/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
mschapv2.c | 48 u8 *master_key) 94 /* Generate master_key here since we have the needed data available. */ 101 get_master_key(password_hash_hash, nt_response, master_key); 103 master_key, MSCHAPV2_MASTER_KEY_LEN);
|
mschapv2.h | 30 u8 *master_key);
|
eap_mschapv2.c | 98 u8 master_key[MSCHAPV2_MASTER_KEY_LEN]; member in struct:eap_mschapv2_data 215 data->auth_response, data->master_key); 593 /* Likewise, generate master_key here since we have the needed data 597 get_master_key(password_hash_hash, cp->nt_response, data->master_key); 837 get_asymetric_start_key(data->master_key, key, MSCHAPV2_KEY_LEN, 1, 0); 838 get_asymetric_start_key(data->master_key, key + MSCHAPV2_KEY_LEN,
|
/external/wpa_supplicant_8/src/eap_peer/ |
mschapv2.c | 42 u8 *master_key) 88 /* Generate master_key here since we have the needed data available. */ 97 get_master_key(password_hash_hash, nt_response, master_key); 99 master_key, MSCHAPV2_MASTER_KEY_LEN);
|
mschapv2.h | 24 u8 *master_key);
|
eap_mschapv2.c | 93 u8 master_key[MSCHAPV2_MASTER_KEY_LEN]; member in struct:eap_mschapv2_data 210 data->auth_response, data->master_key)) { 593 /* Likewise, generate master_key here since we have the needed data 597 get_master_key(password_hash_hash, cp->nt_response, data->master_key); 837 get_asymetric_start_key(data->master_key, key, MSCHAPV2_KEY_LEN, 1, 0); 838 get_asymetric_start_key(data->master_key, key + MSCHAPV2_KEY_LEN,
|
/external/wpa_supplicant_8/src/crypto/ |
ms_funcs.h | 40 u8 *master_key); 41 int get_asymetric_start_key(const u8 *master_key, u8 *session_key,
|
ms_funcs.c | 320 * @master_key: 16-octet MasterKey (OUT) 324 u8 *master_key) 341 os_memcpy(master_key, hash, 16); 348 * @master_key: 16-octet MasterKey (IN) 355 int get_asymetric_start_key(const u8 *master_key, u8 *session_key, 398 addr[0] = master_key;
|
/external/wpa_supplicant_6/wpa_supplicant/tests/ |
test_ms_funcs.c | 50 u8 master_key[] = { local 104 if (memcmp(master_key, buf, sizeof(master_key)) != 0) { 109 get_asymetric_start_key(master_key, buf, sizeof(send_start_key), 1, 1);
|
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
ms_funcs.h | 46 u8 *master_key); 47 void get_asymetric_start_key(const u8 *master_key, u8 *session_key,
|
ms_funcs.c | 259 * @master_key: 16-octet MasterKey (OUT) 262 u8 *master_key) 278 os_memcpy(master_key, hash, 16); 284 * @master_key: 16-octet MasterKey (IN) 290 void get_asymetric_start_key(const u8 *master_key, u8 *session_key, 333 addr[0] = master_key;
|
/external/srtp/srtp/ |
ekt.c | 167 const uint8_t *master_key; local 184 master_key = srtcp_packet_get_emk_location(srtcp_hdr, pkt_octet_len); 185 aes_decrypt_with_raw_key((void*)master_key, stream->ekt->data->ekt_dec_key);
|
/external/openssl/ssl/ |
ssl_asn1.c | 98 ASN1_OCTET_STRING master_key; member in struct:ssl_session_asn1_st 192 a.master_key.length=in->master_key_length; 193 a.master_key.type=V_ASN1_OCTET_STRING; 194 a.master_key.data=in->master_key; 289 M_ASN1_I2D_len(&(a.master_key), i2d_ASN1_OCTET_STRING); 335 M_ASN1_I2D_put(&(a.master_key), i2d_ASN1_OCTET_STRING); 458 memcpy(ret->master_key,os.data,ret->master_key_length);
|
s2_lib.c | 467 s->session->master_key_length > (int)sizeof(s->session->master_key)) 489 < (int)sizeof(s->session->master_key)); 490 EVP_DigestUpdate(&ctx,s->session->master_key,s->session->master_key_length);
|
