/external/chromium_org/net/third_party/nss/ssl/ |
derive.c | 75 unsigned char * key_block = pwSpec->key_block; local 158 keyblk.data = key_block; 173 /* key_block = 197 MD5_End(md5Ctx, key_block + made, &outLen, MD5_LENGTH); 204 PORT_Assert(block_bytes <= sizeof pwSpec->key_block); 205 PRINT_BUF(100, (NULL, "key block", key_block, block_bytes)); 210 key_block2 = key_block + block_bytes; 214 * The key_block is partitioned as follows: 217 buildSSLKey(&key_block[i],macSize, &pwSpec->client.write_mac_key_item, 442 unsigned char * key_block = pwSpec->key_block; local [all...] |
sslimpl.h | 578 unsigned char key_block[NUM_MIXERS * MD5_LENGTH]; member in struct:__anon11524 [all...] |
/libcore/crypto/src/main/java/org/conscrypt/ |
ConnectionStateSSLv3.java | 91 byte[] key_block = new byte[2*hash_size + 2*key_size + 2*iv_size]; 97 PRF.computePRF_SSLv3(key_block, session.master_secret, seed); 106 System.arraycopy(key_block, 0, client_mac_secret, 0, hash_size); 107 System.arraycopy(key_block, hash_size, 109 System.arraycopy(key_block, 2*hash_size, client_key, 0, key_size); 110 System.arraycopy(key_block, 2*hash_size+key_size, 143 clientIV = new IvParameterSpec(key_block, 145 serverIV = new IvParameterSpec(key_block, 157 //logger.println("key_block"); 158 //logger.print(key_block); [all...] |
ConnectionStateTLS.java | 113 byte[] key_block = new byte[2*hash_size + 2*key_size + 2*iv_size]; 119 PRF.computePRF(key_block, session.master_secret, 129 System.arraycopy(key_block, 0, client_mac_secret, 0, hash_size); 130 System.arraycopy(key_block, hash_size, 132 System.arraycopy(key_block, 2*hash_size, client_key, 0, key_size); 133 System.arraycopy(key_block, 2*hash_size+key_size, 161 clientIV = new IvParameterSpec(key_block, 163 serverIV = new IvParameterSpec(key_block, 175 //logger.println("key_block"); 176 //logger.print(key_block); [all...] |
/external/wpa_supplicant_8/src/tls/ |
tlsv1_server.c | 36 u8 key_block[TLS_MAX_KEY_BLOCK_LEN]; local 65 key_block, key_block_len)) { 66 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive key_block"); 69 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: key_block", 70 key_block, key_block_len); 72 pos = key_block; 557 * tlsv1_server_get_keyblock_size - Get TLS key_block size 559 * Returns: Size of the key_block for the negotiated cipher suite or -1 on
|
tlsv1_client.c | 54 u8 key_block[TLS_MAX_KEY_BLOCK_LEN]; local 84 key_block, key_block_len)) { 85 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive key_block"); 88 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: key_block", 89 key_block, key_block_len); 91 pos = key_block; 705 * tlsv1_client_get_keyblock_size - Get TLS key_block size 707 * Returns: Size of the key_block for the negotiated cipher suite or -1 on
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_fast_common.h | 70 /* Extra key material after TLS key_block */
|
/external/chromium_org/third_party/openssl/openssl/ssl/ |
s3_enc.c | 316 p=s->s3->tmp.key_block; 427 s->s3->tmp.key_block=p; 459 if (s->s3->tmp.key_block != NULL) 461 OPENSSL_cleanse(s->s3->tmp.key_block, 463 OPENSSL_free(s->s3->tmp.key_block); 464 s->s3->tmp.key_block=NULL;
|
t1_enc.c | 364 printf("%02x", s->s3->tmp.key_block[i]); printf("\n"); 452 p=s->s3->tmp.key_block; 617 s->s3->tmp.key_block=p1; [all...] |
ssl3.h | 517 unsigned char *key_block; member in struct:ssl3_state_st::__anon15670
|
s3_pkt.c | [all...] |
/external/openssl/ssl/ |
s3_enc.c | 316 p=s->s3->tmp.key_block; 427 s->s3->tmp.key_block=p; 459 if (s->s3->tmp.key_block != NULL) 461 OPENSSL_cleanse(s->s3->tmp.key_block, 463 OPENSSL_free(s->s3->tmp.key_block); 464 s->s3->tmp.key_block=NULL;
|
t1_enc.c | 364 printf("%02x", s->s3->tmp.key_block[i]); printf("\n"); 452 p=s->s3->tmp.key_block; 617 s->s3->tmp.key_block=p1; [all...] |
ssl3.h | 517 unsigned char *key_block; member in struct:ssl3_state_st::__anon26139
|
s3_pkt.c | [all...] |
/external/wpa_supplicant_8/src/crypto/ |
tls.h | 510 * tls_connection_get_keyblock_size - Get TLS key_block size 513 * Returns: Size of the key_block for the negotiated cipher suite or -1 on
|
/external/chromium_org/third_party/openssl/openssl/include/openssl/ |
ssl3.h | 517 unsigned char *key_block; member in struct:ssl3_state_st::__anon15656
|
/external/openssl/include/openssl/ |
ssl3.h | 517 unsigned char *key_block; member in struct:ssl3_state_st::__anon26125
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_fast.c | 264 * Extra key material after TLS key_block: session_key_seed[40] [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_fast.c | 273 * Extra key material after TLS key_block: session_key_seed[40] [all...] |
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/lib2to3/tests/data/ |
infinite_recursion.py | [all...] |
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/lib2to3/tests/data/ |
infinite_recursion.py | [all...] |