generate_keypair(sDevice, key_type, ¶ms, &key_blob, &key_blob_length)) 407 UniqueKey key(&sDevice, key_blob, key_blob_length); 412 sDevice->get_keypair_public(sDevice, key_blob, key_blob_length, 448 uint8_t* key_blob; local 452 sDevice->generate_keypair(sDevice, key_type, ¶ms, &key_blob, &key_blob_length)) 454 UniqueKey key(&sDevice, key_blob, key_blob_length); 459 sDevice->get_keypair_public(sDevice, key_blob, key_blob_length, 492 uint8_t* key_blob; local 496 sDevice->generate_keypair(sDevice, key_type, NULL, &key_blob, &key_blob_length) 507 uint8_t* key_blob; local 516 uint8_t* key_blob; local 552 uint8_t* key_blob; local 588 uint8_t* key_blob; local 598 uint8_t* key_blob; local 608 uint8_t* key_blob; local 630 uint8_t* key_blob; local 652 uint8_t* key_blob; local 665 uint8_t* key_blob; local 684 uint8_t* key_blob; local 703 uint8_t* key_blob; local 717 uint8_t* key_blob; local 853 uint8_t* key_blob; local 893 uint8_t* key_blob; local 941 uint8_t* key_blob; local 991 uint8_t* key_blob; local 1019 uint8_t* key_blob; local 1050 uint8_t* key_blob; local 1081 uint8_t* key_blob; local 1118 uint8_t* key_blob; local 1143 uint8_t* key_blob; local 1186 uint8_t* key_blob; local 1211 uint8_t* key_blob; local [all...] |
/external/chromium_org/crypto/ |
hmac_win.cc | 145 KeyBlob* key_blob = reinterpret_cast<KeyBlob*>(&key_blob_storage[0]); local 146 key_blob->header.bType = PLAINTEXTKEYBLOB; 147 key_blob->header.bVersion = CUR_BLOB_VERSION; 148 key_blob->header.reserved = 0; 149 key_blob->header.aiKeyAlg = CALG_RC2; 150 key_blob->key_size = static_cast<DWORD>(key_length); 151 memcpy(key_blob->key_data, key, key_length); 161 SecureZeroMemory(key_blob->key_data, key_length);
|
/device/asus/grouper/keymaster/ |
keymaster_grouper.cpp | 250 static int keyblob_save(ByteArray* objId, uint8_t** key_blob, size_t* key_blob_length) { 263 *key_blob = handleBlob->get(); 332 uint8_t** key_blob, size_t* key_blob_length) { 406 return keyblob_save(objId.get(), key_blob, key_blob_length); 411 uint8_t** key_blob, size_t* key_blob_length) { 610 return keyblob_save(objId.get(), key_blob, key_blob_length); 614 const uint8_t* key_blob, const size_t key_blob_length, 622 if (keyblob_restore(&session, key_blob, key_blob_length, &publicKey, &privateKey)) { 726 const uint8_t* key_blob, const size_t key_blob_length) { 733 if (keyblob_restore(&session, key_blob, key_blob_length, &publicKey, &privateKey)) [all...] |
/device/asus/grouper/self-extractors/nvidia/staging/keymaster/ |
keymaster_grouper.cpp | 250 static int keyblob_save(ByteArray* objId, uint8_t** key_blob, size_t* key_blob_length) { 263 *key_blob = handleBlob->get(); 332 uint8_t** key_blob, size_t* key_blob_length) { 406 return keyblob_save(objId.get(), key_blob, key_blob_length); 411 uint8_t** key_blob, size_t* key_blob_length) { 610 return keyblob_save(objId.get(), key_blob, key_blob_length); 614 const uint8_t* key_blob, const size_t key_blob_length, 622 if (keyblob_restore(&session, key_blob, key_blob_length, &publicKey, &privateKey)) { 726 const uint8_t* key_blob, const size_t key_blob_length) { 733 if (keyblob_restore(&session, key_blob, key_blob_length, &publicKey, &privateKey)) [all...] |
/device/asus/tilapia/self-extractors/nvidia/staging/keymaster/ |
keymaster_grouper.cpp | 250 static int keyblob_save(ByteArray* objId, uint8_t** key_blob, size_t* key_blob_length) { 263 *key_blob = handleBlob->get(); 332 uint8_t** key_blob, size_t* key_blob_length) { 406 return keyblob_save(objId.get(), key_blob, key_blob_length); 411 uint8_t** key_blob, size_t* key_blob_length) { 610 return keyblob_save(objId.get(), key_blob, key_blob_length); 614 const uint8_t* key_blob, const size_t key_blob_length, 622 if (keyblob_restore(&session, key_blob, key_blob_length, &publicKey, &privateKey)) { 726 const uint8_t* key_blob, const size_t key_blob_length) { 733 if (keyblob_restore(&session, key_blob, key_blob_length, &publicKey, &privateKey)) [all...] |
/hardware/samsung_slsi/exynos5/libkeymaster/ |
keymaster_mobicore.cpp | 138 uint8_t** key_blob, size_t* key_blob_length) { 147 } else if (key_blob == NULL || key_blob_length == NULL) { 227 *key_blob = outPtr.release(); 233 const uint8_t* key_blob, const size_t key_blob_length, 259 ret = TEE_GetPubKey(key_blob, key_blob_length, binModPtr.get(), &bin_mod_len, binExpPtr.get(),
|
/system/security/softkeymaster/ |
keymaster_openssl.cpp | 420 uint8_t** key_blob, size_t* key_blob_length) { 424 } else if (key_blob == NULL || key_blob_length == NULL) { 443 if (wrap_key(pkey.get(), EVP_PKEY_type(pkey->type), key_blob, key_blob_length)) { 452 const uint8_t* key_blob, const size_t key_blob_length, 460 Unique_EVP_PKEY pkey(unwrap_key(key_blob, key_blob_length));
|
/external/openssh/ |
monitor.c | 196 static u_char *key_blob = NULL; variable 618 if (key_blob == NULL || key_bloblen != bloblen || 619 timingsafe_bcmp(key_blob, blob, key_bloblen)) 628 if (key_blob != NULL) 629 xfree(key_blob); 634 key_blob = NULL; 1179 key_blob = blob; [all...] |