t1_enc.c | 303 s->session->master_key,s->session->master_key_length, 306 printf("tls1_generate_key_block() ==> %d byte master_key =\n\t", 312 printf("%02X", s->session->master_key[i]); 631 { int z; for (z=0; z<s->session->master_key_length; z++) printf("%02X%c",s->session->master_key[z],((z+1)%16)?' ':'\n'); } 977 s->session->master_key,s->session->master_key_length, 1109 s->session->master_key,buff,sizeof buff); 1118 BIO_dump_fp(stderr, (char *)s->session->master_key, SSL3_MASTER_SECRET_SIZE); [all...] |
tls_srp.c | 343 int SRP_generate_server_master_secret(SSL *s,unsigned char *master_key) 360 ret = s->method->ssl3_enc->generate_master_secret(s,master_key,tmp,tmp_len); 373 int SRP_generate_client_master_secret(SSL *s,unsigned char *master_key) 392 ret = s->method->ssl3_enc->generate_master_secret(s,master_key,tmp,tmp_len);
|
s2_clnt.c | 656 if (i > (int)sizeof(sess->master_key)) 662 if (RAND_bytes(sess->master_key,i) <= 0) 684 memcpy(d,sess->master_key,(unsigned int)clear); 688 &(sess->master_key[clear]),d, 699 sess->master_key[clear]++;
|
/external/srtp/googlepatches/ |
vidyo-1-srtp-win.patch | 104 - uint8_t *master_key; 105 + const uint8_t *master_key; 112 master_key = srtcp_packet_get_emk_location(srtcp_hdr, pkt_octet_len); 113 - aes_decrypt_with_raw_key(master_key, stream->ekt->data->ekt_dec_key); 114 + aes_decrypt_with_raw_key((void*)master_key, stream->ekt->data->ekt_dec_key);
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_mschapv2.c | 58 u8 master_key[16]; member in struct:eap_mschapv2_data 412 get_master_key(pw_hash_hash, nt_response, data->master_key); 415 data->master_key, MSCHAPV2_KEY_LEN); 528 get_asymetric_start_key(data->master_key, key, MSCHAPV2_KEY_LEN, 0, 1); 529 get_asymetric_start_key(data->master_key, key + MSCHAPV2_KEY_LEN,
|
eap_tls_common.c | 84 keys.master_key == NULL) 94 if (tls_prf(keys.master_key, keys.master_key_len,
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_mschapv2.c | 53 u8 master_key[16]; member in struct:eap_mschapv2_data 416 get_master_key(pw_hash_hash, nt_response, data->master_key); 419 data->master_key, MSCHAPV2_KEY_LEN); 532 get_asymetric_start_key(data->master_key, key, MSCHAPV2_KEY_LEN, 0, 1); 533 get_asymetric_start_key(data->master_key, key + MSCHAPV2_KEY_LEN,
|
eap_server_tls_common.c | 81 keys.master_key == NULL) 91 if (tls_prf_sha1_md5(keys.master_key, keys.master_key_len,
|
/system/vold/ |
cryptfs.c | 358 void convert_key_to_hex_ascii(unsigned char *master_key, unsigned int keysize, 366 nibble = (master_key[i] >> 4) & 0xf; 369 nibble = master_key[i] & 0xf; 378 static int create_crypto_blk_dev(struct crypt_mnt_ftr *crypt_ftr, unsigned char *master_key, 423 convert_key_to_hex_ascii(master_key, crypt_ftr->keysize, master_key_ascii); 558 static int create_encrypted_random_key(char *passwd, unsigned char *master_key, unsigned char *salt) 572 return encrypt_master_key(passwd, salt, key_buf, master_key); 1120 unsigned char master_key[KEY_LEN_BYTES], decrypted_master_key[KEY_LEN_BYTES]; local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
eap_fast_common.c | 135 "expansion", keys.master_key, keys.master_key_len); 136 if (tls_prf(keys.master_key, keys.master_key_len,
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_fast_common.c | 129 "expansion", keys.master_key, keys.master_key_len); 130 if (tls_prf_sha1_md5(keys.master_key, keys.master_key_len,
|