/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | mschapv2.h | 24 u8 *master_key);
|
H A D | mschapv2.c | 42 u8 *master_key) 94 /* Generate master_key here since we have the needed data available. */ 103 if (get_master_key(password_hash_hash, nt_response, master_key)) 106 master_key, MSCHAPV2_MASTER_KEY_LEN); 36 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument
|
H A D | eap_mschapv2.c | 93 u8 master_key[MSCHAPV2_MASTER_KEY_LEN]; member in struct:eap_mschapv2_data 210 data->auth_response, data->master_key)) { 614 /* Likewise, generate master_key here since we have the needed data 619 data->master_key)) { 861 get_asymetric_start_key(data->master_key, key, MSCHAPV2_KEY_LEN, 1, 0); 862 get_asymetric_start_key(data->master_key, key + MSCHAPV2_KEY_LEN,
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | mschapv2.h | 24 u8 *master_key);
|
H A D | mschapv2.c | 42 u8 *master_key) 94 /* Generate master_key here since we have the needed data available. */ 103 if (get_master_key(password_hash_hash, nt_response, master_key)) 106 master_key, MSCHAPV2_MASTER_KEY_LEN); 36 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument
|
H A D | eap_mschapv2.c | 93 u8 master_key[MSCHAPV2_MASTER_KEY_LEN]; member in struct:eap_mschapv2_data 210 data->auth_response, data->master_key)) { 614 /* Likewise, generate master_key here since we have the needed data 619 data->master_key)) { 861 get_asymetric_start_key(data->master_key, key, MSCHAPV2_KEY_LEN, 1, 0); 862 get_asymetric_start_key(data->master_key, key + MSCHAPV2_KEY_LEN,
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | mschapv2.h | 24 u8 *master_key);
|
H A D | mschapv2.c | 42 u8 *master_key) 94 /* Generate master_key here since we have the needed data available. */ 103 if (get_master_key(password_hash_hash, nt_response, master_key)) 106 master_key, MSCHAPV2_MASTER_KEY_LEN); 36 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument
|
H A D | eap_mschapv2.c | 93 u8 master_key[MSCHAPV2_MASTER_KEY_LEN]; member in struct:eap_mschapv2_data 210 data->auth_response, data->master_key)) { 614 /* Likewise, generate master_key here since we have the needed data 619 data->master_key)) { 861 get_asymetric_start_key(data->master_key, key, MSCHAPV2_KEY_LEN, 1, 0); 862 get_asymetric_start_key(data->master_key, key + MSCHAPV2_KEY_LEN,
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | ms_funcs.h | 42 u8 *master_key); 43 int get_asymetric_start_key(const u8 *master_key, u8 *session_key,
|
H A D | ms_funcs.c | 318 * @master_key: 16-octet MasterKey (OUT) 322 u8 *master_key) 339 os_memcpy(master_key, hash, 16); 346 * @master_key: 16-octet MasterKey (IN) 353 int get_asymetric_start_key(const u8 *master_key, u8 *session_key, argument 396 addr[0] = master_key; 321 get_master_key(const u8 *password_hash_hash, const u8 *nt_response, u8 *master_key) argument
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | ms_funcs.h | 42 u8 *master_key); 43 int get_asymetric_start_key(const u8 *master_key, u8 *session_key,
|
H A D | ms_funcs.c | 318 * @master_key: 16-octet MasterKey (OUT) 322 u8 *master_key) 339 os_memcpy(master_key, hash, 16); 346 * @master_key: 16-octet MasterKey (IN) 353 int get_asymetric_start_key(const u8 *master_key, u8 *session_key, argument 396 addr[0] = master_key; 321 get_master_key(const u8 *password_hash_hash, const u8 *nt_response, u8 *master_key) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | ms_funcs.h | 42 u8 *master_key); 43 int get_asymetric_start_key(const u8 *master_key, u8 *session_key,
|
H A D | ms_funcs.c | 318 * @master_key: 16-octet MasterKey (OUT) 322 u8 *master_key) 339 os_memcpy(master_key, hash, 16); 346 * @master_key: 16-octet MasterKey (IN) 353 int get_asymetric_start_key(const u8 *master_key, u8 *session_key, argument 396 addr[0] = master_key; 321 get_master_key(const u8 *password_hash_hash, const u8 *nt_response, u8 *master_key) argument
|
/external/srtp/srtp/ |
H A D | ekt.c | 167 const uint8_t *master_key; local 184 master_key = srtcp_packet_get_emk_location(srtcp_hdr, pkt_octet_len); 185 aes_decrypt_with_raw_key((void*)master_key, stream->ekt->data->ekt_dec_key);
|
/external/chromium-trace/catapult/dashboard/dashboard/ |
H A D | graph_revisions_test.py | 30 master_key = graph_data.Master(id='ChromiumPerf').put() 32 bot_key = graph_data.Bot(id=bot_name, parent=master_key).put()
|
H A D | add_point_queue_test.py | 21 master_key = graph_data.Master(id='ChromiumPerf', parent=None).put() 22 bot_key = graph_data.Bot(id='win7', parent=master_key).put()
|
H A D | update_test_suites_test.py | 102 master_key = ndb.Key('Master', 'Chromium') 103 bot_key = graph_data.Bot(id='internal_mac', parent=master_key,
|
H A D | testing_common.py | 175 master_key = graph_data.Master(id=master_name).put() 177 bot_key = graph_data.Bot(id=bot_name, parent=master_key).put()
|
/external/boringssl/src/ssl/ |
H A D | ssl_asn1.c | 204 !CBB_add_bytes(&child, in->master_key, in->master_key_length)) { 545 CBS session_id, master_key; local 548 !CBS_get_asn1(&session, &master_key, CBS_ASN1_OCTETSTRING) || 549 CBS_len(&master_key) > SSL_MAX_MASTER_KEY_LENGTH) { 555 memcpy(ret->master_key, CBS_data(&master_key), CBS_len(&master_key)); 556 ret->master_key_length = CBS_len(&master_key);
|
H A D | s3_enc.c | 365 EVP_DigestUpdate(&ctx, ssl->session->master_key, 375 EVP_DigestUpdate(&ctx, ssl->session->master_key,
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_mschapv2.c | 53 u8 master_key[16]; member in struct:eap_mschapv2_data 436 data->master_key)) { 442 data->master_key, MSCHAPV2_KEY_LEN); 555 get_asymetric_start_key(data->master_key, key, MSCHAPV2_KEY_LEN, 0, 1); 556 get_asymetric_start_key(data->master_key, key + MSCHAPV2_KEY_LEN,
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_mschapv2.c | 53 u8 master_key[16]; member in struct:eap_mschapv2_data 436 data->master_key)) { 442 data->master_key, MSCHAPV2_KEY_LEN); 555 get_asymetric_start_key(data->master_key, key, MSCHAPV2_KEY_LEN, 0, 1); 556 get_asymetric_start_key(data->master_key, key + MSCHAPV2_KEY_LEN,
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_mschapv2.c | 53 u8 master_key[16]; member in struct:eap_mschapv2_data 436 data->master_key)) { 442 data->master_key, MSCHAPV2_KEY_LEN); 555 get_asymetric_start_key(data->master_key, key, MSCHAPV2_KEY_LEN, 0, 1); 556 get_asymetric_start_key(data->master_key, key + MSCHAPV2_KEY_LEN,
|