HomeSort by relevance Sort by last modified time
    Searched defs:master_key (Results 1 - 10 of 10) sorted by null

  /external/boringssl/src/ssl/
t1_enc.cc 355 auto master_key = local
356 MakeConstSpan(session->master_key, session->master_key_length);
361 return ssl3_prf(out_span, master_key, label, ssl->s3->server_random,
366 return tls1_prf(digest, out_span, master_key, label, ssl->s3->server_random,
426 MakeConstSpan(session->master_key, session->master_key_length),
ssl_asn1.cc 215 !CBB_add_asn1_octet_string(&session, in->master_key,
567 CBS session_id, master_key; local
570 !CBS_get_asn1(&session, &master_key, CBS_ASN1_OCTETSTRING) ||
571 CBS_len(&master_key) > SSL_MAX_MASTER_KEY_LENGTH) {
577 OPENSSL_memcpy(ret->master_key, CBS_data(&master_key), CBS_len(&master_key));
578 ret->master_key_length = CBS_len(&master_key);
  /external/wpa_supplicant_8/src/eap_peer/
eap_mschapv2.c 93 u8 master_key[MSCHAPV2_MASTER_KEY_LEN]; member in struct:eap_mschapv2_data
208 data->auth_response, data->master_key)) {
612 /* Likewise, generate master_key here since we have the needed data
617 data->master_key)) {
859 get_asymetric_start_key(data->master_key, key, MSCHAPV2_KEY_LEN, 1, 0);
860 get_asymetric_start_key(data->master_key, key + MSCHAPV2_KEY_LEN,
eap_ttls.c 53 u8 master_key[MSCHAPV2_MASTER_KEY_LEN]; /* MSCHAPv2 master key */ member in struct:eap_ttls_data
544 data->master_key)) {
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_mschapv2.c 53 u8 master_key[16]; member in struct:eap_mschapv2_data
435 data->master_key)) {
441 data->master_key, MSCHAPV2_KEY_LEN);
554 get_asymetric_start_key(data->master_key, key, MSCHAPV2_KEY_LEN, 0, 1);
555 get_asymetric_start_key(data->master_key, key + MSCHAPV2_KEY_LEN,
  /system/vold/
cryptfs.h 71 #define CRYPT_TYPE_PASSWORD 0 /* master_key is encrypted with a password
74 #define CRYPT_TYPE_DEFAULT 1 /* master_key is encrypted with default
76 #define CRYPT_TYPE_PATTERN 2 /* master_key is encrypted with a pattern */
77 #define CRYPT_TYPE_PIN 3 /* master_key is encrypted with a pin */
106 __le32 crypt_type; /* how master_key is encrypted. Must be a
115 unsigned char master_key[MAX_KEY_LEN]; /* The encrypted key for decrypting the filesystem */ member in struct:crypt_mnt_ftr
  /external/wpa_supplicant_8/src/crypto/
crypto_module_tests.c 2076 u8 master_key[] = { local
    [all...]
tls_openssl.c 99 os_memcpy(out, session->master_key, outlen);
3483 unsigned char master_key[64]; local
    [all...]
  /external/curl/lib/vtls/
openssl.c 183 unsigned char master_key[SSL_MAX_MASTER_KEY_LENGTH]; member in struct:ssl_tap_state
256 unsigned char master_key[SSL_MAX_MASTER_KEY_LENGTH]; local
267 SSL_SESSION_get_master_key(session, master_key, SSL_MAX_MASTER_KEY_LENGTH);
271 memcpy(master_key, session->master_key, session->master_key_length);
281 !memcmp(state->master_key, master_key, master_key_length) &&
287 memcpy(state->master_key, master_key, master_key_length);
302 line[pos++] = hex[master_key[i] >> 4]
    [all...]
  /external/boringssl/src/include/openssl/
ssl.h 4139 uint8_t master_key[SSL_MAX_MASTER_KEY_LENGTH]; member in struct:ssl_session_st
    [all...]

Completed in 170 milliseconds