Home
last modified time | relevance | path

Searched refs:master_key (Results 1 – 22 of 22) sorted by relevance

/external/wpa_supplicant_8/src/eap_peer/
Dmschapv2.c42 u8 *master_key) in mschapv2_derive_response() argument
103 if (get_master_key(password_hash_hash, nt_response, master_key)) in mschapv2_derive_response()
106 master_key, MSCHAPV2_MASTER_KEY_LEN); in mschapv2_derive_response()
Deap_mschapv2.c93 u8 master_key[MSCHAPV2_MASTER_KEY_LEN]; member
208 data->auth_response, data->master_key)) { in eap_mschapv2_challenge_reply()
617 data->master_key)) { in eap_mschapv2_change_password()
859 if (get_asymetric_start_key(data->master_key, key, MSCHAPV2_KEY_LEN, 1, in eap_mschapv2_getKey()
861 get_asymetric_start_key(data->master_key, key + MSCHAPV2_KEY_LEN, in eap_mschapv2_getKey()
Dmschapv2.h24 u8 *master_key);
Deap_ttls.c53 u8 master_key[MSCHAPV2_MASTER_KEY_LEN]; /* MSCHAPv2 master key */ member
546 data->master_key)) { in eap_ttls_phase2_request_mschapv2()
/external/boringssl/src/ssl/
Dssl_asn1.cc208 !CBB_add_asn1_octet_string(&session, in->master_key, in SSL_SESSION_to_bytes_full()
553 CBS session_id, master_key; in SSL_SESSION_parse() local
556 !CBS_get_asn1(&session, &master_key, CBS_ASN1_OCTETSTRING) || in SSL_SESSION_parse()
557 CBS_len(&master_key) > SSL_MAX_MASTER_KEY_LENGTH) { in SSL_SESSION_parse()
563 OPENSSL_memcpy(ret->master_key, CBS_data(&master_key), CBS_len(&master_key)); in SSL_SESSION_parse()
564 ret->master_key_length = CBS_len(&master_key); in SSL_SESSION_parse()
Dt1_enc.cc298 auto master_key = in SSL_generate_key_block() local
299 MakeConstSpan(session->master_key, session->master_key_length); in SSL_generate_key_block()
304 return tls1_prf(digest, out_span, master_key, label, ssl->s3->server_random, in SSL_generate_key_block()
359 MakeConstSpan(session->master_key, session->master_key_length), in SSL_export_keying_material()
Dtls13_enc.cc371 return derive_secret(hs, hs->new_session->master_key, in tls13_derive_resumption_secret()
419 return hkdf_expand_label(session->master_key, digest, session->master_key, in tls13_derive_session_psk()
514 ssl->session->master_key, in tls13_write_psk_binder()
547 session->master_key, session->master_key_length, in tls13_verify_psk_binder()
Dssl_transcript.cc255 MakeConstSpan(session->master_key, session->master_key_length), in GetFinishedMAC()
Dssl_session.cc205 OPENSSL_memcpy(new_session->master_key, session->master_key, in SSL_SESSION_dup()
954 OPENSSL_memcpy(out, session->master_key, max_out); in SSL_SESSION_get_master_key()
Dhandshake.cc482 if (!ssl_log_secret(ssl, "CLIENT_RANDOM", session->master_key, in ssl_send_finished()
Dhandshake_server.cc1347 hs, hs->new_session->master_key, premaster_secret); in do_read_client_key_exchange()
1352 CONSTTIME_DECLASSIFY(hs->new_session->master_key, in do_read_client_key_exchange()
Dhandshake_client.cc459 if (!tls13_init_early_key_schedule(hs, ssl->session->master_key, in do_enter_early_data()
1396 tls1_generate_master_secret(hs, hs->new_session->master_key, pms); in do_send_client_key_exchange()
Dtls13_client.cc367 if (!tls13_init_key_schedule(hs, hs->new_session->master_key, in do_read_server_hello()
Dtls13_server.cc482 if (!tls13_init_key_schedule(hs, hs->new_session->master_key, in do_select_session()
Dinternal.h3288 uint8_t master_key[SSL_MAX_MASTER_KEY_LENGTH] = {0};
/external/wpa_supplicant_8/src/crypto/
Dms_funcs.c326 u8 *master_key) in get_master_key() argument
343 os_memcpy(master_key, hash, 16); in get_master_key()
357 int get_asymetric_start_key(const u8 *master_key, u8 *session_key, in get_asymetric_start_key() argument
400 addr[0] = master_key; in get_asymetric_start_key()
Dms_funcs.h42 u8 *master_key);
43 int get_asymetric_start_key(const u8 *master_key, u8 *session_key,
Dcrypto_module_tests.c2076 u8 master_key[] = { in test_ms_funcs() local
2121 os_memcmp(master_key, buf, sizeof(master_key)) != 0) { in test_ms_funcs()
2126 if (get_asymetric_start_key(master_key, buf, sizeof(send_start_key), in test_ms_funcs()
Dtls_wolfssl.c2012 byte *master_key; in tls_connection_get_eap_fast_key() local
2031 wolfSSL_get_keys(ssl, &master_key, &master_key_len, &server_random, in tls_connection_get_eap_fast_key()
2037 tls_prf_sha256(master_key, master_key_len, in tls_connection_get_eap_fast_key()
2042 ret = tls_prf_sha1_md5(master_key, master_key_len, in tls_connection_get_eap_fast_key()
2047 os_memset(master_key, 0, master_key_len); in tls_connection_get_eap_fast_key()
Dtls_openssl.c100 os_memcpy(out, session->master_key, outlen); in SSL_SESSION_get_master_key()
3971 unsigned char master_key[64]; in tls_connection_get_eap_fast_key() local
4007 master_key_len = SSL_SESSION_get_master_key(sess, master_key, in tls_connection_get_eap_fast_key()
4008 sizeof(master_key)); in tls_connection_get_eap_fast_key()
4014 tls_prf_sha256(master_key, master_key_len, in tls_connection_get_eap_fast_key()
4018 } else if (tls_prf_sha1_md5(master_key, master_key_len, in tls_connection_get_eap_fast_key()
4023 os_memset(master_key, 0, sizeof(master_key)); in tls_connection_get_eap_fast_key()
/external/wpa_supplicant_8/src/eap_server/
Deap_server_mschapv2.c53 u8 master_key[16]; member
435 data->master_key)) { in eap_mschapv2_process_response()
441 data->master_key, MSCHAPV2_KEY_LEN); in eap_mschapv2_process_response()
554 if (get_asymetric_start_key(data->master_key, key, MSCHAPV2_KEY_LEN, 0, in eap_mschapv2_getKey()
556 get_asymetric_start_key(data->master_key, key + MSCHAPV2_KEY_LEN, in eap_mschapv2_getKey()
/external/curl/lib/vtls/
Dopenssl.c218 unsigned char master_key[SSL_MAX_MASTER_KEY_LENGTH]; member
291 unsigned char master_key[SSL_MAX_MASTER_KEY_LENGTH]; in tap_ssl_key() local
304 SSL_SESSION_get_master_key(session, master_key, SSL_MAX_MASTER_KEY_LENGTH); in tap_ssl_key()
308 memcpy(master_key, session->master_key, session->master_key_length); in tap_ssl_key()
318 !memcmp(state->master_key, master_key, master_key_length) && in tap_ssl_key()
324 memcpy(state->master_key, master_key, master_key_length); in tap_ssl_key()
339 line[pos++] = hex[master_key[i] >> 4]; in tap_ssl_key()
340 line[pos++] = hex[master_key[i] & 0xF]; in tap_ssl_key()