/external/vboot_reference/firmware/lib/ |
D | vboot_firmware.c | 92 VbKeyBlockHeader *key_block; in LoadFirmware() local 104 key_block = (VbKeyBlockHeader *) in LoadFirmware() 109 key_block = (VbKeyBlockHeader *) in LoadFirmware() 120 if (!(key_block->key_block_flags & in LoadFirmware() 129 if (!(key_block->key_block_flags & KEY_BLOCK_FLAG_RECOVERY_0)) { in LoadFirmware() 136 if ((0 != KeyBlockVerify(key_block, vblock_size, in LoadFirmware() 144 key_version = key_block->data_key.key_version; in LoadFirmware() 164 data_key = PublicKeyToRSA(&key_block->data_key); in LoadFirmware() 173 ((uint8_t *)key_block + key_block->key_block_size); in LoadFirmware() 176 vblock_size - key_block->key_block_size, in LoadFirmware() [all …]
|
D | vboot_kernel.c | 145 VbKeyBlockHeader *key_block; in LoadKernel() local 192 key_block = (VbKeyBlockHeader*)kbuf; in LoadKernel() 193 if (0 != KeyBlockVerify(key_block, KBUF_SIZE, in LoadKernel() 218 if (0 != KeyBlockVerify(key_block, KBUF_SIZE, in LoadKernel() 228 if (!(key_block->key_block_flags & in LoadKernel() 235 if (!(key_block->key_block_flags & in LoadKernel() 244 key_version = key_block->data_key.key_version; in LoadKernel() 272 data_key = PublicKeyToRSA(&key_block->data_key); in LoadKernel() 281 (kbuf + key_block->key_block_size); in LoadKernel() 284 KBUF_SIZE - key_block->key_block_size, in LoadKernel() [all …]
|
/external/vboot_reference/futility/ |
D | cmd_vbutil_firmware.c | 88 VbKeyBlockHeader *key_block; in Vblock() local 109 key_block = in Vblock() 111 if (!key_block) { in Vblock() 159 i = ((1 != fwrite(key_block, key_block_size, 1, f)) || in Vblock() 176 VbKeyBlockHeader *key_block; in Verify() local 216 key_block = (VbKeyBlockHeader *) blob; in Verify() 217 if (0 != KeyBlockVerify(key_block, blob_size, sign_key, 0)) { in Verify() 222 now += key_block->key_block_size; in Verify() 225 data_key = &key_block->data_key; in Verify() 227 key_block->key_block_size); in Verify() [all …]
|
D | cmd_show.c | 58 static void show_keyblock(VbKeyBlockHeader *key_block, const char *name, in show_keyblock() argument 68 key_block->key_block_size); in show_keyblock() 70 key_block->key_block_flags); in show_keyblock() 71 if (key_block->key_block_flags & KEY_BLOCK_FLAG_DEVELOPER_0) in show_keyblock() 73 if (key_block->key_block_flags & KEY_BLOCK_FLAG_DEVELOPER_1) in show_keyblock() 75 if (key_block->key_block_flags & KEY_BLOCK_FLAG_RECOVERY_0) in show_keyblock() 77 if (key_block->key_block_flags & KEY_BLOCK_FLAG_RECOVERY_1) in show_keyblock() 81 VbPublicKey *data_key = &key_block->data_key; in show_keyblock() 278 VbKeyBlockHeader *key_block = (VbKeyBlockHeader *)state->my_area->buf; in futil_cb_show_fw_preamble() local 288 if (VBOOT_SUCCESS != KeyBlockVerify(key_block, len, NULL, 1)) { in futil_cb_show_fw_preamble() [all …]
|
D | dump_kernel_config_lib.c | 75 VbKeyBlockHeader key_block; in FindKernelConfigFromStream() local 81 if (read_fn(ctx, &key_block, sizeof(key_block)) != sizeof(key_block)) { in FindKernelConfigFromStream() 85 ssize_t to_skip = key_block.key_block_size - sizeof(key_block); in FindKernelConfigFromStream() 90 now += key_block.key_block_size; in FindKernelConfigFromStream()
|
D | vb1_helper.c | 720 VbKeyBlockHeader *key_block = (VbKeyBlockHeader *)buf; in recognize_vblock1() local 726 if (VBOOT_SUCCESS == KeyBlockVerify(key_block, len, NULL, 1)) { in recognize_vblock1() 727 rsa = PublicKeyToRSA(&key_block->data_key); in recognize_vblock1() 728 uint32_t more = key_block->key_block_size; in recognize_vblock1()
|
D | cmd_sign.c | 140 VbKeyBlockHeader *key_block = (VbKeyBlockHeader *)state->my_area->buf; in futil_cb_sign_fw_vblock() local 148 if (VBOOT_SUCCESS != KeyBlockVerify(key_block, len, NULL, 1)) { in futil_cb_sign_fw_vblock() 155 RSAPublicKey *rsa = PublicKeyToRSA(&key_block->data_key); in futil_cb_sign_fw_vblock() 162 uint32_t more = key_block->key_block_size; in futil_cb_sign_fw_vblock()
