/external/wpa_supplicant/tests/ |
test_sha1.c | 42 const u8 master_secret[] = { local 120 printf("- T-PRF (SHA1) test case / master_secret\n"); 122 seed, sizeof(seed), buf, sizeof(master_secret)); 123 if (memcmp(master_secret, buf, sizeof(master_secret)) != 0) { 129 tls_prf(master_secret, sizeof(master_secret), "key expansion",
|
/external/wpa_supplicant_6/wpa_supplicant/tests/ |
test_sha1.c | 42 const u8 master_secret[] = { local 131 printf("- T-PRF (SHA1) test case / master_secret\n"); 133 seed, sizeof(seed), buf, sizeof(master_secret)); 134 if (memcmp(master_secret, buf, sizeof(master_secret)) != 0) { 140 tls_prf(master_secret, sizeof(master_secret), "key expansion",
|
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
tlsv1_client_i.h | 33 u8 master_secret[TLS_MASTER_SECRET_LEN]; member in struct:tlsv1_client
|
tlsv1_server_i.h | 34 u8 master_secret[TLS_MASTER_SECRET_LEN]; member in struct:tlsv1_server
|
/libcore/luni/src/main/java/org/apache/harmony/xnet/provider/jsse/ |
SSLSessionImpl.java | 150 byte[] master_secret; field in class:SSLSessionImpl
|
/external/wpa_supplicant/ |
tls_gnutls.c | 44 * use of internal structures to get the master_secret and 76 opaque master_secret[TLS_MASTER_SIZE]; member in struct:__anon8333 167 /* Because of the horrible hack to get master_secret and client/server 803 keys->master_key = sec->master_secret; 812 /* No access to master_secret */ [all...] |
eap_fast.c | 854 u8 master_secret[48], *seed; local 905 /* master_secret = T-PRF(PAC-Key, "PAC to master secret label hash", 909 seed, seed_len, master_secret, sizeof(master_secret)); 912 master_secret, sizeof(master_secret)); 917 master_secret, 918 sizeof(master_secret)); 954 wpa_hexdump_key(MSG_MSGDUMP, "EAP-FAST: master_secret for key " [all...] |
tlsv1_client.c | 46 u8 master_secret[TLS_MASTER_SECRET_LEN]; member in struct:tlsv1_client 1038 if (tls_prf(conn->master_secret, TLS_MASTER_SECRET_LEN, 1092 conn->master_secret, TLS_MASTER_SECRET_LEN)) { 1094 "master_secret"); 1097 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: master_secret", 1098 conn->master_secret, TLS_MASTER_SECRET_LEN); 1105 if (tls_prf(conn->master_secret, TLS_MASTER_SECRET_LEN, [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
tls_gnutls.c | 48 * use of internal structures to get the master_secret and 80 opaque master_secret[TLS_MASTER_SIZE]; member in struct:__anon8410 171 /* Because of the horrible hack to get master_secret and client/server 831 keys->master_key = sec->master_secret; 840 /* No access to master_secret */ [all...] |
/external/chromium/net/third_party/nss/ssl/ |
sslimpl.h | 555 PK11SymKey * master_secret; member in struct:__anon2620 876 SSL3Opaque master_secret[48]; member in struct:SessionTicketStr [all...] |