/external/wpa_supplicant_8/src/eap_peer/ |
mschapv2.c | 42 u8 *master_key) 94 /* Generate master_key here since we have the needed data available. */ 103 if (get_master_key(password_hash_hash, nt_response, master_key)) 106 master_key, MSCHAPV2_MASTER_KEY_LEN);
|
mschapv2.h | 24 u8 *master_key);
|
/system/keymaster/include/keymaster/ |
key_blob.h | 45 * \p key will be encrypted with key derived from \p master_key, using OCB authenticated 59 const keymaster_key_blob_t& master_key, const uint8_t nonce[NONCE_LENGTH]); 63 * decrypted with key derived from \p master_key. The KeyBlob takes ownership of the \p 66 * Note, again, that \p master_key here is an abuse of \p keymaster_key_blob_t, since it 72 const keymaster_key_blob_t& master_key); 100 void DecryptKey(const keymaster_key_blob_t& master_key); 122 void EncryptKey(const keymaster_key_blob_t& master_key); 126 * Create an AES_OCB context initialized with a key derived using \p master_key and the 130 AeCtx* InitializeKeyWrappingContext(const keymaster_key_blob_t& master_key,
|
/system/keymaster/ |
key_blob.cpp | 48 const keymaster_key_blob_t& master_key, const uint8_t nonce[NONCE_LENGTH]) 85 EncryptKey(master_key); 89 const keymaster_key_blob_t& master_key) 100 DecryptKey(master_key); 149 void KeyBlob::EncryptKey(const keymaster_key_blob_t& master_key) { 150 UniquePtr<AeCtx> ctx(InitializeKeyWrappingContext(master_key, &error_)); 165 void KeyBlob::DecryptKey(const keymaster_key_blob_t& master_key) { 166 UniquePtr<AeCtx> ctx(InitializeKeyWrappingContext(master_key, &error_)); 188 KeyBlob::AeCtx* KeyBlob::InitializeKeyWrappingContext(const keymaster_key_blob_t& master_key, 221 if (AES_set_encrypt_key(master_key.key_material, master_key.key_material_size * 8, &aes_key) ! [all...] |
/external/wpa_supplicant_8/src/crypto/ |
ms_funcs.h | 40 u8 *master_key); 41 int get_asymetric_start_key(const u8 *master_key, u8 *session_key,
|
/external/chromium_org/chrome/browser/supervised_user/ |
supervised_user_sync_service.cc | 52 const std::string& master_key, 64 if (!master_key.empty()) 65 specifics.mutable_managed_user()->set_master_key(master_key); 89 std::string master_key; local 90 dict->GetString(SupervisedUserSyncService::kMasterKey, &master_key); 104 master_key, 208 const std::string& master_key, 214 result->SetString(kMasterKey, master_key); 234 const std::string& master_key, 240 master_key, 331 std::string master_key; local [all...] |
supervised_user_registration_utility_stub.h | 32 std::string master_key() { return master_key_; } function in class:SupervisedUserRegistrationUtilityStub
|
supervised_user_registration_utility_stub.cc | 30 master_key_ = info.master_key;
|
supervised_user_sync_service.h | 72 const std::string& master_key, 78 const std::string& master_key, 135 const std::string& master_key, 142 const std::string& master_key,
|
/external/chromium_org/chrome/browser/chromeos/login/supervised/ |
supervised_user_creation_controller_new.cc | 101 const std::string& master_key) { 111 creation_context_->master_key = master_key; 119 const std::string& master_key, 132 creation_context_->master_key = master_key; 179 creation_context_->master_key = authentication->GenerateMasterKey(); 208 user_context.SetKey(Key(creation_context_->master_key)); 225 cryptohome::KeyDefinition master_key(creation_context_->salted_master_key, 229 keys.push_back(master_key); [all...] |
supervised_user_creation_controller.h | 69 // |avatar_index|. The master key for cryptohome is a |master_key|. 74 const std::string& master_key) = 0; 78 // |avatar_index|. The master key for cryptohome is a |master_key|. The user 84 const std::string& master_key,
|
supervised_user_creation_controller_new.h | 63 // |avatar_index|. The master key for cryptohome is a |master_key|. 68 const std::string& master_key) OVERRIDE; 72 // |avatar_index|. The master key for cryptohome is a |master_key|. The user 78 const std::string& master_key, 128 std::string master_key; // Random string member in struct:chromeos::SupervisedUserCreationControllerNew::UserCreationContext
|
supervised_user_authenticator.cc | 95 Key master_key(plain_text_master_key); 96 master_key.Transform(Key::KEY_TYPE_SALTED_SHA256_TOP_HALF, system_salt); 100 master_key.GetSecret(), 146 const std::string& master_key) { 156 master_key));
|
