/external/vboot_reference/tests/ |
vb21_common_tests.c | 258 struct vb2_keyblock *kbuf; local 279 TEST_SUCC(vb2_keyblock_create(&kbuf, &pubk3, prik, 2, 0x4321, desc), 282 buf = (uint8_t *)kbuf; 283 buf_size = kbuf->c.total_size; 290 kbuf = (struct vb2_keyblock *)buf; 292 TEST_SUCC(vb2_verify_keyblock(kbuf, buf_size, &pubk, &wb), 296 TEST_SUCC(vb2_verify_keyblock(kbuf, buf_size, &pubk2, &wb), 300 TEST_EQ(vb2_verify_keyblock(kbuf, buf_size, &pubk3, &wb), 305 kbuf->c.magic = VB2_MAGIC_PACKED_KEY; 306 TEST_EQ(vb2_verify_keyblock(kbuf, buf_size, &pubk, &wb) [all...] |
/external/openssh/ |
kexecdhs.c | 72 u_char *kbuf = NULL; local 126 if ((kbuf = malloc(klen)) == NULL || 131 if (ECDH_compute_key(kbuf, klen, client_public, 133 BN_bin2bn(kbuf, klen, shared_secret) == NULL) { 139 dump_digest("shared secret", kbuf, klen); 197 if (kbuf) { 198 explicit_bzero(kbuf, klen); 199 free(kbuf);
|
kexdhc.c | 109 u_char *kbuf = NULL, *server_host_key_blob = NULL, *signature = NULL; local 157 if ((kbuf = malloc(klen)) == NULL || 162 if ((kout = DH_compute_key(kbuf, dh_server_pub, kex->dh)) < 0 || 163 BN_bin2bn(kbuf, kout, shared_secret) == NULL) { 168 dump_digest("shared secret", kbuf, kout); 209 if (kbuf) { 210 explicit_bzero(kbuf, klen); 211 free(kbuf);
|
kexdhs.c | 100 u_char *kbuf = NULL, *signature = NULL, *server_host_key_blob = NULL; local 149 if ((kbuf = malloc(klen)) == NULL || 154 if ((kout = DH_compute_key(kbuf, dh_client_pub, kex->dh)) < 0 || 155 BN_bin2bn(kbuf, kout, shared_secret) == NULL) { 160 dump_digest("shared secret", kbuf, kout); 214 if (kbuf) { 215 explicit_bzero(kbuf, klen); 216 free(kbuf);
|
kexecdhc.c | 108 u_char *kbuf = NULL; local 160 if ((kbuf = malloc(klen)) == NULL || 165 if (ECDH_compute_key(kbuf, klen, server_public, 167 BN_bin2bn(kbuf, klen, shared_secret) == NULL) { 173 dump_digest("shared secret", kbuf, klen); 216 if (kbuf) { 217 explicit_bzero(kbuf, klen); 218 free(kbuf);
|
kexgexc.c | 152 u_char *kbuf = NULL, *signature = NULL, *server_host_key_blob = NULL; local 205 if ((kbuf = malloc(klen)) == NULL || 210 if ((kout = DH_compute_key(kbuf, dh_server_pub, kex->dh)) < 0 || 211 BN_bin2bn(kbuf, kout, shared_secret) == NULL) { 216 dump_digest("shared secret", kbuf, kout); 261 if (kbuf) { 262 explicit_bzero(kbuf, klen); 263 free(kbuf);
|
kexgexs.c | 129 u_char *kbuf = NULL, *signature = NULL, *server_host_key_blob = NULL; local 178 if ((kbuf = malloc(klen)) == NULL || 183 if ((kout = DH_compute_key(kbuf, dh_client_pub, kex->dh)) < 0 || 184 BN_bin2bn(kbuf, kout, shared_secret) == NULL) { 189 dump_digest("shared secret", kbuf, kout); 244 if (kbuf) { 245 explicit_bzero(kbuf, klen); 246 free(kbuf);
|
ssh-keygen.c | 2133 struct sshbuf *kbuf; local [all...] |
/external/vboot_reference/firmware/lib/ |
vboot_kernel.c | 44 uint8_t* kbuf = NULL; local 137 kbuf = (uint8_t*)VbExMalloc(KBUF_SIZE); 138 if (!kbuf) 185 if (0 != VbExStreamRead(stream, KBUF_SIZE, kbuf)) { 192 key_block = (VbKeyBlockHeader*)kbuf; 281 (kbuf + key_block->key_block_size); 341 * read into kbuf. 387 Memcpy(body_readptr, kbuf + body_offset, body_copied); 488 if (kbuf) 489 VbExFree(kbuf); [all...] |
/external/compiler-rt/lib/sanitizer_common/ |
sanitizer_linux.cc | 233 struct kernel_stat kbuf; 234 int res = internal_syscall(SYSCALL(stat), path, &kbuf); 235 kernel_stat_to_stat(&kbuf, (struct stat *)buf); 257 struct kernel_stat kbuf; 258 int res = internal_syscall(SYSCALL(lstat), path, &kbuf); 259 kernel_stat_to_stat(&kbuf, (struct stat *)buf); 276 struct kernel_stat kbuf; local 277 int res = internal_syscall(SYSCALL(fstat), fd, &kbuf); 278 kernel_stat_to_stat(&kbuf, (struct stat *)buf); [all...] |
/external/python/cpython2/Modules/ |
bsddbmodule.c | 563 char *kdata=NULL,kbuf[4096]; local 575 if (krec.size > sizeof(kbuf)) kdata = malloc(krec.size); 576 else kdata = kbuf; 602 if (kdata != kbuf) free(kdata);
|