Searched refs:key_block (Results 1 - 24 of 24) sorted by relevance

/external/vboot_reference/host/lib/include/
H A Dhost_keyblock.h43 int KeyBlockWrite(const char* filename, const VbKeyBlockHeader* key_block);
/external/boringssl/src/crypto/hmac/
H A Dhmac.c119 uint8_t key_block[HMAC_MAX_MD_CBLOCK]; local
123 assert(block_size <= sizeof(key_block));
128 !EVP_DigestFinal_ex(&ctx->md_ctx, key_block, &key_block_len)) {
132 assert(key_len >= 0 && key_len <= sizeof(key_block));
133 memcpy(key_block, key, key_len);
138 memset(&key_block[key_block_len], 0, sizeof(key_block) - key_block_len);
142 pad[i] = 0x36 ^ key_block[i];
150 pad[i] = 0x5c ^ key_block[i];
/external/vboot_reference/firmware/lib/
H A Dvboot_firmware.c92 VbKeyBlockHeader *key_block; local
104 key_block = (VbKeyBlockHeader *)
109 key_block = (VbKeyBlockHeader *)
120 if (!(key_block->key_block_flags &
129 if (!(key_block->key_block_flags & KEY_BLOCK_FLAG_RECOVERY_0)) {
136 if ((0 != KeyBlockVerify(key_block, vblock_size,
144 key_version = key_block->data_key.key_version;
164 data_key = PublicKeyToRSA(&key_block->data_key);
173 ((uint8_t *)key_block + key_block
[all...]
H A Dvboot_kernel.c145 VbKeyBlockHeader *key_block; local
192 key_block = (VbKeyBlockHeader*)kbuf;
193 if (0 != KeyBlockVerify(key_block, KBUF_SIZE,
218 if (0 != KeyBlockVerify(key_block, KBUF_SIZE,
228 if (!(key_block->key_block_flags &
235 if (!(key_block->key_block_flags &
244 key_version = key_block->data_key.key_version;
272 data_key = PublicKeyToRSA(&key_block->data_key);
281 (kbuf + key_block->key_block_size);
284 KBUF_SIZE - key_block
[all...]
/external/vboot_reference/futility/
H A Dcmd_vbutil_firmware.c88 VbKeyBlockHeader *key_block; local
109 key_block =
111 if (!key_block) {
159 i = ((1 != fwrite(key_block, key_block_size, 1, f)) ||
176 VbKeyBlockHeader *key_block; local
216 key_block = (VbKeyBlockHeader *) blob;
217 if (0 != KeyBlockVerify(key_block, blob_size, sign_key, 0)) {
222 now += key_block->key_block_size;
225 data_key = &key_block->data_key;
227 key_block
[all...]
H A Ddump_kernel_config_lib.c75 VbKeyBlockHeader key_block; local
81 if (read_fn(ctx, &key_block, sizeof(key_block)) != sizeof(key_block)) {
85 ssize_t to_skip = key_block.key_block_size - sizeof(key_block);
90 now += key_block.key_block_size;
H A Dcmd_show.c58 static void show_keyblock(VbKeyBlockHeader *key_block, const char *name, argument
68 key_block->key_block_size);
70 key_block->key_block_flags);
71 if (key_block->key_block_flags & KEY_BLOCK_FLAG_DEVELOPER_0)
73 if (key_block->key_block_flags & KEY_BLOCK_FLAG_DEVELOPER_1)
75 if (key_block->key_block_flags & KEY_BLOCK_FLAG_RECOVERY_0)
77 if (key_block->key_block_flags & KEY_BLOCK_FLAG_RECOVERY_1)
81 VbPublicKey *data_key = &key_block->data_key;
278 VbKeyBlockHeader *key_block = (VbKeyBlockHeader *)state->my_area->buf; local
288 if (VBOOT_SUCCESS != KeyBlockVerify(key_block, le
413 VbKeyBlockHeader *key_block = (VbKeyBlockHeader *)state->my_area->buf; local
[all...]
