| /src/external/bsd/ppp/dist/pppd/ |
| peap.c | 204 u_char csk[PEAP_TLV_CSK_LEN] = {0}; local 209 len++; /* CSK requires NULL byte in seed */ 210 peap_prfplus((u_char *)label, len, ipmk, PEAP_TLV_IPMK_LEN, csk, PEAP_TLV_CSK_LEN); 213 * The first 64 bytes of the CSK are split into two MPPE keys, as follows. 216 * | First 32 bytes of CSK | Second 32 bytes of CSK | 222 mppe_set_keys(csk, csk + PEAP_MPPE_KEY_LEN, PEAP_MPPE_KEY_LEN); 224 mppe_set_keys(csk + PEAP_MPPE_KEY_LEN, csk, PEAP_MPPE_KEY_LEN) [all...] |
| /src/external/mpl/bind/dist/lib/dns/ |
| kasp.c | 586 bool csk = dns_kasp_key_ksk(key) && dns_kasp_key_zsk(key); local 587 const char *rolestr = (csk ? "csk"
|
| keymgr.c | 112 return "CSK"; 1702 bool csk) { 1718 dst_key_setbool(key->key, DST_BOOL_KSK, ksk || csk); 1723 dst_key_setbool(key->key, DST_BOOL_ZSK, zsk || csk); 1796 if (ksk || csk) { 1802 if (zsk || csk) { 1974 bool csk = (dns_kasp_key_ksk(kaspkey) && local 1986 dns_keymgr_key_init(new_key, kasp, now, csk);
|
| /src/external/bsd/wpa/dist/src/eap_peer/ |
| eap_peap.c | 1321 u8 csk[128]; local 1329 (u8 *) "\00", 1, csk, sizeof(csk)) < 0) { 1333 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: CSK", csk, sizeof(csk)); 1334 os_memcpy(key, csk, EAP_TLS_KEY_LEN); 1337 forced_memzero(csk, sizeof(csk));
|
| /src/external/bsd/wpa/dist/src/eap_server/ |
| eap_server_peap.c | 1360 u8 csk[128]; local 1368 (u8 *) "\00", 1, csk, sizeof(csk)) < 0) 1370 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: CSK", csk, sizeof(csk)); 1373 os_memcpy(eapKeyData, csk, EAP_TLS_KEY_LEN); 1382 forced_memzero(csk, sizeof(csk));
|
| /src/external/mpl/dhcp/bind/dist/lib/dns/ |
| keymgr.c | 94 return ("CSK"); 1549 bool csk) { 1565 dst_key_setbool(key->key, DST_BOOL_KSK, (ksk || csk)); 1570 dst_key_setbool(key->key, DST_BOOL_ZSK, (zsk || csk)); 1643 if (ksk || csk) { 1649 if (zsk || csk) { 1774 bool csk = (dns_kasp_key_ksk(kaspkey) && local 1789 keymgr_key_init(new_key, kasp, now, csk);
|