/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_fast_common.c | 69 const u8 *client_random, u8 *master_secret) 82 * master_secret = T-PRF(PAC-Key, "PAC to master secret label hash", 89 seed, sizeof(seed), master_secret, TLS_MASTER_SECRET_LEN); 91 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: master_secret", 92 master_secret, TLS_MASTER_SECRET_LEN); 68 eap_fast_derive_master_secret(const u8 *pac_key, const u8 *server_random, const u8 *client_random, u8 *master_secret) argument
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_fast_common.c | 69 const u8 *client_random, u8 *master_secret) 82 * master_secret = T-PRF(PAC-Key, "PAC to master secret label hash", 89 seed, sizeof(seed), master_secret, TLS_MASTER_SECRET_LEN); 91 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: master_secret", 92 master_secret, TLS_MASTER_SECRET_LEN); 68 eap_fast_derive_master_secret(const u8 *pac_key, const u8 *server_random, const u8 *client_random, u8 *master_secret) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_fast_common.c | 69 const u8 *client_random, u8 *master_secret) 82 * master_secret = T-PRF(PAC-Key, "PAC to master secret label hash", 89 seed, sizeof(seed), master_secret, TLS_MASTER_SECRET_LEN); 91 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: master_secret", 92 master_secret, TLS_MASTER_SECRET_LEN); 68 eap_fast_derive_master_secret(const u8 *pac_key, const u8 *server_random, const u8 *client_random, u8 *master_secret) argument
|
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_client_i.h | 27 u8 master_secret[TLS_MASTER_SECRET_LEN]; member in struct:tlsv1_client
|
H A D | tlsv1_server_i.h | 28 u8 master_secret[TLS_MASTER_SECRET_LEN]; member in struct:tlsv1_server
|
/external/wpa_supplicant_8/src/tls/ |
H A D | tlsv1_client_i.h | 27 u8 master_secret[TLS_MASTER_SECRET_LEN]; member in struct:tlsv1_client
|
H A D | tlsv1_server_i.h | 28 u8 master_secret[TLS_MASTER_SECRET_LEN]; member in struct:tlsv1_server
|
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | tlsv1_client_i.h | 27 u8 master_secret[TLS_MASTER_SECRET_LEN]; member in struct:tlsv1_client
|
H A D | tlsv1_server_i.h | 28 u8 master_secret[TLS_MASTER_SECRET_LEN]; member in struct:tlsv1_server
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | crypto_module_tests.c | 850 const u8 master_secret[] = { local 941 wpa_printf(MSG_INFO, "- T-PRF (SHA1) test case / master_secret"); 944 seed, sizeof(seed), buf, sizeof(master_secret)) < 0 || 945 os_memcmp(master_secret, buf, sizeof(master_secret)) != 0) { 952 if (tls_prf_sha1_md5(master_secret, sizeof(master_secret),
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_fast.c | 77 u8 *master_secret) 84 master_secret == NULL) { 108 master_secret); 74 eap_fast_session_ticket_cb(void *ctx, const u8 *ticket, size_t len, const u8 *client_random, const u8 *server_random, u8 *master_secret) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_fast.c | 123 u8 *master_secret) 264 master_secret); 120 eap_fast_session_ticket_cb(void *ctx, const u8 *ticket, size_t len, const u8 *client_random, const u8 *server_random, u8 *master_secret) argument
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | crypto_module_tests.c | 850 const u8 master_secret[] = { local 941 wpa_printf(MSG_INFO, "- T-PRF (SHA1) test case / master_secret"); 944 seed, sizeof(seed), buf, sizeof(master_secret)) < 0 || 945 os_memcmp(master_secret, buf, sizeof(master_secret)) != 0) { 952 if (tls_prf_sha1_md5(master_secret, sizeof(master_secret),
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_fast.c | 77 u8 *master_secret) 84 master_secret == NULL) { 108 master_secret); 74 eap_fast_session_ticket_cb(void *ctx, const u8 *ticket, size_t len, const u8 *client_random, const u8 *server_random, u8 *master_secret) argument
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_fast.c | 123 u8 *master_secret) 264 master_secret); 120 eap_fast_session_ticket_cb(void *ctx, const u8 *ticket, size_t len, const u8 *client_random, const u8 *server_random, u8 *master_secret) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | crypto_module_tests.c | 850 const u8 master_secret[] = { local 941 wpa_printf(MSG_INFO, "- T-PRF (SHA1) test case / master_secret"); 944 seed, sizeof(seed), buf, sizeof(master_secret)) < 0 || 945 os_memcmp(master_secret, buf, sizeof(master_secret)) != 0) { 952 if (tls_prf_sha1_md5(master_secret, sizeof(master_secret),
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_fast.c | 77 u8 *master_secret) 84 master_secret == NULL) { 108 master_secret); 74 eap_fast_session_ticket_cb(void *ctx, const u8 *ticket, size_t len, const u8 *client_random, const u8 *server_random, u8 *master_secret) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_fast.c | 123 u8 *master_secret) 264 master_secret); 120 eap_fast_session_ticket_cb(void *ctx, const u8 *ticket, size_t len, const u8 *client_random, const u8 *server_random, u8 *master_secret) argument
|
/external/robolectric/v3/runtime/ |
H A D | android-all-4.1.2_r1-robolectric-0.jar | META-INF/ META-INF/MANIFEST.MF android/ android/accessibilityservice/ android/accessibilityservice/AccessibilityService$1.class ... |
H A D | android-all-4.2.2_r1.2-robolectric-0.jar | META-INF/ META-INF/MANIFEST.MF android/ android/accessibilityservice/ android/accessibilityservice/AccessibilityService$1.class ... |
H A D | android-all-4.3_r2-robolectric-0.jar | META-INF/ META-INF/MANIFEST.MF android/ android/accessibilityservice/ android/accessibilityservice/AccessibilityService$1.class ... |
H A D | android-all-4.4_r1-robolectric-1.jar | META-INF/ META-INF/MANIFEST.MF com/ com/google/ com/google/android/ com/google/android/collect/ ... |