/libcore/luni/src/main/java/org/apache/harmony/xnet/provider/jsse/ |
ConnectionStateSSLv3.java | 91 byte[] key_block = new byte[2*hash_size + 2*key_size + 2*iv_size]; 97 PRF.computePRF_SSLv3(key_block, session.master_secret, seed); 106 System.arraycopy(key_block, 0, client_mac_secret, 0, hash_size); 107 System.arraycopy(key_block, hash_size, 109 System.arraycopy(key_block, 2*hash_size, client_key, 0, key_size); 110 System.arraycopy(key_block, 2*hash_size+key_size, 143 clientIV = new IvParameterSpec(key_block, 145 serverIV = new IvParameterSpec(key_block, 157 //logger.println("key_block"); 158 //logger.print(key_block); [all...] |
ConnectionStateTLS.java | 113 byte[] key_block = new byte[2*hash_size + 2*key_size + 2*iv_size]; 119 PRF.computePRF(key_block, session.master_secret, 129 System.arraycopy(key_block, 0, client_mac_secret, 0, hash_size); 130 System.arraycopy(key_block, hash_size, 132 System.arraycopy(key_block, 2*hash_size, client_key, 0, key_size); 133 System.arraycopy(key_block, 2*hash_size+key_size, 161 clientIV = new IvParameterSpec(key_block, 163 serverIV = new IvParameterSpec(key_block, 175 //logger.println("key_block"); 176 //logger.print(key_block); [all...] |
/external/wpa_supplicant_8/src/tls/ |
tlsv1_server.c | 36 u8 key_block[TLS_MAX_KEY_BLOCK_LEN]; local 65 key_block, key_block_len)) { 66 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive key_block"); 69 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: key_block", 70 key_block, key_block_len); 72 pos = key_block; 557 * tlsv1_server_get_keyblock_size - Get TLS key_block size 559 * Returns: Size of the key_block for the negotiated cipher suite or -1 on
|
tlsv1_client.c | 54 u8 key_block[TLS_MAX_KEY_BLOCK_LEN]; local 84 key_block, key_block_len)) { 85 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive key_block"); 88 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: key_block", 89 key_block, key_block_len); 91 pos = key_block; 705 * tlsv1_client_get_keyblock_size - Get TLS key_block size 707 * Returns: Size of the key_block for the negotiated cipher suite or -1 on
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_fast_common.h | 70 /* Extra key material after TLS key_block */
|
/external/openssl/ssl/ |
s3_enc.c | 316 p=s->s3->tmp.key_block; 427 s->s3->tmp.key_block=p; 459 if (s->s3->tmp.key_block != NULL) 461 OPENSSL_cleanse(s->s3->tmp.key_block, 463 OPENSSL_free(s->s3->tmp.key_block); 464 s->s3->tmp.key_block=NULL;
|
t1_enc.c | 364 printf("%02x", s->s3->tmp.key_block[i]); printf("\n"); 452 p=s->s3->tmp.key_block; 617 s->s3->tmp.key_block=p1; [all...] |
ssl3.h | 517 unsigned char *key_block; member in struct:ssl3_state_st::__anon12731
|
s3_pkt.c | [all...] |
/external/wpa_supplicant_8/src/crypto/ |
tls.h | 505 * tls_connection_get_keyblock_size - Get TLS key_block size 508 * Returns: Size of the key_block for the negotiated cipher suite or -1 on
|
/external/openssl/include/openssl/ |
ssl3.h | 517 unsigned char *key_block; member in struct:ssl3_state_st::__anon12717
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_fast.c | 264 * Extra key material after TLS key_block: session_key_seed[40] [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_fast.c | 273 * Extra key material after TLS key_block: session_key_seed[40] [all...] |