H A Dvb1_helper.c720 VbKeyBlockHeader *key_block = (VbKeyBlockHeader *)buf; local
726 if (VBOOT_SUCCESS == KeyBlockVerify(key_block, len, NULL, 1)) {
727 rsa = PublicKeyToRSA(&key_block->data_key);
728 uint32_t more = key_block->key_block_size;
H A Dcmd_sign.c140 VbKeyBlockHeader *key_block = (VbKeyBlockHeader *)state->my_area->buf; local
148 if (VBOOT_SUCCESS != KeyBlockVerify(key_block, len, NULL, 1)) {
155 RSAPublicKey *rsa = PublicKeyToRSA(&key_block->data_key);
162 uint32_t more = key_block->key_block_size;
/external/vboot_reference/host/lib/
H A Dhost_keyblock.c160 int KeyBlockWrite(const char* filename, const VbKeyBlockHeader* key_block) { argument
162 if (0 != WriteFile(filename, key_block, key_block->key_block_size)) {
/external/boringssl/src/ssl/
H A Ds3_enc.c230 if (s->s3->tmp.key_block != NULL) {
231 OPENSSL_cleanse(s->s3->tmp.key_block, s->s3->tmp.key_block_length);
232 OPENSSL_free(s->s3->tmp.key_block);
233 s->s3->tmp.key_block = NULL;
H A Dt1_enc.c336 key_data = s->s3->tmp.key_block;
360 if (key_data - s->s3->tmp.key_block != s->s3->tmp.key_block_length) {
443 s->s3->tmp.key_block = p;
H A Ds3_pkt.c1055 if (s->s3->tmp.key_block == NULL) {
/external/wpa_supplicant_8/hostapd/src/tls/
H A Dtlsv1_client.c54 u8 key_block[TLS_MAX_KEY_BLOCK_LEN]; local
84 key_block, key_block_len)) {
85 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive key_block");
88 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: key_block",
89 key_block, key_block_len);
91 pos = key_block;
741 * tlsv1_client_get_keyblock_size - Get TLS key_block size
743 * Returns: Size of the key_block for the negotiated cipher suite or -1 on
H A Dtlsv1_server.c61 u8 key_block[TLS_MAX_KEY_BLOCK_LEN]; local
90 key_block, key_block_len)) {
91 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive key_block");
94 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: key_block",
95 key_block, key_block_len);
97 pos = key_block;
637 * tlsv1_server_get_keyblock_size - Get TLS key_block size
639 * Returns: Size of the key_block for the negotiated cipher suite or -1 on
/external/wpa_supplicant_8/src/tls/
H A Dtlsv1_client.c54 u8 key_block[TLS_MAX_KEY_BLOCK_LEN]; local
84 key_block, key_block_len)) {
85 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive key_block");
88 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: key_block",
89 key_block, key_block_len);
91 pos = key_block;
741 * tlsv1_client_get_keyblock_size - Get TLS key_block size
743 * Returns: Size of the key_block for the negotiated cipher suite or -1 on
H A Dtlsv1_server.c61 u8 key_block[TLS_MAX_KEY_BLOCK_LEN]; local
90 key_block, key_block_len)) {
91 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive key_block");
94 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: key_block",
95 key_block, key_block_len);
97 pos = key_block;
637 * tlsv1_server_get_keyblock_size - Get TLS key_block size
639 * Returns: Size of the key_block for the negotiated cipher suite or -1 on
/external/wpa_supplicant_8/wpa_supplicant/src/tls/
H A Dtlsv1_client.c54 u8 key_block[TLS_MAX_KEY_BLOCK_LEN]; local
84 key_block, key_block_len)) {
85 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive key_block");
88 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: key_block",
89 key_block, key_block_len);
91 pos = key_block;
741 * tlsv1_client_get_keyblock_size - Get TLS key_block size
743 * Returns: Size of the key_block for the negotiated cipher suite or -1 on
H A Dtlsv1_server.c61 u8 key_block[TLS_MAX_KEY_BLOCK_LEN]; local
90 key_block, key_block_len)) {
91 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive key_block");
94 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: key_block",
95 key_block, key_block_len);
97 pos = key_block;
637 * tlsv1_server_get_keyblock_size - Get TLS key_block size
639 * Returns: Size of the key_block for the negotiated cipher suite or -1 on
/external/boringssl/include/openssl/
H A Dssl3.h465 uint8_t *key_block; member in struct:ssl3_state_st::__anon406
/external/boringssl/src/include/openssl/
H A Dssl3.h465 uint8_t *key_block; member in struct:ssl3_state_st::__anon486
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dcrypto_module_tests.c845 const u8 key_block[] = { local
935 wpa_printf(MSG_INFO, "- PRF (TLS, SHA1/MD5) test case / key_block");
938 buf, sizeof(key_block)) ||
939 os_memcmp(key_block, buf, sizeof(key_block)) != 0) {
/external/wpa_supplicant_8/src/crypto/
H A Dcrypto_module_tests.c845 const u8 key_block[] = { local
935 wpa_printf(MSG_INFO, "- PRF (TLS, SHA1/MD5) test case / key_block");
938 buf, sizeof(key_block)) ||
939 os_memcmp(key_block, buf, sizeof(key_block)) != 0) {
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Dcrypto_module_tests.c845 const u8 key_block[] = { local
935 wpa_printf(MSG_INFO, "- PRF (TLS, SHA1/MD5) test case / key_block");
938 buf, sizeof(key_block)) ||
939 os_memcmp(key_block, buf, sizeof(key_block)) != 0) {

Completed in 682 milliseconds