supervised_user_creation_screen.cc | 249 std::string master_key; local 256 user_info->GetString(SupervisedUserSyncService::kMasterKey, &master_key); 292 master_key, 315 std::string master_key; local 320 user_info->GetString(SupervisedUserSyncService::kMasterKey, &master_key); 342 master_key);
|
/system/vold/ |
cryptfs.h | 57 #define CRYPT_TYPE_PASSWORD 0 /* master_key is encrypted with a password 60 #define CRYPT_TYPE_DEFAULT 1 /* master_key is encrypted with default 62 #define CRYPT_TYPE_PATTERN 2 /* master_key is encrypted with a pattern */ 63 #define CRYPT_TYPE_PIN 3 /* master_key is encrypted with a pin */ 94 __le32 crypt_type; /* how master_key is encrypted. Must be a 103 unsigned char master_key[MAX_KEY_LEN]; /* The encrypted key for decrypting the filesystem */ member in struct:crypt_mnt_ftr
|
cryptfs.c | 932 unsigned char* master_key = (unsigned char*) malloc(size / 2); local 933 if (master_key == 0) { 944 free (master_key); 948 master_key[*out_keysize] = high_nibble * 16 + low_nibble; 952 return master_key; 958 static void convert_key_to_hex_ascii(unsigned char *master_key, unsigned int keysize, 966 nibble = (master_key[i] >> 4) & 0xf; 969 nibble = master_key[i] & 0xf; 978 static int load_crypto_mapping_table(struct crypt_mnt_ftr *crypt_ftr, unsigned char *master_key, 1011 convert_key_to_hex_ascii(master_key, crypt_ftr->keysize, master_key_ascii) 1182 char* master_key = (char*)convert_hex_ascii_to_key(passwd, &keysize); local 1205 unsigned char* master_key = convert_hex_ascii_to_key(passwd, &keysize); local 1230 unsigned char* master_key = convert_hex_ascii_to_key(passwd, &key_size); local [all...] |
/external/chromium_org/sync/protocol/ |
managed_user_specifics.proto | 27 optional string master_key = 4;
|
/external/chromium_org/chrome/browser/supervised_user/chromeos/ |
manager_password_service.cc | 110 std::string master_key; 114 &master_key)) { 139 manager_key.SetKey(Key(master_key));
|
/external/chromium_org/third_party/libsrtp/srtp/srtp/ |
ekt.c | 167 const uint8_t *master_key; local 184 master_key = srtcp_packet_get_emk_location(srtcp_hdr, pkt_octet_len); 188 aes_decrypt_with_raw_key((void*)master_key, &stream->ekt->data->ekt_dec_key, 16);
|
/external/srtp/srtp/ |
ekt.c | 167 const uint8_t *master_key; local 184 master_key = srtcp_packet_get_emk_location(srtcp_hdr, pkt_octet_len); 185 aes_decrypt_with_raw_key((void*)master_key, stream->ekt->data->ekt_dec_key);
|
/external/openssl/patches/ |
0011-ecdhe_psk.patch | 284 + s->session->master_key, 358 - s->session->master_key, 382 + s->session->master_key, pre_ms, pre_ms_len); 392 + s->session->master_key, p, n); 534 - s->session->master_key, 956 + s->session->master_key, pre_ms, pre_ms_len); 1006 s->session->master_key,p,i); 1059 - generate_master_secret(s, s->session->master_key, p, i); 1158 - s->session->master_key, psk_or_pre_ms, pre_ms_len); [all...] |
/external/chromium_org/third_party/boringssl/src/ssl/ |
ssl_asn1.c | 108 ASN1_OCTET_STRING master_key; member in struct:ssl_session_asn1_st 178 a.master_key.length=in->master_key_length; 179 a.master_key.type=V_ASN1_OCTET_STRING; 180 a.master_key.data=in->master_key; 284 M_ASN1_I2D_len(&(a.master_key), i2d_ASN1_OCTET_STRING); 323 M_ASN1_I2D_put(&(a.master_key), i2d_ASN1_OCTET_STRING); 447 memcpy(ret->master_key,os.data,ret->master_key_length);
|
/external/openssl/ssl/ |
ssl_asn1.c | 98 ASN1_OCTET_STRING master_key; member in struct:ssl_session_asn1_st 193 a.master_key.length=in->master_key_length; 194 a.master_key.type=V_ASN1_OCTET_STRING; 195 a.master_key.data=in->master_key; 297 M_ASN1_I2D_len(&(a.master_key), i2d_ASN1_OCTET_STRING); 345 M_ASN1_I2D_put(&(a.master_key), i2d_ASN1_OCTET_STRING); 473 memcpy(ret->master_key,os.data,ret->master_key_length);
|
/external/srtp/googlepatches/ |
vidyo-1-srtp-win.patch | 104 - uint8_t *master_key; 105 + const uint8_t *master_key; 112 master_key = srtcp_packet_get_emk_location(srtcp_hdr, pkt_octet_len); 113 - aes_decrypt_with_raw_key(master_key, stream->ekt->data->ekt_dec_key); 114 + aes_decrypt_with_raw_key((void*)master_key, stream->ekt->data->ekt_dec_key);
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_mschapv2.c | 53 u8 master_key[16]; member in struct:eap_mschapv2_data 423 get_master_key(pw_hash_hash, nt_response, data->master_key); 426 data->master_key, MSCHAPV2_KEY_LEN); 539 get_asymetric_start_key(data->master_key, key, MSCHAPV2_KEY_LEN, 0, 1); 540 get_asymetric_start_key(data->master_key, key + MSCHAPV2_KEY_LEN,
|