HomeSort by relevance Sort by last modified time
    Searched defs:key_block (Results 1 - 15 of 15) sorted by null

  /external/boringssl/src/crypto/fipsmodule/hmac/
hmac.c 129 uint8_t key_block[EVP_MAX_MD_BLOCK_SIZE]; local
133 assert(block_size <= sizeof(key_block));
138 !EVP_DigestFinal_ex(&ctx->md_ctx, key_block, &key_block_len)) {
142 assert(key_len <= sizeof(key_block));
143 OPENSSL_memcpy(key_block, key, key_len);
148 OPENSSL_memset(&key_block[key_block_len], 0, sizeof(key_block) - key_block_len);
152 pad[i] = 0x36 ^ key_block[i];
160 pad[i] = 0x5c ^ key_block[i];
  /external/vboot_reference/futility/
dump_kernel_config_lib.c 75 VbKeyBlockHeader key_block; local
81 if (read_fn(ctx, &key_block, sizeof(key_block)) != sizeof(key_block)) {
85 ssize_t to_skip = key_block.key_block_size - sizeof(key_block);
90 now += key_block.key_block_size;
cmd_show.c 58 static void show_keyblock(VbKeyBlockHeader *key_block, const char *name,
68 key_block->key_block_size);
70 key_block->key_block_flags);
71 if (key_block->key_block_flags & KEY_BLOCK_FLAG_DEVELOPER_0)
73 if (key_block->key_block_flags & KEY_BLOCK_FLAG_DEVELOPER_1)
75 if (key_block->key_block_flags & KEY_BLOCK_FLAG_RECOVERY_0)
77 if (key_block->key_block_flags & KEY_BLOCK_FLAG_RECOVERY_1)
81 VbPublicKey *data_key = &key_block->data_key;
278 VbKeyBlockHeader *key_block = (VbKeyBlockHeader *)state->my_area->buf; local
288 if (VBOOT_SUCCESS != KeyBlockVerify(key_block, len, NULL, 1))
413 VbKeyBlockHeader *key_block = (VbKeyBlockHeader *)state->my_area->buf; local
    [all...]
cmd_vbutil_firmware.c 88 VbKeyBlockHeader *key_block; local
109 key_block =
111 if (!key_block) {
159 i = ((1 != fwrite(key_block, key_block_size, 1, f)) ||
176 VbKeyBlockHeader *key_block; local
216 key_block = (VbKeyBlockHeader *) blob;
217 if (0 != KeyBlockVerify(key_block, blob_size, sign_key, 0)) {
222 now += key_block->key_block_size;
225 data_key = &key_block->data_key;
227 key_block->key_block_size)
    [all...]
vb1_helper.c 720 VbKeyBlockHeader *key_block = (VbKeyBlockHeader *)buf; local
726 if (VBOOT_SUCCESS == KeyBlockVerify(key_block, len, NULL, 1)) {
727 rsa = PublicKeyToRSA(&key_block->data_key);
728 uint32_t more = key_block->key_block_size;
cmd_sign.c 140 VbKeyBlockHeader *key_block = (VbKeyBlockHeader *)state->my_area->buf; local
148 if (VBOOT_SUCCESS != KeyBlockVerify(key_block, len, NULL, 1)) {
155 RSAPublicKey *rsa = PublicKeyToRSA(&key_block->data_key);
162 uint32_t more = key_block->key_block_size;
  /external/vboot_reference/firmware/lib/
vboot_firmware.c 92 VbKeyBlockHeader *key_block; local
104 key_block = (VbKeyBlockHeader *)
109 key_block = (VbKeyBlockHeader *)
120 if (!(key_block->key_block_flags &
129 if (!(key_block->key_block_flags & KEY_BLOCK_FLAG_RECOVERY_0)) {
136 if ((0 != KeyBlockVerify(key_block, vblock_size,
144 key_version = key_block->data_key.key_version;
164 data_key = PublicKeyToRSA(&key_block->data_key);
173 ((uint8_t *)key_block + key_block->key_block_size)
    [all...]
vboot_kernel.c 145 VbKeyBlockHeader *key_block; local
192 key_block = (VbKeyBlockHeader*)kbuf;
193 if (0 != KeyBlockVerify(key_block, KBUF_SIZE,
218 if (0 != KeyBlockVerify(key_block, KBUF_SIZE,
228 if (!(key_block->key_block_flags &
235 if (!(key_block->key_block_flags &
244 key_version = key_block->data_key.key_version;
272 data_key = PublicKeyToRSA(&key_block->data_key);
281 (kbuf + key_block->key_block_size);
284 KBUF_SIZE - key_block->key_block_size
    [all...]
  /external/boringssl/src/ssl/
handoff.cc 267 Array<uint8_t> key_block; local
268 if (!tls1_configure_aead(ssl, evp_aead_open, &key_block,
270 !tls1_configure_aead(ssl, evp_aead_seal, &key_block,
t1_enc.cc 261 Span<const uint8_t> key_block = *key_block_cache; local
265 mac_secret = key_block.subspan(0, mac_secret_len);
266 key = key_block.subspan(2 * mac_secret_len, key_len);
267 iv = key_block.subspan(2 * mac_secret_len + 2 * key_len, iv_len);
270 mac_secret = key_block.subspan(mac_secret_len, mac_secret_len);
271 key = key_block.subspan(2 * mac_secret_len + key_len, key_len);
272 iv = key_block.subspan(2 * mac_secret_len + 2 * key_len + iv_len, iv_len);
297 return tls1_configure_aead(hs->ssl, direction, &hs->key_block,
internal.h 1424 Array<uint8_t> key_block; member in struct:bssl::SSL_HANDSHAKE
    [all...]
  /external/wpa_supplicant_8/src/tls/
tlsv1_client.c 55 u8 key_block[TLS_MAX_KEY_BLOCK_LEN]; local
85 key_block, key_block_len)) {
86 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive key_block");
89 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: key_block",
90 key_block, key_block_len);
92 pos = key_block;
740 * tlsv1_client_get_keyblock_size - Get TLS key_block size
742 * Returns: Size of the key_block for the negotiated cipher suite or -1 on
tlsv1_server.c 61 u8 key_block[TLS_MAX_KEY_BLOCK_LEN]; local
90 key_block, key_block_len)) {
91 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive key_block");
94 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: key_block",
95 key_block, key_block_len);
97 pos = key_block;
637 * tlsv1_server_get_keyblock_size - Get TLS key_block size
639 * Returns: Size of the key_block for the negotiated cipher suite or -1 on
  /external/syslinux/gpxe/src/net/
tls.c 332 uint8_t key_block[total]; local
338 key_block, sizeof ( key_block ), "key expansion",
343 key = key_block;
393 assert ( ( key_block + total ) == key );
    [all...]
  /external/wpa_supplicant_8/src/crypto/
crypto_module_tests.c 864 const u8 key_block[] = { local
956 wpa_printf(MSG_INFO, "- PRF (TLS, SHA1/MD5) test case / key_block");
959 buf, sizeof(key_block)) ||
960 os_memcmp(key_block, buf, sizeof(key_block)) != 0) {
    [all...]

Completed in 407 milliseconds