/external/chromium/net/third_party/nss/ssl/ |
derive.c | 105 unsigned char * key_block = pwSpec->key_block; local 180 keyblk.data = key_block; 190 /* key_block = 214 MD5_End(md5Ctx, key_block + made, &outLen, MD5_LENGTH); 221 PORT_Assert(block_bytes <= sizeof pwSpec->key_block); 222 PRINT_BUF(100, (NULL, "key block", key_block, block_bytes)); 227 key_block2 = key_block + block_bytes; 231 * The key_block is partitioned as follows: 234 buildSSLKey(&key_block[i],macSize, &pwSpec->client.write_mac_key_item, 447 unsigned char * key_block = pwSpec->key_block; local [all...] |
sslimpl.h | 562 unsigned char key_block[NUM_MIXERS * MD5_LENGTH]; member in struct:__anon2620 [all...] |
/libcore/luni/src/main/java/org/apache/harmony/xnet/provider/jsse/ |
ConnectionStateSSLv3.java | 91 byte[] key_block = new byte[2*hash_size + 2*key_size + 2*iv_size]; 97 PRF.computePRF_SSLv3(key_block, session.master_secret, seed); 106 System.arraycopy(key_block, 0, client_mac_secret, 0, hash_size); 107 System.arraycopy(key_block, hash_size, 109 System.arraycopy(key_block, 2*hash_size, client_key, 0, key_size); 110 System.arraycopy(key_block, 2*hash_size+key_size, 143 clientIV = new IvParameterSpec(key_block, 145 serverIV = new IvParameterSpec(key_block, 157 //logger.println("key_block"); 158 //logger.print(key_block); [all...] |
ConnectionStateTLS.java | 113 byte[] key_block = new byte[2*hash_size + 2*key_size + 2*iv_size]; 119 PRF.computePRF(key_block, session.master_secret, 129 System.arraycopy(key_block, 0, client_mac_secret, 0, hash_size); 130 System.arraycopy(key_block, hash_size, 132 System.arraycopy(key_block, 2*hash_size, client_key, 0, key_size); 133 System.arraycopy(key_block, 2*hash_size+key_size, 161 clientIV = new IvParameterSpec(key_block, 163 serverIV = new IvParameterSpec(key_block, 175 //logger.println("key_block"); 176 //logger.print(key_block); [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
tlsv1_client.c | 60 u8 key_block[TLS_MAX_KEY_BLOCK_LEN]; local 87 key_block, key_block_len)) { 88 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive key_block"); 91 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: key_block", 92 key_block, key_block_len); 94 pos = key_block; 584 * tlsv1_client_get_keyblock_size - Get TLS key_block size 586 * Returns: Size of the key_block for the negotiated cipher suite or -1 on
|
tlsv1_server.c | 42 u8 key_block[TLS_MAX_KEY_BLOCK_LEN]; local 69 key_block, key_block_len)) { 70 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive key_block"); 73 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: key_block", 74 key_block, key_block_len); 76 pos = key_block; 525 * tlsv1_server_get_keyblock_size - Get TLS key_block size 527 * Returns: Size of the key_block for the negotiated cipher suite or -1 on
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
eap_fast_common.h | 76 /* Extra key material after TLS key_block */
|
/external/wpa_supplicant/tests/ |
test_sha1.c | 50 const u8 key_block[] = { local 128 printf("- PRF (TLS, SHA1/MD5) test case / key_block\n"); 130 seed, sizeof(seed), buf, sizeof(key_block)); 131 if (memcmp(key_block, buf, sizeof(key_block)) != 0) {
|
/external/openssl/ssl/ |
s3_enc.c | 217 unsigned char *p,*key_block,*mac_secret; local 242 key_block=s->s3->tmp.key_block; 316 p=s->s3->tmp.key_block; 427 s->s3->tmp.key_block=p; 459 if (s->s3->tmp.key_block != NULL) 461 OPENSSL_cleanse(s->s3->tmp.key_block, 463 OPENSSL_free(s->s3->tmp.key_block); 464 s->s3->tmp.key_block=NULL;
|
t1_enc.c | 312 unsigned char *p,*key_block,*mac_secret; local 340 key_block=s->s3->tmp.key_block; 355 printf("%02x", key_block[i]); printf("\n"); 443 p=s->s3->tmp.key_block; 590 s->s3->tmp.key_block=p1;
|
ssl3.h | 505 unsigned char *key_block; member in struct:ssl3_state_st::__anon5493
|
s3_pkt.c | [all...] |
/external/wpa_supplicant_6/wpa_supplicant/tests/ |
test_sha1.c | 50 const u8 key_block[] = { local 139 printf("- PRF (TLS, SHA1/MD5) test case / key_block\n"); 141 seed, sizeof(seed), buf, sizeof(key_block)); 142 if (memcmp(key_block, buf, sizeof(key_block)) != 0) {
|
/external/wpa_supplicant/ |
tlsv1_client.c | 1080 u8 key_block[TLS_MAX_KEY_BLOCK_LEN]; local 1107 key_block, key_block_len)) { 1108 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive key_block"); 1111 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: key_block", 1112 key_block, key_block_len); 1114 pos = key_block; [all...] |
tls.h | 464 * tls_connection_get_keyblock_size - Get TLS key_block size 467 * Returns: Size of the key_block for the negotiated cipher suite or -1 on
|
eap_fast.c | 66 /* Extra key material after TLS key_block */ 978 * Extra key material after TLS key_block: session_ket_seed[40] [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
tls.h | 474 * tls_connection_get_keyblock_size - Get TLS key_block size 477 * Returns: Size of the key_block for the negotiated cipher suite or -1 on
|
/external/openssl/include/openssl/ |
ssl3.h | 505 unsigned char *key_block; member in struct:ssl3_state_st::__anon5480
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_fast.c | 267 * Extra key material after TLS key_block: session_key_seed[40] [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_fast.c | 278 * Extra key material after TLS key_block: session_key_seed[40] [all...] |