/external/wpa_supplicant_8/src/eap_peer/ |
D | mschapv2.c | 42 u8 *master_key) in mschapv2_derive_response() argument 103 if (get_master_key(password_hash_hash, nt_response, master_key)) in mschapv2_derive_response() 106 master_key, MSCHAPV2_MASTER_KEY_LEN); in mschapv2_derive_response()
|
D | eap_mschapv2.c | 93 u8 master_key[MSCHAPV2_MASTER_KEY_LEN]; member 208 data->auth_response, data->master_key)) { in eap_mschapv2_challenge_reply() 617 data->master_key)) { in eap_mschapv2_change_password() 859 if (get_asymetric_start_key(data->master_key, key, MSCHAPV2_KEY_LEN, 1, in eap_mschapv2_getKey() 861 get_asymetric_start_key(data->master_key, key + MSCHAPV2_KEY_LEN, in eap_mschapv2_getKey()
|
D | mschapv2.h | 24 u8 *master_key);
|
D | eap_ttls.c | 53 u8 master_key[MSCHAPV2_MASTER_KEY_LEN]; /* MSCHAPv2 master key */ member 546 data->master_key)) { in eap_ttls_phase2_request_mschapv2()
|
/external/boringssl/src/ssl/ |
D | ssl_asn1.cc | 208 !CBB_add_asn1_octet_string(&session, in->master_key, in SSL_SESSION_to_bytes_full() 553 CBS session_id, master_key; in SSL_SESSION_parse() local 556 !CBS_get_asn1(&session, &master_key, CBS_ASN1_OCTETSTRING) || in SSL_SESSION_parse() 557 CBS_len(&master_key) > SSL_MAX_MASTER_KEY_LENGTH) { in SSL_SESSION_parse() 563 OPENSSL_memcpy(ret->master_key, CBS_data(&master_key), CBS_len(&master_key)); in SSL_SESSION_parse() 564 ret->master_key_length = CBS_len(&master_key); in SSL_SESSION_parse()
|
D | t1_enc.cc | 298 auto master_key = in SSL_generate_key_block() local 299 MakeConstSpan(session->master_key, session->master_key_length); in SSL_generate_key_block() 304 return tls1_prf(digest, out_span, master_key, label, ssl->s3->server_random, in SSL_generate_key_block() 359 MakeConstSpan(session->master_key, session->master_key_length), in SSL_export_keying_material()
|
D | tls13_enc.cc | 371 return derive_secret(hs, hs->new_session->master_key, in tls13_derive_resumption_secret() 419 return hkdf_expand_label(session->master_key, digest, session->master_key, in tls13_derive_session_psk() 514 ssl->session->master_key, in tls13_write_psk_binder() 547 session->master_key, session->master_key_length, in tls13_verify_psk_binder()
|
D | ssl_transcript.cc | 255 MakeConstSpan(session->master_key, session->master_key_length), in GetFinishedMAC()
|
D | ssl_session.cc | 205 OPENSSL_memcpy(new_session->master_key, session->master_key, in SSL_SESSION_dup() 954 OPENSSL_memcpy(out, session->master_key, max_out); in SSL_SESSION_get_master_key()
|
D | handshake.cc | 482 if (!ssl_log_secret(ssl, "CLIENT_RANDOM", session->master_key, in ssl_send_finished()
|
D | handshake_server.cc | 1347 hs, hs->new_session->master_key, premaster_secret); in do_read_client_key_exchange() 1352 CONSTTIME_DECLASSIFY(hs->new_session->master_key, in do_read_client_key_exchange()
|
D | handshake_client.cc | 459 if (!tls13_init_early_key_schedule(hs, ssl->session->master_key, in do_enter_early_data() 1396 tls1_generate_master_secret(hs, hs->new_session->master_key, pms); in do_send_client_key_exchange()
|
D | tls13_client.cc | 367 if (!tls13_init_key_schedule(hs, hs->new_session->master_key, in do_read_server_hello()
