Searched defs:key_block (Results 1 - 25 of 26) sorted by relevance

12

/external/vboot_reference/futility/
H A Ddump_kernel_config_lib.c75 VbKeyBlockHeader key_block; local
81 if (read_fn(ctx, &key_block, sizeof(key_block)) != sizeof(key_block)) {
85 ssize_t to_skip = key_block.key_block_size - sizeof(key_block);
90 now += key_block.key_block_size;
H A Dcmd_vbutil_firmware.c88 VbKeyBlockHeader *key_block; local
109 key_block =
111 if (!key_block) {
159 i = ((1 != fwrite(key_block, key_block_size, 1, f)) ||
176 VbKeyBlockHeader *key_block; local
216 key_block = (VbKeyBlockHeader *) blob;
217 if (0 != KeyBlockVerify(key_block, blob_size, sign_key, 0)) {
222 now += key_block->key_block_size;
225 data_key = &key_block->data_key;
227 key_block
[all...]
H A Dcmd_show.c58 static void show_keyblock(VbKeyBlockHeader *key_block, const char *name, argument
68 key_block->key_block_size);
70 key_block->key_block_flags);
71 if (key_block->key_block_flags & KEY_BLOCK_FLAG_DEVELOPER_0)
73 if (key_block->key_block_flags & KEY_BLOCK_FLAG_DEVELOPER_1)
75 if (key_block->key_block_flags & KEY_BLOCK_FLAG_RECOVERY_0)
77 if (key_block->key_block_flags & KEY_BLOCK_FLAG_RECOVERY_1)
81 VbPublicKey *data_key = &key_block->data_key;
278 VbKeyBlockHeader *key_block = (VbKeyBlockHeader *)state->my_area->buf; local
288 if (VBOOT_SUCCESS != KeyBlockVerify(key_block, le
413 VbKeyBlockHeader *key_block = (VbKeyBlockHeader *)state->my_area->buf; local
[all...]
H A Dcmd_sign.c140 VbKeyBlockHeader *key_block = (VbKeyBlockHeader *)state->my_area->buf; local
148 if (VBOOT_SUCCESS != KeyBlockVerify(key_block, len, NULL, 1)) {
155 RSAPublicKey *rsa = PublicKeyToRSA(&key_block->data_key);
162 uint32_t more = key_block->key_block_size;
H A Dvb1_helper.c720 VbKeyBlockHeader *key_block = (VbKeyBlockHeader *)buf; local
726 if (VBOOT_SUCCESS == KeyBlockVerify(key_block, len, NULL, 1)) {
727 rsa = PublicKeyToRSA(&key_block->data_key);
728 uint32_t more = key_block->key_block_size;
/external/vboot_reference/host/lib/
H A Dhost_keyblock.c160 int KeyBlockWrite(const char* filename, const VbKeyBlockHeader* key_block) { argument
162 if (0 != WriteFile(filename, key_block, key_block->key_block_size)) {
/external/boringssl/src/crypto/fipsmodule/hmac/
H A Dhmac.c129 uint8_t key_block[EVP_MAX_MD_BLOCK_SIZE]; local
133 assert(block_size <= sizeof(key_block));
138 !EVP_DigestFinal_ex(&ctx->md_ctx, key_block, &key_block_len)) {
142 assert(key_len <= sizeof(key_block));
143 OPENSSL_memcpy(key_block, key, key_len);
148 OPENSSL_memset(&key_block[key_block_len], 0, sizeof(key_block) - key_block_len);
152 pad[i] = 0x36 ^ key_block[i];
160 pad[i] = 0x5c ^ key_block[i];
/external/vboot_reference/firmware/lib/
H A Dvboot_firmware.c92 VbKeyBlockHeader *key_block; local
104 key_block = (VbKeyBlockHeader *)
109 key_block = (VbKeyBlockHeader *)
120 if (!(key_block->key_block_flags &
129 if (!(key_block->key_block_flags & KEY_BLOCK_FLAG_RECOVERY_0)) {
136 if ((0 != KeyBlockVerify(key_block, vblock_size,
144 key_version = key_block->data_key.key_version;
164 data_key = PublicKeyToRSA(&key_block->data_key);
173 ((uint8_t *)key_block + key_block
[all...]
H A Dvboot_kernel.c145 VbKeyBlockHeader *key_block; local
192 key_block = (VbKeyBlockHeader*)kbuf;
193 if (0 != KeyBlockVerify(key_block, KBUF_SIZE,
218 if (0 != KeyBlockVerify(key_block, KBUF_SIZE,
228 if (!(key_block->key_block_flags &
235 if (!(key_block->key_block_flags &
244 key_version = key_block->data_key.key_version;
272 data_key = PublicKeyToRSA(&key_block->data_key);
281 (kbuf + key_block->key_block_size);
284 KBUF_SIZE - key_block
[all...]
/external/boringssl/src/ssl/
H A Dhandoff.cc267 Array<uint8_t> key_block; local
268 if (!tls1_configure_aead(ssl, evp_aead_open, &key_block,
270 !tls1_configure_aead(ssl, evp_aead_seal, &key_block,
H A Dt1_enc.cc261 Span<const uint8_t> key_block = *key_block_cache; local
265 mac_secret = key_block.subspan(0, mac_secret_len);
266 key = key_block.subspan(2 * mac_secret_len, key_len);
267 iv = key_block.subspan(2 * mac_secret_len + 2 * key_len, iv_len);
270 mac_secret = key_block.subspan(mac_secret_len, mac_secret_len);
271 key = key_block.subspan(2 * mac_secret_len + key_len, key_len);
272 iv = key_block.subspan(2 * mac_secret_len + 2 * key_len + iv_len, iv_len);
297 return tls1_configure_aead(hs->ssl, direction, &hs->key_block,
H A Dinternal.h1423 // key_block is the record-layer key block for TLS 1.2 and earlier.
