/external/vboot_reference/tests/ |
D | vb21_common_tests.c | 258 struct vb2_keyblock *kbuf; in test_verify_keyblock() local 279 TEST_SUCC(vb2_keyblock_create(&kbuf, &pubk3, prik, 2, 0x4321, desc), in test_verify_keyblock() 282 buf = (uint8_t *)kbuf; in test_verify_keyblock() 283 buf_size = kbuf->c.total_size; in test_verify_keyblock() 290 kbuf = (struct vb2_keyblock *)buf; in test_verify_keyblock() 292 TEST_SUCC(vb2_verify_keyblock(kbuf, buf_size, &pubk, &wb), in test_verify_keyblock() 296 TEST_SUCC(vb2_verify_keyblock(kbuf, buf_size, &pubk2, &wb), in test_verify_keyblock() 300 TEST_EQ(vb2_verify_keyblock(kbuf, buf_size, &pubk3, &wb), in test_verify_keyblock() 305 kbuf->c.magic = VB2_MAGIC_PACKED_KEY; in test_verify_keyblock() 306 TEST_EQ(vb2_verify_keyblock(kbuf, buf_size, &pubk, &wb), in test_verify_keyblock() [all …]
|
/external/openssh/ |
D | kexecdhs.c | 72 u_char *kbuf = NULL; in input_kex_ecdh_init() local 126 if ((kbuf = malloc(klen)) == NULL || in input_kex_ecdh_init() 131 if (ECDH_compute_key(kbuf, klen, client_public, in input_kex_ecdh_init() 133 BN_bin2bn(kbuf, klen, shared_secret) == NULL) { in input_kex_ecdh_init() 139 dump_digest("shared secret", kbuf, klen); in input_kex_ecdh_init() 197 if (kbuf) { in input_kex_ecdh_init() 198 explicit_bzero(kbuf, klen); in input_kex_ecdh_init() 199 free(kbuf); in input_kex_ecdh_init()
|
D | kexdhc.c | 109 u_char *kbuf = NULL, *server_host_key_blob = NULL, *signature = NULL; in input_kex_dh() local 157 if ((kbuf = malloc(klen)) == NULL || in input_kex_dh() 162 if ((kout = DH_compute_key(kbuf, dh_server_pub, kex->dh)) < 0 || in input_kex_dh() 163 BN_bin2bn(kbuf, kout, shared_secret) == NULL) { in input_kex_dh() 168 dump_digest("shared secret", kbuf, kout); in input_kex_dh() 209 if (kbuf) { in input_kex_dh() 210 explicit_bzero(kbuf, klen); in input_kex_dh() 211 free(kbuf); in input_kex_dh()
|
D | kexecdhc.c | 108 u_char *kbuf = NULL; in input_kex_ecdh_reply() local 160 if ((kbuf = malloc(klen)) == NULL || in input_kex_ecdh_reply() 165 if (ECDH_compute_key(kbuf, klen, server_public, in input_kex_ecdh_reply() 167 BN_bin2bn(kbuf, klen, shared_secret) == NULL) { in input_kex_ecdh_reply() 173 dump_digest("shared secret", kbuf, klen); in input_kex_ecdh_reply() 216 if (kbuf) { in input_kex_ecdh_reply() 217 explicit_bzero(kbuf, klen); in input_kex_ecdh_reply() 218 free(kbuf); in input_kex_ecdh_reply()
|
D | kexdhs.c | 100 u_char *kbuf = NULL, *signature = NULL, *server_host_key_blob = NULL; in input_kex_dh_init() local 149 if ((kbuf = malloc(klen)) == NULL || in input_kex_dh_init() 154 if ((kout = DH_compute_key(kbuf, dh_client_pub, kex->dh)) < 0 || in input_kex_dh_init() 155 BN_bin2bn(kbuf, kout, shared_secret) == NULL) { in input_kex_dh_init() 160 dump_digest("shared secret", kbuf, kout); in input_kex_dh_init() 214 if (kbuf) { in input_kex_dh_init() 215 explicit_bzero(kbuf, klen); in input_kex_dh_init() 216 free(kbuf); in input_kex_dh_init()
|
