HomeSort by relevance Sort by last modified time
    Searched refs:master_key (Results 1 - 25 of 26) sorted by null

1 2

  /system/keymaster/include/keymaster/key_blob_utils/
ocb_utils.h 37 const KeymasterKeyBlob& master_key,
43 const KeymasterKeyBlob& master_key,
  /external/wpa_supplicant_8/src/eap_peer/
mschapv2.h 24 u8 *master_key);
mschapv2.c 42 u8 *master_key)
94 /* Generate master_key here since we have the needed data available. */
103 if (get_master_key(password_hash_hash, nt_response, master_key))
106 master_key, MSCHAPV2_MASTER_KEY_LEN);
eap_mschapv2.c 93 u8 master_key[MSCHAPV2_MASTER_KEY_LEN]; member in struct:eap_mschapv2_data
208 data->auth_response, data->master_key)) {
612 /* Likewise, generate master_key here since we have the needed data
617 data->master_key)) {
859 get_asymetric_start_key(data->master_key, key, MSCHAPV2_KEY_LEN, 1, 0);
860 get_asymetric_start_key(data->master_key, key + MSCHAPV2_KEY_LEN,
eap_ttls.c 53 u8 master_key[MSCHAPV2_MASTER_KEY_LEN]; /* MSCHAPv2 master key */ member in struct:eap_ttls_data
544 data->master_key)) {
    [all...]
  /system/keymaster/key_blob_utils/
ocb_utils.cpp 71 const KeymasterKeyBlob& master_key,
103 AES_set_encrypt_key(master_key.key_material, master_key.key_material_size * 8, &aes_key))
120 const KeymasterKeyBlob& master_key,
133 InitializeKeyWrappingContext(hw_enforced, sw_enforced, hidden, master_key, &ctx);
156 const KeymasterKeyBlob& master_key,
169 InitializeKeyWrappingContext(hw_enforced, sw_enforced, hidden, master_key, &ctx);
  /external/wpa_supplicant_8/src/crypto/
ms_funcs.h 42 u8 *master_key);
43 int get_asymetric_start_key(const u8 *master_key, u8 *session_key,
ms_funcs.c 322 * @master_key: 16-octet MasterKey (OUT)
326 u8 *master_key)
343 os_memcpy(master_key, hash, 16);
350 * @master_key: 16-octet MasterKey (IN)
357 int get_asymetric_start_key(const u8 *master_key, u8 *session_key,
400 addr[0] = master_key;
tls_openssl.c 99 os_memcpy(out, session->master_key, outlen);
3483 unsigned char master_key[64]; local
    [all...]
crypto_module_tests.c 2076 u8 master_key[] = { local
    [all...]
  /external/boringssl/src/ssl/
ssl_asn1.cc 215 !CBB_add_asn1_octet_string(&session, in->master_key,
567 CBS session_id, master_key; local
570 !CBS_get_asn1(&session, &master_key, CBS_ASN1_OCTETSTRING) ||
571 CBS_len(&master_key) > SSL_MAX_MASTER_KEY_LENGTH) {
577 OPENSSL_memcpy(ret->master_key, CBS_data(&master_key), CBS_len(&master_key));
578 ret->master_key_length = CBS_len(&master_key);
t1_enc.cc 355 auto master_key = local
356 MakeConstSpan(session->master_key, session->master_key_length);
361 return ssl3_prf(out_span, master_key, label, ssl->s3->server_random,
366 return tls1_prf(digest, out_span, master_key, label, ssl->s3->server_random,
426 MakeConstSpan(session->master_key, session->master_key_length),
ssl_transcript.cc 301 EVP_DigestUpdate(ctx.get(), session->master_key, session->master_key_length);
311 EVP_DigestUpdate(ctx.get(), session->master_key, session->master_key_length);
389 MakeConstSpan(session->master_key, session->master_key_length),
tls13_enc.cc 295 return derive_secret(hs, hs->new_session->master_key,
343 return hkdf_expand_label(session->master_key, digest, session->master_key,
438 ssl->session->master_key,
471 session->master_key, session->master_key_length,
ssl_session.cc 200 OPENSSL_memcpy(new_session->master_key, session->master_key,
887 OPENSSL_cleanse(session->master_key, sizeof(session->master_key));
    [all...]
handshake.cc 444 session->master_key,
handshake_client.cc 500 if (!tls13_init_early_key_schedule(hs, ssl->session->master_key,
    [all...]
tls13_client.cc 352 if (!tls13_init_key_schedule(hs, hs->new_session->master_key,
tls13_server.cc 451 if (!tls13_init_key_schedule(hs, hs->new_session->master_key,
    [all...]
handshake_server.cc     [all...]
  /system/vold/
cryptfs.h 71 #define CRYPT_TYPE_PASSWORD 0 /* master_key is encrypted with a password
74 #define CRYPT_TYPE_DEFAULT 1 /* master_key is encrypted with default
76 #define CRYPT_TYPE_PATTERN 2 /* master_key is encrypted with a pattern */
77 #define CRYPT_TYPE_PIN 3 /* master_key is encrypted with a pin */
106 __le32 crypt_type; /* how master_key is encrypted. Must be a
115 unsigned char master_key[MAX_KEY_LEN]; /* The encrypted key for decrypting the filesystem */ member in struct:crypt_mnt_ftr
cryptfs.cpp 965 static void convert_key_to_hex_ascii(const unsigned char *master_key,
972 nibble = (master_key[i] >> 4) & 0xf;
975 nibble = master_key[i] & 0xf;
985 const unsigned char *master_key, const char *real_blk_name,
1010 convert_key_to_hex_ascii(master_key, crypt_ftr->keysize, master_key_ascii);
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_mschapv2.c 53 u8 master_key[16]; member in struct:eap_mschapv2_data
435 data->master_key)) {
441 data->master_key, MSCHAPV2_KEY_LEN);
554 get_asymetric_start_key(data->master_key, key, MSCHAPV2_KEY_LEN, 0, 1);
555 get_asymetric_start_key(data->master_key, key + MSCHAPV2_KEY_LEN,
  /external/curl/lib/vtls/
openssl.c 183 unsigned char master_key[SSL_MAX_MASTER_KEY_LENGTH]; member in struct:ssl_tap_state
256 unsigned char master_key[SSL_MAX_MASTER_KEY_LENGTH]; local
267 SSL_SESSION_get_master_key(session, master_key, SSL_MAX_MASTER_KEY_LENGTH);
271 memcpy(master_key, session->master_key, session->master_key_length);
281 !memcmp(state->master_key, master_key, master_key_length) &&
287 memcpy(state->master_key, master_key, master_key_length);
302 line[pos++] = hex[master_key[i] >> 4]
    [all...]
  /device/linaro/bootloader/edk2/CryptoPkg/Library/TlsLib/
TlsConfig.c 919 CopyMem (KeyMaterial, Session->master_key, Session->master_key_length);

Completed in 1897 milliseconds

1 2