/external/wpa_supplicant_8/src/eap_peer/ |
mschapv2.h | 24 u8 *master_key);
|
mschapv2.c | 42 u8 *master_key) 94 /* Generate master_key here since we have the needed data available. */ 103 if (get_master_key(password_hash_hash, nt_response, master_key)) 106 master_key, MSCHAPV2_MASTER_KEY_LEN);
|
eap_mschapv2.c | 93 u8 master_key[MSCHAPV2_MASTER_KEY_LEN]; member in struct:eap_mschapv2_data 210 data->auth_response, data->master_key)) { 595 /* Likewise, generate master_key here since we have the needed data 599 get_master_key(password_hash_hash, cp->nt_response, data->master_key); 837 get_asymetric_start_key(data->master_key, key, MSCHAPV2_KEY_LEN, 1, 0); 838 get_asymetric_start_key(data->master_key, key + MSCHAPV2_KEY_LEN,
|
/external/chromium_org/chrome/browser/managed_mode/ |
managed_user_registration_utility_stub.h | 32 std::string master_key() { return master_key_; } function in class:ManagedUserRegistrationUtilityStub
|
managed_user_sync_service.cc | 47 const std::string& master_key, 57 if (!master_key.empty()) 58 specifics.mutable_managed_user()->set_master_key(master_key); 74 std::string master_key; local 75 dict->GetString(ManagedUserSyncService::kMasterKey, &master_key); 81 return CreateLocalSyncData(it.key(), name, acknowledged, master_key, 157 const std::string& master_key, 163 value->SetString(kMasterKey, master_key); 184 CreateLocalSyncData(id, name, false, master_key, 228 std::string master_key; local [all...] |
managed_user_registration_utility.h | 37 std::string master_key; member in struct:ManagedUserRegistrationInfo
|
managed_user_registration_utility_stub.cc | 29 master_key_ = info.master_key;
|
managed_user_sync_service.h | 70 const std::string& master_key,
|
/external/chromium_org/chrome/browser/chromeos/login/managed/ |
locally_managed_user_creation_controller.cc | 101 const std::string& master_key) { 108 creation_context_->master_key = master_key; 187 creation_context_->master_key = StringToLowerASCII(base::HexEncode( 195 creation_context_->master_key); 206 info.master_key = creation_context_->master_key;
|
locally_managed_user_creation_controller.h | 82 // |avatar_index|. The master key for cryptohome is a |master_key|. 87 const std::string& master_key); 113 std::string master_key; member in struct:chromeos::LocallyManagedUserCreationController::UserCreationContext
|
managed_user_authenticator.h | 93 const std::string& master_key);
|
locally_managed_user_creation_screen.cc | 219 std::string master_key; local 224 user_info->GetString(ManagedUserSyncService::kMasterKey, &master_key); 246 master_key); 263 std::string master_key; local 268 user_info->GetString(ManagedUserSyncService::kMasterKey, &master_key); 290 master_key);
|
managed_user_authenticator.cc | 83 const std::string& master_key, 91 ParallelAuthenticator::HashPassword(master_key, system_salt), 136 const std::string& master_key) { 146 master_key));
|
/external/wpa_supplicant_8/src/crypto/ |
ms_funcs.h | 40 u8 *master_key); 41 int get_asymetric_start_key(const u8 *master_key, u8 *session_key,
|
ms_funcs.c | 322 * @master_key: 16-octet MasterKey (OUT) 326 u8 *master_key) 343 os_memcpy(master_key, hash, 16); 350 * @master_key: 16-octet MasterKey (IN) 357 int get_asymetric_start_key(const u8 *master_key, u8 *session_key, 400 addr[0] = master_key;
|
/external/srtp/srtp/ |
ekt.c | 167 const uint8_t *master_key; local 184 master_key = srtcp_packet_get_emk_location(srtcp_hdr, pkt_octet_len); 185 aes_decrypt_with_raw_key((void*)master_key, stream->ekt->data->ekt_dec_key);
|
/external/chromium_org/third_party/openssl/openssl/ssl/ |
ssl_asn1.c | 98 ASN1_OCTET_STRING master_key; member in struct:ssl_session_asn1_st 192 a.master_key.length=in->master_key_length; 193 a.master_key.type=V_ASN1_OCTET_STRING; 194 a.master_key.data=in->master_key; 289 M_ASN1_I2D_len(&(a.master_key), i2d_ASN1_OCTET_STRING); 335 M_ASN1_I2D_put(&(a.master_key), i2d_ASN1_OCTET_STRING); 458 memcpy(ret->master_key,os.data,ret->master_key_length);
|
s2_lib.c | 467 s->session->master_key_length > (int)sizeof(s->session->master_key)) 489 < (int)sizeof(s->session->master_key)); 490 EVP_DigestUpdate(&ctx,s->session->master_key,s->session->master_key_length);
|
ssl_txt.c | 164 if (BIO_printf(bp,"%02X",x->master_key[i]) <= 0) goto err;
|
/external/openssl/ssl/ |
ssl_asn1.c | 98 ASN1_OCTET_STRING master_key; member in struct:ssl_session_asn1_st 192 a.master_key.length=in->master_key_length; 193 a.master_key.type=V_ASN1_OCTET_STRING; 194 a.master_key.data=in->master_key; 289 M_ASN1_I2D_len(&(a.master_key), i2d_ASN1_OCTET_STRING); 335 M_ASN1_I2D_put(&(a.master_key), i2d_ASN1_OCTET_STRING); 458 memcpy(ret->master_key,os.data,ret->master_key_length);
|
s2_lib.c | 467 s->session->master_key_length > (int)sizeof(s->session->master_key)) 489 < (int)sizeof(s->session->master_key)); 490 EVP_DigestUpdate(&ctx,s->session->master_key,s->session->master_key_length);
|
/system/vold/ |
cryptfs.h | 78 unsigned char master_key[MAX_KEY_LEN]; /* The encrypted key for decrypting the filesystem */ member in struct:crypt_mnt_ftr
|
cryptfs.c | 667 void convert_key_to_hex_ascii(unsigned char *master_key, unsigned int keysize, 675 nibble = (master_key[i] >> 4) & 0xf; 678 nibble = master_key[i] & 0xf; 687 static int load_crypto_mapping_table(struct crypt_mnt_ftr *crypt_ftr, unsigned char *master_key, 711 convert_key_to_hex_ascii(master_key, crypt_ftr->keysize, master_key_ascii); 767 static int create_crypto_blk_dev(struct crypt_mnt_ftr *crypt_ftr, unsigned char *master_key, 815 load_count = load_crypto_mapping_table(crypt_ftr, master_key, real_blk_name, name, 980 ret = decrypt_master_key_aux(passwd, crypt_ftr->salt, crypt_ftr->master_key, decrypted_master_key, kdf, 989 static int create_encrypted_random_key(char *passwd, unsigned char *master_key, unsigned char *salt, 1003 return encrypt_master_key(passwd, salt, key_buf, master_key, crypt_ftr) [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_mschapv2.c | 53 u8 master_key[16]; member in struct:eap_mschapv2_data 415 get_master_key(pw_hash_hash, nt_response, data->master_key); 418 data->master_key, MSCHAPV2_KEY_LEN); 531 get_asymetric_start_key(data->master_key, key, MSCHAPV2_KEY_LEN, 0, 1); 532 get_asymetric_start_key(data->master_key, key + MSCHAPV2_KEY_LEN,
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_fast_common.c | 129 "expansion", keys.master_key, keys.master_key_len); 130 if (tls_prf_sha1_md5(keys.master_key, keys.master_key_len,
|