HomeSort by relevance Sort by last modified time
    Searched full:master_key (Results 1 - 25 of 80) sorted by null

1 2 3 4

  /external/wpa_supplicant_8/src/eap_peer/
mschapv2.c 42 u8 *master_key)
94 /* Generate master_key here since we have the needed data available. */
103 if (get_master_key(password_hash_hash, nt_response, master_key))
106 master_key, MSCHAPV2_MASTER_KEY_LEN);
mschapv2.h 24 u8 *master_key);
  /system/keymaster/include/keymaster/
key_blob.h 45 * \p key will be encrypted with key derived from \p master_key, using OCB authenticated
59 const keymaster_key_blob_t& master_key, const uint8_t nonce[NONCE_LENGTH]);
63 * decrypted with key derived from \p master_key. The KeyBlob takes ownership of the \p
66 * Note, again, that \p master_key here is an abuse of \p keymaster_key_blob_t, since it
72 const keymaster_key_blob_t& master_key);
100 void DecryptKey(const keymaster_key_blob_t& master_key);
122 void EncryptKey(const keymaster_key_blob_t& master_key);
126 * Create an AES_OCB context initialized with a key derived using \p master_key and the
130 AeCtx* InitializeKeyWrappingContext(const keymaster_key_blob_t& master_key,
  /system/keymaster/
key_blob.cpp 48 const keymaster_key_blob_t& master_key, const uint8_t nonce[NONCE_LENGTH])
85 EncryptKey(master_key);
89 const keymaster_key_blob_t& master_key)
100 DecryptKey(master_key);
149 void KeyBlob::EncryptKey(const keymaster_key_blob_t& master_key) {
150 UniquePtr<AeCtx> ctx(InitializeKeyWrappingContext(master_key, &error_));
165 void KeyBlob::DecryptKey(const keymaster_key_blob_t& master_key) {
166 UniquePtr<AeCtx> ctx(InitializeKeyWrappingContext(master_key, &error_));
188 KeyBlob::AeCtx* KeyBlob::InitializeKeyWrappingContext(const keymaster_key_blob_t& master_key,
221 if (AES_set_encrypt_key(master_key.key_material, master_key.key_material_size * 8, &aes_key) !
    [all...]
  /external/wpa_supplicant_8/src/crypto/
ms_funcs.h 40 u8 *master_key);
41 int get_asymetric_start_key(const u8 *master_key, u8 *session_key,
  /external/chromium_org/chrome/browser/supervised_user/
supervised_user_sync_service.cc 52 const std::string& master_key,
64 if (!master_key.empty())
65 specifics.mutable_managed_user()->set_master_key(master_key);
89 std::string master_key; local
90 dict->GetString(SupervisedUserSyncService::kMasterKey, &master_key);
104 master_key,
208 const std::string& master_key,
214 result->SetString(kMasterKey, master_key);
234 const std::string& master_key,
240 master_key,
331 std::string master_key; local
    [all...]
supervised_user_registration_utility_stub.h 32 std::string master_key() { return master_key_; } function in class:SupervisedUserRegistrationUtilityStub
supervised_user_registration_utility_stub.cc 30 master_key_ = info.master_key;
supervised_user_sync_service.h 72 const std::string& master_key,
78 const std::string& master_key,
135 const std::string& master_key,
142 const std::string& master_key,
  /external/chromium_org/chrome/browser/chromeos/login/managed/
managed_user_creation_controller_new.cc 98 const std::string& master_key) {
108 creation_context_->master_key = master_key;
116 const std::string& master_key,
129 creation_context_->master_key = master_key;
176 creation_context_->master_key = authentication->GenerateMasterKey();
205 user_context.SetKey(Key(creation_context_->master_key));
222 cryptohome::KeyDefinition master_key(creation_context_->salted_master_key,
226 keys.push_back(master_key);
    [all...]
managed_user_creation_controller.h 71 // |avatar_index|. The master key for cryptohome is a |master_key|.
76 const std::string& master_key) = 0;
80 // |avatar_index|. The master key for cryptohome is a |master_key|. The user
86 const std::string& master_key,
managed_user_creation_controller_old.h 54 // |avatar_index|. The master key for cryptohome is a |master_key|.
59 const std::string& master_key) OVERRIDE;
65 const std::string& master_key,
93 std::string master_key; member in struct:chromeos::ManagedUserCreationControllerOld::UserCreationContext
managed_user_creation_controller_old.cc 89 const std::string& master_key) {
96 creation_context_->master_key = master_key;
104 const std::string& master_key,
205 creation_context_->master_key = authentication->GenerateMasterKey();
215 creation_context_->master_key);
228 info.master_key = creation_context_->master_key;
