HomeSort by relevance Sort by last modified time
    Searched full:master_secret (Results 1 - 25 of 42) sorted by null

1 2

  /external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
eap_fast_common.c 75 const u8 *client_random, u8 *master_secret)
88 * master_secret = T-PRF(PAC-Key, "PAC to master secret label hash",
95 seed, sizeof(seed), master_secret, TLS_MASTER_SECRET_LEN);
97 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: master_secret",
98 master_secret, TLS_MASTER_SECRET_LEN);
134 wpa_hexdump_key(MSG_MSGDUMP, "EAP-FAST: master_secret for key "
eap_fast_common.h 105 const u8 *client_random, u8 *master_secret);
  /external/wpa_supplicant_8/src/eap_common/
eap_fast_common.c 75 const u8 *client_random, u8 *master_secret)
88 * master_secret = T-PRF(PAC-Key, "PAC to master secret label hash",
95 seed, sizeof(seed), master_secret, TLS_MASTER_SECRET_LEN);
97 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: master_secret",
98 master_secret, TLS_MASTER_SECRET_LEN);
134 wpa_hexdump_key(MSG_MSGDUMP, "EAP-FAST: master_secret for key "
eap_fast_common.h 105 const u8 *client_random, u8 *master_secret);
  /libcore/luni/src/main/java/org/apache/harmony/xnet/provider/jsse/
HandshakeProtocol.java 356 PRF.computePRF(buf, session.master_secret,
395 md5.update(session.master_secret);
397 md5.update(session.master_secret);
403 sha.update(session.master_secret);
405 sha.update(session.master_secret);
453 session.master_secret = new byte[48];
456 PRF.computePRF(session.master_secret, preMasterSecret,
462 PRF.computePRF_SSLv3(session.master_secret, preMasterSecret, seed);
ConnectionStateSSLv3.java 97 PRF.computePRF_SSLv3(key_block, session.master_secret, seed);
151 logger.println("master_secret");
152 logger.print(session.master_secret);
ConnectionStateTLS.java 119 PRF.computePRF(key_block, session.master_secret,
169 logger.println("master_secret");
170 logger.print(session.master_secret);
SSLSessionImpl.java 52 byte[] master_secret; field in class:SSLSessionImpl
  /external/wpa_supplicant_6/wpa_supplicant/src/tls/
tlsv1_client.h 53 const u8 *server_random, u8 *master_secret);
tlsv1_server.h 48 const u8 *server_random, u8 *master_secret);
tlsv1_server_i.h 34 u8 master_secret[TLS_MASTER_SECRET_LEN]; member in struct:tlsv1_server
tlsv1_client_i.h 33 u8 master_secret[TLS_MASTER_SECRET_LEN]; member in struct:tlsv1_client
tlsv1_client.c 72 conn->master_secret, TLS_MASTER_SECRET_LEN)) {
74 "master_secret");
77 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: master_secret",
78 conn->master_secret, TLS_MASTER_SECRET_LEN);
85 if (tls_prf(conn->master_secret, TLS_MASTER_SECRET_LEN,
424 return tls_prf(conn->master_secret, TLS_MASTER_SECRET_LEN,
575 keys->master_key = conn->master_secret;
tlsv1_server.c 54 conn->master_secret, TLS_MASTER_SECRET_LEN)) {
56 "master_secret");
59 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: master_secret",
60 conn->master_secret, TLS_MASTER_SECRET_LEN);
67 if (tls_prf(conn->master_secret, TLS_MASTER_SECRET_LEN,
415 return tls_prf(conn->master_secret, TLS_MASTER_SECRET_LEN,
516 keys->master_key = conn->master_secret;
  /external/wpa_supplicant_8/src/tls/
tlsv1_client.h 54 const u8 *server_random, u8 *master_secret);
tlsv1_server.h 48 const u8 *server_random, u8 *master_secret);
tlsv1_server_i.h 34 u8 master_secret[TLS_MASTER_SECRET_LEN]; member in struct:tlsv1_server
tlsv1_client_i.h 33 u8 master_secret[TLS_MASTER_SECRET_LEN]; member in struct:tlsv1_client
tlsv1_client.c 72 conn->master_secret, TLS_MASTER_SECRET_LEN)) {
74 "master_secret");
77 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: master_secret",
78 conn->master_secret, TLS_MASTER_SECRET_LEN);
85 if (tls_prf(conn->master_secret, TLS_MASTER_SECRET_LEN,
424 return tls_prf(conn->master_secret, TLS_MASTER_SECRET_LEN,
575 keys->master_key = conn->master_secret;
tlsv1_server.c 54 conn->master_secret, TLS_MASTER_SECRET_LEN)) {
56 "master_secret");
59 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: master_secret",
60 conn->master_secret, TLS_MASTER_SECRET_LEN);
67 if (tls_prf(conn->master_secret, TLS_MASTER_SECRET_LEN,
415 return tls_prf(conn->master_secret, TLS_MASTER_SECRET_LEN,
516 keys->master_key = conn->master_secret;
  /external/wpa_supplicant/tests/
test_sha1.c 42 const u8 master_secret[] = { local
120 printf("- T-PRF (SHA1) test case / master_secret\n");
122 seed, sizeof(seed), buf, sizeof(master_secret));
123 if (memcmp(master_secret, buf, sizeof(master_secret)) != 0) {
129 tls_prf(master_secret, sizeof(master_secret), "key expansion",
  /external/apache-harmony/x-net/src/test/impl/java.injected/org/apache/harmony/xnet/provider/jsse/
HandshakeProtocolTest.java 122 assertEquals(48, hs_protocol.session.master_secret.length);
166 assertEquals(48, hs_protocol.session.master_secret.length);
  /external/wpa_supplicant_6/wpa_supplicant/tests/
test_sha1.c 42 const u8 master_secret[] = { local
131 printf("- T-PRF (SHA1) test case / master_secret\n");
133 seed, sizeof(seed), buf, sizeof(master_secret));
134 if (memcmp(master_secret, buf, sizeof(master_secret)) != 0) {
140 tls_prf(master_secret, sizeof(master_secret), "key expansion",
  /external/wpa_supplicant/
tlsv1_client.c 46 u8 master_secret[TLS_MASTER_SECRET_LEN]; member in struct:tlsv1_client
1038 if (tls_prf(conn->master_secret, TLS_MASTER_SECRET_LEN,
1092 conn->master_secret, TLS_MASTER_SECRET_LEN)) {
1094 "master_secret");
1097 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: master_secret",
1098 conn->master_secret, TLS_MASTER_SECRET_LEN);
1105 if (tls_prf(conn->master_secret, TLS_MASTER_SECRET_LEN,
    [all...]
tls_gnutls.c 44 * use of internal structures to get the master_secret and
76 opaque master_secret[TLS_MASTER_SIZE]; member in struct:__anon13944
167 /* Because of the horrible hack to get master_secret and client/server
803 keys->master_key = sec->master_secret;
812 /* No access to master_secret */
    [all...]

Completed in 675 milliseconds

1 2