Searched refs:sessionKey (Results 1 – 10 of 10) sorted by relevance
/external/boringssl/src/ssl/test/runner/ |
D | common.go | 232 Get(sessionKey string) (session *ClientSessionState, ok bool) 235 Put(sessionKey string, cs *ClientSessionState) 1006 sessionKey string member 1011 func (c *lruSessionCache) Put(sessionKey string, cs interface{}) { 1015 if elem, ok := c.m[sessionKey]; ok { 1023 entry := &lruSessionCacheEntry{sessionKey, cs} 1024 c.m[sessionKey] = c.q.PushFront(entry) 1030 delete(c.m, entry.sessionKey) 1031 entry.sessionKey = sessionKey 1034 c.m[sessionKey] = elem [all …]
|
/external/tpm2/ |
D | Session.c | 390 session->sessionKey.t.size = hashSize; in SessionCreate() 393 &nonceCaller->b, hashSize * 8, session->sessionKey.t.buffer, NULL); in SessionCreate()
|
D | CryptUtil.c | 2662 + sizeof(session->sessionKey.t.buffer))); in CryptParameterEncryption() 2665 pAssert(session->sessionKey.t.size + extraKey->t.size <= sizeof(key.t.buffer)); in CryptParameterEncryption() 2690 MemoryCopy2B(&key.b, &session->sessionKey.b, sizeof(key.t.buffer)); in CryptParameterEncryption() 2732 + sizeof(session->sessionKey.t.buffer))); in CryptParameterDecryption() 2735 pAssert(session->sessionKey.t.size + extraKey->t.size <= sizeof(key.t.buffer)); in CryptParameterDecryption() 2759 MemoryCopy2B(&key.b, &session->sessionKey.b, sizeof(key.t.buffer)); in CryptParameterDecryption()
|
D | Global.h | 321 TPM2B_AUTH sessionKey; // session secret value used for member
|
D | SessionProcess.c | 608 MemoryCopy2B(&key.b, &session->sessionKey.b, sizeof(key.t.buffer)); in ComputeCommandHMAC() 1696 MemoryCopy2B(&key.b, &session->sessionKey.b, sizeof(key.t.buffer)); in ComputeResponseHMAC()
|
D | part3.txt | 2263 session key (sessionKey). The session key is then used to derive values used for authorization and … 2267 is used to compute the sessionKey. 2273 The TPM generates the sessionKey from the recovered secret value. 2277 …not available to the caller, except indirectly through the sessionKey. This does not represent a p… 2279 … sessionKey value, it is an authorization failure that will trigger the dictionary attack logic. 2281 The entity referenced with the bind parameter contributes an authorization value to the sessionKey 2283 If both tpmKey and bind are TPM_ALG_NULL, then sessionKey is set to the Empty Buffer. If tpmKey is 2284 not TPM_ALG_NULL, then encryptedSalt is used in the computation of sessionKey. If bind is not 2285 TPM_ALG_NULL, the authValue of bind is used in the sessionKey computation. 2322 For all session types, this command will cause initialization of the sessionKey and may establish b… [all …]
|
D | part4.txt | 1907 185 TPM2B_AUTH sessionKey; // session secret value used f… 4409 514 MemoryCopy2B(&key.b, &session->sessionKey.b, sizeof(key.t.buffer)); 5716 1548 MemoryCopy2B(&key.b, &session->sessionKey.b, sizeof(key.t.buffer)); 14560 288 // a sessionKey. 14563 291 // sessionKey = KDFa(hash, (authValue || seed), "ATH", nonceTPM, 14580 303 // Get hash size, which is also the length of sessionKey 14591 314 session->sessionKey.t.size = hashSize; 14595 318 &nonceCaller->b, hashSize * 8, session->sessionKey.t.buffer, NULL); 22477 2188 + sizeof(session->sessionKey.t.buffer))); 22481 2192 pAssert(session->sessionKey.t.size + extraKey->t.size <= sizeof(key.t.buffer)); [all …]
|
/external/tpm2/generator/ |
D | raw_commands.txt | 3495 session key (sessionKey). The session key is then used to derive values used for authorization and … 3499 is used to compute the sessionKey. 3506 The TPM generates the sessionKey from the recovered secret value. 3511 not available to the caller, except indirectly through the sessionKey. This does not represent a po… 3513 sessionKey value, it is an authorization failure that will trigger the dictionary attack logic. 3515 The entity referenced with the bind parameter contributes an authorization value to the sessionKey 3517 If both tpmKey and bind are TPM_ALG_NULL, then sessionKey is set to the Empty Buffer. If tpmKey is 3518 not TPM_ALG_NULL, then encryptedSalt is used in the computation of sessionKey. If bind is not 3519 TPM_ALG_NULL, the authValue of bind is used in the sessionKey computation. 3583 For all session types, this command will cause initialization of the sessionKey and may establish b… [all …]
|
D | raw_commands_fixed.txt | 3495 session key (sessionKey). The session key is then used to derive values used for authorization and … 3499 is used to compute the sessionKey. 3506 The TPM generates the sessionKey from the recovered secret value. 3511 not available to the caller, except indirectly through the sessionKey. This does not represent a po… 3513 sessionKey value, it is an authorization failure that will trigger the dictionary attack logic. 3515 The entity referenced with the bind parameter contributes an authorization value to the sessionKey 3517 If both tpmKey and bind are TPM_ALG_NULL, then sessionKey is set to the Empty Buffer. If tpmKey is 3518 not TPM_ALG_NULL, then encryptedSalt is used in the computation of sessionKey. If bind is not 3519 TPM_ALG_NULL, the authValue of bind is used in the sessionKey computation. 3583 For all session types, this command will cause initialization of the sessionKey and may establish b… [all …]
|
D | commands.txt | 145 _COMMENT the initial nonce from the TPM, used in the computation of the sessionKey
|