HomeSort by relevance Sort by last modified time
    Searched refs:key_block (Results 1 - 14 of 14) sorted by null

  /external/chromium/net/third_party/nss/ssl/
derive.c 105 unsigned char * key_block = pwSpec->key_block; local
180 keyblk.data = key_block;
190 /* key_block =
214 MD5_End(md5Ctx, key_block + made, &outLen, MD5_LENGTH);
221 PORT_Assert(block_bytes <= sizeof pwSpec->key_block);
222 PRINT_BUF(100, (NULL, "key block", key_block, block_bytes));
227 key_block2 = key_block + block_bytes;
231 * The key_block is partitioned as follows:
234 buildSSLKey(&key_block[i],macSize, &pwSpec->client.write_mac_key_item,
447 unsigned char * key_block = pwSpec->key_block; local
    [all...]
sslimpl.h 562 unsigned char key_block[NUM_MIXERS * MD5_LENGTH]; member in struct:__anon2620
    [all...]
  /libcore/luni/src/main/java/org/apache/harmony/xnet/provider/jsse/
ConnectionStateSSLv3.java 91 byte[] key_block = new byte[2*hash_size + 2*key_size + 2*iv_size];
97 PRF.computePRF_SSLv3(key_block, session.master_secret, seed);
106 System.arraycopy(key_block, 0, client_mac_secret, 0, hash_size);
107 System.arraycopy(key_block, hash_size,
109 System.arraycopy(key_block, 2*hash_size, client_key, 0, key_size);
110 System.arraycopy(key_block, 2*hash_size+key_size,
143 clientIV = new IvParameterSpec(key_block,
145 serverIV = new IvParameterSpec(key_block,
157 //logger.println("key_block");
158 //logger.print(key_block);
    [all...]
ConnectionStateTLS.java 113 byte[] key_block = new byte[2*hash_size + 2*key_size + 2*iv_size];
119 PRF.computePRF(key_block, session.master_secret,
129 System.arraycopy(key_block, 0, client_mac_secret, 0, hash_size);
130 System.arraycopy(key_block, hash_size,
132 System.arraycopy(key_block, 2*hash_size, client_key, 0, key_size);
133 System.arraycopy(key_block, 2*hash_size+key_size,
161 clientIV = new IvParameterSpec(key_block,
163 serverIV = new IvParameterSpec(key_block,
175 //logger.println("key_block");
176 //logger.print(key_block);
    [all...]
  /external/openssl/ssl/
s3_enc.c 217 unsigned char *p,*key_block,*mac_secret; local
242 key_block=s->s3->tmp.key_block;
316 p=s->s3->tmp.key_block;
427 s->s3->tmp.key_block=p;
459 if (s->s3->tmp.key_block != NULL)
461 OPENSSL_cleanse(s->s3->tmp.key_block,
463 OPENSSL_free(s->s3->tmp.key_block);
464 s->s3->tmp.key_block=NULL;
t1_enc.c 312 unsigned char *p,*key_block,*mac_secret; local
340 key_block=s->s3->tmp.key_block;
355 printf("%02x", key_block[i]); printf("\n");
443 p=s->s3->tmp.key_block;
590 s->s3->tmp.key_block=p1;
ssl3.h 505 unsigned char *key_block; member in struct:ssl3_state_st::__anon5493
s3_pkt.c     [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/tls/
tlsv1_client.c 60 u8 key_block[TLS_MAX_KEY_BLOCK_LEN]; local
87 key_block, key_block_len)) {
88 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive key_block");
91 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: key_block",
92 key_block, key_block_len);
94 pos = key_block;
584 * tlsv1_client_get_keyblock_size - Get TLS key_block size
586 * Returns: Size of the key_block for the negotiated cipher suite or -1 on
tlsv1_server.c 42 u8 key_block[TLS_MAX_KEY_BLOCK_LEN]; local
69 key_block, key_block_len)) {
70 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive key_block");
73 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: key_block",
74 key_block, key_block_len);
76 pos = key_block;
525 * tlsv1_server_get_keyblock_size - Get TLS key_block size
527 * Returns: Size of the key_block for the negotiated cipher suite or -1 on
  /external/wpa_supplicant/tests/
test_sha1.c 50 const u8 key_block[] = { local
128 printf("- PRF (TLS, SHA1/MD5) test case / key_block\n");
130 seed, sizeof(seed), buf, sizeof(key_block));
131 if (memcmp(key_block, buf, sizeof(key_block)) != 0) {
  /external/wpa_supplicant_6/wpa_supplicant/tests/
test_sha1.c 50 const u8 key_block[] = { local
139 printf("- PRF (TLS, SHA1/MD5) test case / key_block\n");
141 seed, sizeof(seed), buf, sizeof(key_block));
142 if (memcmp(key_block, buf, sizeof(key_block)) != 0) {
  /external/openssl/include/openssl/
ssl3.h 505 unsigned char *key_block; member in struct:ssl3_state_st::__anon5480
  /external/wpa_supplicant/
tlsv1_client.c 1080 u8 key_block[TLS_MAX_KEY_BLOCK_LEN]; local
1107 key_block, key_block_len)) {
1108 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive key_block");
1111 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: key_block",
1112 key_block, key_block_len);
1114 pos = key_block;
    [all...]

Completed in 172 milliseconds