HomeSort by relevance Sort by last modified time
    Searched full:server_random (Results 1 - 25 of 42) sorted by null

1 2

  /external/wpa_supplicant_8/src/eap_common/
eap_fast_common.c 68 void eap_fast_derive_master_secret(const u8 *pac_key, const u8 *server_random,
77 wpa_hexdump(MSG_DEBUG, "EAP-FAST: server_random",
78 server_random, TLS_RANDOM_LEN);
83 * server_random + client_random, 48)
85 os_memcpy(seed, server_random, TLS_RANDOM_LEN);
124 os_memcpy(rnd, keys.server_random, keys.server_random_len);
eap_fast_common.h 98 void eap_fast_derive_master_secret(const u8 *pac_key, const u8 *server_random,
  /external/chromium_org/net/third_party/nss/patches/
secretexporterlocks.patch 30 PORT_Memcpy(val + i, &ss->ssl3.hs.server_random.rand, SSL3_RANDOM_LENGTH);
  /external/wpa_supplicant_8/src/tls/
tlsv1_client.h 48 const u8 *server_random, u8 *master_secret);
tlsv1_client_i.h 26 u8 server_random[TLS_RANDOM_LEN]; member in struct:tlsv1_client
tlsv1_server.h 42 const u8 *server_random, u8 *master_secret);
tlsv1_server_i.h 27 u8 server_random[TLS_RANDOM_LEN]; member in struct:tlsv1_server
tlsv1_server.c 44 os_memcpy(seed + TLS_RANDOM_LEN, conn->server_random,
58 os_memcpy(seed, conn->server_random, TLS_RANDOM_LEN);
422 * @server_random_first: seed is 0 = client_random|server_random,
423 * 1 = server_random|client_random
437 os_memcpy(seed, conn->server_random, TLS_RANDOM_LEN);
442 os_memcpy(seed + TLS_RANDOM_LEN, conn->server_random,
546 keys->server_random = conn->server_random;
tlsv1_client.c 62 os_memcpy(seed + TLS_RANDOM_LEN, conn->server_random,
76 os_memcpy(seed, conn->server_random, TLS_RANDOM_LEN);
511 * @server_random_first: seed is 0 = client_random|server_random,
512 * 1 = server_random|client_random
526 os_memcpy(seed, conn->server_random, TLS_RANDOM_LEN);
531 os_memcpy(seed + TLS_RANDOM_LEN, conn->server_random,
694 keys->server_random = conn->server_random;
tlsv1_server_write.c 56 WPA_PUT_BE32(conn->server_random, now.sec);
57 if (random_get_bytes(conn->server_random + 4, TLS_RANDOM_LEN - 4)) {
59 "server_random");
62 wpa_hexdump(MSG_MSGDUMP, "TLSv1: server_random",
63 conn->server_random, TLS_RANDOM_LEN);
88 os_memcpy(pos, conn->server_random, TLS_RANDOM_LEN);
104 conn->client_random, conn->server_random,
tlsv1_client_read.c 96 os_memcpy(conn->server_random, pos, TLS_RANDOM_LEN);
98 wpa_hexdump(MSG_MSGDUMP, "TLSv1: server_random",
99 conn->server_random, TLS_RANDOM_LEN);
180 conn->client_random, conn->server_random,
  /external/wpa_supplicant_8/src/crypto/
tls.h 19 const u8 *server_random; member in struct:tls_keys
305 * @server_random_first: seed is 0 = client_random|server_random,
306 * 1 = server_random|client_random
317 * when it is called with seed set to client_random|server_random (or
318 * server_random|client_random).
528 const u8 *server_random, u8 *master_secret);
tls_gnutls.c 35 * It looks like gnutls does not provide access to client/server_random and
60 opaque server_random[WPA_TLS_RANDOM_SIZE]; member in struct:__anon28793
770 keys->server_random = sec->server_random;
774 keys->server_random =
  /external/wpa_supplicant_8/src/eap_server/
eap_server_tls_common.c 92 if (keys.client_random == NULL || keys.server_random == NULL ||
100 os_memcpy(rnd + keys.client_random_len, keys.server_random,
  /external/chromium_org/third_party/openssl/openssl/patches/
tls1_change_cipher_state_rewrite.patch 289 - s->s3->server_random,SSL3_RANDOM_SIZE,
296 + s->s3->server_random, SSL3_RANDOM_SIZE,
313 - s->s3->server_random,SSL3_RANDOM_SIZE,
321 + s->s3->server_random, SSL3_RANDOM_SIZE,
  /external/chromium_org/third_party/openssl/openssl/ssl/
t1_enc.c 300 s->s3->server_random,SSL3_RANDOM_SIZE,
469 s->s3->server_random, SSL3_RANDOM_SIZE,
485 s->s3->server_random, SSL3_RANDOM_SIZE,
754 { int z; for (z=0; z<SSL3_RANDOM_SIZE; z++) printf("%02X%c",s->s3->server_random[z],((z+1)%16)?' ':'\n'); }
    [all...]
s3_enc.c 192 EVP_DigestUpdate(&s1,s->s3->server_random,SSL3_RANDOM_SIZE);
332 er2= &(s->s3->server_random[0]);
340 er1= &(s->s3->server_random[0]);
852 EVP_DigestUpdate(&ctx,&(s->s3->server_random[0]),
d1_srvr.c 920 p=s->s3->server_random;
931 memcpy(p,s->s3->server_random,SSL3_RANDOM_SIZE);
    [all...]
s3_srvr.c     [all...]
  /external/openssl/ssl/
t1_enc.c 300 s->s3->server_random,SSL3_RANDOM_SIZE,
512 s->s3->server_random,SSL3_RANDOM_SIZE,
523 s->s3->server_random,SSL3_RANDOM_SIZE,
629 { int z; for (z=0; z<SSL3_RANDOM_SIZE; z++) printf("%02X%c",s->s3->server_random[z],((z+1)%16)?' ':'\n'); }
1097 s->s3->server_random,SSL3_RANDOM_SIZE,
1107 BIO_dump_fp(stderr, (char *)s->s3->server_random, SSL3_RANDOM_SIZE);
    [all...]
s3_enc.c 192 EVP_DigestUpdate(&s1,s->s3->server_random,SSL3_RANDOM_SIZE);
332 er2= &(s->s3->server_random[0]);
340 er1= &(s->s3->server_random[0]);
846 EVP_DigestUpdate(&ctx,&(s->s3->server_random[0]),
d1_srvr.c 920 p=s->s3->server_random;
931 memcpy(p,s->s3->server_random,SSL3_RANDOM_SIZE);
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_tls_common.c 319 if (keys.client_random == NULL || keys.server_random == NULL ||
327 os_memcpy(rnd + keys.client_random_len, keys.server_random,
373 if (keys.client_random == NULL || keys.server_random == NULL ||
385 os_memcpy(out + 1 + keys.client_random_len, keys.server_random,
    [all...]
  /external/chromium_org/net/third_party/nss/ssl/
derive.c 356 ** client_random + server_random);
375 ** client_random + server_random);
391 ** iv_block = PRF("", "IV block", client_random + server_random);
  /libcore/crypto/src/main/java/org/conscrypt/
ConnectionStateSSLv3.java 155 logger.println("server_random");

Completed in 7165 milliseconds

1 2