/external/wpa_supplicant_8/src/eap_common/ |
eap_fast_common.c | 69 const u8 *client_random, u8 *master_secret) 75 wpa_hexdump(MSG_DEBUG, "EAP-FAST: client_random", 76 client_random, TLS_RANDOM_LEN); 83 * server_random + client_random, 48) 86 os_memcpy(seed + TLS_RANDOM_LEN, client_random, TLS_RANDOM_LEN); 125 os_memcpy(rnd + keys.server_random_len, keys.client_random,
|
eap_fast_common.h | 99 const u8 *client_random, u8 *master_secret);
|
/external/chromium_org/net/third_party/nss/patches/ |
secretexporterlocks.patch | 28 PORT_Memcpy(val + i, &ss->ssl3.hs.client_random.rand, SSL3_RANDOM_LENGTH);
|
/external/wpa_supplicant_8/src/tls/ |
tlsv1_client.h | 47 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
|
tlsv1_client_i.h | 25 u8 client_random[TLS_RANDOM_LEN]; member in struct:tlsv1_client
|
tlsv1_server.h | 41 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
|
tlsv1_server_i.h | 26 u8 client_random[TLS_RANDOM_LEN]; member in struct:tlsv1_server
|
tlsv1_server.c | 43 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); 59 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, TLS_RANDOM_LEN); 422 * @server_random_first: seed is 0 = client_random|server_random, 423 * 1 = server_random|client_random 438 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, 441 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); 542 keys->client_random = conn->client_random;
|
tlsv1_client.c | 61 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); 77 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, TLS_RANDOM_LEN); 511 * @server_random_first: seed is 0 = client_random|server_random, 512 * 1 = server_random|client_random 527 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, 530 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); 690 keys->client_random = conn->client_random;
|
tlsv1_client_write.c | 55 WPA_PUT_BE32(conn->client_random, now.sec); 56 if (random_get_bytes(conn->client_random + 4, TLS_RANDOM_LEN - 4)) { 58 "client_random"); 61 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client_random", 62 conn->client_random, TLS_RANDOM_LEN); 87 os_memcpy(pos, conn->client_random, TLS_RANDOM_LEN);
|
tlsv1_server_read.c | 111 os_memcpy(conn->client_random, pos, TLS_RANDOM_LEN); 113 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client_random", 114 conn->client_random, TLS_RANDOM_LEN);
|
/external/wpa_supplicant_8/src/crypto/ |
tls.h | 17 const u8 *client_random; member in struct:tls_keys 305 * @server_random_first: seed is 0 = client_random|server_random, 306 * 1 = server_random|client_random 317 * when it is called with seed set to client_random|server_random (or 318 * server_random|client_random). 527 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
|
tls_gnutls.c | 59 opaque client_random[WPA_TLS_RANDOM_SIZE]; member in struct:__anon30624 769 keys->client_random = sec->client_random; 772 keys->client_random =
|
/external/chromium_org/third_party/openssl/openssl/ssl/ |
s23_clnt.c | 357 p=s->s3->client_random; 448 memset(&(s->s3->client_random[0]),0,SSL3_RANDOM_SIZE); 449 if (RAND_pseudo_bytes(&(s->s3->client_random[SSL3_RANDOM_SIZE-i]),i) <= 0) 452 memcpy(p,&(s->s3->client_random[SSL3_RANDOM_SIZE-i]),i); 476 memcpy(p, s->s3->client_random, SSL3_RANDOM_SIZE); 641 &(s->s3->client_random[SSL3_RANDOM_SIZE-i]),i);
