/external/chromium_org/chrome/browser/supervised_user/ |
supervised_user_registration_utility.h | 40 std::string master_key; member in struct:SupervisedUserRegistrationInfo
|
supervised_user_registration_utility_stub.h | 32 std::string master_key() { return master_key_; } function in class:SupervisedUserRegistrationUtilityStub
|
supervised_user_sync_service.cc | 52 const std::string& master_key, 64 if (!master_key.empty()) 65 specifics.mutable_managed_user()->set_master_key(master_key); 89 std::string master_key; local 90 dict->GetString(SupervisedUserSyncService::kMasterKey, &master_key); 104 master_key, 208 const std::string& master_key, 214 result->SetString(kMasterKey, master_key); 234 const std::string& master_key, 240 master_key, 331 std::string master_key; local [all...] |
/external/chromium_org/third_party/libsrtp/srtp/srtp/ |
ekt.c | 167 const uint8_t *master_key; local 184 master_key = srtcp_packet_get_emk_location(srtcp_hdr, pkt_octet_len); 188 aes_decrypt_with_raw_key((void*)master_key, &stream->ekt->data->ekt_dec_key, 16);
|
/external/srtp/srtp/ |
ekt.c | 167 const uint8_t *master_key; local 184 master_key = srtcp_packet_get_emk_location(srtcp_hdr, pkt_octet_len); 185 aes_decrypt_with_raw_key((void*)master_key, stream->ekt->data->ekt_dec_key);
|
/external/chromium_org/chrome/browser/chromeos/login/supervised/ |
supervised_user_creation_controller_new.h | 63 // |avatar_index|. The master key for cryptohome is a |master_key|. 68 const std::string& master_key) OVERRIDE; 72 // |avatar_index|. The master key for cryptohome is a |master_key|. The user 78 const std::string& master_key, 128 std::string master_key; // Random string member in struct:chromeos::SupervisedUserCreationControllerNew::UserCreationContext
|
supervised_user_creation_screen.cc | 249 std::string master_key; local 256 user_info->GetString(SupervisedUserSyncService::kMasterKey, &master_key); 292 master_key, 315 std::string master_key; local 320 user_info->GetString(SupervisedUserSyncService::kMasterKey, &master_key); 342 master_key);
|
/external/chromium_org/third_party/boringssl/src/ssl/ |
ssl_asn1.c | 108 ASN1_OCTET_STRING master_key; member in struct:ssl_session_asn1_st 178 a.master_key.length=in->master_key_length; 179 a.master_key.type=V_ASN1_OCTET_STRING; 180 a.master_key.data=in->master_key; 284 M_ASN1_I2D_len(&(a.master_key), i2d_ASN1_OCTET_STRING); 323 M_ASN1_I2D_put(&(a.master_key), i2d_ASN1_OCTET_STRING); 447 memcpy(ret->master_key,os.data,ret->master_key_length);
|
/external/openssl/ssl/ |
ssl_asn1.c | 98 ASN1_OCTET_STRING master_key; member in struct:ssl_session_asn1_st 193 a.master_key.length=in->master_key_length; 194 a.master_key.type=V_ASN1_OCTET_STRING; 195 a.master_key.data=in->master_key; 297 M_ASN1_I2D_len(&(a.master_key), i2d_ASN1_OCTET_STRING); 345 M_ASN1_I2D_put(&(a.master_key), i2d_ASN1_OCTET_STRING); 473 memcpy(ret->master_key,os.data,ret->master_key_length);
|
ssl.h | 451 * Master_key OCTET STRING, -- the master key 479 unsigned char master_key[SSL_MAX_MASTER_KEY_LENGTH]; member in struct:ssl_session_st 760 int SRP_generate_server_master_secret(SSL *s,unsigned char *master_key); 762 int SRP_generate_client_master_secret(SSL *s,unsigned char *master_key); [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_mschapv2.c | 53 u8 master_key[16]; member in struct:eap_mschapv2_data 423 get_master_key(pw_hash_hash, nt_response, data->master_key); 426 data->master_key, MSCHAPV2_KEY_LEN); 539 get_asymetric_start_key(data->master_key, key, MSCHAPV2_KEY_LEN, 0, 1); 540 get_asymetric_start_key(data->master_key, key + MSCHAPV2_KEY_LEN,
|
/external/wpa_supplicant_8/src/crypto/ |
tls.h | 15 const u8 *master_key; /* TLS master secret */ member in struct:tls_keys
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_mschapv2.c | 93 u8 master_key[MSCHAPV2_MASTER_KEY_LEN]; member in struct:eap_mschapv2_data 210 data->auth_response, data->master_key)) { 602 /* Likewise, generate master_key here since we have the needed data 607 data->master_key)) { 848 get_asymetric_start_key(data->master_key, key, MSCHAPV2_KEY_LEN, 1, 0); 849 get_asymetric_start_key(data->master_key, key + MSCHAPV2_KEY_LEN,
|
eap_ttls.c | 52 u8 master_key[MSCHAPV2_MASTER_KEY_LEN]; /* MSCHAPv2 master key */ member in struct:eap_ttls_data 488 data->master_key)) { [all...] |
/system/vold/ |
cryptfs.h | 57 #define CRYPT_TYPE_PASSWORD 0 /* master_key is encrypted with a password 60 #define CRYPT_TYPE_DEFAULT 1 /* master_key is encrypted with default 62 #define CRYPT_TYPE_PATTERN 2 /* master_key is encrypted with a pattern */ 63 #define CRYPT_TYPE_PIN 3 /* master_key is encrypted with a pin */ 94 __le32 crypt_type; /* how master_key is encrypted. Must be a 103 unsigned char master_key[MAX_KEY_LEN]; /* The encrypted key for decrypting the filesystem */ member in struct:crypt_mnt_ftr
|
cryptfs.c | 932 unsigned char* master_key = (unsigned char*) malloc(size / 2); local 933 if (master_key == 0) { 944 free (master_key); 948 master_key[*out_keysize] = high_nibble * 16 + low_nibble; 952 return master_key; 958 static void convert_key_to_hex_ascii(unsigned char *master_key, unsigned int keysize, 966 nibble = (master_key[i] >> 4) & 0xf; 969 nibble = master_key[i] & 0xf; 978 static int load_crypto_mapping_table(struct crypt_mnt_ftr *crypt_ftr, unsigned char *master_key, 1011 convert_key_to_hex_ascii(master_key, crypt_ftr->keysize, master_key_ascii) 1182 char* master_key = (char*)convert_hex_ascii_to_key(passwd, &keysize); local 1205 unsigned char* master_key = convert_hex_ascii_to_key(passwd, &keysize); local 1230 unsigned char* master_key = convert_hex_ascii_to_key(passwd, &key_size); local [all...] |
/external/chromium_org/third_party/boringssl/src/include/openssl/ |
ssl.h | 368 * Master_key OCTET STRING, -- the master key 399 unsigned char master_key[SSL_MAX_MASTER_KEY_LENGTH]; member in struct:ssl_session_st [all...] |
/external/openssl/include/openssl/ |
ssl.h | 451 * Master_key OCTET STRING, -- the master key 479 unsigned char master_key[SSL_MAX_MASTER_KEY_LENGTH]; member in struct:ssl_session_st 760 int SRP_generate_server_master_secret(SSL *s,unsigned char *master_key); 762 int SRP_generate_client_master_secret(SSL *s,unsigned char *master_key); [all...] |