1424 Array<uint8_t> key_block; member in struct:bssl::SSL_HANDSHAKE
/external/wpa_supplicant_8/hostapd/src/tls/
H A Dtlsv1_client.c55 u8 key_block[TLS_MAX_KEY_BLOCK_LEN]; local
85 key_block, key_block_len)) {
86 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive key_block");
89 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: key_block",
90 key_block, key_block_len);
92 pos = key_block;
740 * tlsv1_client_get_keyblock_size - Get TLS key_block size
742 * Returns: Size of the key_block for the negotiated cipher suite or -1 on
H A Dtlsv1_server.c61 u8 key_block[TLS_MAX_KEY_BLOCK_LEN]; local
90 key_block, key_block_len)) {
91 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive key_block");
94 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: key_block",
95 key_block, key_block_len);
97 pos = key_block;
637 * tlsv1_server_get_keyblock_size - Get TLS key_block size
639 * Returns: Size of the key_block for the negotiated cipher suite or -1 on
/external/wpa_supplicant_8/src/tls/
H A Dtlsv1_client.c55 u8 key_block[TLS_MAX_KEY_BLOCK_LEN]; local
85 key_block, key_block_len)) {
86 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive key_block");
89 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: key_block",
90 key_block, key_block_len);
92 pos = key_block;
740 * tlsv1_client_get_keyblock_size - Get TLS key_block size
742 * Returns: Size of the key_block for the negotiated cipher suite or -1 on
H A Dtlsv1_server.c61 u8 key_block[TLS_MAX_KEY_BLOCK_LEN]; local
90 key_block, key_block_len)) {
91 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive key_block");
94 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: key_block",
95 key_block, key_block_len);
97 pos = key_block;
637 * tlsv1_server_get_keyblock_size - Get TLS key_block size
639 * Returns: Size of the key_block for the negotiated cipher suite or -1 on
/external/wpa_supplicant_8/wpa_supplicant/src/tls/
H A Dtlsv1_client.c55 u8 key_block[TLS_MAX_KEY_BLOCK_LEN]; local
85 key_block, key_block_len)) {
86 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive key_block");
89 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: key_block",
90 key_block, key_block_len);
92 pos = key_block;
740 * tlsv1_client_get_keyblock_size - Get TLS key_block size
742 * Returns: Size of the key_block for the negotiated cipher suite or -1 on
H A Dtlsv1_server.c61 u8 key_block[TLS_MAX_KEY_BLOCK_LEN]; local
90 key_block, key_block_len)) {
91 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive key_block");
94 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: key_block",
95 key_block, key_block_len);
97 pos = key_block;
637 * tlsv1_server_get_keyblock_size - Get TLS key_block size
639 * Returns: Size of the key_block for the negotiated cipher suite or -1 on
/external/syslinux/gpxe/src/net/
H A Dtls.c332 uint8_t key_block[total]; local
338 key_block, sizeof ( key_block ), "key expansion",
343 key = key_block;
393 assert ( ( key_block + total ) == key );
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dcrypto_module_tests.c864 const u8 key_block[] = { local
956 wpa_printf(MSG_INFO, "- PRF (TLS, SHA1/MD5) test case / key_block");
959 buf, sizeof(key_block)) ||
960 os_memcmp(key_block, buf, sizeof(key_block)) != 0) {
/external/wpa_supplicant_8/src/crypto/
H A Dcrypto_module_tests.c864 const u8 key_block[] = { local
956 wpa_printf(MSG_INFO, "- PRF (TLS, SHA1/MD5) test case / key_block");
959 buf, sizeof(key_block)) ||
960 os_memcmp(key_block, buf, sizeof(key_block)) != 0) {
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Dcrypto_module_tests.c864 const u8 key_block[] = { local
956 wpa_printf(MSG_INFO, "- PRF (TLS, SHA1/MD5) test case / key_block");
959 buf, sizeof(key_block)) ||
960 os_memcmp(key_block, buf, sizeof(key_block)) != 0) {
/external/robolectric/v3/runtime/
H A Dandroid-all-4.1.2_r1-robolectric-0.jarMETA-INF/ META-INF/MANIFEST.MF android/ android/accessibilityservice/ android/accessibilityservice/AccessibilityService$1.class ...
H A Dandroid-all-4.2.2_r1.2-robolectric-0.jarMETA-INF/ META-INF/MANIFEST.MF android/ android/accessibilityservice/ android/accessibilityservice/AccessibilityService$1.class ...
H A Dandroid-all-4.3_r2-robolectric-0.jarMETA-INF/ META-INF/MANIFEST.MF android/ android/accessibilityservice/ android/accessibilityservice/AccessibilityService$1.class ...

Completed in 2262 milliseconds

12