/external/wpa_supplicant/tests/ |
test_sha1.c | 50 const u8 key_block[] = { local 128 printf("- PRF (TLS, SHA1/MD5) test case / key_block\n"); 130 seed, sizeof(seed), buf, sizeof(key_block)); 131 if (memcmp(key_block, buf, sizeof(key_block)) != 0) {
|
/external/wpa_supplicant_6/wpa_supplicant/tests/ |
test_sha1.c | 50 const u8 key_block[] = { local 139 printf("- PRF (TLS, SHA1/MD5) test case / key_block\n"); 141 seed, sizeof(seed), buf, sizeof(key_block)); 142 if (memcmp(key_block, buf, sizeof(key_block)) != 0) {
|
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
tlsv1_client.c | 60 u8 key_block[TLS_MAX_KEY_BLOCK_LEN]; local 87 key_block, key_block_len)) { 88 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive key_block"); 91 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: key_block", 92 key_block, key_block_len); 94 pos = key_block; 584 * tlsv1_client_get_keyblock_size - Get TLS key_block size 586 * Returns: Size of the key_block for the negotiated cipher suite or -1 on
|
tlsv1_server.c | 42 u8 key_block[TLS_MAX_KEY_BLOCK_LEN]; local 69 key_block, key_block_len)) { 70 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive key_block"); 73 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: key_block", 74 key_block, key_block_len); 76 pos = key_block; 525 * tlsv1_server_get_keyblock_size - Get TLS key_block size 527 * Returns: Size of the key_block for the negotiated cipher suite or -1 on
|
/external/wpa_supplicant_8/src/tls/ |
tlsv1_client.c | 60 u8 key_block[TLS_MAX_KEY_BLOCK_LEN]; local 87 key_block, key_block_len)) { 88 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive key_block"); 91 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: key_block", 92 key_block, key_block_len); 94 pos = key_block; 584 * tlsv1_client_get_keyblock_size - Get TLS key_block size 586 * Returns: Size of the key_block for the negotiated cipher suite or -1 on
|
tlsv1_server.c | 42 u8 key_block[TLS_MAX_KEY_BLOCK_LEN]; local 69 key_block, key_block_len)) { 70 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive key_block"); 73 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: key_block", 74 key_block, key_block_len); 76 pos = key_block; 525 * tlsv1_server_get_keyblock_size - Get TLS key_block size 527 * Returns: Size of the key_block for the negotiated cipher suite or -1 on
|
/external/wpa_supplicant/ |
tlsv1_client.c | 1080 u8 key_block[TLS_MAX_KEY_BLOCK_LEN]; local 1107 key_block, key_block_len)) { 1108 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive key_block"); 1111 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: key_block", 1112 key_block, key_block_len); 1114 pos = key_block; [all...] |
/external/openssl/include/openssl/ |
ssl3.h | 511 unsigned char *key_block; member in struct:ssl3_state_st::__anon9091
|
/external/openssl/ssl/ |
ssl3.h | 511 unsigned char *key_block; member in struct:ssl3_state_st::__anon9104
|