/external/vboot_reference/futility/ |
H A D | dump_kernel_config_lib.c | 75 VbKeyBlockHeader key_block; local 81 if (read_fn(ctx, &key_block, sizeof(key_block)) != sizeof(key_block)) { 85 ssize_t to_skip = key_block.key_block_size - sizeof(key_block); 90 now += key_block.key_block_size;
|
H A D | cmd_vbutil_firmware.c | 88 VbKeyBlockHeader *key_block; local 109 key_block = 111 if (!key_block) { 159 i = ((1 != fwrite(key_block, key_block_size, 1, f)) || 176 VbKeyBlockHeader *key_block; local 216 key_block = (VbKeyBlockHeader *) blob; 217 if (0 != KeyBlockVerify(key_block, blob_size, sign_key, 0)) { 222 now += key_block->key_block_size; 225 data_key = &key_block->data_key; 227 key_block [all...] |
H A D | cmd_show.c | 58 static void show_keyblock(VbKeyBlockHeader *key_block, const char *name, argument 68 key_block->key_block_size); 70 key_block->key_block_flags); 71 if (key_block->key_block_flags & KEY_BLOCK_FLAG_DEVELOPER_0) 73 if (key_block->key_block_flags & KEY_BLOCK_FLAG_DEVELOPER_1) 75 if (key_block->key_block_flags & KEY_BLOCK_FLAG_RECOVERY_0) 77 if (key_block->key_block_flags & KEY_BLOCK_FLAG_RECOVERY_1) 81 VbPublicKey *data_key = &key_block->data_key; 278 VbKeyBlockHeader *key_block = (VbKeyBlockHeader *)state->my_area->buf; local 288 if (VBOOT_SUCCESS != KeyBlockVerify(key_block, le 413 VbKeyBlockHeader *key_block = (VbKeyBlockHeader *)state->my_area->buf; local [all...] |
H A D | cmd_sign.c | 140 VbKeyBlockHeader *key_block = (VbKeyBlockHeader *)state->my_area->buf; local 148 if (VBOOT_SUCCESS != KeyBlockVerify(key_block, len, NULL, 1)) { 155 RSAPublicKey *rsa = PublicKeyToRSA(&key_block->data_key); 162 uint32_t more = key_block->key_block_size;
|
H A D | vb1_helper.c | 720 VbKeyBlockHeader *key_block = (VbKeyBlockHeader *)buf; local 726 if (VBOOT_SUCCESS == KeyBlockVerify(key_block, len, NULL, 1)) { 727 rsa = PublicKeyToRSA(&key_block->data_key); 728 uint32_t more = key_block->key_block_size;
|
/external/vboot_reference/host/lib/ |
H A D | host_keyblock.c | 160 int KeyBlockWrite(const char* filename, const VbKeyBlockHeader* key_block) { argument 162 if (0 != WriteFile(filename, key_block, key_block->key_block_size)) {
|
/external/boringssl/src/crypto/hmac/ |
H A D | hmac.c | 119 uint8_t key_block[HMAC_MAX_MD_CBLOCK]; local 123 assert(block_size <= sizeof(key_block)); 128 !EVP_DigestFinal_ex(&ctx->md_ctx, key_block, &key_block_len)) { 132 assert(key_len <= sizeof(key_block)); 133 memcpy(key_block, key, key_len); 138 memset(&key_block[key_block_len], 0, sizeof(key_block) - key_block_len); 142 pad[i] = 0x36 ^ key_block[i]; 150 pad[i] = 0x5c ^ key_block[i];
|
/external/vboot_reference/firmware/lib/ |
H A D | vboot_firmware.c | 92 VbKeyBlockHeader *key_block; local 104 key_block = (VbKeyBlockHeader *) 109 key_block = (VbKeyBlockHeader *) 120 if (!(key_block->key_block_flags & 129 if (!(key_block->key_block_flags & KEY_BLOCK_FLAG_RECOVERY_0)) { 136 if ((0 != KeyBlockVerify(key_block, vblock_size, 144 key_version = key_block->data_key.key_version; 164 data_key = PublicKeyToRSA(&key_block->data_key); 173 ((uint8_t *)key_block + key_block [all...] |
H A D | vboot_kernel.c | 145 VbKeyBlockHeader *key_block; local 192 key_block = (VbKeyBlockHeader*)kbuf; 193 if (0 != KeyBlockVerify(key_block, KBUF_SIZE, 218 if (0 != KeyBlockVerify(key_block, KBUF_SIZE, 228 if (!(key_block->key_block_flags & 235 if (!(key_block->key_block_flags & 244 key_version = key_block->data_key.key_version; 272 data_key = PublicKeyToRSA(&key_block->data_key); 281 (kbuf + key_block->key_block_size); 284 KBUF_SIZE - key_block [all...] |
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_client.c | 55 u8 key_block[TLS_MAX_KEY_BLOCK_LEN]; local 85 key_block, key_block_len)) { 86 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive key_block"); 89 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: key_block", 90 key_block, key_block_len); 92 pos = key_block; 740 * tlsv1_client_get_keyblock_size - Get TLS key_block size 742 * Returns: Size of the key_block for the negotiated cipher suite or -1 on
|
