Lines Matching refs:existing_header
1554 struct mach_core_fileheader_v2 existing_header; in kdp_core_handle_new_encryption_key() local
1556 ret = access_data(access_context, FALSE, 0, sizeof(existing_header), &existing_header); in kdp_core_handle_new_encryption_key()
1562 if (existing_header.signature == MACH_CORE_FILEHEADER_V2_SIGNATURE in kdp_core_handle_new_encryption_key()
1563 && existing_header.version == 2 in kdp_core_handle_new_encryption_key()
1564 && (existing_header.pub_key_length == 0 in kdp_core_handle_new_encryption_key()
1566 || existing_header.pub_key_length == kdp_core_header->pub_key_length)) { in kdp_core_handle_new_encryption_key()
1568 existing_header.flags &= ~MACH_CORE_FILEHEADER_V2_FLAGS_NEXT_COREFILE_KEY_FORMAT_MASK; in kdp_core_handle_new_encryption_key()
1571 …existing_header.flags |= key_descriptor->kcekd_format & MACH_CORE_FILEHEADER_V2_FLAGS_NEXT_COREFIL… in kdp_core_handle_new_encryption_key()
1573 if (existing_header.pub_key_offset == 0) { in kdp_core_handle_new_encryption_key()
1574 existing_header.pub_key_offset = kdp_core_header->pub_key_offset; in kdp_core_handle_new_encryption_key()
1575 existing_header.pub_key_length = kdp_core_header->pub_key_length; in kdp_core_handle_new_encryption_key()
1579 ret = access_data(access_context, TRUE, 0, sizeof(existing_header), &existing_header); in kdp_core_handle_new_encryption_key()
1593 …uint64_t offset = used_existing_header ? existing_header.pub_key_offset : kdp_core_header->pub_key… in kdp_core_handle_new_encryption_key()