Home
last modified time | relevance | path

Searched refs:sessionKey (Results 1 – 10 of 10) sorted by relevance

/external/boringssl/src/ssl/test/runner/
Dcommon.go232 Get(sessionKey string) (session *ClientSessionState, ok bool)
235 Put(sessionKey string, cs *ClientSessionState)
1006 sessionKey string member
1011 func (c *lruSessionCache) Put(sessionKey string, cs interface{}) {
1015 if elem, ok := c.m[sessionKey]; ok {
1023 entry := &lruSessionCacheEntry{sessionKey, cs}
1024 c.m[sessionKey] = c.q.PushFront(entry)
1030 delete(c.m, entry.sessionKey)
1031 entry.sessionKey = sessionKey
1034 c.m[sessionKey] = elem
[all …]
/external/tpm2/
DSession.c390 session->sessionKey.t.size = hashSize; in SessionCreate()
393 &nonceCaller->b, hashSize * 8, session->sessionKey.t.buffer, NULL); in SessionCreate()
DCryptUtil.c2662 + sizeof(session->sessionKey.t.buffer))); in CryptParameterEncryption()
2665 pAssert(session->sessionKey.t.size + extraKey->t.size <= sizeof(key.t.buffer)); in CryptParameterEncryption()
2690 MemoryCopy2B(&key.b, &session->sessionKey.b, sizeof(key.t.buffer)); in CryptParameterEncryption()
2732 + sizeof(session->sessionKey.t.buffer))); in CryptParameterDecryption()
2735 pAssert(session->sessionKey.t.size + extraKey->t.size <= sizeof(key.t.buffer)); in CryptParameterDecryption()
2759 MemoryCopy2B(&key.b, &session->sessionKey.b, sizeof(key.t.buffer)); in CryptParameterDecryption()
DGlobal.h321 TPM2B_AUTH sessionKey; // session secret value used for member
DSessionProcess.c608 MemoryCopy2B(&key.b, &session->sessionKey.b, sizeof(key.t.buffer)); in ComputeCommandHMAC()
1696 MemoryCopy2B(&key.b, &session->sessionKey.b, sizeof(key.t.buffer)); in ComputeResponseHMAC()
Dpart3.txt2263 session key (sessionKey). The session key is then used to derive values used for authorization and …
2267 is used to compute the sessionKey.
2273 The TPM generates the sessionKey from the recovered secret value.
2277 …not available to the caller, except indirectly through the sessionKey. This does not represent a p…
2279sessionKey value, it is an authorization failure that will trigger the dictionary attack logic.
2281 The entity referenced with the bind parameter contributes an authorization value to the sessionKey
2283 If both tpmKey and bind are TPM_ALG_NULL, then sessionKey is set to the Empty Buffer. If tpmKey is
2284 not TPM_ALG_NULL, then encryptedSalt is used in the computation of sessionKey. If bind is not
2285 TPM_ALG_NULL, the authValue of bind is used in the sessionKey computation.
2322 For all session types, this command will cause initialization of the sessionKey and may establish b…
[all …]
Dpart4.txt1907 185 TPM2B_AUTH sessionKey; // session secret value used f…
4409 514 MemoryCopy2B(&key.b, &session->sessionKey.b, sizeof(key.t.buffer));
5716 1548 MemoryCopy2B(&key.b, &session->sessionKey.b, sizeof(key.t.buffer));
14560 288 // a sessionKey.
14563 291 // sessionKey = KDFa(hash, (authValue || seed), "ATH", nonceTPM,
14580 303 // Get hash size, which is also the length of sessionKey
14591 314 session->sessionKey.t.size = hashSize;
14595 318 &nonceCaller->b, hashSize * 8, session->sessionKey.t.buffer, NULL);
22477 2188 + sizeof(session->sessionKey.t.buffer)));
22481 2192 pAssert(session->sessionKey.t.size + extraKey->t.size <= sizeof(key.t.buffer));
[all …]
/external/tpm2/generator/
Draw_commands.txt3495 session key (sessionKey). The session key is then used to derive values used for authorization and …
3499 is used to compute the sessionKey.
3506 The TPM generates the sessionKey from the recovered secret value.
3511 not available to the caller, except indirectly through the sessionKey. This does not represent a po…
3513 sessionKey value, it is an authorization failure that will trigger the dictionary attack logic.
3515 The entity referenced with the bind parameter contributes an authorization value to the sessionKey
3517 If both tpmKey and bind are TPM_ALG_NULL, then sessionKey is set to the Empty Buffer. If tpmKey is
3518 not TPM_ALG_NULL, then encryptedSalt is used in the computation of sessionKey. If bind is not
3519 TPM_ALG_NULL, the authValue of bind is used in the sessionKey computation.
3583 For all session types, this command will cause initialization of the sessionKey and may establish b…
[all …]
Draw_commands_fixed.txt3495 session key (sessionKey). The session key is then used to derive values used for authorization and …
3499 is used to compute the sessionKey.
3506 The TPM generates the sessionKey from the recovered secret value.
3511 not available to the caller, except indirectly through the sessionKey. This does not represent a po…
3513 sessionKey value, it is an authorization failure that will trigger the dictionary attack logic.
3515 The entity referenced with the bind parameter contributes an authorization value to the sessionKey
3517 If both tpmKey and bind are TPM_ALG_NULL, then sessionKey is set to the Empty Buffer. If tpmKey is
3518 not TPM_ALG_NULL, then encryptedSalt is used in the computation of sessionKey. If bind is not
3519 TPM_ALG_NULL, the authValue of bind is used in the sessionKey computation.
3583 For all session types, this command will cause initialization of the sessionKey and may establish b…
[all …]
Dcommands.txt145 _COMMENT the initial nonce from the TPM, used in the computation of the sessionKey