H A D | tlsv1_server.c | 61 u8 key_block[TLS_MAX_KEY_BLOCK_LEN]; local 90 key_block, key_block_len)) { 91 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive key_block"); 94 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: key_block", 95 key_block, key_block_len); 97 pos = key_block; 637 * tlsv1_server_get_keyblock_size - Get TLS key_block size 639 * Returns: Size of the key_block for the negotiated cipher suite or -1 on
|
/external/wpa_supplicant_8/src/tls/ |
H A D | tlsv1_client.c | 55 u8 key_block[TLS_MAX_KEY_BLOCK_LEN]; local 85 key_block, key_block_len)) { 86 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive key_block"); 89 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: key_block", 90 key_block, key_block_len); 92 pos = key_block; 740 * tlsv1_client_get_keyblock_size - Get TLS key_block size 742 * Returns: Size of the key_block for the negotiated cipher suite or -1 on
|
H A D | tlsv1_server.c | 61 u8 key_block[TLS_MAX_KEY_BLOCK_LEN]; local 90 key_block, key_block_len)) { 91 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive key_block"); 94 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: key_block", 95 key_block, key_block_len); 97 pos = key_block; 637 * tlsv1_server_get_keyblock_size - Get TLS key_block size 639 * Returns: Size of the key_block for the negotiated cipher suite or -1 on
|
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | tlsv1_client.c | 55 u8 key_block[TLS_MAX_KEY_BLOCK_LEN]; local 85 key_block, key_block_len)) { 86 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive key_block"); 89 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: key_block", 90 key_block, key_block_len); 92 pos = key_block; 740 * tlsv1_client_get_keyblock_size - Get TLS key_block size 742 * Returns: Size of the key_block for the negotiated cipher suite or -1 on
|
H A D | tlsv1_server.c | 61 u8 key_block[TLS_MAX_KEY_BLOCK_LEN]; local 90 key_block, key_block_len)) { 91 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive key_block"); 94 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: key_block", 95 key_block, key_block_len); 97 pos = key_block; 637 * tlsv1_server_get_keyblock_size - Get TLS key_block size 639 * Returns: Size of the key_block for the negotiated cipher suite or -1 on
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | crypto_module_tests.c | 859 const u8 key_block[] = { local 951 wpa_printf(MSG_INFO, "- PRF (TLS, SHA1/MD5) test case / key_block"); 954 buf, sizeof(key_block)) || 955 os_memcmp(key_block, buf, sizeof(key_block)) != 0) {
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | crypto_module_tests.c | 859 const u8 key_block[] = { local 951 wpa_printf(MSG_INFO, "- PRF (TLS, SHA1/MD5) test case / key_block"); 954 buf, sizeof(key_block)) || 955 os_memcmp(key_block, buf, sizeof(key_block)) != 0) {
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | crypto_module_tests.c | 859 const u8 key_block[] = { local 951 wpa_printf(MSG_INFO, "- PRF (TLS, SHA1/MD5) test case / key_block"); 954 buf, sizeof(key_block)) || 955 os_memcmp(key_block, buf, sizeof(key_block)) != 0) {
|
/external/boringssl/include/openssl/ |
H A D | ssl.h | 4049 uint8_t *key_block; member in struct:ssl3_state_st::__anon673
|
/external/boringssl/src/include/openssl/ |
H A D | ssl.h | 4049 uint8_t *key_block; member in struct:ssl3_state_st::__anon761
|
/external/robolectric/v3/runtime/ |
H A D | android-all-4.1.2_r1-robolectric-0.jar | META-INF/ META-INF/MANIFEST.MF android/ android/accessibilityservice/ android/accessibilityservice/AccessibilityService$1.class ... |
H A D | android-all-4.2.2_r1.2-robolectric-0.jar | META-INF/ META-INF/MANIFEST.MF android/ android/accessibilityservice/ android/accessibilityservice/AccessibilityService$1.class ... |
H A D | android-all-4.3_r2-robolectric-0.jar | META-INF/ META-INF/MANIFEST.MF android/ android/accessibilityservice/ android/accessibilityservice/AccessibilityService$1.class ... |
H A D | android-all-4.4_r1-robolectric-1.jar | META-INF/ META-INF/MANIFEST.MF com/ com/google/ com/google/android/ com/google/android/collect/ ... |