HomeSort by relevance Sort by last modified time
    Searched refs:key_blob (Results 1 - 18 of 18) sorted by null

  /system/security/keystore/
keyblob_utils.cpp 22 * to a hardware keymaster implementation, the first 4 bytes of the key_blob
45 uint8_t* add_softkey_header(uint8_t* key_blob, size_t key_blob_length) {
50 memcpy(key_blob, SOFT_KEY_MAGIC, sizeof(SOFT_KEY_MAGIC));
52 return key_blob + sizeof(SOFT_KEY_MAGIC);
55 bool is_softkey(const uint8_t* key_blob, const size_t key_blob_length) {
60 return !memcmp(key_blob, SOFT_KEY_MAGIC, sizeof(SOFT_KEY_MAGIC));
  /external/wpa_supplicant_8/src/crypto/
crypto_cryptoapi.c 164 } key_blob; local
167 key_blob.hdr.bType = PLAINTEXTKEYBLOB;
168 key_blob.hdr.bVersion = CUR_BLOB_VERSION;
169 key_blob.hdr.reserved = 0;
170 key_blob.hdr.aiKeyAlg = CALG_DES;
171 key_blob.len = 8;
177 key_blob.key[i] = (tmp >> i) | next | 1;
180 key_blob.key[i] = next | 1;
189 if (!CryptImportKey(prov, (BYTE *) &key_blob, sizeof(key_blob), 0, 0
243 } key_blob; local
361 } key_blob; local
516 } key_blob; local
    [all...]
  /system/security/keystore/include/keystore/
keystore.h 67 uint8_t* add_softkey_header(uint8_t* key_blob, size_t key_blob_length);
72 bool is_softkey(const uint8_t* key_blob, const size_t key_blob_length);
  /external/chromium/net/http/
des.cc 186 KeyBlob key_blob; local
187 key_blob.header.bType = PLAINTEXTKEYBLOB;
188 key_blob.header.bVersion = CUR_BLOB_VERSION;
189 key_blob.header.reserved = 0;
190 key_blob.header.aiKeyAlg = CALG_DES;
191 key_blob.key_size = 8; // 64 bits
192 memcpy(key_blob.key_data, key, 8);
196 reinterpret_cast<BYTE*>(&key_blob),
197 sizeof key_blob, 0, 0, key.receive());
199 SecureZeroMemory(key_blob.key_data, sizeof key_blob.key_data)
    [all...]
  /external/chromium_org/net/http/
des.cc 186 KeyBlob key_blob; local
187 key_blob.header.bType = PLAINTEXTKEYBLOB;
188 key_blob.header.bVersion = CUR_BLOB_VERSION;
189 key_blob.header.reserved = 0;
190 key_blob.header.aiKeyAlg = CALG_DES;
191 key_blob.key_size = 8; // 64 bits
192 memcpy(key_blob.key_data, key, 8);
196 reinterpret_cast<BYTE*>(&key_blob),
197 sizeof key_blob, 0, 0, key.receive());
199 SecureZeroMemory(key_blob.key_data, sizeof key_blob.key_data)
    [all...]