|
D | tls13_server.cc | 482 if (!tls13_init_key_schedule(hs, hs->new_session->master_key, in do_select_session()
|
D | internal.h | 3288 uint8_t master_key[SSL_MAX_MASTER_KEY_LENGTH] = {0};
|
/external/wpa_supplicant_8/src/crypto/ |
D | ms_funcs.c | 326 u8 *master_key) in get_master_key() argument 343 os_memcpy(master_key, hash, 16); in get_master_key() 357 int get_asymetric_start_key(const u8 *master_key, u8 *session_key, in get_asymetric_start_key() argument 400 addr[0] = master_key; in get_asymetric_start_key()
|
D | ms_funcs.h | 42 u8 *master_key); 43 int get_asymetric_start_key(const u8 *master_key, u8 *session_key,
|
D | crypto_module_tests.c | 2076 u8 master_key[] = { in test_ms_funcs() local 2121 os_memcmp(master_key, buf, sizeof(master_key)) != 0) { in test_ms_funcs() 2126 if (get_asymetric_start_key(master_key, buf, sizeof(send_start_key), in test_ms_funcs()
|
D | tls_wolfssl.c | 2012 byte *master_key; in tls_connection_get_eap_fast_key() local 2031 wolfSSL_get_keys(ssl, &master_key, &master_key_len, &server_random, in tls_connection_get_eap_fast_key() 2037 tls_prf_sha256(master_key, master_key_len, in tls_connection_get_eap_fast_key() 2042 ret = tls_prf_sha1_md5(master_key, master_key_len, in tls_connection_get_eap_fast_key() 2047 os_memset(master_key, 0, master_key_len); in tls_connection_get_eap_fast_key()
|
D | tls_openssl.c | 100 os_memcpy(out, session->master_key, outlen); in SSL_SESSION_get_master_key() 3971 unsigned char master_key[64]; in tls_connection_get_eap_fast_key() local 4007 master_key_len = SSL_SESSION_get_master_key(sess, master_key, in tls_connection_get_eap_fast_key() 4008 sizeof(master_key)); in tls_connection_get_eap_fast_key() 4014 tls_prf_sha256(master_key, master_key_len, in tls_connection_get_eap_fast_key() 4018 } else if (tls_prf_sha1_md5(master_key, master_key_len, in tls_connection_get_eap_fast_key() 4023 os_memset(master_key, 0, sizeof(master_key)); in tls_connection_get_eap_fast_key()
|
/external/wpa_supplicant_8/src/eap_server/ |
D | eap_server_mschapv2.c | 53 u8 master_key[16]; member 435 data->master_key)) { in eap_mschapv2_process_response() 441 data->master_key, MSCHAPV2_KEY_LEN); in eap_mschapv2_process_response() 554 if (get_asymetric_start_key(data->master_key, key, MSCHAPV2_KEY_LEN, 0, in eap_mschapv2_getKey() 556 get_asymetric_start_key(data->master_key, key + MSCHAPV2_KEY_LEN, in eap_mschapv2_getKey()
|
/external/curl/lib/vtls/ |
D | openssl.c | 218 unsigned char master_key[SSL_MAX_MASTER_KEY_LENGTH]; member 291 unsigned char master_key[SSL_MAX_MASTER_KEY_LENGTH]; in tap_ssl_key() local 304 SSL_SESSION_get_master_key(session, master_key, SSL_MAX_MASTER_KEY_LENGTH); in tap_ssl_key() 308 memcpy(master_key, session->master_key, session->master_key_length); in tap_ssl_key() 318 !memcmp(state->master_key, master_key, master_key_length) && in tap_ssl_key() 324 memcpy(state->master_key, master_key, master_key_length); in tap_ssl_key() 339 line[pos++] = hex[master_key[i] >> 4]; in tap_ssl_key() 340 line[pos++] = hex[master_key[i] & 0xF]; in tap_ssl_key()
|