Home
last modified time | relevance | path

Searched refs:kbuf (Results 1 – 11 of 11) sorted by relevance

/external/vboot_reference/tests/
Dvb21_common_tests.c258 struct vb2_keyblock *kbuf; in test_verify_keyblock() local
279 TEST_SUCC(vb2_keyblock_create(&kbuf, &pubk3, prik, 2, 0x4321, desc), in test_verify_keyblock()
282 buf = (uint8_t *)kbuf; in test_verify_keyblock()
283 buf_size = kbuf->c.total_size; in test_verify_keyblock()
290 kbuf = (struct vb2_keyblock *)buf; in test_verify_keyblock()
292 TEST_SUCC(vb2_verify_keyblock(kbuf, buf_size, &pubk, &wb), in test_verify_keyblock()
296 TEST_SUCC(vb2_verify_keyblock(kbuf, buf_size, &pubk2, &wb), in test_verify_keyblock()
300 TEST_EQ(vb2_verify_keyblock(kbuf, buf_size, &pubk3, &wb), in test_verify_keyblock()
305 kbuf->c.magic = VB2_MAGIC_PACKED_KEY; in test_verify_keyblock()
306 TEST_EQ(vb2_verify_keyblock(kbuf, buf_size, &pubk, &wb), in test_verify_keyblock()
[all …]
/external/openssh/
Dkexecdhs.c72 u_char *kbuf = NULL; in input_kex_ecdh_init() local
126 if ((kbuf = malloc(klen)) == NULL || in input_kex_ecdh_init()
131 if (ECDH_compute_key(kbuf, klen, client_public, in input_kex_ecdh_init()
133 BN_bin2bn(kbuf, klen, shared_secret) == NULL) { in input_kex_ecdh_init()
139 dump_digest("shared secret", kbuf, klen); in input_kex_ecdh_init()
197 if (kbuf) { in input_kex_ecdh_init()
198 explicit_bzero(kbuf, klen); in input_kex_ecdh_init()
199 free(kbuf); in input_kex_ecdh_init()
Dkexdhc.c109 u_char *kbuf = NULL, *server_host_key_blob = NULL, *signature = NULL; in input_kex_dh() local
157 if ((kbuf = malloc(klen)) == NULL || in input_kex_dh()
162 if ((kout = DH_compute_key(kbuf, dh_server_pub, kex->dh)) < 0 || in input_kex_dh()
163 BN_bin2bn(kbuf, kout, shared_secret) == NULL) { in input_kex_dh()
168 dump_digest("shared secret", kbuf, kout); in input_kex_dh()
209 if (kbuf) { in input_kex_dh()
210 explicit_bzero(kbuf, klen); in input_kex_dh()
211 free(kbuf); in input_kex_dh()
Dkexecdhc.c108 u_char *kbuf = NULL; in input_kex_ecdh_reply() local
160 if ((kbuf = malloc(klen)) == NULL || in input_kex_ecdh_reply()
165 if (ECDH_compute_key(kbuf, klen, server_public, in input_kex_ecdh_reply()
167 BN_bin2bn(kbuf, klen, shared_secret) == NULL) { in input_kex_ecdh_reply()
173 dump_digest("shared secret", kbuf, klen); in input_kex_ecdh_reply()
216 if (kbuf) { in input_kex_ecdh_reply()
217 explicit_bzero(kbuf, klen); in input_kex_ecdh_reply()
218 free(kbuf); in input_kex_ecdh_reply()
Dkexdhs.c100 u_char *kbuf = NULL, *signature = NULL, *server_host_key_blob = NULL; in input_kex_dh_init() local
149 if ((kbuf = malloc(klen)) == NULL || in input_kex_dh_init()
154 if ((kout = DH_compute_key(kbuf, dh_client_pub, kex->dh)) < 0 || in input_kex_dh_init()
155 BN_bin2bn(kbuf, kout, shared_secret) == NULL) { in input_kex_dh_init()
160 dump_digest("shared secret", kbuf, kout); in input_kex_dh_init()
214 if (kbuf) { in input_kex_dh_init()
215 explicit_bzero(kbuf, klen); in input_kex_dh_init()
216 free(kbuf); in input_kex_dh_init()