  /hardware/libhardware/include/hardware/
keymaster.h 165 uint8_t** key_blob, size_t* key_blob_length);
177 uint8_t** key_blob, size_t* key_blob_length);
187 const uint8_t* key_blob, const size_t key_blob_length,
199 const uint8_t* key_blob, const size_t key_blob_length);
220 const uint8_t* key_blob, const size_t key_blob_length,
232 const uint8_t* key_blob, const size_t key_blob_length,
  /external/chromium/crypto/
hmac_win.cc 133 KeyBlob* key_blob = reinterpret_cast<KeyBlob*>(&key_blob_storage[0]); local
134 key_blob->header.bType = PLAINTEXTKEYBLOB;
135 key_blob->header.bVersion = CUR_BLOB_VERSION;
136 key_blob->header.reserved = 0;
137 key_blob->header.aiKeyAlg = CALG_RC2;
138 key_blob->key_size = key_length;
139 memcpy(key_blob->key_data, key, key_length);
149 SecureZeroMemory(key_blob->key_data, key_length);
  /system/security/softkeymaster/include/keymaster/
softkeymaster.h 28 uint8_t** key_blob, size_t* key_blob_length);
31 const uint8_t* key_blob, const size_t key_blob_length,
  /hardware/qcom/keymaster/
keymaster_qcom.h 77 * (by secure app) is in shared buffer at offset of "key_blob" and is opaque
92 * (by secure app) is in shared buffer at offset of "key_blob" and is opaque
95 * key_blob : key blob data
101 qcom_km_key_blob_t key_blob; member in struct:keymaster_gen_keypair_resp
112 * "key_blob" and is opaque
127 * (by secure app) is in shared buffer at offset of "key_blob" and is opaque
130 * key_blob : key blob data
136 qcom_km_key_blob_t key_blob; member in struct:keymaster_import_keypair_resp
149 * key_blob : Key data information (in shared buffer)
156 qcom_km_key_blob_t key_blob; member in struct:keymaster_sign_data_cmd
195 qcom_km_key_blob_t key_blob; member in struct:keymaster_verify_data_cmd
    [all...]
keymaster_qcom.cpp 376 memcpy(p, (unsigned char *)(&resp->key_blob), resp->key_blob_len);
459 memcpy(p, (unsigned char *)(&resp->key_blob), resp->key_blob_len);
526 memcpy((unsigned char *)(&send_cmd->key_blob), keyBlob, keyBlobLength);
626 memcpy((unsigned char *)(&send_cmd->key_blob), keyBlob, keyBlobLength);
  /hardware/libhardware/tests/keymaster/
keymaster_test.cpp 401 uint8_t* key_blob; local
405 sDevice->generate_keypair(sDevice, key_type, &params, &key_blob, &key_blob_length))
407 UniqueKey key(&sDevice, key_blob, key_blob_length);
412 sDevice->get_keypair_public(sDevice, key_blob, key_blob_length,
448 uint8_t* key_blob; local
452 sDevice->generate_keypair(sDevice, key_type, &params, &key_blob, &key_blob_length))
454 UniqueKey key(&sDevice, key_blob, key_blob_length);
459 sDevice->get_keypair_public(sDevice, key_blob, key_blob_length,
492 uint8_t* key_blob; local
496 sDevice->generate_keypair(sDevice, key_type, NULL, &key_blob, &key_blob_length)
507 uint8_t* key_blob; local
516 uint8_t* key_blob; local
552 uint8_t* key_blob; local
588 uint8_t* key_blob; local
598 uint8_t* key_blob; local
608 uint8_t* key_blob; local
630 uint8_t* key_blob; local
652 uint8_t* key_blob; local
665 uint8_t* key_blob; local
684 uint8_t* key_blob; local
703 uint8_t* key_blob; local
717 uint8_t* key_blob; local
853 uint8_t* key_blob; local
893 uint8_t* key_blob; local
941 uint8_t* key_blob; local
991 uint8_t* key_blob; local
1019 uint8_t* key_blob; local
1050 uint8_t* key_blob; local
1081 uint8_t* key_blob; local
1118 uint8_t* key_blob; local
1143 uint8_t* key_blob; local
1186 uint8_t* key_blob; local
1211 uint8_t* key_blob; local
    [all...]
