/external/wpa_supplicant_8/src/eap_peer/ |
mschapv2.c | 42 u8 *master_key) 94 /* Generate master_key here since we have the needed data available. */ 103 if (get_master_key(password_hash_hash, nt_response, master_key)) 106 master_key, MSCHAPV2_MASTER_KEY_LEN);
|
mschapv2.h | 24 u8 *master_key);
|
/system/keymaster/include/keymaster/ |
key_blob.h | 45 * \p key will be encrypted with key derived from \p master_key, using OCB authenticated 59 const keymaster_key_blob_t& master_key, const uint8_t nonce[NONCE_LENGTH]); 63 * decrypted with key derived from \p master_key. The KeyBlob takes ownership of the \p 66 * Note, again, that \p master_key here is an abuse of \p keymaster_key_blob_t, since it 72 const keymaster_key_blob_t& master_key); 100 void DecryptKey(const keymaster_key_blob_t& master_key); 122 void EncryptKey(const keymaster_key_blob_t& master_key); 126 * Create an AES_OCB context initialized with a key derived using \p master_key and the 130 AeCtx* InitializeKeyWrappingContext(const keymaster_key_blob_t& master_key,
|
/system/keymaster/ |
key_blob.cpp | 48 const keymaster_key_blob_t& master_key, const uint8_t nonce[NONCE_LENGTH]) 85 EncryptKey(master_key); 89 const keymaster_key_blob_t& master_key) 100 DecryptKey(master_key); 149 void KeyBlob::EncryptKey(const keymaster_key_blob_t& master_key) { 150 UniquePtr<AeCtx> ctx(InitializeKeyWrappingContext(master_key, &error_)); 165 void KeyBlob::DecryptKey(const keymaster_key_blob_t& master_key) { 166 UniquePtr<AeCtx> ctx(InitializeKeyWrappingContext(master_key, &error_)); 188 KeyBlob::AeCtx* KeyBlob::InitializeKeyWrappingContext(const keymaster_key_blob_t& master_key, 221 if (AES_set_encrypt_key(master_key.key_material, master_key.key_material_size * 8, &aes_key) ! [all...] |
/external/wpa_supplicant_8/src/crypto/ |
ms_funcs.h | 40 u8 *master_key); 41 int get_asymetric_start_key(const u8 *master_key, u8 *session_key,
|
/external/chromium_org/chrome/browser/supervised_user/ |
supervised_user_sync_service.cc | 52 const std::string& master_key, 64 if (!master_key.empty()) 65 specifics.mutable_managed_user()->set_master_key(master_key); 89 std::string master_key; local 90 dict->GetString(SupervisedUserSyncService::kMasterKey, &master_key); 104 master_key, 208 const std::string& master_key, 214 result->SetString(kMasterKey, master_key); 234 const std::string& master_key, 240 master_key, 331 std::string master_key; local [all...] |
supervised_user_registration_utility_stub.h | 32 std::string master_key() { return master_key_; } function in class:SupervisedUserRegistrationUtilityStub
|
supervised_user_registration_utility_stub.cc | 30 master_key_ = info.master_key;
|
supervised_user_sync_service.h | 72 const std::string& master_key, 78 const std::string& master_key, 135 const std::string& master_key, 142 const std::string& master_key,
|
/external/chromium_org/chrome/browser/chromeos/login/managed/ |
managed_user_creation_controller_new.cc | 98 const std::string& master_key) { 108 creation_context_->master_key = master_key; 116 const std::string& master_key, 129 creation_context_->master_key = master_key; 176 creation_context_->master_key = authentication->GenerateMasterKey(); 205 user_context.SetKey(Key(creation_context_->master_key)); 222 cryptohome::KeyDefinition master_key(creation_context_->salted_master_key, 226 keys.push_back(master_key); [all...] |
managed_user_creation_controller.h | 71 // |avatar_index|. The master key for cryptohome is a |master_key|. 76 const std::string& master_key) = 0; 80 // |avatar_index|. The master key for cryptohome is a |master_key|. The user 86 const std::string& master_key,
|
managed_user_creation_controller_old.h | 54 // |avatar_index|. The master key for cryptohome is a |master_key|. 59 const std::string& master_key) OVERRIDE; 65 const std::string& master_key, 93 std::string master_key; member in struct:chromeos::ManagedUserCreationControllerOld::UserCreationContext
|
managed_user_creation_controller_old.cc | 89 const std::string& master_key) { 96 creation_context_->master_key = master_key; 104 const std::string& master_key, 205 creation_context_->master_key = authentication->GenerateMasterKey(); 215 creation_context_->master_key); 228 info.master_key = creation_context_->master_key;
|
