/external/wpa_supplicant_8/src/eap_common/ |
eap_fast_common.c | 69 const u8 *client_random, u8 *master_secret) 82 * master_secret = T-PRF(PAC-Key, "PAC to master secret label hash", 89 seed, sizeof(seed), master_secret, TLS_MASTER_SECRET_LEN); 91 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: master_secret", 92 master_secret, TLS_MASTER_SECRET_LEN); 128 wpa_hexdump_key(MSG_MSGDUMP, "EAP-FAST: master_secret for key "
|
eap_fast_common.h | 99 const u8 *client_random, u8 *master_secret);
|
/external/wpa_supplicant_8/src/tls/ |
tlsv1_client.h | 48 const u8 *server_random, u8 *master_secret);
|
tlsv1_client_i.h | 27 u8 master_secret[TLS_MASTER_SECRET_LEN]; member in struct:tlsv1_client
|
tlsv1_server.h | 42 const u8 *server_random, u8 *master_secret);
|
tlsv1_server_i.h | 28 u8 master_secret[TLS_MASTER_SECRET_LEN]; member in struct:tlsv1_server
|
tlsv1_client.c | 67 conn->master_secret, TLS_MASTER_SECRET_LEN)) { 69 "master_secret"); 72 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: master_secret", 73 conn->master_secret, TLS_MASTER_SECRET_LEN); 82 conn->master_secret, TLS_MASTER_SECRET_LEN, 541 conn->master_secret, TLS_MASTER_SECRET_LEN, 701 keys->master_key = conn->master_secret;
|
tlsv1_server.c | 74 conn->master_secret, TLS_MASTER_SECRET_LEN)) { 76 "master_secret"); 79 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: master_secret", 80 conn->master_secret, TLS_MASTER_SECRET_LEN); 88 conn->master_secret, TLS_MASTER_SECRET_LEN, 487 conn->master_secret, TLS_MASTER_SECRET_LEN, 588 keys->master_key = conn->master_secret;
|
tlsv1_client_read.c | 181 conn->master_secret); 954 conn->master_secret, TLS_MASTER_SECRET_LEN,
|
tlsv1_server_write.c | 105 conn->master_secret); 761 conn->master_secret, TLS_MASTER_SECRET_LEN,
|
tlsv1_client_write.c | 695 conn->master_secret, TLS_MASTER_SECRET_LEN,
|
tlsv1_server_read.c | 1127 conn->master_secret, TLS_MASTER_SECRET_LEN,
|
/external/apache-harmony/x-net/src/test/impl/java.injected/org/apache/harmony/xnet/provider/jsse/ |
HandshakeProtocolTest.java | 121 assertEquals(48, hs_protocol.session.master_secret.length); 165 assertEquals(48, hs_protocol.session.master_secret.length);
|
/external/chromium_org/net/third_party/nss/ssl/ |
derive.c | 174 * MD5(master_secret + SHA('A' + master_secret + 176 * MD5(master_secret + SHA('BB' + master_secret + 178 * MD5(master_secret + SHA('CCC' + master_secret +
|
ssl3con.c | [all...] |
ssl3ext.c | [all...] |
sslinfo.c | 396 if (!ss->ssl3.cwSpec->master_secret && !ss->ssl3.cwSpec->msItem.len) {
|
sslimpl.h | 598 PK11SymKey * master_secret; member in struct:__anon14336 1087 SSL3Opaque master_secret[48]; member in struct:SessionTicketStr [all...] |
/external/wpa_supplicant_8/src/crypto/ |
tls_gnutls.c | 26 * use of internal structures to get the master_secret and 58 opaque master_secret[WPA_TLS_MASTER_SIZE]; member in struct:__anon17273 133 /* Because of the horrible hack to get master_secret and client/server 765 keys->master_key = sec->master_secret; 774 /* No access to master_secret */
|
tls.h | 534 const u8 *server_random, u8 *master_secret);
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_fast.c | 76 u8 *master_secret) 83 master_secret == NULL) { 107 master_secret); [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_fast.c | 123 u8 *master_secret) 260 master_secret); [all...] |