|
/external/rust/crates/quiche/deps/boringssl/src/crypto/fipsmodule/hmac/ |
D | hmac.c | 129 uint8_t key_block[EVP_MAX_MD_BLOCK_SIZE]; in HMAC_Init_ex() local 133 assert(block_size <= sizeof(key_block)); in HMAC_Init_ex() 138 !EVP_DigestFinal_ex(&ctx->md_ctx, key_block, &key_block_len)) { in HMAC_Init_ex() 142 assert(key_len <= sizeof(key_block)); in HMAC_Init_ex() 143 OPENSSL_memcpy(key_block, key, key_len); in HMAC_Init_ex() 148 OPENSSL_memset(&key_block[key_block_len], 0, sizeof(key_block) - key_block_len); in HMAC_Init_ex() 152 pad[i] = 0x36 ^ key_block[i]; in HMAC_Init_ex() 160 pad[i] = 0x5c ^ key_block[i]; in HMAC_Init_ex()
|
/external/cronet/third_party/boringssl/src/crypto/fipsmodule/hmac/ |
D | hmac.c | 149 uint8_t key_block[EVP_MAX_MD_BLOCK_SIZE]; in HMAC_Init_ex() local 153 assert(block_size <= sizeof(key_block)); in HMAC_Init_ex() 159 !EVP_DigestFinal_ex(&ctx->md_ctx, key_block, &key_block_len)) { in HMAC_Init_ex() 163 assert(key_len <= sizeof(key_block)); in HMAC_Init_ex() 164 OPENSSL_memcpy(key_block, key, key_len); in HMAC_Init_ex() 168 OPENSSL_memset(key_block + key_block_len, 0, block_size - key_block_len); in HMAC_Init_ex() 171 pad[i] = 0x36 ^ key_block[i]; in HMAC_Init_ex() 179 pad[i] = 0x5c ^ key_block[i]; in HMAC_Init_ex()
|
/external/boringssl/src/crypto/fipsmodule/hmac/ |
D | hmac.c | 149 uint8_t key_block[EVP_MAX_MD_BLOCK_SIZE]; in HMAC_Init_ex() local 153 assert(block_size <= sizeof(key_block)); in HMAC_Init_ex() 159 !EVP_DigestFinal_ex(&ctx->md_ctx, key_block, &key_block_len)) { in HMAC_Init_ex() 163 assert(key_len <= sizeof(key_block)); in HMAC_Init_ex() 164 OPENSSL_memcpy(key_block, key, key_len); in HMAC_Init_ex() 168 OPENSSL_memset(key_block + key_block_len, 0, block_size - key_block_len); in HMAC_Init_ex() 171 pad[i] = 0x36 ^ key_block[i]; in HMAC_Init_ex() 179 pad[i] = 0x5c ^ key_block[i]; in HMAC_Init_ex()
|
/external/boringssl/src/ssl/ |
D | t1_enc.cc | 225 Span<const uint8_t> key_block = *key_block_cache; in tls1_configure_aead() local 229 mac_secret = key_block.subspan(0, mac_secret_len); in tls1_configure_aead() 230 key = key_block.subspan(2 * mac_secret_len, key_len); in tls1_configure_aead() 231 iv = key_block.subspan(2 * mac_secret_len + 2 * key_len, iv_len); in tls1_configure_aead() 234 mac_secret = key_block.subspan(mac_secret_len, mac_secret_len); in tls1_configure_aead() 235 key = key_block.subspan(2 * mac_secret_len + key_len, key_len); in tls1_configure_aead() 236 iv = key_block.subspan(2 * mac_secret_len + 2 * key_len + iv_len, iv_len); in tls1_configure_aead() 266 return tls1_configure_aead(hs->ssl, direction, &hs->key_block, in tls1_change_cipher_state()
|
D | handoff.cc | 682 Array<uint8_t> key_block; in SSL_apply_handback() local 687 if (!tls1_configure_aead(ssl, evp_aead_seal, &key_block, session, in SSL_apply_handback() 697 if (!tls1_configure_aead(ssl, evp_aead_seal, &key_block, session, in SSL_apply_handback() 699 !tls1_configure_aead(ssl, evp_aead_open, &key_block, session, in SSL_apply_handback()
|
/external/rust/crates/quiche/deps/boringssl/src/ssl/ |
D | t1_enc.cc | 225 Span<const uint8_t> key_block = *key_block_cache; in tls1_configure_aead() local 229 mac_secret = key_block.subspan(0, mac_secret_len); in tls1_configure_aead() 230 key = key_block.subspan(2 * mac_secret_len, key_len); in tls1_configure_aead() 231 iv = key_block.subspan(2 * mac_secret_len + 2 * key_len, iv_len); in tls1_configure_aead() 234 mac_secret = key_block.subspan(mac_secret_len, mac_secret_len); in tls1_configure_aead() 235 key = key_block.subspan(2 * mac_secret_len + key_len, key_len); in tls1_configure_aead() 236 iv = key_block.subspan(2 * mac_secret_len + 2 * key_len + iv_len, iv_len); in tls1_configure_aead() 266 return tls1_configure_aead(hs->ssl, direction, &hs->key_block, in tls1_change_cipher_state()
|
