Home
last modified time | relevance | path

Searched refs:key_blob (Results 1 – 6 of 6) sorted by relevance

/external/wpa_supplicant_6/wpa_supplicant/src/crypto/
Dcrypto_cryptoapi.c172 } key_blob; in des_encrypt() local
175 key_blob.hdr.bType = PLAINTEXTKEYBLOB; in des_encrypt()
176 key_blob.hdr.bVersion = CUR_BLOB_VERSION; in des_encrypt()
177 key_blob.hdr.reserved = 0; in des_encrypt()
178 key_blob.hdr.aiKeyAlg = CALG_DES; in des_encrypt()
179 key_blob.len = 8; in des_encrypt()
185 key_blob.key[i] = (tmp >> i) | next | 1; in des_encrypt()
188 key_blob.key[i] = next | 1; in des_encrypt()
197 if (!CryptImportKey(prov, (BYTE *) &key_blob, sizeof(key_blob), 0, 0, in des_encrypt()
252 } key_blob; in aes_encrypt_init() local
[all …]
/external/wpa_supplicant_8/src/crypto/
Dcrypto_cryptoapi.c164 } key_blob; in des_encrypt() local
167 key_blob.hdr.bType = PLAINTEXTKEYBLOB; in des_encrypt()
168 key_blob.hdr.bVersion = CUR_BLOB_VERSION; in des_encrypt()
169 key_blob.hdr.reserved = 0; in des_encrypt()
170 key_blob.hdr.aiKeyAlg = CALG_DES; in des_encrypt()
171 key_blob.len = 8; in des_encrypt()
177 key_blob.key[i] = (tmp >> i) | next | 1; in des_encrypt()
180 key_blob.key[i] = next | 1; in des_encrypt()
189 if (!CryptImportKey(prov, (BYTE *) &key_blob, sizeof(key_blob), 0, 0, in des_encrypt()
243 } key_blob; in aes_encrypt_init() local
[all …]
/external/chromium/net/http/
Ddes.cc186 KeyBlob key_blob; in DESEncrypt() local
187 key_blob.header.bType = PLAINTEXTKEYBLOB; in DESEncrypt()
188 key_blob.header.bVersion = CUR_BLOB_VERSION; in DESEncrypt()
189 key_blob.header.reserved = 0; in DESEncrypt()
190 key_blob.header.aiKeyAlg = CALG_DES; in DESEncrypt()
191 key_blob.key_size = 8; // 64 bits in DESEncrypt()
192 memcpy(key_blob.key_data, key, 8); in DESEncrypt()
196 reinterpret_cast<BYTE*>(&key_blob), in DESEncrypt()
197 sizeof key_blob, 0, 0, key.receive()); in DESEncrypt()
199 SecureZeroMemory(key_blob.key_data, sizeof key_blob.key_data); in DESEncrypt()
/external/chromium/crypto/
Dhmac_win.cc133 KeyBlob* key_blob = reinterpret_cast<KeyBlob*>(&key_blob_storage[0]); in Init() local
134 key_blob->header.bType = PLAINTEXTKEYBLOB; in Init()
135 key_blob->header.bVersion = CUR_BLOB_VERSION; in Init()
136 key_blob->header.reserved = 0; in Init()
137 key_blob->header.aiKeyAlg = CALG_RC2; in Init()
138 key_blob->key_size = key_length; in Init()
139 memcpy(key_blob->key_data, key, key_length); in Init()
149 SecureZeroMemory(key_blob->key_data, key_length); in Init()
/external/openssh/
DPROTOCOL.agent318 string key_blob
320 Where "key_blob" is encoded as per RFC 4253 section 6.6 "Public Key
386 string key_blob
389 Where "key_blob" is encoded as per RFC 4253 section 6.6 "Public Key
449 string key_blob
453 Where "key_blob" is encoded as per RFC 4253 section 6.6 "Public Key
461 corresponds to the public key contained in key_blob. It will use this
478 If the agent cannot find the key specified by the supplied key_blob then
Dmonitor.c196 static u_char *key_blob = NULL; variable
618 if (key_blob == NULL || key_bloblen != bloblen || in monitor_allowed_key()
619 timingsafe_bcmp(key_blob, blob, key_bloblen)) in monitor_allowed_key()
628 if (key_blob != NULL) in monitor_reset_key_state()
629 xfree(key_blob); in monitor_reset_key_state()
634 key_blob = NULL; in monitor_reset_key_state()
1179 key_blob = blob; in mm_answer_keyallowed()
1575 key_blob = blob; in mm_answer_rsa_keyallowed()