/third_party/node/test/common/ |
H A D | tls.js | 33 const key_block = PRF12('sha256', this.primary_secret, 38 this.client_writeKey = key_block.slice(0, 16); 39 this.client_writeIV = key_block.slice(32, 36);
|
/third_party/openssl/test/ |
H A D | bad_dtls_test.c | 58 static unsigned char key_block[104]; variable 59 #define mac_key (key_block + 20) 60 #define dec_key (key_block + 40) 61 #define enc_key (key_block + 56) 378 key_block, sizeof(key_block)); in send_finished()
|
/third_party/node/deps/openssl/openssl/ssl/ |
H A D | s3_enc.c | 188 p = s->s3.tmp.key_block; in ssl3_change_cipher_state() 288 s->s3.tmp.key_block = p; in ssl3_setup_key_block() 314 OPENSSL_clear_free(s->s3.tmp.key_block, s->s3.tmp.key_block_length); in ssl3_cleanup_key_block() 315 s->s3.tmp.key_block = NULL; in ssl3_cleanup_key_block()
|
H A D | s3_msg.c | 21 if (s->s3.tmp.key_block == NULL) { in ssl3_do_change_cipher_spec()
|
H A D | t1_enc.c | 333 p = s->s3.tmp.key_block; in tls1_change_cipher_state() 566 s->s3.tmp.key_block = p; in tls1_setup_key_block()
|
H A D | ssl_local.h | 1349 unsigned char *key_block; member
|
/third_party/openssl/ssl/ |
H A D | s3_enc.c | 188 p = s->s3.tmp.key_block; in ssl3_change_cipher_state() 284 s->s3.tmp.key_block = p; in ssl3_setup_key_block() 310 OPENSSL_clear_free(s->s3.tmp.key_block, s->s3.tmp.key_block_length); in ssl3_cleanup_key_block() 311 s->s3.tmp.key_block = NULL; in ssl3_cleanup_key_block()
|
H A D | s3_msg.c | 21 if (s->s3.tmp.key_block == NULL) { in ssl3_do_change_cipher_spec()
|
H A D | t1_enc.c | 333 p = s->s3.tmp.key_block; in tls1_change_cipher_state() 561 s->s3.tmp.key_block = p; in tls1_setup_key_block()
|
H A D | ssl_local.h | 1325 unsigned char *key_block; member
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/ |
H A D | tlsv1_client.c | 55 u8 key_block[TLS_MAX_KEY_BLOCK_LEN]; in tls_derive_keys() local 85 key_block, key_block_len)) { in tls_derive_keys() 86 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive key_block"); in tls_derive_keys() 89 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: key_block", in tls_derive_keys() 90 key_block, key_block_len); in tls_derive_keys() 92 pos = key_block; in tls_derive_keys() 764 * tlsv1_client_get_keyblock_size - Get TLS key_block size 766 * Returns: Size of the key_block for the negotiated cipher suite or -1 on
|
H A D | tlsv1_server.c | 61 u8 key_block[TLS_MAX_KEY_BLOCK_LEN]; in tlsv1_server_derive_keys() local 90 key_block, key_block_len)) { in tlsv1_server_derive_keys() 91 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive key_block"); in tlsv1_server_derive_keys() 94 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: key_block", in tlsv1_server_derive_keys() 95 key_block, key_block_len); in tlsv1_server_derive_keys() 97 pos = key_block; in tlsv1_server_derive_keys() 664 * tlsv1_server_get_keyblock_size - Get TLS key_block size 666 * Returns: Size of the key_block for the negotiated cipher suite or -1 on
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/ |
H A D | tlsv1_client.c | 79 u8 key_block[TLS_MAX_KEY_BLOCK_LEN]; in tls_derive_keys() local 109 key_block, key_block_len)) { in tls_derive_keys() 110 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive key_block"); in tls_derive_keys() 113 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: key_block", in tls_derive_keys() 114 key_block, key_block_len); in tls_derive_keys() 116 pos = key_block; in tls_derive_keys() 788 * tlsv1_client_get_keyblock_size - Get TLS key_block size 790 * Returns: Size of the key_block for the negotiated cipher suite or -1 on
|
H A D | tlsv1_server.c | 61 u8 key_block[TLS_MAX_KEY_BLOCK_LEN]; in tlsv1_server_derive_keys() local 90 key_block, key_block_len)) { in tlsv1_server_derive_keys() 91 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive key_block"); in tlsv1_server_derive_keys() 94 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: key_block", in tlsv1_server_derive_keys() 95 key_block, key_block_len); in tlsv1_server_derive_keys() 97 pos = key_block; in tlsv1_server_derive_keys() 664 * tlsv1_server_get_keyblock_size - Get TLS key_block size 666 * Returns: Size of the key_block for the negotiated cipher suite or -1 on
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
H A D | crypto_module_tests.c | 864 const u8 key_block[] = { in test_eap_fast() local 956 wpa_printf(MSG_INFO, "- PRF (TLS, SHA1/MD5) test case / key_block"); in test_eap_fast() 959 buf, sizeof(key_block)) || in test_eap_fast() 960 os_memcmp(key_block, buf, sizeof(key_block)) != 0) { in test_eap_fast()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
H A D | crypto_module_tests.c | 1013 const u8 key_block[] = { in test_eap_fast() local 1105 wpa_printf(MSG_INFO, "- PRF (TLS, SHA1/MD5) test case / key_block"); in test_eap_fast() 1108 buf, sizeof(key_block)) || in test_eap_fast() 1109 os_memcmp(key_block, buf, sizeof(key_block)) != 0) { in test_eap_fast()
|