managed_user_creation_controller_new.h 63 // |avatar_index|. The master key for cryptohome is a |master_key|.
68 const std::string& master_key) OVERRIDE;
72 // |avatar_index|. The master key for cryptohome is a |master_key|. The user
78 const std::string& master_key,
128 std::string master_key; // Random string member in struct:chromeos::ManagedUserCreationControllerNew::UserCreationContext
managed_user_authenticator.cc 95 Key master_key(plain_text_master_key);
96 master_key.Transform(Key::KEY_TYPE_SALTED_SHA256_TOP_HALF, system_salt);
100 master_key.GetSecret(),
145 const std::string& master_key) {
155 master_key));
locally_managed_user_creation_screen.cc 236 std::string master_key; local
243 user_info->GetString(SupervisedUserSyncService::kMasterKey, &master_key);
279 master_key,
302 std::string master_key; local
307 user_info->GetString(SupervisedUserSyncService::kMasterKey, &master_key);
329 master_key);
  /system/vold/
cryptfs.h 57 #define CRYPT_TYPE_PASSWORD 0 /* master_key is encrypted with a password
60 #define CRYPT_TYPE_DEFAULT 1 /* master_key is encrypted with default
62 #define CRYPT_TYPE_PATTERN 2 /* master_key is encrypted with a pattern */
63 #define CRYPT_TYPE_PIN 3 /* master_key is encrypted with a pin */
94 __le32 crypt_type; /* how master_key is encrypted. Must be a
103 unsigned char master_key[MAX_KEY_LEN]; /* The encrypted key for decrypting the filesystem */ member in struct:crypt_mnt_ftr
cryptfs.c 926 unsigned char* master_key = (unsigned char*) malloc(size / 2); local
927 if (master_key == 0) {
938 free (master_key);
942 master_key[*out_keysize] = high_nibble * 16 + low_nibble;
946 return master_key;
952 static void convert_key_to_hex_ascii(unsigned char *master_key, unsigned int keysize,
960 nibble = (master_key[i] >> 4) & 0xf;
963 nibble = master_key[i] & 0xf;
972 static int load_crypto_mapping_table(struct crypt_mnt_ftr *crypt_ftr, unsigned char *master_key,
996 convert_key_to_hex_ascii(master_key, crypt_ftr->keysize, master_key_ascii)
1163 char* master_key = (char*)convert_hex_ascii_to_key(passwd, &keysize); local
1186 unsigned char* master_key = convert_hex_ascii_to_key(passwd, &keysize); local
1211 unsigned char* master_key = convert_hex_ascii_to_key(passwd, &key_size); local
    [all...]
  /external/chromium_org/sync/protocol/
managed_user_specifics.proto 27 optional string master_key = 4;
  /external/chromium_org/chrome/browser/supervised_user/chromeos/
manager_password_service.cc 107 std::string master_key;
111 &master_key)) {
136 manager_key.SetKey(Key(master_key));
  /external/chromium_org/third_party/libsrtp/srtp/srtp/
ekt.c 167 const uint8_t *master_key; local
184 master_key = srtcp_packet_get_emk_location(srtcp_hdr, pkt_octet_len);
188 aes_decrypt_with_raw_key((void*)master_key, &stream->ekt->data->ekt_dec_key, 16);
  /external/srtp/srtp/
ekt.c 167 const uint8_t *master_key; local
184 master_key = srtcp_packet_get_emk_location(srtcp_hdr, pkt_octet_len);
185 aes_decrypt_with_raw_key((void*)master_key, stream->ekt->data->ekt_dec_key);
  /external/openssl/patches/
0011-ecdhe_psk.patch 261 + s->session->master_key,
336 - s->session->master_key,
360 + s->session->master_key, pre_ms, pre_ms_len);
370 + s->session->master_key, p, n);
500 - s->session->master_key,
933 + s->session->master_key, pre_ms, pre_ms_len);
983 s->session->master_key,p,i);
1036 - generate_master_secret(s, s->session->master_key, p, i);
1135 - s->session->master_key, psk_or_pre_ms, pre_ms_len);
1150 + s->session->master_key, pre_ms, pre_ms_len)
    [all...]
  /external/chromium_org/third_party/openssl/openssl/ssl/
ssl_asn1.c 98 ASN1_OCTET_STRING master_key; member in struct:ssl_session_asn1_st
192 a.master_key.length=in->master_key_length;
193 a.master_key.type=V_ASN1_OCTET_STRING;
194 a.master_key.data=in->master_key;
289 M_ASN1_I2D_len(&(a.master_key), i2d_ASN1_OCTET_STRING);
335 M_ASN1_I2D_put(&(a.master_key), i2d_ASN1_OCTET_STRING);
458 memcpy(ret->master_key,os.data,ret->master_key_length);
  /external/openssl/ssl/
ssl_asn1.c 98 ASN1_OCTET_STRING master_key; member in struct:ssl_session_asn1_st
193 a.master_key.length=in->master_key_length;
194 a.master_key.type=V_ASN1_OCTET_STRING;
195 a.master_key.data=in->master_key;
297 M_ASN1_I2D_len(&(a.master_key), i2d_ASN1_OCTET_STRING);
345 M_ASN1_I2D_put(&(a.master_key), i2d_ASN1_OCTET_STRING);
473 memcpy(ret->master_key,os.data,ret->master_key_length);

Completed in 2084 milliseconds

1 2 3 4