HomeSort by relevance Sort by last modified time
    Searched refs:kbuf (Results 1 - 11 of 11) sorted by null

  /external/vboot_reference/tests/
vb21_common_tests.c 258 struct vb2_keyblock *kbuf; local
279 TEST_SUCC(vb2_keyblock_create(&kbuf, &pubk3, prik, 2, 0x4321, desc),
282 buf = (uint8_t *)kbuf;
283 buf_size = kbuf->c.total_size;
290 kbuf = (struct vb2_keyblock *)buf;
292 TEST_SUCC(vb2_verify_keyblock(kbuf, buf_size, &pubk, &wb),
296 TEST_SUCC(vb2_verify_keyblock(kbuf, buf_size, &pubk2, &wb),
300 TEST_EQ(vb2_verify_keyblock(kbuf, buf_size, &pubk3, &wb),
305 kbuf->c.magic = VB2_MAGIC_PACKED_KEY;
306 TEST_EQ(vb2_verify_keyblock(kbuf, buf_size, &pubk, &wb)
    [all...]
  /external/openssh/
kexecdhs.c 72 u_char *kbuf = NULL; local
126 if ((kbuf = malloc(klen)) == NULL ||
131 if (ECDH_compute_key(kbuf, klen, client_public,
133 BN_bin2bn(kbuf, klen, shared_secret) == NULL) {
139 dump_digest("shared secret", kbuf, klen);
197 if (kbuf) {
198 explicit_bzero(kbuf, klen);
199 free(kbuf);
kexdhc.c 109 u_char *kbuf = NULL, *server_host_key_blob = NULL, *signature = NULL; local
157 if ((kbuf = malloc(klen)) == NULL ||
162 if ((kout = DH_compute_key(kbuf, dh_server_pub, kex->dh)) < 0 ||
163 BN_bin2bn(kbuf, kout, shared_secret) == NULL) {
168 dump_digest("shared secret", kbuf, kout);
209 if (kbuf) {
210 explicit_bzero(kbuf, klen);
211 free(kbuf);
kexdhs.c 100 u_char *kbuf = NULL, *signature = NULL, *server_host_key_blob = NULL; local
149 if ((kbuf = malloc(klen)) == NULL ||
154 if ((kout = DH_compute_key(kbuf, dh_client_pub, kex->dh)) < 0 ||
155 BN_bin2bn(kbuf, kout, shared_secret) == NULL) {
160 dump_digest("shared secret", kbuf, kout);
214 if (kbuf) {
215 explicit_bzero(kbuf, klen);
216 free(kbuf);
kexecdhc.c 108 u_char *kbuf = NULL; local
160 if ((kbuf = malloc(klen)) == NULL ||
165 if (ECDH_compute_key(kbuf, klen, server_public,
167 BN_bin2bn(kbuf, klen, shared_secret) == NULL) {
173 dump_digest("shared secret", kbuf, klen);
216 if (kbuf) {
217 explicit_bzero(kbuf, klen);
218 free(kbuf);
kexgexc.c 152 u_char *kbuf = NULL, *signature = NULL, *server_host_key_blob = NULL; local
205 if ((kbuf = malloc(klen)) == NULL ||
210 if ((kout = DH_compute_key(kbuf, dh_server_pub, kex->dh)) < 0 ||
211 BN_bin2bn(kbuf, kout, shared_secret) == NULL) {
216 dump_digest("shared secret", kbuf, kout);
261 if (kbuf) {
262 explicit_bzero(kbuf, klen);
263 free(kbuf);
kexgexs.c 129 u_char *kbuf = NULL, *signature = NULL, *server_host_key_blob = NULL; local
178 if ((kbuf = malloc(klen)) == NULL ||
183 if ((kout = DH_compute_key(kbuf, dh_client_pub, kex->dh)) < 0 ||
184 BN_bin2bn(kbuf, kout, shared_secret) == NULL) {
189 dump_digest("shared secret", kbuf, kout);
244 if (kbuf) {
245 explicit_bzero(kbuf, klen);
246 free(kbuf);
ssh-keygen.c 2133 struct sshbuf *kbuf; local
    [all...]
  /external/vboot_reference/firmware/lib/
vboot_kernel.c 44 uint8_t* kbuf = NULL; local
137 kbuf = (uint8_t*)VbExMalloc(KBUF_SIZE);
138 if (!kbuf)
185 if (0 != VbExStreamRead(stream, KBUF_SIZE, kbuf)) {
192 key_block = (VbKeyBlockHeader*)kbuf;
281 (kbuf + key_block->key_block_size);
341 * read into kbuf.
387 Memcpy(body_readptr, kbuf + body_offset, body_copied);
488 if (kbuf)
489 VbExFree(kbuf);
    [all...]
  /external/compiler-rt/lib/sanitizer_common/
sanitizer_linux.cc 233 struct kernel_stat kbuf;
234 int res = internal_syscall(SYSCALL(stat), path, &kbuf);
235 kernel_stat_to_stat(&kbuf, (struct stat *)buf);
257 struct kernel_stat kbuf;
258 int res = internal_syscall(SYSCALL(lstat), path, &kbuf);
259 kernel_stat_to_stat(&kbuf, (struct stat *)buf);
276 struct kernel_stat kbuf; local
277 int res = internal_syscall(SYSCALL(fstat), fd, &kbuf);
278 kernel_stat_to_stat(&kbuf, (struct stat *)buf);
    [all...]
  /external/python/cpython2/Modules/
bsddbmodule.c 563 char *kdata=NULL,kbuf[4096]; local
575 if (krec.size > sizeof(kbuf)) kdata = malloc(krec.size);
576 else kdata = kbuf;
602 if (kdata != kbuf) free(kdata);

Completed in 296 milliseconds