Searched refs:key_blob (Results 1 – 6 of 6) sorted by relevance
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
D | crypto_cryptoapi.c | 172 } key_blob; in des_encrypt() local 175 key_blob.hdr.bType = PLAINTEXTKEYBLOB; in des_encrypt() 176 key_blob.hdr.bVersion = CUR_BLOB_VERSION; in des_encrypt() 177 key_blob.hdr.reserved = 0; in des_encrypt() 178 key_blob.hdr.aiKeyAlg = CALG_DES; in des_encrypt() 179 key_blob.len = 8; in des_encrypt() 185 key_blob.key[i] = (tmp >> i) | next | 1; in des_encrypt() 188 key_blob.key[i] = next | 1; in des_encrypt() 197 if (!CryptImportKey(prov, (BYTE *) &key_blob, sizeof(key_blob), 0, 0, in des_encrypt() 252 } key_blob; in aes_encrypt_init() local [all …]
|
/external/wpa_supplicant_8/src/crypto/ |
D | crypto_cryptoapi.c | 164 } key_blob; in des_encrypt() local 167 key_blob.hdr.bType = PLAINTEXTKEYBLOB; in des_encrypt() 168 key_blob.hdr.bVersion = CUR_BLOB_VERSION; in des_encrypt() 169 key_blob.hdr.reserved = 0; in des_encrypt() 170 key_blob.hdr.aiKeyAlg = CALG_DES; in des_encrypt() 171 key_blob.len = 8; in des_encrypt() 177 key_blob.key[i] = (tmp >> i) | next | 1; in des_encrypt() 180 key_blob.key[i] = next | 1; in des_encrypt() 189 if (!CryptImportKey(prov, (BYTE *) &key_blob, sizeof(key_blob), 0, 0, in des_encrypt() 243 } key_blob; in aes_encrypt_init() local [all …]
|
/external/chromium/net/http/ |
D | des.cc | 186 KeyBlob key_blob; in DESEncrypt() local 187 key_blob.header.bType = PLAINTEXTKEYBLOB; in DESEncrypt() 188 key_blob.header.bVersion = CUR_BLOB_VERSION; in DESEncrypt() 189 key_blob.header.reserved = 0; in DESEncrypt() 190 key_blob.header.aiKeyAlg = CALG_DES; in DESEncrypt() 191 key_blob.key_size = 8; // 64 bits in DESEncrypt() 192 memcpy(key_blob.key_data, key, 8); in DESEncrypt() 196 reinterpret_cast<BYTE*>(&key_blob), in DESEncrypt() 197 sizeof key_blob, 0, 0, key.receive()); in DESEncrypt() 199 SecureZeroMemory(key_blob.key_data, sizeof key_blob.key_data); in DESEncrypt()
|
/external/chromium/crypto/ |
D | hmac_win.cc | 133 KeyBlob* key_blob = reinterpret_cast<KeyBlob*>(&key_blob_storage[0]); in Init() local 134 key_blob->header.bType = PLAINTEXTKEYBLOB; in Init() 135 key_blob->header.bVersion = CUR_BLOB_VERSION; in Init() 136 key_blob->header.reserved = 0; in Init() 137 key_blob->header.aiKeyAlg = CALG_RC2; in Init() 138 key_blob->key_size = key_length; in Init() 139 memcpy(key_blob->key_data, key, key_length); in Init() 149 SecureZeroMemory(key_blob->key_data, key_length); in Init()
|
/external/openssh/ |
D | PROTOCOL.agent | 318 string key_blob 320 Where "key_blob" is encoded as per RFC 4253 section 6.6 "Public Key 386 string key_blob 389 Where "key_blob" is encoded as per RFC 4253 section 6.6 "Public Key 449 string key_blob 453 Where "key_blob" is encoded as per RFC 4253 section 6.6 "Public Key 461 corresponds to the public key contained in key_blob. It will use this 478 If the agent cannot find the key specified by the supplied key_blob then
|
D | monitor.c | 196 static u_char *key_blob = NULL; variable 618 if (key_blob == NULL || key_bloblen != bloblen || in monitor_allowed_key() 619 timingsafe_bcmp(key_blob, blob, key_bloblen)) in monitor_allowed_key() 628 if (key_blob != NULL) in monitor_reset_key_state() 629 xfree(key_blob); in monitor_reset_key_state() 634 key_blob = NULL; in monitor_reset_key_state() 1179 key_blob = blob; in mm_answer_keyallowed() 1575 key_blob = blob; in mm_answer_rsa_keyallowed()
|