/external/boringssl/src/crypto/fipsmodule/hmac/ |
hmac.c | 129 uint8_t key_block[EVP_MAX_MD_BLOCK_SIZE]; local 133 assert(block_size <= sizeof(key_block)); 138 !EVP_DigestFinal_ex(&ctx->md_ctx, key_block, &key_block_len)) { 142 assert(key_len <= sizeof(key_block)); 143 OPENSSL_memcpy(key_block, key, key_len); 148 OPENSSL_memset(&key_block[key_block_len], 0, sizeof(key_block) - key_block_len); 152 pad[i] = 0x36 ^ key_block[i]; 160 pad[i] = 0x5c ^ key_block[i];
|
/external/vboot_reference/futility/ |
dump_kernel_config_lib.c | 75 VbKeyBlockHeader key_block; local 81 if (read_fn(ctx, &key_block, sizeof(key_block)) != sizeof(key_block)) { 85 ssize_t to_skip = key_block.key_block_size - sizeof(key_block); 90 now += key_block.key_block_size;
|
cmd_show.c | 58 static void show_keyblock(VbKeyBlockHeader *key_block, const char *name, 68 key_block->key_block_size); 70 key_block->key_block_flags); 71 if (key_block->key_block_flags & KEY_BLOCK_FLAG_DEVELOPER_0) 73 if (key_block->key_block_flags & KEY_BLOCK_FLAG_DEVELOPER_1) 75 if (key_block->key_block_flags & KEY_BLOCK_FLAG_RECOVERY_0) 77 if (key_block->key_block_flags & KEY_BLOCK_FLAG_RECOVERY_1) 81 VbPublicKey *data_key = &key_block->data_key; 278 VbKeyBlockHeader *key_block = (VbKeyBlockHeader *)state->my_area->buf; local 288 if (VBOOT_SUCCESS != KeyBlockVerify(key_block, len, NULL, 1)) 413 VbKeyBlockHeader *key_block = (VbKeyBlockHeader *)state->my_area->buf; local [all...] |
cmd_vbutil_firmware.c | 88 VbKeyBlockHeader *key_block; local 109 key_block = 111 if (!key_block) { 159 i = ((1 != fwrite(key_block, key_block_size, 1, f)) || 176 VbKeyBlockHeader *key_block; local 216 key_block = (VbKeyBlockHeader *) blob; 217 if (0 != KeyBlockVerify(key_block, blob_size, sign_key, 0)) { 222 now += key_block->key_block_size; 225 data_key = &key_block->data_key; 227 key_block->key_block_size) [all...] |
vb1_helper.c | 720 VbKeyBlockHeader *key_block = (VbKeyBlockHeader *)buf; local 726 if (VBOOT_SUCCESS == KeyBlockVerify(key_block, len, NULL, 1)) { 727 rsa = PublicKeyToRSA(&key_block->data_key); 728 uint32_t more = key_block->key_block_size;
|
cmd_sign.c | 140 VbKeyBlockHeader *key_block = (VbKeyBlockHeader *)state->my_area->buf; local 148 if (VBOOT_SUCCESS != KeyBlockVerify(key_block, len, NULL, 1)) { 155 RSAPublicKey *rsa = PublicKeyToRSA(&key_block->data_key); 162 uint32_t more = key_block->key_block_size;
|
/external/vboot_reference/firmware/lib/ |
vboot_firmware.c | 92 VbKeyBlockHeader *key_block; local 104 key_block = (VbKeyBlockHeader *) 109 key_block = (VbKeyBlockHeader *) 120 if (!(key_block->key_block_flags & 129 if (!(key_block->key_block_flags & KEY_BLOCK_FLAG_RECOVERY_0)) { 136 if ((0 != KeyBlockVerify(key_block, vblock_size, 144 key_version = key_block->data_key.key_version; 164 data_key = PublicKeyToRSA(&key_block->data_key); 173 ((uint8_t *)key_block + key_block->key_block_size) [all...] |
vboot_kernel.c | 145 VbKeyBlockHeader *key_block; local 192 key_block = (VbKeyBlockHeader*)kbuf; 193 if (0 != KeyBlockVerify(key_block, KBUF_SIZE, 218 if (0 != KeyBlockVerify(key_block, KBUF_SIZE, 228 if (!(key_block->key_block_flags & 235 if (!(key_block->key_block_flags & 244 key_version = key_block->data_key.key_version; 272 data_key = PublicKeyToRSA(&key_block->data_key); 281 (kbuf + key_block->key_block_size); 284 KBUF_SIZE - key_block->key_block_size [all...] |
/external/boringssl/src/ssl/ |
handoff.cc | 267 Array<uint8_t> key_block; local 268 if (!tls1_configure_aead(ssl, evp_aead_open, &key_block, 270 !tls1_configure_aead(ssl, evp_aead_seal, &key_block,
|
t1_enc.cc | 261 Span<const uint8_t> key_block = *key_block_cache; local 265 mac_secret = key_block.subspan(0, mac_secret_len); 266 key = key_block.subspan(2 * mac_secret_len, key_len); 267 iv = key_block.subspan(2 * mac_secret_len + 2 * key_len, iv_len); 270 mac_secret = key_block.subspan(mac_secret_len, mac_secret_len); 271 key = key_block.subspan(2 * mac_secret_len + key_len, key_len); 272 iv = key_block.subspan(2 * mac_secret_len + 2 * key_len + iv_len, iv_len); 297 return tls1_configure_aead(hs->ssl, direction, &hs->key_block,
|
internal.h | 1424 Array<uint8_t> key_block; member in struct:bssl::SSL_HANDSHAKE [all...] |
/external/wpa_supplicant_8/src/tls/ |
tlsv1_client.c | 55 u8 key_block[TLS_MAX_KEY_BLOCK_LEN]; local 85 key_block, key_block_len)) { 86 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive key_block"); 89 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: key_block", 90 key_block, key_block_len); 92 pos = key_block; 740 * tlsv1_client_get_keyblock_size - Get TLS key_block size 742 * Returns: Size of the key_block for the negotiated cipher suite or -1 on
|
tlsv1_server.c | 61 u8 key_block[TLS_MAX_KEY_BLOCK_LEN]; local 90 key_block, key_block_len)) { 91 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive key_block"); 94 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: key_block", 95 key_block, key_block_len); 97 pos = key_block; 637 * tlsv1_server_get_keyblock_size - Get TLS key_block size 639 * Returns: Size of the key_block for the negotiated cipher suite or -1 on
|
/external/syslinux/gpxe/src/net/ |
tls.c | 332 uint8_t key_block[total]; local 338 key_block, sizeof ( key_block ), "key expansion", 343 key = key_block; 393 assert ( ( key_block + total ) == key ); [all...] |
/external/wpa_supplicant_8/src/crypto/ |
crypto_module_tests.c | 864 const u8 key_block[] = { local 956 wpa_printf(MSG_INFO, "- PRF (TLS, SHA1/MD5) test case / key_block"); 959 buf, sizeof(key_block)) || 960 os_memcmp(key_block, buf, sizeof(key_block)) != 0) { [all...] |