/third_party/mbedtls/programs/ssl/ |
D | ssl_test_common_source.c | 40 if( secret_len != sizeof( keys->master_secret ) ) in eap_tls_key_derivation() 43 memcpy( keys->master_secret, secret, sizeof( keys->master_secret ) ); in eap_tls_key_derivation() 132 if( secret_len != sizeof( keys->master_secret ) ) in dtls_srtp_key_derivation() 135 memcpy( keys->master_secret, secret, sizeof( keys->master_secret ) ); in dtls_srtp_key_derivation()
|
D | ssl_test_lib.h | 100 unsigned char master_secret[48]; member 116 unsigned char master_secret[48]; member
|
/third_party/openssl/test/ |
D | bad_dtls_test.c | 52 static unsigned char master_secret[48]; variable 74 EVP_PKEY_CTX_set1_tls1_prf_secret(pctx, master_secret, sizeof(master_secret)); in do_PRF() 109 memcpy(session_asn1 + SS_SECRET_OFS, master_secret, sizeof(master_secret)); in client_session() 457 RAND_bytes(master_secret, sizeof(master_secret)); in test_bad_dtls()
|
D | tls13secretstest.c | 98 static unsigned char master_secret[] = { variable 354 master_secret, sizeof(master_secret))) { in test_handshake_secrets()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
D | eap_fast_common.c | 69 const u8 *client_random, u8 *master_secret) in eap_fast_derive_master_secret() argument 89 seed, sizeof(seed), master_secret, TLS_MASTER_SECRET_LEN); in eap_fast_derive_master_secret() 92 master_secret, TLS_MASTER_SECRET_LEN); in eap_fast_derive_master_secret()
|
D | eap_fast_common.h | 99 const u8 *client_random, u8 *master_secret);
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
D | eap_fast_common.c | 69 const u8 *client_random, u8 *master_secret) in eap_fast_derive_master_secret() argument 89 seed, sizeof(seed), master_secret, TLS_MASTER_SECRET_LEN); in eap_fast_derive_master_secret() 92 master_secret, TLS_MASTER_SECRET_LEN); in eap_fast_derive_master_secret()
|
D | eap_fast_common.h | 99 const u8 *client_random, u8 *master_secret);
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/ |
D | tlsv1_server.c | 74 conn->master_secret, TLS_MASTER_SECRET_LEN)) { in tlsv1_server_derive_keys() 80 conn->master_secret, TLS_MASTER_SECRET_LEN); in tlsv1_server_derive_keys() 88 conn->master_secret, TLS_MASTER_SECRET_LEN, in tlsv1_server_derive_keys() 512 conn->master_secret, TLS_MASTER_SECRET_LEN, in tlsv1_server_prf()
|
D | tlsv1_client.c | 92 conn->master_secret, TLS_MASTER_SECRET_LEN)) { in tls_derive_keys() 98 conn->master_secret, TLS_MASTER_SECRET_LEN); in tls_derive_keys() 107 conn->master_secret, TLS_MASTER_SECRET_LEN, in tls_derive_keys() 588 conn->master_secret, TLS_MASTER_SECRET_LEN, in tlsv1_client_prf()
|
D | tlsv1_server_i.h | 28 u8 master_secret[TLS_MASTER_SECRET_LEN]; member
|
D | tlsv1_server.h | 43 const u8 *server_random, u8 *master_secret);
|
D | tlsv1_client.h | 49 const u8 *server_random, u8 *master_secret);
|
D | tlsv1_client_i.h | 27 u8 master_secret[TLS_MASTER_SECRET_LEN]; member
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/ |
D | tlsv1_server.c | 74 conn->master_secret, TLS_MASTER_SECRET_LEN)) { in tlsv1_server_derive_keys() 80 conn->master_secret, TLS_MASTER_SECRET_LEN); in tlsv1_server_derive_keys() 88 conn->master_secret, TLS_MASTER_SECRET_LEN, in tlsv1_server_derive_keys() 512 conn->master_secret, TLS_MASTER_SECRET_LEN, in tlsv1_server_prf()
|
D | tlsv1_client.c | 68 conn->master_secret, TLS_MASTER_SECRET_LEN)) { in tls_derive_keys() 74 conn->master_secret, TLS_MASTER_SECRET_LEN); in tls_derive_keys() 83 conn->master_secret, TLS_MASTER_SECRET_LEN, in tls_derive_keys() 564 conn->master_secret, TLS_MASTER_SECRET_LEN, in tlsv1_client_prf()
|
D | tlsv1_server_i.h | 28 u8 master_secret[TLS_MASTER_SECRET_LEN]; member
|
D | tlsv1_server.h | 43 const u8 *server_random, u8 *master_secret);
|
D | tlsv1_client.h | 49 const u8 *server_random, u8 *master_secret);
|
D | tlsv1_client_i.h | 27 u8 master_secret[TLS_MASTER_SECRET_LEN]; member
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
D | crypto_module_tests.c | 855 const u8 master_secret[] = { in test_eap_fast() local 949 seed, sizeof(seed), buf, sizeof(master_secret)) < 0 || in test_eap_fast() 950 os_memcmp(master_secret, buf, sizeof(master_secret)) != 0) { in test_eap_fast() 957 if (tls_prf_sha1_md5(master_secret, sizeof(master_secret), in test_eap_fast()
|
D | tls.h | 620 const u8 *server_random, u8 *master_secret);
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
D | crypto_module_tests.c | 1004 const u8 master_secret[] = { in test_eap_fast() local 1098 seed, sizeof(seed), buf, sizeof(master_secret)) < 0 || in test_eap_fast() 1099 os_memcmp(master_secret, buf, sizeof(master_secret)) != 0) { in test_eap_fast() 1106 if (tls_prf_sha1_md5(master_secret, sizeof(master_secret), in test_eap_fast()
|
D | tls.h | 620 const u8 *server_random, u8 *master_secret);
|
/third_party/mbedtls/library/ |
D | ssl_tls13_keys.h | 351 unsigned char const *master_secret,
|