HomeSort by relevance Sort by last modified time
    Searched refs:master_secret (Results 1 - 21 of 21) sorted by null

  /libcore/luni/src/main/java/org/apache/harmony/xnet/provider/jsse/
HandshakeProtocol.java 356 PRF.computePRF(buf, session.master_secret,
395 md5.update(session.master_secret);
397 md5.update(session.master_secret);
403 sha.update(session.master_secret);
405 sha.update(session.master_secret);
453 session.master_secret = new byte[48];
456 PRF.computePRF(session.master_secret, preMasterSecret,
462 PRF.computePRF_SSLv3(session.master_secret, preMasterSecret, seed);
ConnectionStateSSLv3.java 97 PRF.computePRF_SSLv3(key_block, session.master_secret, seed);
151 logger.println("master_secret");
152 logger.print(session.master_secret);
ConnectionStateTLS.java 119 PRF.computePRF(key_block, session.master_secret,
169 logger.println("master_secret");
170 logger.print(session.master_secret);
SSLSessionImpl.java 52 byte[] master_secret; field in class:SSLSessionImpl
  /external/wpa_supplicant_8/src/eap_common/
eap_fast_common.h 99 const u8 *client_random, u8 *master_secret);
eap_fast_common.c 69 const u8 *client_random, u8 *master_secret)
82 * master_secret = T-PRF(PAC-Key, "PAC to master secret label hash",
89 seed, sizeof(seed), master_secret, TLS_MASTER_SECRET_LEN);
91 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: master_secret",
92 master_secret, TLS_MASTER_SECRET_LEN);
128 wpa_hexdump_key(MSG_MSGDUMP, "EAP-FAST: master_secret for key "
  /external/wpa_supplicant_8/src/tls/
tlsv1_client.h 48 const u8 *server_random, u8 *master_secret);
tlsv1_server.h 42 const u8 *server_random, u8 *master_secret);
tlsv1_server_i.h 28 u8 master_secret[TLS_MASTER_SECRET_LEN]; member in struct:tlsv1_server
tlsv1_client_i.h 27 u8 master_secret[TLS_MASTER_SECRET_LEN]; member in struct:tlsv1_client
tlsv1_server.c 49 conn->master_secret, TLS_MASTER_SECRET_LEN)) {
51 "master_secret");
54 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: master_secret",
55 conn->master_secret, TLS_MASTER_SECRET_LEN);
63 conn->master_secret, TLS_MASTER_SECRET_LEN,
447 conn->master_secret, TLS_MASTER_SECRET_LEN,
548 keys->master_key = conn->master_secret;
tlsv1_client.c 67 conn->master_secret, TLS_MASTER_SECRET_LEN)) {
69 "master_secret");
72 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: master_secret",
73 conn->master_secret, TLS_MASTER_SECRET_LEN);
82 conn->master_secret, TLS_MASTER_SECRET_LEN,
536 conn->master_secret, TLS_MASTER_SECRET_LEN,
696 keys->master_key = conn->master_secret;
tlsv1_server_write.c 105 conn->master_secret);
628 conn->master_secret, TLS_MASTER_SECRET_LEN,
tlsv1_client_read.c 181 conn->master_secret);
863 conn->master_secret, TLS_MASTER_SECRET_LEN,
tlsv1_client_write.c 695 conn->master_secret, TLS_MASTER_SECRET_LEN,
tlsv1_server_read.c 1166 conn->master_secret, TLS_MASTER_SECRET_LEN,
  /external/apache-harmony/x-net/src/test/impl/java.injected/org/apache/harmony/xnet/provider/jsse/
HandshakeProtocolTest.java 122 assertEquals(48, hs_protocol.session.master_secret.length);
166 assertEquals(48, hs_protocol.session.master_secret.length);
  /external/wpa_supplicant_8/src/crypto/
tls.h 523 const u8 *server_random, u8 *master_secret);
tls_gnutls.c 26 * use of internal structures to get the master_secret and
58 opaque master_secret[WPA_TLS_MASTER_SIZE]; member in struct:__anon18451
135 /* Because of the horrible hack to get master_secret and client/server
767 keys->master_key = sec->master_secret;
776 /* No access to master_secret */
  /external/wpa_supplicant_8/src/eap_peer/
eap_fast.c 76 u8 *master_secret)
83 master_secret == NULL) {
107 master_secret);
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_fast.c 123 u8 *master_secret)
259 master_secret);
    [all...]

Completed in 151 milliseconds