/external/rust/crates/quiche/deps/boringssl/src/util/fipstools/cavp/ |
D | cavp_tlskdf_test.cc | 67 uint8_t master_secret[48]; in TestTLSKDF() local 69 if (!CRYPTO_tls1_prf(md, master_secret, sizeof(master_secret), in TestTLSKDF() 87 md, key_block.data(), key_block.size(), master_secret, in TestTLSKDF() 88 sizeof(master_secret), kLabel, sizeof(kLabel) - 1, in TestTLSKDF() 95 t->CurrentTestToString().c_str(), EncodeHex(master_secret).c_str(), in TestTLSKDF()
|
/external/boringssl/src/util/fipstools/cavp/ |
D | cavp_tlskdf_test.cc | 67 uint8_t master_secret[48]; in TestTLSKDF() local 69 if (!CRYPTO_tls1_prf(md, master_secret, sizeof(master_secret), in TestTLSKDF() 87 md, key_block.data(), key_block.size(), master_secret, in TestTLSKDF() 88 sizeof(master_secret), kLabel, sizeof(kLabel) - 1, in TestTLSKDF() 95 t->CurrentTestToString().c_str(), EncodeHex(master_secret).c_str(), in TestTLSKDF()
|
/external/scapy/scapy/layers/tls/crypto/ |
D | prf.py | 213 def derive_key_block(self, master_secret, server_random, argument 221 return self.prf(master_secret, seed, req_len) 223 return self.prf(master_secret, b"key expansion", seed, req_len) 226 handshake_msg, master_secret): argument 255 md5_hash = md5.digest(master_secret + sslv3_md5_pad2 + 257 master_secret + sslv3_md5_pad1)) 258 sha1_hash = sha1.digest(master_secret + sslv3_sha1_pad2 + 260 master_secret + sslv3_sha1_pad1)) 274 verify_data = self.prf(master_secret, label, s1 + s2, 12) 281 verify_data = self.prf(master_secret, label, s, 12)
|
/external/scapy/scapy/layers/tls/ |
D | session.py | 126 master_secret=b""): argument 132 key_block = self.prf.derive_key_block(master_secret, 427 self.master_secret = None 533 self.master_secret = ms 541 master_secret=self.master_secret) 544 master_secret=self.master_secret) 550 if self.master_secret is None: 557 km = self.pwcs.prf.derive_key_block(self.master_secret, 563 log_runtime.debug("TLS: master secret: %s", repr_hex(self.master_secret))
|
D | handshake.py | 977 ms = s.master_secret 988 if s.tls_version < 0x0304 and s.master_secret is not None: 989 ms = s.master_secret
|
D | automaton_srv.py | 100 ms = s.master_secret 119 ms = self.cur_session.master_secret
|
D | handshake_sslv2.py | 369 s.master_secret = self.clearkey + self.decryptedkey
|
D | automaton_cli.py | 121 ms = s.master_secret
|
/external/wpa_supplicant_8/src/eap_common/ |
D | eap_fast_common.c | 69 const u8 *client_random, u8 *master_secret) in eap_fast_derive_master_secret() argument 89 seed, sizeof(seed), master_secret, TLS_MASTER_SECRET_LEN); in eap_fast_derive_master_secret() 92 master_secret, TLS_MASTER_SECRET_LEN); in eap_fast_derive_master_secret()
|
D | eap_fast_common.h | 99 const u8 *client_random, u8 *master_secret);
|
/external/wpa_supplicant_8/src/tls/ |
D | tlsv1_server.c | 74 conn->master_secret, TLS_MASTER_SECRET_LEN)) { in tlsv1_server_derive_keys() 80 conn->master_secret, TLS_MASTER_SECRET_LEN); in tlsv1_server_derive_keys() 88 conn->master_secret, TLS_MASTER_SECRET_LEN, in tlsv1_server_derive_keys() 512 conn->master_secret, TLS_MASTER_SECRET_LEN, in tlsv1_server_prf()
|
D | tlsv1_client.c | 68 conn->master_secret, TLS_MASTER_SECRET_LEN)) { in tls_derive_keys() 74 conn->master_secret, TLS_MASTER_SECRET_LEN); in tls_derive_keys() 83 conn->master_secret, TLS_MASTER_SECRET_LEN, in tls_derive_keys() 564 conn->master_secret, TLS_MASTER_SECRET_LEN, in tlsv1_client_prf()
|
D | tlsv1_server_i.h | 28 u8 master_secret[TLS_MASTER_SECRET_LEN]; member
|
D | tlsv1_server.h | 43 const u8 *server_random, u8 *master_secret);
|
D | tlsv1_client.h | 49 const u8 *server_random, u8 *master_secret);
|
D | tlsv1_client_i.h | 27 u8 master_secret[TLS_MASTER_SECRET_LEN]; member
|
D | tlsv1_server_write.c | 134 conn->master_secret); in tls_write_server_hello() 888 conn->master_secret, TLS_MASTER_SECRET_LEN, in tls_write_server_finished()
|
D | tlsv1_client_read.c | 246 conn->master_secret); in tls_process_server_hello() 1423 conn->master_secret, TLS_MASTER_SECRET_LEN, in tls_process_server_finished()
|
D | tlsv1_client_write.c | 836 conn->master_secret, TLS_MASTER_SECRET_LEN, in tls_write_client_finished()
|
/external/wpa_supplicant_8/src/crypto/ |
D | crypto_module_tests.c | 1004 const u8 master_secret[] = { in test_eap_fast() local 1098 seed, sizeof(seed), buf, sizeof(master_secret)) < 0 || in test_eap_fast() 1099 os_memcmp(master_secret, buf, sizeof(master_secret)) != 0) { in test_eap_fast() 1106 if (tls_prf_sha1_md5(master_secret, sizeof(master_secret), in test_eap_fast()
|
D | tls.h | 620 const u8 *server_random, u8 *master_secret);
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap_fast.c | 77 u8 *master_secret) in eap_fast_session_ticket_cb() argument 84 master_secret == NULL) { in eap_fast_session_ticket_cb() 108 master_secret); in eap_fast_session_ticket_cb()
|
D | eap_teap.c | 81 u8 *master_secret) in eap_teap_session_ticket_cb() argument 87 if (!master_secret) { in eap_teap_session_ticket_cb() 110 os_memcpy(master_secret, data->current_pac->pac_key, in eap_teap_session_ticket_cb()
|
/external/wpa_supplicant_8/src/eap_server/ |
D | eap_server_fast.c | 123 u8 *master_secret) in eap_fast_session_ticket_cb() argument 264 master_secret); in eap_fast_session_ticket_cb()
|
D | eap_server_teap.c | 139 u8 *master_secret) in eap_teap_session_ticket_cb() argument 280 os_memcpy(master_secret, pac_key, EAP_TEAP_PAC_KEY_LEN); in eap_teap_session_ticket_cb()
|