|
d1_clnt.c | 248 /* mark client_random uninitialized */ 249 memset(s->s3->client_random,0,sizeof(s->s3->client_random)); 803 p=s->s3->client_random; 805 /* if client_random is initialized, reuse it, we are 807 for (i=0;p[i]=='\0' && i<sizeof(s->s3->client_random);i++) ; 808 if (i==sizeof(s->s3->client_random)) 812 RAND_pseudo_bytes(p,sizeof(s->s3->client_random)-4); 823 memcpy(p,s->s3->client_random,SSL3_RANDOM_SIZE); [all...] |
t1_enc.c | 301 s->s3->client_random,SSL3_RANDOM_SIZE, 511 s->s3->client_random,SSL3_RANDOM_SIZE, 522 s->s3->client_random,SSL3_RANDOM_SIZE, 627 { int z; for (z=0; z<SSL3_RANDOM_SIZE; z++) printf("%02X%c",s->s3->client_random[z],((z+1)%16)?' ':'\n'); } 1095 s->s3->client_random,SSL3_RANDOM_SIZE, 1105 BIO_dump_fp(stderr, (char *)s->s3->client_random, SSL3_RANDOM_SIZE); [all...] |
s3_enc.c | 193 EVP_DigestUpdate(&s1,s->s3->client_random,SSL3_RANDOM_SIZE); 331 er1= &(s->s3->client_random[0]); 341 er2= &(s->s3->client_random[0]); 844 EVP_DigestUpdate(&ctx,&(s->s3->client_random[0]),
|
/external/openssl/ssl/ |
s23_clnt.c | 357 p=s->s3->client_random; 448 memset(&(s->s3->client_random[0]),0,SSL3_RANDOM_SIZE); 449 if (RAND_pseudo_bytes(&(s->s3->client_random[SSL3_RANDOM_SIZE-i]),i) <= 0) 452 memcpy(p,&(s->s3->client_random[SSL3_RANDOM_SIZE-i]),i); 476 memcpy(p, s->s3->client_random, SSL3_RANDOM_SIZE); 641 &(s->s3->client_random[SSL3_RANDOM_SIZE-i]),i);
|
d1_clnt.c | 248 /* mark client_random uninitialized */ 249 memset(s->s3->client_random,0,sizeof(s->s3->client_random)); 803 p=s->s3->client_random; 805 /* if client_random is initialized, reuse it, we are 807 for (i=0;p[i]=='\0' && i<sizeof(s->s3->client_random);i++) ; 808 if (i==sizeof(s->s3->client_random)) 812 RAND_pseudo_bytes(p,sizeof(s->s3->client_random)-4); 823 memcpy(p,s->s3->client_random,SSL3_RANDOM_SIZE); [all...] |
t1_enc.c | 301 s->s3->client_random,SSL3_RANDOM_SIZE, 511 s->s3->client_random,SSL3_RANDOM_SIZE, 522 s->s3->client_random,SSL3_RANDOM_SIZE, 627 { int z; for (z=0; z<SSL3_RANDOM_SIZE; z++) printf("%02X%c",s->s3->client_random[z],((z+1)%16)?' ':'\n'); } 1095 s->s3->client_random,SSL3_RANDOM_SIZE, 1105 BIO_dump_fp(stderr, (char *)s->s3->client_random, SSL3_RANDOM_SIZE); [all...] |
s3_enc.c | 193 EVP_DigestUpdate(&s1,s->s3->client_random,SSL3_RANDOM_SIZE); 331 er1= &(s->s3->client_random[0]); 341 er2= &(s->s3->client_random[0]); 844 EVP_DigestUpdate(&ctx,&(s->s3->client_random[0]),
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_tls_common.c | 92 if (keys.client_random == NULL || keys.server_random == NULL || 99 os_memcpy(rnd, keys.client_random, keys.client_random_len);
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_tls_common.c | 319 if (keys.client_random == NULL || keys.server_random == NULL || 326 os_memcpy(rnd, keys.client_random, keys.client_random_len); 373 if (keys.client_random == NULL || keys.server_random == NULL || 384 os_memcpy(out + 1, keys.client_random, keys.client_random_len); [all...] |
/external/chromium_org/net/third_party/nss/ssl/ |
derive.c | 356 ** client_random + server_random); 375 ** client_random + server_random); 391 ** iv_block = PRF("", "IV block", client_random + server_random);
|
/libcore/crypto/src/main/java/org/conscrypt/ |
ConnectionStateSSLv3.java | 153 logger.println("client_random");
|