HomeSort by relevance Sort by last modified time
    Searched refs:master_key (Results 1 - 25 of 59) sorted by null

1 2 3

  /system/keymaster/include/keymaster/
key_blob.h 45 * \p key will be encrypted with key derived from \p master_key, using OCB authenticated
59 const keymaster_key_blob_t& master_key, const uint8_t nonce[NONCE_LENGTH]);
63 * decrypted with key derived from \p master_key. The KeyBlob takes ownership of the \p
66 * Note, again, that \p master_key here is an abuse of \p keymaster_key_blob_t, since it
72 const keymaster_key_blob_t& master_key);
100 void DecryptKey(const keymaster_key_blob_t& master_key);
122 void EncryptKey(const keymaster_key_blob_t& master_key);
126 * Create an AES_OCB context initialized with a key derived using \p master_key and the
130 AeCtx* InitializeKeyWrappingContext(const keymaster_key_blob_t& master_key,
  /external/wpa_supplicant_8/src/eap_peer/
mschapv2.h 24 u8 *master_key);
mschapv2.c 42 u8 *master_key)
94 /* Generate master_key here since we have the needed data available. */
103 if (get_master_key(password_hash_hash, nt_response, master_key))
106 master_key, MSCHAPV2_MASTER_KEY_LEN);
  /external/chromium_org/chrome/browser/chromeos/login/supervised/
supervised_user_creation_controller_new.cc 101 const std::string& master_key) {
111 creation_context_->master_key = master_key;
119 const std::string& master_key,
132 creation_context_->master_key = master_key;
179 creation_context_->master_key = authentication->GenerateMasterKey();
208 user_context.SetKey(Key(creation_context_->master_key));
225 cryptohome::KeyDefinition master_key(creation_context_->salted_master_key,
229 keys.push_back(master_key);
    [all...]
supervised_user_creation_controller.h 69 // |avatar_index|. The master key for cryptohome is a |master_key|.
74 const std::string& master_key) = 0;
78 // |avatar_index|. The master key for cryptohome is a |master_key|. The user
84 const std::string& master_key,
supervised_user_creation_controller_new.h 63 // |avatar_index|. The master key for cryptohome is a |master_key|.
68 const std::string& master_key) OVERRIDE;
72 // |avatar_index|. The master key for cryptohome is a |master_key|. The user
78 const std::string& master_key,
128 std::string master_key; // Random string member in struct:chromeos::SupervisedUserCreationControllerNew::UserCreationContext
supervised_user_authenticator.h 93 const std::string& master_key);
supervised_user_authenticator.cc 95 Key master_key(plain_text_master_key);
96 master_key.Transform(Key::KEY_TYPE_SALTED_SHA256_TOP_HALF, system_salt);
100 master_key.GetSecret(),
146 const std::string& master_key) {
156 master_key));
supervised_user_creation_screen.cc 249 std::string master_key; local
256 user_info->GetString(SupervisedUserSyncService::kMasterKey, &master_key);
292 master_key,
315 std::string master_key; local
320 user_info->GetString(SupervisedUserSyncService::kMasterKey, &master_key);
342 master_key);
  /external/chromium_org/chrome/browser/supervised_user/
supervised_user_registration_utility_stub.h 32 std::string master_key() { return master_key_; } function in class:SupervisedUserRegistrationUtilityStub
supervised_user_sync_service.h 72 const std::string& master_key,
78 const std::string& master_key,
135 const std::string& master_key,
142 const std::string& master_key,
supervised_user_sync_service.cc 52 const std::string& master_key,
64 if (!master_key.empty())
65 specifics.mutable_managed_user()->set_master_key(master_key);
89 std::string master_key; local
90 dict->GetString(SupervisedUserSyncService::kMasterKey, &master_key);
104 master_key,
208 const std::string& master_key,
214 result->SetString(kMasterKey, master_key);
234 const std::string& master_key,
240 master_key,
331 std::string master_key; local
    [all...]
supervised_user_registration_utility.h 40 std::string master_key; member in struct:SupervisedUserRegistrationInfo
supervised_user_registration_utility_stub.cc 30 master_key_ = info.master_key;
  /system/keymaster/
key_blob.cpp 48 const keymaster_key_blob_t& master_key, const uint8_t nonce[NONCE_LENGTH])