  /external/chromium_org/crypto/
hmac_win.cc 145 KeyBlob* key_blob = reinterpret_cast<KeyBlob*>(&key_blob_storage[0]); local
146 key_blob->header.bType = PLAINTEXTKEYBLOB;
147 key_blob->header.bVersion = CUR_BLOB_VERSION;
148 key_blob->header.reserved = 0;
149 key_blob->header.aiKeyAlg = CALG_RC2;
150 key_blob->key_size = static_cast<DWORD>(key_length);
151 memcpy(key_blob->key_data, key, key_length);
161 SecureZeroMemory(key_blob->key_data, key_length);
  /device/asus/grouper/keymaster/
keymaster_grouper.cpp 250 static int keyblob_save(ByteArray* objId, uint8_t** key_blob, size_t* key_blob_length) {
263 *key_blob = handleBlob->get();
332 uint8_t** key_blob, size_t* key_blob_length) {
406 return keyblob_save(objId.get(), key_blob, key_blob_length);
411 uint8_t** key_blob, size_t* key_blob_length) {
610 return keyblob_save(objId.get(), key_blob, key_blob_length);
614 const uint8_t* key_blob, const size_t key_blob_length,
622 if (keyblob_restore(&session, key_blob, key_blob_length, &publicKey, &privateKey)) {
726 const uint8_t* key_blob, const size_t key_blob_length) {
733 if (keyblob_restore(&session, key_blob, key_blob_length, &publicKey, &privateKey))
    [all...]
  /device/asus/grouper/self-extractors/nvidia/staging/keymaster/
keymaster_grouper.cpp 250 static int keyblob_save(ByteArray* objId, uint8_t** key_blob, size_t* key_blob_length) {
263 *key_blob = handleBlob->get();
332 uint8_t** key_blob, size_t* key_blob_length) {
406 return keyblob_save(objId.get(), key_blob, key_blob_length);
411 uint8_t** key_blob, size_t* key_blob_length) {
610 return keyblob_save(objId.get(), key_blob, key_blob_length);
614 const uint8_t* key_blob, const size_t key_blob_length,
622 if (keyblob_restore(&session, key_blob, key_blob_length, &publicKey, &privateKey)) {
726 const uint8_t* key_blob, const size_t key_blob_length) {
733 if (keyblob_restore(&session, key_blob, key_blob_length, &publicKey, &privateKey))
    [all...]
  /device/asus/tilapia/self-extractors/nvidia/staging/keymaster/
keymaster_grouper.cpp 250 static int keyblob_save(ByteArray* objId, uint8_t** key_blob, size_t* key_blob_length) {
263 *key_blob = handleBlob->get();
332 uint8_t** key_blob, size_t* key_blob_length) {
406 return keyblob_save(objId.get(), key_blob, key_blob_length);
411 uint8_t** key_blob, size_t* key_blob_length) {
610 return keyblob_save(objId.get(), key_blob, key_blob_length);
614 const uint8_t* key_blob, const size_t key_blob_length,
622 if (keyblob_restore(&session, key_blob, key_blob_length, &publicKey, &privateKey)) {
726 const uint8_t* key_blob, const size_t key_blob_length) {
733 if (keyblob_restore(&session, key_blob, key_blob_length, &publicKey, &privateKey))
    [all...]
  /hardware/samsung_slsi/exynos5/libkeymaster/
keymaster_mobicore.cpp 138 uint8_t** key_blob, size_t* key_blob_length) {
147 } else if (key_blob == NULL || key_blob_length == NULL) {
227 *key_blob = outPtr.release();
233 const uint8_t* key_blob, const size_t key_blob_length,
259 ret = TEE_GetPubKey(key_blob, key_blob_length, binModPtr.get(), &bin_mod_len, binExpPtr.get(),
  /system/security/softkeymaster/
keymaster_openssl.cpp 420 uint8_t** key_blob, size_t* key_blob_length) {
424 } else if (key_blob == NULL || key_blob_length == NULL) {
443 if (wrap_key(pkey.get(), EVP_PKEY_type(pkey->type), key_blob, key_blob_length)) {
452 const uint8_t* key_blob, const size_t key_blob_length,
460 Unique_EVP_PKEY pkey(unwrap_key(key_blob, key_blob_length));
  /external/openssh/
monitor.c 196 static u_char *key_blob = NULL; variable
618 if (key_blob == NULL || key_bloblen != bloblen ||
619 timingsafe_bcmp(key_blob, blob, key_bloblen))
628 if (key_blob != NULL)
629 xfree(key_blob);
634 key_blob = NULL;
1179 key_blob = blob;
    [all...]

Completed in 279 milliseconds