Home
last modified time | relevance | path

Searched refs:key_block (Results 1 - 16 of 16) sorted by relevance

/third_party/node/test/common/
H A Dtls.js33 const key_block = PRF12('sha256', this.primary_secret,
38 this.client_writeKey = key_block.slice(0, 16);
39 this.client_writeIV = key_block.slice(32, 36);
/third_party/openssl/test/
H A Dbad_dtls_test.c58 static unsigned char key_block[104]; variable
59 #define mac_key (key_block + 20)
60 #define dec_key (key_block + 40)
61 #define enc_key (key_block + 56)
378 key_block, sizeof(key_block)); in send_finished()
/third_party/node/deps/openssl/openssl/ssl/
H A Ds3_enc.c188 p = s->s3.tmp.key_block; in ssl3_change_cipher_state()
288 s->s3.tmp.key_block = p; in ssl3_setup_key_block()
314 OPENSSL_clear_free(s->s3.tmp.key_block, s->s3.tmp.key_block_length); in ssl3_cleanup_key_block()
315 s->s3.tmp.key_block = NULL; in ssl3_cleanup_key_block()
H A Ds3_msg.c21 if (s->s3.tmp.key_block == NULL) { in ssl3_do_change_cipher_spec()
H A Dt1_enc.c333 p = s->s3.tmp.key_block; in tls1_change_cipher_state()
566 s->s3.tmp.key_block = p; in tls1_setup_key_block()
H A Dssl_local.h1349 unsigned char *key_block; member
/third_party/openssl/ssl/
H A Ds3_enc.c188 p = s->s3.tmp.key_block; in ssl3_change_cipher_state()
284 s->s3.tmp.key_block = p; in ssl3_setup_key_block()
310 OPENSSL_clear_free(s->s3.tmp.key_block, s->s3.tmp.key_block_length); in ssl3_cleanup_key_block()
311 s->s3.tmp.key_block = NULL; in ssl3_cleanup_key_block()
H A Ds3_msg.c21 if (s->s3.tmp.key_block == NULL) { in ssl3_do_change_cipher_spec()
H A Dt1_enc.c333 p = s->s3.tmp.key_block; in tls1_change_cipher_state()
561 s->s3.tmp.key_block = p; in tls1_setup_key_block()
H A Dssl_local.h1325 unsigned char *key_block; member
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/
H A Dtlsv1_client.c55 u8 key_block[TLS_MAX_KEY_BLOCK_LEN]; in tls_derive_keys() local
85 key_block, key_block_len)) { in tls_derive_keys()
86 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive key_block"); in tls_derive_keys()
89 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: key_block", in tls_derive_keys()
90 key_block, key_block_len); in tls_derive_keys()
92 pos = key_block; in tls_derive_keys()
764 * tlsv1_client_get_keyblock_size - Get TLS key_block size
766 * Returns: Size of the key_block for the negotiated cipher suite or -1 on
H A Dtlsv1_server.c61 u8 key_block[TLS_MAX_KEY_BLOCK_LEN]; in tlsv1_server_derive_keys() local
90 key_block, key_block_len)) { in tlsv1_server_derive_keys()
91 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive key_block"); in tlsv1_server_derive_keys()
94 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: key_block", in tlsv1_server_derive_keys()
95 key_block, key_block_len); in tlsv1_server_derive_keys()
97 pos = key_block; in tlsv1_server_derive_keys()
664 * tlsv1_server_get_keyblock_size - Get TLS key_block size
666 * Returns: Size of the key_block for the negotiated cipher suite or -1 on
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/
H A Dtlsv1_client.c79 u8 key_block[TLS_MAX_KEY_BLOCK_LEN]; in tls_derive_keys() local
109 key_block, key_block_len)) { in tls_derive_keys()
110 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive key_block"); in tls_derive_keys()
113 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: key_block", in tls_derive_keys()
114 key_block, key_block_len); in tls_derive_keys()
116 pos = key_block; in tls_derive_keys()
788 * tlsv1_client_get_keyblock_size - Get TLS key_block size
790 * Returns: Size of the key_block for the negotiated cipher suite or -1 on
H A Dtlsv1_server.c61 u8 key_block[TLS_MAX_KEY_BLOCK_LEN]; in tlsv1_server_derive_keys() local
90 key_block, key_block_len)) { in tlsv1_server_derive_keys()
91 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive key_block"); in tlsv1_server_derive_keys()
94 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: key_block", in tlsv1_server_derive_keys()
95 key_block, key_block_len); in tlsv1_server_derive_keys()
97 pos = key_block; in tlsv1_server_derive_keys()
664 * tlsv1_server_get_keyblock_size - Get TLS key_block size
666 * Returns: Size of the key_block for the negotiated cipher suite or -1 on
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/
H A Dcrypto_module_tests.c864 const u8 key_block[] = { in test_eap_fast() local
956 wpa_printf(MSG_INFO, "- PRF (TLS, SHA1/MD5) test case / key_block"); in test_eap_fast()
959 buf, sizeof(key_block)) || in test_eap_fast()
960 os_memcmp(key_block, buf, sizeof(key_block)) != 0) { in test_eap_fast()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/
H A Dcrypto_module_tests.c1013 const u8 key_block[] = { in test_eap_fast() local
1105 wpa_printf(MSG_INFO, "- PRF (TLS, SHA1/MD5) test case / key_block"); in test_eap_fast()
1108 buf, sizeof(key_block)) || in test_eap_fast()
1109 os_memcmp(key_block, buf, sizeof(key_block)) != 0) { in test_eap_fast()

Completed in 26 milliseconds