| /src/external/bsd/wpa/dist/src/eap_common/ |
| eap_fast_common.h | 99 const u8 *client_random, u8 *master_secret);
|
| eap_fast_common.c | 69 const u8 *client_random, u8 *master_secret) 82 * master_secret = T-PRF(PAC-Key, "PAC to master secret label hash", 89 seed, sizeof(seed), master_secret, TLS_MASTER_SECRET_LEN); 91 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: master_secret", 92 master_secret, TLS_MASTER_SECRET_LEN);
|
| /src/external/bsd/wpa/dist/src/tls/ |
| tlsv1_server.h | 43 const u8 *server_random, u8 *master_secret);
|
| tlsv1_client.h | 49 const u8 *server_random, u8 *master_secret);
|
| tlsv1_client_i.h | 27 u8 master_secret[TLS_MASTER_SECRET_LEN]; member in struct:tlsv1_client
|
| tlsv1_server_i.h | 28 u8 master_secret[TLS_MASTER_SECRET_LEN]; member in struct:tlsv1_server
|
| tlsv1_client.c | 92 conn->master_secret, TLS_MASTER_SECRET_LEN)) { 94 "master_secret"); 97 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: master_secret", 98 conn->master_secret, TLS_MASTER_SECRET_LEN); 107 conn->master_secret, TLS_MASTER_SECRET_LEN, 588 conn->master_secret, TLS_MASTER_SECRET_LEN,
|
| tlsv1_server.c | 74 conn->master_secret, TLS_MASTER_SECRET_LEN)) { 76 "master_secret"); 79 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: master_secret", 80 conn->master_secret, TLS_MASTER_SECRET_LEN); 88 conn->master_secret, TLS_MASTER_SECRET_LEN, 512 conn->master_secret, TLS_MASTER_SECRET_LEN,
|
| tlsv1_server_write.c | 134 conn->master_secret); 888 conn->master_secret, TLS_MASTER_SECRET_LEN,
|
| tlsv1_client_read.c | 246 conn->master_secret); 1424 conn->master_secret, TLS_MASTER_SECRET_LEN,
|
| /src/crypto/external/apache2/openssl/dist/test/ |
| bad_dtls_test.c | 54 static unsigned char master_secret[48]; variable 76 EVP_PKEY_CTX_set1_tls1_prf_secret(pctx, master_secret, sizeof(master_secret)); 192 memcpy(session_asn1 + SS_SECRET_OFS, master_secret, sizeof(master_secret)); 681 RAND_bytes(master_secret, sizeof(master_secret));
|
| tls13secretstest.c | 89 static unsigned char master_secret[] = { variable 376 master_secret, sizeof(master_secret))) {
|
| /src/crypto/external/bsd/openssl/dist/test/ |
| bad_dtls_test.c | 54 static unsigned char master_secret[48]; variable 76 EVP_PKEY_CTX_set1_tls1_prf_secret(pctx, master_secret, sizeof(master_secret)); 111 memcpy(session_asn1 + SS_SECRET_OFS, master_secret, sizeof(master_secret)); 476 RAND_bytes(master_secret, sizeof(master_secret));
|
| tls13secretstest.c | 88 static unsigned char master_secret[] = { variable 362 master_secret, sizeof(master_secret))) {
|
| /src/crypto/external/bsd/openssl.old/dist/test/ |
| bad_dtls_test.c | 52 static unsigned char master_secret[48]; variable 74 EVP_PKEY_CTX_set1_tls1_prf_secret(pctx, master_secret, sizeof(master_secret)); 109 memcpy(session_asn1 + SS_SECRET_OFS, master_secret, sizeof(master_secret)); 457 RAND_bytes(master_secret, sizeof(master_secret));
|
| tls13secretstest.c | 98 static unsigned char master_secret[] = { variable 354 master_secret, sizeof(master_secret))) {
|
| /src/external/bsd/wpa/dist/src/crypto/ |
| tls.h | 626 const u8 *server_random, u8 *master_secret);
|
| crypto_module_tests.c | 1004 const u8 master_secret[] = { local 1095 wpa_printf(MSG_INFO, "- T-PRF (SHA1) test case / master_secret"); 1098 seed, sizeof(seed), buf, sizeof(master_secret)) < 0 || 1099 os_memcmp(master_secret, buf, sizeof(master_secret)) != 0) { 1106 if (tls_prf_sha1_md5(master_secret, sizeof(master_secret),
|
| /src/crypto/external/apache2/openssl/dist/ssl/ |
| tls13_enc.c | 630 insecret = s->master_secret; 656 insecret = s->master_secret;
|
| /src/crypto/external/bsd/openssl/dist/ssl/ |
| tls13_enc.c | 582 insecret = s->master_secret; 604 insecret = s->master_secret;
|
| /src/crypto/external/bsd/openssl.old/dist/ssl/ |
| tls13_enc.c | 611 insecret = s->master_secret; 633 insecret = s->master_secret;
|
| /src/external/bsd/wpa/dist/src/eap_peer/ |
| eap_fast.c | 77 u8 *master_secret) 84 master_secret == NULL) { 108 master_secret);
|
| eap_teap.c | 81 u8 *master_secret) 87 if (!master_secret) { 109 /* EAP-TEAP uses PAC-Key as the TLS master_secret */ 110 os_memcpy(master_secret, data->current_pac->pac_key,
|
| /src/external/bsd/wpa/dist/src/eap_server/ |
| eap_server_fast.c | 123 u8 *master_secret) 264 master_secret);
|
| eap_server_teap.c | 143 u8 *master_secret) 283 /* EAP-TEAP uses PAC-Key as the TLS master_secret */ 284 os_memcpy(master_secret, pac_key, EAP_TEAP_PAC_KEY_LEN);
|