managed_user_creation_controller_new.h | 63 // |avatar_index|. The master key for cryptohome is a |master_key|. 68 const std::string& master_key) OVERRIDE; 72 // |avatar_index|. The master key for cryptohome is a |master_key|. The user 78 const std::string& master_key, 128 std::string master_key; // Random string member in struct:chromeos::ManagedUserCreationControllerNew::UserCreationContext
|
managed_user_authenticator.cc | 95 Key master_key(plain_text_master_key); 96 master_key.Transform(Key::KEY_TYPE_SALTED_SHA256_TOP_HALF, system_salt); 100 master_key.GetSecret(), 145 const std::string& master_key) { 155 master_key));
|
locally_managed_user_creation_screen.cc | 236 std::string master_key; local 243 user_info->GetString(SupervisedUserSyncService::kMasterKey, &master_key); 279 master_key, 302 std::string master_key; local 307 user_info->GetString(SupervisedUserSyncService::kMasterKey, &master_key); 329 master_key);
|
/system/vold/ |
cryptfs.h | 57 #define CRYPT_TYPE_PASSWORD 0 /* master_key is encrypted with a password 60 #define CRYPT_TYPE_DEFAULT 1 /* master_key is encrypted with default 62 #define CRYPT_TYPE_PATTERN 2 /* master_key is encrypted with a pattern */ 63 #define CRYPT_TYPE_PIN 3 /* master_key is encrypted with a pin */ 94 __le32 crypt_type; /* how master_key is encrypted. Must be a 103 unsigned char master_key[MAX_KEY_LEN]; /* The encrypted key for decrypting the filesystem */ member in struct:crypt_mnt_ftr
|
cryptfs.c | 926 unsigned char* master_key = (unsigned char*) malloc(size / 2); local 927 if (master_key == 0) { 938 free (master_key); 942 master_key[*out_keysize] = high_nibble * 16 + low_nibble; 946 return master_key; 952 static void convert_key_to_hex_ascii(unsigned char *master_key, unsigned int keysize, 960 nibble = (master_key[i] >> 4) & 0xf; 963 nibble = master_key[i] & 0xf; 972 static int load_crypto_mapping_table(struct crypt_mnt_ftr *crypt_ftr, unsigned char *master_key, 996 convert_key_to_hex_ascii(master_key, crypt_ftr->keysize, master_key_ascii) 1163 char* master_key = (char*)convert_hex_ascii_to_key(passwd, &keysize); local 1186 unsigned char* master_key = convert_hex_ascii_to_key(passwd, &keysize); local 1211 unsigned char* master_key = convert_hex_ascii_to_key(passwd, &key_size); local [all...] |
/external/chromium_org/sync/protocol/ |
managed_user_specifics.proto | 27 optional string master_key = 4;
|
/external/chromium_org/chrome/browser/supervised_user/chromeos/ |
manager_password_service.cc | 107 std::string master_key; 111 &master_key)) { 136 manager_key.SetKey(Key(master_key));
|
/external/chromium_org/third_party/libsrtp/srtp/srtp/ |
ekt.c | 167 const uint8_t *master_key; local 184 master_key = srtcp_packet_get_emk_location(srtcp_hdr, pkt_octet_len); 188 aes_decrypt_with_raw_key((void*)master_key, &stream->ekt->data->ekt_dec_key, 16);
|
/external/srtp/srtp/ |
ekt.c | 167 const uint8_t *master_key; local 184 master_key = srtcp_packet_get_emk_location(srtcp_hdr, pkt_octet_len); 185 aes_decrypt_with_raw_key((void*)master_key, stream->ekt->data->ekt_dec_key);
|
/external/openssl/patches/ |
0011-ecdhe_psk.patch | 261 + s->session->master_key, 336 - s->session->master_key, 360 + s->session->master_key, pre_ms, pre_ms_len); 370 + s->session->master_key, p, n); 500 - s->session->master_key, 933 + s->session->master_key, pre_ms, pre_ms_len); 983 s->session->master_key,p,i); 1036 - generate_master_secret(s, s->session->master_key, p, i); 1135 - s->session->master_key, psk_or_pre_ms, pre_ms_len); 1150 + s->session->master_key, pre_ms, pre_ms_len) [all...] |
/external/chromium_org/third_party/openssl/openssl/ssl/ |
ssl_asn1.c | 98 ASN1_OCTET_STRING master_key; member in struct:ssl_session_asn1_st 192 a.master_key.length=in->master_key_length; 193 a.master_key.type=V_ASN1_OCTET_STRING; 194 a.master_key.data=in->master_key; 289 M_ASN1_I2D_len(&(a.master_key), i2d_ASN1_OCTET_STRING); 335 M_ASN1_I2D_put(&(a.master_key), i2d_ASN1_OCTET_STRING); 458 memcpy(ret->master_key,os.data,ret->master_key_length);
|
/external/openssl/ssl/ |
ssl_asn1.c | 98 ASN1_OCTET_STRING master_key; member in struct:ssl_session_asn1_st 193 a.master_key.length=in->master_key_length; 194 a.master_key.type=V_ASN1_OCTET_STRING; 195 a.master_key.data=in->master_key; 297 M_ASN1_I2D_len(&(a.master_key), i2d_ASN1_OCTET_STRING); 345 M_ASN1_I2D_put(&(a.master_key), i2d_ASN1_OCTET_STRING); 473 memcpy(ret->master_key,os.data,ret->master_key_length);
|