/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
eap_fast_common.c | 75 const u8 *client_random, u8 *master_secret) 88 * master_secret = T-PRF(PAC-Key, "PAC to master secret label hash", 95 seed, sizeof(seed), master_secret, TLS_MASTER_SECRET_LEN); 97 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: master_secret", 98 master_secret, TLS_MASTER_SECRET_LEN); 134 wpa_hexdump_key(MSG_MSGDUMP, "EAP-FAST: master_secret for key "
|
eap_fast_common.h | 105 const u8 *client_random, u8 *master_secret);
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_fast_common.c | 69 const u8 *client_random, u8 *master_secret) 82 * master_secret = T-PRF(PAC-Key, "PAC to master secret label hash", 89 seed, sizeof(seed), master_secret, TLS_MASTER_SECRET_LEN); 91 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: master_secret", 92 master_secret, TLS_MASTER_SECRET_LEN); 128 wpa_hexdump_key(MSG_MSGDUMP, "EAP-FAST: master_secret for key "
|
eap_fast_common.h | 99 const u8 *client_random, u8 *master_secret);
|
/libcore/luni/src/main/java/org/apache/harmony/xnet/provider/jsse/ |
HandshakeProtocol.java | 356 PRF.computePRF(buf, session.master_secret, 395 md5.update(session.master_secret); 397 md5.update(session.master_secret); 403 sha.update(session.master_secret); 405 sha.update(session.master_secret); 453 session.master_secret = new byte[48]; 456 PRF.computePRF(session.master_secret, preMasterSecret, 462 PRF.computePRF_SSLv3(session.master_secret, preMasterSecret, seed);
|
ConnectionStateSSLv3.java | 97 PRF.computePRF_SSLv3(key_block, session.master_secret, seed); 151 logger.println("master_secret"); 152 logger.print(session.master_secret);
|
ConnectionStateTLS.java | 119 PRF.computePRF(key_block, session.master_secret, 169 logger.println("master_secret"); 170 logger.print(session.master_secret);
|
SSLSessionImpl.java | 52 byte[] master_secret; field in class:SSLSessionImpl
|
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
tlsv1_client.h | 53 const u8 *server_random, u8 *master_secret);
|
tlsv1_server.h | 48 const u8 *server_random, u8 *master_secret);
|
tlsv1_server_i.h | 34 u8 master_secret[TLS_MASTER_SECRET_LEN]; member in struct:tlsv1_server
|
tlsv1_client_i.h | 33 u8 master_secret[TLS_MASTER_SECRET_LEN]; member in struct:tlsv1_client
|
tlsv1_client.c | 72 conn->master_secret, TLS_MASTER_SECRET_LEN)) { 74 "master_secret"); 77 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: master_secret", 78 conn->master_secret, TLS_MASTER_SECRET_LEN); 85 if (tls_prf(conn->master_secret, TLS_MASTER_SECRET_LEN, 424 return tls_prf(conn->master_secret, TLS_MASTER_SECRET_LEN, 575 keys->master_key = conn->master_secret;
|
tlsv1_server.c | 54 conn->master_secret, TLS_MASTER_SECRET_LEN)) { 56 "master_secret"); 59 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: master_secret", 60 conn->master_secret, TLS_MASTER_SECRET_LEN); 67 if (tls_prf(conn->master_secret, TLS_MASTER_SECRET_LEN, 415 return tls_prf(conn->master_secret, TLS_MASTER_SECRET_LEN, 516 keys->master_key = conn->master_secret;
|
tlsv1_client_read.c | 180 conn->master_secret); 840 if (tls_prf(conn->master_secret, TLS_MASTER_SECRET_LEN,
|
/external/wpa_supplicant_8/src/tls/ |
tlsv1_client.h | 48 const u8 *server_random, u8 *master_secret);
|
tlsv1_client_i.h | 27 u8 master_secret[TLS_MASTER_SECRET_LEN]; member in struct:tlsv1_client
|
tlsv1_server.h | 42 const u8 *server_random, u8 *master_secret);
|
tlsv1_server_i.h | 28 u8 master_secret[TLS_MASTER_SECRET_LEN]; member in struct:tlsv1_server
|
tlsv1_server.c | 49 conn->master_secret, TLS_MASTER_SECRET_LEN)) { 51 "master_secret"); 54 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: master_secret", 55 conn->master_secret, TLS_MASTER_SECRET_LEN); 63 conn->master_secret, TLS_MASTER_SECRET_LEN, 449 conn->master_secret, TLS_MASTER_SECRET_LEN, 550 keys->master_key = conn->master_secret;
|
tlsv1_client.c | 67 conn->master_secret, TLS_MASTER_SECRET_LEN)) { 69 "master_secret"); 72 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: master_secret", 73 conn->master_secret, TLS_MASTER_SECRET_LEN); 82 conn->master_secret, TLS_MASTER_SECRET_LEN, 538 conn->master_secret, TLS_MASTER_SECRET_LEN, 698 keys->master_key = conn->master_secret;
|
/external/apache-harmony/x-net/src/test/impl/java.injected/org/apache/harmony/xnet/provider/jsse/ |
HandshakeProtocolTest.java | 122 assertEquals(48, hs_protocol.session.master_secret.length); 166 assertEquals(48, hs_protocol.session.master_secret.length);
|
/external/wpa_supplicant_6/wpa_supplicant/tests/ |
test_sha1.c | 42 const u8 master_secret[] = { local 131 printf("- T-PRF (SHA1) test case / master_secret\n"); 133 seed, sizeof(seed), buf, sizeof(master_secret)); 134 if (memcmp(master_secret, buf, sizeof(master_secret)) != 0) { 140 tls_prf(master_secret, sizeof(master_secret), "key expansion",
|
/external/wpa_supplicant_8/src/crypto/ |
tls_gnutls.c | 26 * use of internal structures to get the master_secret and 58 opaque master_secret[WPA_TLS_MASTER_SIZE]; member in struct:__anon15597 135 /* Because of the horrible hack to get master_secret and client/server 767 keys->master_key = sec->master_secret; 776 /* No access to master_secret */
|
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
tls_gnutls.c | 48 * use of internal structures to get the master_secret and 80 opaque master_secret[TLS_MASTER_SIZE]; member in struct:__anon15378 171 /* Because of the horrible hack to get master_secret and client/server 831 keys->master_key = sec->master_secret; 840 /* No access to master_secret */ [all...] |