/external/boringssl/src/ssl/ |
t1_enc.cc | 355 auto master_key = local 356 MakeConstSpan(session->master_key, session->master_key_length); 361 return ssl3_prf(out_span, master_key, label, ssl->s3->server_random, 366 return tls1_prf(digest, out_span, master_key, label, ssl->s3->server_random, 426 MakeConstSpan(session->master_key, session->master_key_length),
|
ssl_asn1.cc | 215 !CBB_add_asn1_octet_string(&session, in->master_key, 567 CBS session_id, master_key; local 570 !CBS_get_asn1(&session, &master_key, CBS_ASN1_OCTETSTRING) || 571 CBS_len(&master_key) > SSL_MAX_MASTER_KEY_LENGTH) { 577 OPENSSL_memcpy(ret->master_key, CBS_data(&master_key), CBS_len(&master_key)); 578 ret->master_key_length = CBS_len(&master_key);
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_mschapv2.c | 93 u8 master_key[MSCHAPV2_MASTER_KEY_LEN]; member in struct:eap_mschapv2_data 208 data->auth_response, data->master_key)) { 612 /* Likewise, generate master_key here since we have the needed data 617 data->master_key)) { 859 get_asymetric_start_key(data->master_key, key, MSCHAPV2_KEY_LEN, 1, 0); 860 get_asymetric_start_key(data->master_key, key + MSCHAPV2_KEY_LEN,
|
eap_ttls.c | 53 u8 master_key[MSCHAPV2_MASTER_KEY_LEN]; /* MSCHAPv2 master key */ member in struct:eap_ttls_data 544 data->master_key)) { [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_mschapv2.c | 53 u8 master_key[16]; member in struct:eap_mschapv2_data 435 data->master_key)) { 441 data->master_key, MSCHAPV2_KEY_LEN); 554 get_asymetric_start_key(data->master_key, key, MSCHAPV2_KEY_LEN, 0, 1); 555 get_asymetric_start_key(data->master_key, key + MSCHAPV2_KEY_LEN,
|
/system/vold/ |
cryptfs.h | 71 #define CRYPT_TYPE_PASSWORD 0 /* master_key is encrypted with a password 74 #define CRYPT_TYPE_DEFAULT 1 /* master_key is encrypted with default 76 #define CRYPT_TYPE_PATTERN 2 /* master_key is encrypted with a pattern */ 77 #define CRYPT_TYPE_PIN 3 /* master_key is encrypted with a pin */ 106 __le32 crypt_type; /* how master_key is encrypted. Must be a 115 unsigned char master_key[MAX_KEY_LEN]; /* The encrypted key for decrypting the filesystem */ member in struct:crypt_mnt_ftr
|
/external/wpa_supplicant_8/src/crypto/ |
crypto_module_tests.c | 2076 u8 master_key[] = { local [all...] |
tls_openssl.c | 99 os_memcpy(out, session->master_key, outlen); 3483 unsigned char master_key[64]; local [all...] |
/external/curl/lib/vtls/ |
openssl.c | 183 unsigned char master_key[SSL_MAX_MASTER_KEY_LENGTH]; member in struct:ssl_tap_state 256 unsigned char master_key[SSL_MAX_MASTER_KEY_LENGTH]; local 267 SSL_SESSION_get_master_key(session, master_key, SSL_MAX_MASTER_KEY_LENGTH); 271 memcpy(master_key, session->master_key, session->master_key_length); 281 !memcmp(state->master_key, master_key, master_key_length) && 287 memcpy(state->master_key, master_key, master_key_length); 302 line[pos++] = hex[master_key[i] >> 4] [all...] |
/external/boringssl/src/include/openssl/ |
ssl.h | 4139 uint8_t master_key[SSL_MAX_MASTER_KEY_LENGTH]; member in struct:ssl_session_st [all...] |