/external/openssh/regress/misc/sk-dummy/ |
D | sk-dummy.c | 94 response->key_handle = NULL; in pack_key_ecdsa() 137 if ((response->key_handle = malloc(privlen)) == NULL) { in pack_key_ecdsa() 142 memcpy(response->key_handle, privptr, response->key_handle_len); in pack_key_ecdsa() 153 if (response->key_handle != NULL) { in pack_key_ecdsa() 154 memset(response->key_handle, 0, in pack_key_ecdsa() 156 free(response->key_handle); in pack_key_ecdsa() 157 response->key_handle = NULL; in pack_key_ecdsa() 177 response->key_handle = NULL; in pack_key_ed25519() 192 if ((response->key_handle = malloc(response->key_handle_len)) == NULL) { in pack_key_ed25519() 196 memcpy(response->key_handle, sk, sizeof(sk)); in pack_key_ed25519() [all …]
|
/external/tpm2-tss/src/tss2-fapi/api/ |
D | Fapi_Encrypt.c | 194 command->key_handle = ESYS_TR_NONE; in Fapi_Encrypt_Async() 289 &command->key_handle, in Fapi_Encrypt_Finish() 313 context->cmd.Data_EncryptDecrypt.key_handle, in Fapi_Encrypt_Finish() 351 command->key_handle); in Fapi_Encrypt_Finish() 360 command->key_handle = ESYS_TR_NONE; in Fapi_Encrypt_Finish() 377 if (command->key_handle != ESYS_TR_NONE) in Fapi_Encrypt_Finish() 378 Esys_FlushContext(context->esys, command->key_handle); in Fapi_Encrypt_Finish()
|
D | Fapi_Decrypt.c | 282 &command->key_handle, in Fapi_Decrypt_Finish() 310 context->cmd.Data_EncryptDecrypt.key_handle, in Fapi_Decrypt_Finish() 337 command->key_handle); in Fapi_Decrypt_Finish() 347 command->key_handle = ESYS_TR_NONE; in Fapi_Decrypt_Finish() 387 if (command->key_handle != ESYS_TR_NONE) in Fapi_Decrypt_Finish() 388 Esys_FlushContext(context->esys, command->key_handle); in Fapi_Decrypt_Finish()
|
/external/openssh/ |
D | sk-usbhid.c | 81 const char *application, const uint8_t *key_handle, size_t key_handle_len, 160 const char *application, const uint8_t *key_handle, size_t key_handle_len) in try_device() argument 179 if ((r = fido_assert_allow_cred(assert, key_handle, in try_device() 203 const char *application, const uint8_t *key_handle, size_t key_handle_len) in find_device() argument 257 key_handle, key_handle_len) == 0) { in find_device() 559 if ((response->key_handle = calloc(1, len)) == NULL) { in sk_enroll() 563 memcpy(response->key_handle, ptr, len); in sk_enroll() 592 free(response->key_handle); in sk_enroll() 740 const uint8_t *key_handle, size_t key_handle_len, in sk_sign() argument 769 application, key_handle, key_handle_len)) == NULL) { in sk_sign() [all …]
|
D | sk-api.h | 44 uint8_t *key_handle; member 87 const char *application, const uint8_t *key_handle, size_t key_handle_len,
|
D | ssh-sk.c | 64 const uint8_t *key_handle, size_t key_handle_len, 80 const uint8_t *key_handle, size_t key_handle_len, 173 freezero(r->key_handle, r->key_handle_len); in sshsk_free_enroll_response() 289 if (resp->public_key == NULL || resp->key_handle == NULL) { in sshsk_key_from_response() 322 if ((r = sshbuf_put(key->sk_key_handle, resp->key_handle, in sshsk_key_from_response() 717 freezero(rks[i]->key.key_handle, rks[i]->key.key_handle_len); in sshsk_free_sk_resident_keys()
|
D | PROTOCOL.u2f | 71 string key_handle 86 string key_handle 133 string key_handle 260 uint8_t *key_handle; 303 const uint8_t *key_handle, size_t key_handle_len,
|
/external/autotest/server/site_tests/firmware_Cr50U2fPowerwash/ |
D | firmware_Cr50U2fPowerwash.py | 67 key_handle = self.parse_g2ftool_output(g2f_reg.stdout)['key_handle'] 78 key_handle, 102 key_handle,
|
/external/autotest/client/common_lib/cros/ |
D | g2f_utils.py | 55 def G2fAuth(client, dev, challenge, application, key_handle, p1=0): argument 63 ' --key_handle=' + key_handle +
|
/external/autotest/server/site_tests/firmware_Cr50U2fCommands/ |
D | firmware_Cr50U2fCommands.py | 170 def __u2f_sign(self, app_id, user_secret, key_handle, hash, flags, argument 174 assert_byte_length(key_handle, 64) 178 VENDOR_CC_U2F_SIGN, '{}{}{}{}{}'.format(app_id, user_secret, key_handle, 453 key_handle, argument 461 key_handle,
|
/external/tpm2-tss/src/tss2-fapi/ |
D | ifapi_policy_callbacks.h | 28 ESYS_TR key_handle; /**< Handle of a used key */ member
|
D | fapi_int.h | 346 ESYS_TR key_handle; /**< The ESYS handle of the encryption key */ member
|
D | ifapi_policy_callbacks.c | 503 cb_ctx->key_handle = cb_ctx->object.handle; in ifapi_policyeval_cbauth()
|
/external/libpcap/rpcapd/ |
D | log.c | 115 &key_handle) != ERROR_SUCCESS) { in rpcapd_vlog_systemlog()
|
/external/ukey2/src/main/proto/ |
D | securegcm.proto | 61 optional bytes key_handle = 9; field
|
/external/rust/crates/libc/src/ |
D | psp.rs | 3737 key_handle: *mut RegHandle, in sceRegGetKeyInfo() 3749 key_handle: RegHandle, in sceRegGetKeyValue()
|