HomeSort by relevance Sort by last modified time
    Searched refs:master_key (Results 1 - 25 of 48) sorted by null

1 2

  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
mschapv2.h 30 u8 *master_key);
mschapv2.c 48 u8 *master_key)
94 /* Generate master_key here since we have the needed data available. */
101 get_master_key(password_hash_hash, nt_response, master_key);
103 master_key, MSCHAPV2_MASTER_KEY_LEN);
eap_mschapv2.c 98 u8 master_key[MSCHAPV2_MASTER_KEY_LEN]; member in struct:eap_mschapv2_data
215 data->auth_response, data->master_key);
593 /* Likewise, generate master_key here since we have the needed data
597 get_master_key(password_hash_hash, cp->nt_response, data->master_key);
837 get_asymetric_start_key(data->master_key, key, MSCHAPV2_KEY_LEN, 1, 0);
838 get_asymetric_start_key(data->master_key, key + MSCHAPV2_KEY_LEN,
  /external/wpa_supplicant_8/src/eap_peer/
mschapv2.h 24 u8 *master_key);
mschapv2.c 42 u8 *master_key)
88 /* Generate master_key here since we have the needed data available. */
97 get_master_key(password_hash_hash, nt_response, master_key);
99 master_key, MSCHAPV2_MASTER_KEY_LEN);
eap_mschapv2.c 93 u8 master_key[MSCHAPV2_MASTER_KEY_LEN]; member in struct:eap_mschapv2_data
210 data->auth_response, data->master_key)) {
593 /* Likewise, generate master_key here since we have the needed data
597 get_master_key(password_hash_hash, cp->nt_response, data->master_key);
837 get_asymetric_start_key(data->master_key, key, MSCHAPV2_KEY_LEN, 1, 0);
838 get_asymetric_start_key(data->master_key, key + MSCHAPV2_KEY_LEN,
  /external/wpa_supplicant_6/wpa_supplicant/tests/
test_ms_funcs.c 50 u8 master_key[] = { local
104 if (memcmp(master_key, buf, sizeof(master_key)) != 0) {
109 get_asymetric_start_key(master_key, buf, sizeof(send_start_key), 1, 1);
  /external/wpa_supplicant_6/wpa_supplicant/src/crypto/
ms_funcs.h 46 u8 *master_key);
47 void get_asymetric_start_key(const u8 *master_key, u8 *session_key,
ms_funcs.c 259 * @master_key: 16-octet MasterKey (OUT)
262 u8 *master_key)
278 os_memcpy(master_key, hash, 16);
284 * @master_key: 16-octet MasterKey (IN)
290 void get_asymetric_start_key(const u8 *master_key, u8 *session_key,
333 addr[0] = master_key;
tls.h 21 const u8 *master_key; /* TLS master secret */ member in struct:tls_keys
  /external/wpa_supplicant_8/src/crypto/
ms_funcs.h 40 u8 *master_key);
41 int get_asymetric_start_key(const u8 *master_key, u8 *session_key,
ms_funcs.c 320 * @master_key: 16-octet MasterKey (OUT)
324 u8 *master_key)
341 os_memcpy(master_key, hash, 16);
348 * @master_key: 16-octet MasterKey (IN)
355 int get_asymetric_start_key(const u8 *master_key, u8 *session_key,
398 addr[0] = master_key;
tls.h 15 const u8 *master_key; /* TLS master secret */ member in struct:tls_keys
  /external/srtp/srtp/
ekt.c 167 const uint8_t *master_key; local
184 master_key = srtcp_packet_get_emk_location(srtcp_hdr, pkt_octet_len);
185 aes_decrypt_with_raw_key((void*)master_key, stream->ekt->data->ekt_dec_key);
  /external/openssl/ssl/
ssl_asn1.c 98 ASN1_OCTET_STRING master_key; member in struct:ssl_session_asn1_st
192 a.master_key.length=in->master_key_length;
193 a.master_key.type=V_ASN1_OCTET_STRING;
194 a.master_key.data=in->master_key;
289 M_ASN1_I2D_len(&(a.master_key), i2d_ASN1_OCTET_STRING);
335 M_ASN1_I2D_put(&(a.master_key), i2d_ASN1_OCTET_STRING);
458 memcpy(ret->master_key,os.data,ret->master_key_length);
s2_lib.c 467 s->session->master_key_length > (int)sizeof(s->session->master_key))
489 < (int)sizeof(s->session->master_key));
490 EVP_DigestUpdate(&ctx,s->session->master_key,s->session->master_key_length);
ssl_txt.c 164 if (BIO_printf(bp,"%02X",x->master_key[i]) <= 0) goto err;
tls_srp.c 343 int SRP_generate_server_master_secret(SSL *s,unsigned char *master_key)
360 ret = s->method->ssl3_enc->generate_master_secret(s,master_key,tmp,tmp_len);
373 int SRP_generate_client_master_secret(SSL *s,unsigned char *master_key)
392 ret = s->method->ssl3_enc->generate_master_secret(s,master_key,tmp,tmp_len);
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_mschapv2.c 58 u8 master_key[16]; member in struct:eap_mschapv2_data
412 get_master_key(pw_hash_hash, nt_response, data->master_key);
415 data->master_key, MSCHAPV2_KEY_LEN);
528 get_asymetric_start_key(data->master_key, key, MSCHAPV2_KEY_LEN, 0, 1);
529 get_asymetric_start_key(data->master_key, key + MSCHAPV2_KEY_LEN,
eap_tls_common.c 84 keys.master_key == NULL)
94 if (tls_prf(keys.master_key, keys.master_key_len,
  /external/wpa_supplicant_8/src/eap_server/
eap_server_mschapv2.c 53 u8 master_key[16]; member in struct:eap_mschapv2_data
416 get_master_key(pw_hash_hash, nt_response, data->master_key);
419 data->master_key, MSCHAPV2_KEY_LEN);
532 get_asymetric_start_key(data->master_key, key, MSCHAPV2_KEY_LEN, 0, 1);
533 get_asymetric_start_key(data->master_key, key + MSCHAPV2_KEY_LEN,
eap_server_tls_common.c 81 keys.master_key == NULL)
91 if (tls_prf_sha1_md5(keys.master_key, keys.master_key_len,
  /system/vold/
cryptfs.c 358 void convert_key_to_hex_ascii(unsigned char *master_key, unsigned int keysize,
366 nibble = (master_key[i] >> 4) & 0xf;
369 nibble = master_key[i] & 0xf;
378 static int create_crypto_blk_dev(struct crypt_mnt_ftr *crypt_ftr, unsigned char *master_key,
423 convert_key_to_hex_ascii(master_key, crypt_ftr->keysize, master_key_ascii);
558 static int create_encrypted_random_key(char *passwd, unsigned char *master_key, unsigned char *salt)
572 return encrypt_master_key(passwd, salt, key_buf, master_key);
1120 unsigned char master_key[KEY_LEN_BYTES], decrypted_master_key[KEY_LEN_BYTES]; local
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
eap_fast_common.c 135 "expansion", keys.master_key, keys.master_key_len);
136 if (tls_prf(keys.master_key, keys.master_key_len,
  /external/wpa_supplicant_8/src/eap_common/
eap_fast_common.c 129 "expansion", keys.master_key, keys.master_key_len);
130 if (tls_prf_sha1_md5(keys.master_key, keys.master_key_len,

Completed in 1143 milliseconds

1 2