/barrelfish-master/lib/lwip2/src/netif/ppp/ |
H A D | mppe.c | 72 lwip_sha1_update(&sha1_ctx, state->master_key, state->keylen); 102 MEMCPY(state->master_key, key, MPPE_MAX_KEY_LEN); 119 MEMCPY(state->session_key, state->master_key, sizeof(state->master_key)); 140 char mkey[sizeof(state->master_key) * 2 + 1]; 147 for (i = 0; i < (int)sizeof(state->master_key); i++) 148 sprintf(mkey + i * 2, "%02x", state->master_key[i]);
|
/barrelfish-master/include/lwip2/netif/ppp/ |
H A D | mppe.c | 72 lwip_sha1_update(&sha1_ctx, state->master_key, state->keylen); 102 MEMCPY(state->master_key, key, MPPE_MAX_KEY_LEN); 119 MEMCPY(state->session_key, state->master_key, sizeof(state->master_key)); 140 char mkey[sizeof(state->master_key) * 2 + 1]; 147 for (i = 0; i < (int)sizeof(state->master_key); i++) 148 sprintf(mkey + i * 2, "%02x", state->master_key[i]);
|
H A D | mppe.h | 152 u8_t master_key[MPPE_MAX_KEY_LEN]; member in struct:ppp_mppe_state
|
/barrelfish-master/lib/openssl-1.0.0d/ssl/ |
H A D | ssl_asn1.c | 98 ASN1_OCTET_STRING master_key; member in struct:ssl_session_asn1_st 186 a.master_key.length=in->master_key_length; 187 a.master_key.type=V_ASN1_OCTET_STRING; 188 a.master_key.data=in->master_key; 275 M_ASN1_I2D_len(&(a.master_key), i2d_ASN1_OCTET_STRING); 317 M_ASN1_I2D_put(&(a.master_key), i2d_ASN1_OCTET_STRING); 436 memcpy(ret->master_key,os.data,ret->master_key_length);
|
H A D | s2_lib.c | 467 s->session->master_key_length > (int)sizeof(s->session->master_key)) 489 < (int)sizeof(s->session->master_key)); 490 EVP_DigestUpdate(&ctx,s->session->master_key,s->session->master_key_length);
|
H A D | ssl_txt.c | 160 if (BIO_printf(bp,"%02X",x->master_key[i]) <= 0) goto err;
|
H A D | s2_clnt.c | 656 if (i > (int)sizeof(sess->master_key)) 662 if (RAND_bytes(sess->master_key,i) <= 0) 684 memcpy(d,sess->master_key,(unsigned int)clear); 688 &(sess->master_key[clear]),d, 699 sess->master_key[clear]++;
|
H A D | t1_enc.c | 292 s->session->master_key,s->session->master_key_length, 295 printf("tls1_generate_key_block() ==> %d byte master_key =\n\t", 301 printf("%02X", s->session->master_key[i]); 600 { int z; for (z=0; z<s->session->master_key_length; z++) printf("%02X%c",s->session->master_key[z],((z+1)%16)?' ':'\n'); } 865 s->session->master_key,s->session->master_key_length, 996 s->session->master_key,buff,sizeof buff);
|
H A D | s3_enc.c | 189 EVP_DigestUpdate(&s1,s->session->master_key, 196 EVP_DigestUpdate(&m5,s->session->master_key, 680 EVP_DigestUpdate(&ctx,s->session->master_key, 686 EVP_DigestUpdate(&ctx,s->session->master_key,
|
H A D | d1_clnt.c | 857 s->session->master_key, 987 s->session->master_key, 1035 s->session->master_key,p,n); 1180 s->session->master_key, 1301 s->session->master_key,
|
H A D | s3_clnt.c | 800 s->session->master_key_length=sizeof(s->session->master_key); 801 if (s->tls_session_secret_cb(s, s->session->master_key, 2076 s->session->master_key, 2208 s->session->master_key, 2263 s->session->master_key,p,n); 2409 s->session->master_key, 2550 s->session->master_key,premaster_secret,32); 2619 s->session->master_key,
|
H A D | s3_srvr.c | 1078 s->session->master_key_length=sizeof(s->session->master_key); 1079 if(s->tls_session_secret_cb(s, s->session->master_key, &s->session->master_key_length, 2076 s->session->master_key, 2140 s->session->master_key,p,i); 2316 s->session->master_key, pms, outl); 2481 generate_master_secret(s, s->session->master_key, p, i); 2574 s->session->master_key, psk_or_pre_ms, pre_ms_len); 2641 s->session->master_key,premaster_secret,32);
|
H A D | ssl_sess.c | 711 OPENSSL_cleanse(ss->master_key,sizeof ss->master_key);
|
H A D | s2_srvr.c | 517 memcpy(s->session->master_key,p,(unsigned int)i);
|
H A D | ssl.h | 452 unsigned char master_key[SSL_MAX_MASTER_KEY_LENGTH]; member in struct:ssl_session_st
|
/barrelfish-master/include/openssl/ |
H A D | ssl.h | 452 unsigned char master_key[SSL_MAX_MASTER_KEY_LENGTH]; member in struct:ssl_session_st
|