Dkexgexs.c129 u_char *kbuf = NULL, *signature = NULL, *server_host_key_blob = NULL; in input_kex_dh_gex_init() local
178 if ((kbuf = malloc(klen)) == NULL || in input_kex_dh_gex_init()
183 if ((kout = DH_compute_key(kbuf, dh_client_pub, kex->dh)) < 0 || in input_kex_dh_gex_init()
184 BN_bin2bn(kbuf, kout, shared_secret) == NULL) { in input_kex_dh_gex_init()
189 dump_digest("shared secret", kbuf, kout); in input_kex_dh_gex_init()
244 if (kbuf) { in input_kex_dh_gex_init()
245 explicit_bzero(kbuf, klen); in input_kex_dh_gex_init()
246 free(kbuf); in input_kex_dh_gex_init()
Dkexgexc.c152 u_char *kbuf = NULL, *signature = NULL, *server_host_key_blob = NULL; in input_kex_dh_gex_reply() local
205 if ((kbuf = malloc(klen)) == NULL || in input_kex_dh_gex_reply()
210 if ((kout = DH_compute_key(kbuf, dh_server_pub, kex->dh)) < 0 || in input_kex_dh_gex_reply()
211 BN_bin2bn(kbuf, kout, shared_secret) == NULL) { in input_kex_dh_gex_reply()
216 dump_digest("shared secret", kbuf, kout); in input_kex_dh_gex_reply()
261 if (kbuf) { in input_kex_dh_gex_reply()
262 explicit_bzero(kbuf, klen); in input_kex_dh_gex_reply()
263 free(kbuf); in input_kex_dh_gex_reply()
Dssh-keygen.c2133 struct sshbuf *kbuf; in do_gen_krl() local
2169 if ((kbuf = sshbuf_new()) == NULL) in do_gen_krl()
2171 if (ssh_krl_to_blob(krl, kbuf, NULL, 0) != 0) in do_gen_krl()
2175 if (atomicio(vwrite, fd, (void *)sshbuf_ptr(kbuf), sshbuf_len(kbuf)) != in do_gen_krl()
2176 sshbuf_len(kbuf)) in do_gen_krl()
2179 sshbuf_free(kbuf); in do_gen_krl()
/external/vboot_reference/firmware/lib/
Dvboot_kernel.c44 uint8_t* kbuf = NULL; in LoadKernel() local
137 kbuf = (uint8_t*)VbExMalloc(KBUF_SIZE); in LoadKernel()
138 if (!kbuf) in LoadKernel()
185 if (0 != VbExStreamRead(stream, KBUF_SIZE, kbuf)) { in LoadKernel()
192 key_block = (VbKeyBlockHeader*)kbuf; in LoadKernel()
281 (kbuf + key_block->key_block_size); in LoadKernel()
387 Memcpy(body_readptr, kbuf + body_offset, body_copied); in LoadKernel()
488 if (kbuf) in LoadKernel()
489 VbExFree(kbuf); in LoadKernel()
/external/compiler-rt/lib/sanitizer_common/
Dsanitizer_linux.cc233 struct kernel_stat kbuf; in internal_stat()
234 int res = internal_syscall(SYSCALL(stat), path, &kbuf); in internal_stat()
235 kernel_stat_to_stat(&kbuf, (struct stat *)buf); in internal_stat()
257 struct kernel_stat kbuf; in internal_lstat()
258 int res = internal_syscall(SYSCALL(lstat), path, &kbuf); in internal_lstat()
259 kernel_stat_to_stat(&kbuf, (struct stat *)buf); in internal_lstat()
276 struct kernel_stat kbuf; in internal_fstat() local
277 int res = internal_syscall(SYSCALL(fstat), fd, &kbuf); in internal_fstat()
278 kernel_stat_to_stat(&kbuf, (struct stat *)buf); in internal_fstat()
/external/python/cpython2/Modules/
Dbsddbmodule.c563 char *kdata=NULL,kbuf[4096]; in bsddb_seq() local
575 if (krec.size > sizeof(kbuf)) kdata = malloc(krec.size); in bsddb_seq()
576 else kdata = kbuf; in bsddb_seq()
602 if (kdata != kbuf) free(kdata); in bsddb_seq()