D | kexgexs.c | 129 u_char *kbuf = NULL, *signature = NULL, *server_host_key_blob = NULL; in input_kex_dh_gex_init() local 178 if ((kbuf = malloc(klen)) == NULL || in input_kex_dh_gex_init() 183 if ((kout = DH_compute_key(kbuf, dh_client_pub, kex->dh)) < 0 || in input_kex_dh_gex_init() 184 BN_bin2bn(kbuf, kout, shared_secret) == NULL) { in input_kex_dh_gex_init() 189 dump_digest("shared secret", kbuf, kout); in input_kex_dh_gex_init() 244 if (kbuf) { in input_kex_dh_gex_init() 245 explicit_bzero(kbuf, klen); in input_kex_dh_gex_init() 246 free(kbuf); in input_kex_dh_gex_init()
|
D | kexgexc.c | 152 u_char *kbuf = NULL, *signature = NULL, *server_host_key_blob = NULL; in input_kex_dh_gex_reply() local 205 if ((kbuf = malloc(klen)) == NULL || in input_kex_dh_gex_reply() 210 if ((kout = DH_compute_key(kbuf, dh_server_pub, kex->dh)) < 0 || in input_kex_dh_gex_reply() 211 BN_bin2bn(kbuf, kout, shared_secret) == NULL) { in input_kex_dh_gex_reply() 216 dump_digest("shared secret", kbuf, kout); in input_kex_dh_gex_reply() 261 if (kbuf) { in input_kex_dh_gex_reply() 262 explicit_bzero(kbuf, klen); in input_kex_dh_gex_reply() 263 free(kbuf); in input_kex_dh_gex_reply()
|
D | ssh-keygen.c | 2133 struct sshbuf *kbuf; in do_gen_krl() local 2169 if ((kbuf = sshbuf_new()) == NULL) in do_gen_krl() 2171 if (ssh_krl_to_blob(krl, kbuf, NULL, 0) != 0) in do_gen_krl() 2175 if (atomicio(vwrite, fd, (void *)sshbuf_ptr(kbuf), sshbuf_len(kbuf)) != in do_gen_krl() 2176 sshbuf_len(kbuf)) in do_gen_krl() 2179 sshbuf_free(kbuf); in do_gen_krl()
|
/external/vboot_reference/firmware/lib/ |
D | vboot_kernel.c | 44 uint8_t* kbuf = NULL; in LoadKernel() local 137 kbuf = (uint8_t*)VbExMalloc(KBUF_SIZE); in LoadKernel() 138 if (!kbuf) in LoadKernel() 185 if (0 != VbExStreamRead(stream, KBUF_SIZE, kbuf)) { in LoadKernel() 192 key_block = (VbKeyBlockHeader*)kbuf; in LoadKernel() 281 (kbuf + key_block->key_block_size); in LoadKernel() 387 Memcpy(body_readptr, kbuf + body_offset, body_copied); in LoadKernel() 488 if (kbuf) in LoadKernel() 489 VbExFree(kbuf); in LoadKernel()
|
/external/compiler-rt/lib/sanitizer_common/ |
D | sanitizer_linux.cc | 233 struct kernel_stat kbuf; in internal_stat() 234 int res = internal_syscall(SYSCALL(stat), path, &kbuf); in internal_stat() 235 kernel_stat_to_stat(&kbuf, (struct stat *)buf); in internal_stat() 257 struct kernel_stat kbuf; in internal_lstat() 258 int res = internal_syscall(SYSCALL(lstat), path, &kbuf); in internal_lstat() 259 kernel_stat_to_stat(&kbuf, (struct stat *)buf); in internal_lstat() 276 struct kernel_stat kbuf; in internal_fstat() local 277 int res = internal_syscall(SYSCALL(fstat), fd, &kbuf); in internal_fstat() 278 kernel_stat_to_stat(&kbuf, (struct stat *)buf); in internal_fstat()
|
/external/python/cpython2/Modules/ |
D | bsddbmodule.c | 563 char *kdata=NULL,kbuf[4096]; in bsddb_seq() local 575 if (krec.size > sizeof(kbuf)) kdata = malloc(krec.size); in bsddb_seq() 576 else kdata = kbuf; in bsddb_seq() 602 if (kdata != kbuf) free(kdata); in bsddb_seq()
|