85 EncryptKey(master_key);
89 const keymaster_key_blob_t& master_key)
100 DecryptKey(master_key);
149 void KeyBlob::EncryptKey(const keymaster_key_blob_t& master_key) {
150 UniquePtr<AeCtx> ctx(InitializeKeyWrappingContext(master_key, &error_));
165 void KeyBlob::DecryptKey(const keymaster_key_blob_t& master_key) {
166 UniquePtr<AeCtx> ctx(InitializeKeyWrappingContext(master_key, &error_));
188 KeyBlob::AeCtx* KeyBlob::InitializeKeyWrappingContext(const keymaster_key_blob_t& master_key,
221 if (AES_set_encrypt_key(master_key.key_material, master_key.key_material_size * 8, &aes_key) !
    [all...]
  /external/wpa_supplicant_8/src/crypto/
ms_funcs.h 40 u8 *master_key);
41 int get_asymetric_start_key(const u8 *master_key, u8 *session_key,
ms_funcs.c 323 * @master_key: 16-octet MasterKey (OUT)
327 u8 *master_key)
344 os_memcpy(master_key, hash, 16);
351 * @master_key: 16-octet MasterKey (IN)
358 int get_asymetric_start_key(const u8 *master_key, u8 *session_key,
401 addr[0] = master_key;
  /external/chromium_org/third_party/libsrtp/srtp/srtp/
ekt.c 167 const uint8_t *master_key; local
184 master_key = srtcp_packet_get_emk_location(srtcp_hdr, pkt_octet_len);
188 aes_decrypt_with_raw_key((void*)master_key, &stream->ekt->data->ekt_dec_key, 16);
  /external/srtp/srtp/
ekt.c 167 const uint8_t *master_key; local
184 master_key = srtcp_packet_get_emk_location(srtcp_hdr, pkt_octet_len);
185 aes_decrypt_with_raw_key((void*)master_key, stream->ekt->data->ekt_dec_key);
  /system/vold/
cryptfs.c 932 unsigned char* master_key = (unsigned char*) malloc(size / 2); local
933 if (master_key == 0) {
944 free (master_key);
948 master_key[*out_keysize] = high_nibble * 16 + low_nibble;
952 return master_key;
958 static void convert_key_to_hex_ascii(unsigned char *master_key, unsigned int keysize,
966 nibble = (master_key[i] >> 4) & 0xf;
969 nibble = master_key[i] & 0xf;
978 static int load_crypto_mapping_table(struct crypt_mnt_ftr *crypt_ftr, unsigned char *master_key,
1011 convert_key_to_hex_ascii(master_key, crypt_ftr->keysize, master_key_ascii)
1182 char* master_key = (char*)convert_hex_ascii_to_key(passwd, &keysize); local
1205 unsigned char* master_key = convert_hex_ascii_to_key(passwd, &keysize); local
1230 unsigned char* master_key = convert_hex_ascii_to_key(passwd, &key_size); local
    [all...]
cryptfs.h 57 #define CRYPT_TYPE_PASSWORD 0 /* master_key is encrypted with a password
60 #define CRYPT_TYPE_DEFAULT 1 /* master_key is encrypted with default
62 #define CRYPT_TYPE_PATTERN 2 /* master_key is encrypted with a pattern */
63 #define CRYPT_TYPE_PIN 3 /* master_key is encrypted with a pin */
94 __le32 crypt_type; /* how master_key is encrypted. Must be a
103 unsigned char master_key[MAX_KEY_LEN]; /* The encrypted key for decrypting the filesystem */ member in struct:crypt_mnt_ftr
  /external/chromium_org/chrome/browser/supervised_user/chromeos/
manager_password_service.cc 110 std::string master_key;
114 &master_key)) {
139 manager_key.SetKey(Key(master_key));
  /external/openssl/ssl/
s2_lib.c 469 s->session->master_key_length > (int)sizeof(s->session->master_key))
491 < (int)sizeof(s->session->master_key));
492 EVP_DigestUpdate(&ctx,s->session->master_key,s->session->master_key_length);
ssl_asn1.c 98 ASN1_OCTET_STRING master_key; member in struct:ssl_session_asn1_st
193 a.master_key.length=in->master_key_length;
194 a.master_key.type=V_ASN1_OCTET_STRING;
195 a.master_key.data=in->master_key;
297 M_ASN1_I2D_len(&(a.master_key), i2d_ASN1_OCTET_STRING);
345 M_ASN1_I2D_put(&(a.master_key), i2d_ASN1_OCTET_STRING);
473 memcpy(ret->master_key,os.data,ret->master_key_length);
  /external/chromium_org/third_party/boringssl/src/ssl/
ssl_asn1.c 108 ASN1_OCTET_STRING master_key; member in struct:ssl_session_asn1_st
178 a.master_key.length=in->master_key_length;
179 a.master_key.type=V_ASN1_OCTET_STRING;
180 a.master_key.data=in->master_key;
284 M_ASN1_I2D_len(&(a.master_key), i2d_ASN1_OCTET_STRING);
323 M_ASN1_I2D_put(&(a.master_key), i2d_ASN1_OCTET_STRING);
447 memcpy(ret->master_key,os.data,ret->master_key_length);

Completed in 901 milliseconds

1 2 3