| /OK3568_Linux_fs/kernel/security/keys/encrypted-keys/ |
| H A D | encrypted.h | 9 const u8 **master_key, size_t *master_keylen); 12 const u8 **master_key, in request_trusted_key() argument 20 static inline void dump_master_key(const u8 *master_key, size_t master_keylen) in dump_master_key() argument 23 master_key, master_keylen, 0); in dump_master_key() 49 static inline void dump_master_key(const u8 *master_key, size_t master_keylen) in dump_master_key() argument
|
| H A D | encrypted.c | 301 static struct key *request_user_key(const char *master_desc, const u8 **master_key, in request_user_key() argument 320 *master_key = upayload->data; in request_user_key() 350 const u8 *master_key, size_t master_keylen) in get_derived_key() argument 369 memcpy(derived_buf + strlen(derived_buf) + 1, master_key, in get_derived_key() 411 const u8 **master_key, size_t *master_keylen) in request_master_key() argument 419 master_key, master_keylen); in request_master_key() 424 master_key, master_keylen); in request_master_key() 440 dump_master_key(*master_key, *master_keylen); in request_master_key() 489 const u8 *master_key, size_t master_keylen) in datablob_hmac_append() argument 495 ret = get_derived_key(derived_key, AUTH_KEY, master_key, master_keylen); in datablob_hmac_append() [all …]
|
| H A D | masterkey_trusted.c | 28 const u8 **master_key, size_t *master_keylen) in request_trusted_key() argument 39 *master_key = tpayload->key; in request_trusted_key()
|
| /OK3568_Linux_fs/kernel/drivers/net/ppp/ |
| H A D | ppp_mppe.c | 95 unsigned char master_key[MPPE_MAX_KEY_LEN]; member 134 crypto_shash_update(state->sha1, state->master_key, in get_new_key_from_sha() 177 if (optlen != CILEN_MPPE + sizeof(state->master_key) || in mppe_alloc() 209 memcpy(state->master_key, &options[CILEN_MPPE], in mppe_alloc() 210 sizeof(state->master_key)); in mppe_alloc() 211 memcpy(state->session_key, state->master_key, in mppe_alloc() 212 sizeof(state->master_key)); in mppe_alloc() 283 (int)sizeof(state->master_key), state->master_key, in mppe_init()
|
| /OK3568_Linux_fs/kernel/net/tipc/ |
| H A D | crypto.h | 126 master_key:1, member 137 master_key:1, 169 u8 mode, bool master_key);
|
| H A D | crypto.c | 280 bool master_key); 1073 ehdr->master_key = aead->crypto->key_master; in tipc_ehdr_build() 1124 u8 mode, bool master_key) in tipc_crypto_key_init() argument 1134 rc = tipc_crypto_key_attach(c, aead, 0, master_key); in tipc_crypto_key_init() 1153 bool master_key) in tipc_crypto_key_attach() argument 1161 if (master_key) { in tipc_crypto_key_attach() 1198 c->key_master |= master_key; in tipc_crypto_key_attach() 1397 rx->key_master = ehdr->master_key; in tipc_crypto_key_synch()
|
| H A D | node.c | 2918 bool rekeying = true, master_key = false; in __tipc_nl_node_set_key() local 2956 master_key = !!(attrs[TIPC_NLA_NODE_KEY_MASTER]); in __tipc_nl_node_set_key() 2973 rc = tipc_crypto_key_init(c, ukey, mode, master_key); in __tipc_nl_node_set_key() 2982 if (!master_key && tipc_crypto_key_distr(tx, rc, NULL)) in __tipc_nl_node_set_key()
|
| /OK3568_Linux_fs/kernel/fs/crypto/ |
| H A D | hkdf.c | 68 int fscrypt_init_hkdf(struct fscrypt_hkdf *hkdf, const u8 *master_key, in fscrypt_init_hkdf() argument 87 err = hkdf_extract(hmac_tfm, master_key, master_key_size, prk); in fscrypt_init_hkdf()
|
| H A D | keysetup_v1.c | 47 static int derive_key_aes(const u8 *master_key, in derive_key_aes() argument 75 sg_init_one(&src_sg, master_key, derived_keysize); in derive_key_aes()
|
| H A D | fscrypt_private.h | 318 int fscrypt_init_hkdf(struct fscrypt_hkdf *hkdf, const u8 *master_key,
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/host/openssl/include/openssl/ |
| H A D | ssl.h | 505 unsigned char master_key[SSL_MAX_MASTER_KEY_LENGTH]; member 874 int SRP_generate_server_master_secret(SSL *s, unsigned char *master_key); 876 int SRP_generate_client_master_secret(SSL *s, unsigned char *master_key);
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v1/export-user_ta/host_include/openssl/ |
| H A D | ssl.h | 4063 uint8_t master_key[SSL_MAX_MASTER_KEY_LENGTH]; member
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v1/export-user_ta/include/openssl/ |
| H A D | ssl.h | 4063 uint8_t master_key[SSL_MAX_MASTER_KEY_LENGTH]; member
|
| /OK3568_Linux_fs/kernel/Documentation/filesystems/ |
| H A D | fscrypt.rst | 502 ``SHA-512(SHA-512(master_key))``, but this particular scheme is not
|
| /OK3568_Linux_fs/recovery/ |
| HD | rootfs.cpio.gz | 107070100A8AEB0000041ED0000000000000000000000116841B48100000000000000FD0000000200000000000000000000000200000000.07070100A8B07C000081A40000000000000000000000016841263500000000000000FD0000000200000000000000000000000900000000.gitkeep07070100A8B07D000081A40000000000000000000000016841263500000000000000FD0000000200000000000000000000000B00000000.skip_fsck07070100A8AEB10000A1FF0000000000000000000000016841B0B600000007000000FD0000000200000000000000000000000400000000binusr/bin07070100A8B07E000081A400000000000000000000000168412635000001CC000000FD0000000200000000000000000000001100000000busybox. ... |