Lines Matching full:server_random
855 const u8 *server_random;
869 * message, so we need to parse server_random from this message before
873 * (16 03 01 00 2a 02 00 00 26 03 01 <32 bytes server_random>)
889 server_random = tls + 11;
891 wpa_hexdump(MSG_DEBUG, "EAP-FAST: server_random",
892 server_random, server_random_len);
898 os_memcpy(seed, server_random, server_random_len);
906 * server_random + client_random, 48) */
950 os_memcpy(rnd, keys.server_random, keys.server_random_len);