/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_fast_common.c | 69 const u8 *client_random, u8 *master_secret) 82 * master_secret = T-PRF(PAC-Key, "PAC to master secret label hash", 89 seed, sizeof(seed), master_secret, TLS_MASTER_SECRET_LEN); 91 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: master_secret", 92 master_secret, TLS_MASTER_SECRET_LEN); 128 wpa_hexdump_key(MSG_MSGDUMP, "EAP-FAST: master_secret for key " 68 eap_fast_derive_master_secret(const u8 *pac_key, const u8 *server_random, const u8 *client_random, u8 *master_secret) argument
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_fast_common.c | 69 const u8 *client_random, u8 *master_secret) 82 * master_secret = T-PRF(PAC-Key, "PAC to master secret label hash", 89 seed, sizeof(seed), master_secret, TLS_MASTER_SECRET_LEN); 91 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: master_secret", 92 master_secret, TLS_MASTER_SECRET_LEN); 128 wpa_hexdump_key(MSG_MSGDUMP, "EAP-FAST: master_secret for key " 68 eap_fast_derive_master_secret(const u8 *pac_key, const u8 *server_random, const u8 *client_random, u8 *master_secret) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_fast_common.c | 69 const u8 *client_random, u8 *master_secret) 82 * master_secret = T-PRF(PAC-Key, "PAC to master secret label hash", 89 seed, sizeof(seed), master_secret, TLS_MASTER_SECRET_LEN); 91 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: master_secret", 92 master_secret, TLS_MASTER_SECRET_LEN); 128 wpa_hexdump_key(MSG_MSGDUMP, "EAP-FAST: master_secret for key " 68 eap_fast_derive_master_secret(const u8 *pac_key, const u8 *server_random, const u8 *client_random, u8 *master_secret) argument
|
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_client_i.h | 27 u8 master_secret[TLS_MASTER_SECRET_LEN]; member in struct:tlsv1_client
|
H A D | tlsv1_server_i.h | 28 u8 master_secret[TLS_MASTER_SECRET_LEN]; member in struct:tlsv1_server
|
/external/wpa_supplicant_8/src/tls/ |
H A D | tlsv1_client_i.h | 27 u8 master_secret[TLS_MASTER_SECRET_LEN]; member in struct:tlsv1_client
|
H A D | tlsv1_server_i.h | 28 u8 master_secret[TLS_MASTER_SECRET_LEN]; member in struct:tlsv1_server
|
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | tlsv1_client_i.h | 27 u8 master_secret[TLS_MASTER_SECRET_LEN]; member in struct:tlsv1_client
|
H A D | tlsv1_server_i.h | 28 u8 master_secret[TLS_MASTER_SECRET_LEN]; member in struct:tlsv1_server
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | tls_gnutls.c | 26 * use of internal structures to get the master_secret and 58 opaque master_secret[WPA_TLS_MASTER_SIZE]; member in struct:__anon33603 133 /* Because of the horrible hack to get master_secret and client/server 765 keys->master_key = sec->master_secret; 774 /* No access to master_secret */
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_fast.c | 76 u8 *master_secret) 83 master_secret == NULL) { 107 master_secret); 73 eap_fast_session_ticket_cb(void *ctx, const u8 *ticket, size_t len, const u8 *client_random, const u8 *server_random, u8 *master_secret) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_fast.c | 123 u8 *master_secret) 260 master_secret); 120 eap_fast_session_ticket_cb(void *ctx, const u8 *ticket, size_t len, const u8 *client_random, const u8 *server_random, u8 *master_secret) argument
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | tls_gnutls.c | 26 * use of internal structures to get the master_secret and 58 opaque master_secret[WPA_TLS_MASTER_SIZE]; member in struct:__anon33856 133 /* Because of the horrible hack to get master_secret and client/server 765 keys->master_key = sec->master_secret; 774 /* No access to master_secret */
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_fast.c | 76 u8 *master_secret) 83 master_secret == NULL) { 107 master_secret); 73 eap_fast_session_ticket_cb(void *ctx, const u8 *ticket, size_t len, const u8 *client_random, const u8 *server_random, u8 *master_secret) argument
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_fast.c | 123 u8 *master_secret) 260 master_secret); 120 eap_fast_session_ticket_cb(void *ctx, const u8 *ticket, size_t len, const u8 *client_random, const u8 *server_random, u8 *master_secret) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | tls_gnutls.c | 26 * use of internal structures to get the master_secret and 58 opaque master_secret[WPA_TLS_MASTER_SIZE]; member in struct:__anon34107 133 /* Because of the horrible hack to get master_secret and client/server 765 keys->master_key = sec->master_secret; 774 /* No access to master_secret */
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_fast.c | 76 u8 *master_secret) 83 master_secret == NULL) { 107 master_secret); 73 eap_fast_session_ticket_cb(void *ctx, const u8 *ticket, size_t len, const u8 *client_random, const u8 *server_random, u8 *master_secret) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_fast.c | 123 u8 *master_secret) 260 master_secret); 120 eap_fast_session_ticket_cb(void *ctx, const u8 *ticket, size_t len, const u8 *client_random, const u8 *server_random, u8 *master_secret) argument
|
/external/chromium_org/net/third_party/nss/ssl/ |
H A D | sslimpl.h | 598 PK11SymKey * master_secret; member in struct:__anon9711 1087 SSL3Opaque master_secret[48]; member in struct:SessionTicketStr
|