D | handoff.cc | 664 Array<uint8_t> key_block; in SSL_apply_handback() local 669 if (!tls1_configure_aead(ssl, evp_aead_seal, &key_block, session, in SSL_apply_handback() 679 if (!tls1_configure_aead(ssl, evp_aead_seal, &key_block, session, in SSL_apply_handback() 681 !tls1_configure_aead(ssl, evp_aead_open, &key_block, session, in SSL_apply_handback()
|
D | ssl_test.cc | 7412 uint8_t key_block[2u * (kKeyLen + kNonceLen)]; in TEST() local 7414 SSL_generate_key_block(server.get(), key_block, sizeof(key_block))); in TEST() 7415 Span<uint8_t> key = MakeSpan(key_block + kKeyLen, kKeyLen); in TEST() 7417 MakeSpan(key_block + kKeyLen + kKeyLen + kNonceLen, kNonceLen); in TEST()
|
/external/cronet/third_party/boringssl/src/ssl/ |
D | t1_enc.cc | 225 Span<const uint8_t> key_block = *key_block_cache; in tls1_configure_aead() local 229 mac_secret = key_block.subspan(0, mac_secret_len); in tls1_configure_aead() 230 key = key_block.subspan(2 * mac_secret_len, key_len); in tls1_configure_aead() 231 iv = key_block.subspan(2 * mac_secret_len + 2 * key_len, iv_len); in tls1_configure_aead() 234 mac_secret = key_block.subspan(mac_secret_len, mac_secret_len); in tls1_configure_aead() 235 key = key_block.subspan(2 * mac_secret_len + key_len, key_len); in tls1_configure_aead() 236 iv = key_block.subspan(2 * mac_secret_len + 2 * key_len + iv_len, iv_len); in tls1_configure_aead() 266 return tls1_configure_aead(hs->ssl, direction, &hs->key_block, in tls1_change_cipher_state()
|
D | handoff.cc | 682 Array<uint8_t> key_block; in SSL_apply_handback() local 687 if (!tls1_configure_aead(ssl, evp_aead_seal, &key_block, session, in SSL_apply_handback() 697 if (!tls1_configure_aead(ssl, evp_aead_seal, &key_block, session, in SSL_apply_handback() 699 !tls1_configure_aead(ssl, evp_aead_open, &key_block, session, in SSL_apply_handback()
|
/external/rust/crates/quiche/deps/boringssl/src/util/fipstools/cavp/ |
D | cavp_tlskdf_test.cc | 84 std::vector<uint8_t> key_block(key_block_len); in TestTLSKDF() local 87 md, key_block.data(), key_block.size(), master_secret, in TestTLSKDF() 96 EncodeHex(key_block).c_str()); in TestTLSKDF()
|
/external/vboot_reference/host/lib/ |
D | host_keyblock.c | 160 int KeyBlockWrite(const char* filename, const VbKeyBlockHeader* key_block) { in KeyBlockWrite() argument 162 if (0 != WriteFile(filename, key_block, key_block->key_block_size)) { in KeyBlockWrite()
|
/external/vboot_reference/host/lib/include/ |
D | host_keyblock.h | 43 int KeyBlockWrite(const char* filename, const VbKeyBlockHeader* key_block);
|
/external/wpa_supplicant_8/src/tls/ |
D | tlsv1_server.c | 61 u8 key_block[TLS_MAX_KEY_BLOCK_LEN]; in tlsv1_server_derive_keys() local 90 key_block, key_block_len)) { in tlsv1_server_derive_keys() 95 key_block, key_block_len); in tlsv1_server_derive_keys() 97 pos = key_block; in tlsv1_server_derive_keys()
|
D | tlsv1_client.c | 79 u8 key_block[TLS_MAX_KEY_BLOCK_LEN]; in tls_derive_keys() local 109 key_block, key_block_len)) { in tls_derive_keys() 114 key_block, key_block_len); in tls_derive_keys() 116 pos = key_block; in tls_derive_keys()
|
/external/cronet/net/ntlm/ |
D | ntlm.cc | 205 DES_cblock* key_block = reinterpret_cast<DES_cblock*>(keys + ix); in GenerateResponseDesl() local 210 DES_set_odd_parity(key_block); in GenerateResponseDesl() 211 DES_set_key(key_block, &key_schedule); in GenerateResponseDesl()
|
/external/scapy/scapy/layers/tls/ |
D | session.py | 132 key_block = self.prf.derive_key_block(master_secret, 152 mac_secret = key_block[start:end] 163 cipher_secret = key_block[start:end] 200 iv = key_block[start:end] 211 fixed_iv = key_block[start:end]
|
/external/wpa_supplicant_8/src/crypto/ |
D | crypto_module_tests.c | 1013 const u8 key_block[] = { in test_eap_fast() local 1108 buf, sizeof(key_block)) || in test_eap_fast() 1109 os_memcmp(key_block, buf, sizeof(key_block)) != 0) { in test_eap_fast()
|