HomeSort by relevance Sort by last modified time
    Searched full:client_random (Results 1 - 25 of 49) sorted by null

1 2

  /external/wpa_supplicant_8/src/eap_common/
eap_fast_common.c 69 const u8 *client_random, u8 *master_secret)
75 wpa_hexdump(MSG_DEBUG, "EAP-FAST: client_random",
76 client_random, TLS_RANDOM_LEN);
83 * server_random + client_random, 48)
86 os_memcpy(seed + TLS_RANDOM_LEN, client_random, TLS_RANDOM_LEN);
125 os_memcpy(rnd + keys.server_random_len, keys.client_random,
eap_fast_common.h 99 const u8 *client_random, u8 *master_secret);
  /external/chromium_org/net/third_party/nss/patches/
secretexporterlocks.patch 28 PORT_Memcpy(val + i, &ss->ssl3.hs.client_random.rand, SSL3_RANDOM_LENGTH);
  /external/wpa_supplicant_8/src/tls/
tlsv1_client.h 47 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
tlsv1_client_i.h 25 u8 client_random[TLS_RANDOM_LEN]; member in struct:tlsv1_client
tlsv1_server.h 41 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
tlsv1_server_i.h 26 u8 client_random[TLS_RANDOM_LEN]; member in struct:tlsv1_server
tlsv1_server.c 43 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN);
59 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, TLS_RANDOM_LEN);
422 * @server_random_first: seed is 0 = client_random|server_random,
423 * 1 = server_random|client_random
438 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random,
441 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN);
542 keys->client_random = conn->client_random;
tlsv1_client.c 61 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN);
77 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, TLS_RANDOM_LEN);
511 * @server_random_first: seed is 0 = client_random|server_random,
512 * 1 = server_random|client_random
527 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random,
530 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN);
690 keys->client_random = conn->client_random;
tlsv1_client_write.c 55 WPA_PUT_BE32(conn->client_random, now.sec);
56 if (random_get_bytes(conn->client_random + 4, TLS_RANDOM_LEN - 4)) {
58 "client_random");
61 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client_random",
62 conn->client_random, TLS_RANDOM_LEN);
87 os_memcpy(pos, conn->client_random, TLS_RANDOM_LEN);
tlsv1_server_read.c 111 os_memcpy(conn->client_random, pos, TLS_RANDOM_LEN);
113 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client_random",
114 conn->client_random, TLS_RANDOM_LEN);
  /external/wpa_supplicant_8/src/crypto/
tls.h 17 const u8 *client_random; member in struct:tls_keys
305 * @server_random_first: seed is 0 = client_random|server_random,
306 * 1 = server_random|client_random
317 * when it is called with seed set to client_random|server_random (or
318 * server_random|client_random).
527 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
tls_gnutls.c 59 opaque client_random[WPA_TLS_RANDOM_SIZE]; member in struct:__anon31509
769 keys->client_random = sec->client_random;
772 keys->client_random =
  /external/chromium_org/third_party/openssl/openssl/ssl/
s23_clnt.c 357 p=s->s3->client_random;
448 memset(&(s->s3->client_random[0]),0,SSL3_RANDOM_SIZE);
449 if (RAND_pseudo_bytes(&(s->s3->client_random[SSL3_RANDOM_SIZE-i]),i) <= 0)
452 memcpy(p,&(s->s3->client_random[SSL3_RANDOM_SIZE-i]),i);
476 memcpy(p, s->s3->client_random, SSL3_RANDOM_SIZE);
641 &(s->s3->client_random[SSL3_RANDOM_SIZE-i]),i);
d1_clnt.c 248 /* mark client_random uninitialized */
249 memset(s->s3->client_random,0,sizeof(s->s3->client_random));
803 p=s->s3->client_random;
805 /* if client_random is initialized, reuse it, we are
807 for (i=0;p[i]=='\0' && i<sizeof(s->s3->client_random);i++) ;
808 if (i==sizeof(s->s3->client_random))
812 RAND_pseudo_bytes(p,sizeof(s->s3->client_random)-4);
823 memcpy(p,s->s3->client_random,SSL3_RANDOM_SIZE);
    [all...]
t1_enc.c 301 s->s3->client_random,SSL3_RANDOM_SIZE,
468 s->s3->client_random, SSL3_RANDOM_SIZE,
484 s->s3->client_random, SSL3_RANDOM_SIZE,
752 { int z; for (z=0; z<SSL3_RANDOM_SIZE; z++) printf("%02X%c",s->s3->client_random[z],((z+1)%16)?' ':'\n'); }
    [all...]
s3_enc.c 193 EVP_DigestUpdate(&s1,s->s3->client_random,SSL3_RANDOM_SIZE);
331 er1= &(s->s3->client_random[0]);
341 er2= &(s->s3->client_random[0]);
850 EVP_DigestUpdate(&ctx,&(s->s3->client_random[0]),
  /external/openssl/ssl/
s23_clnt.c 357 p=s->s3->client_random;
448 memset(&(s->s3->client_random[0]),0,SSL3_RANDOM_SIZE);
449 if (RAND_pseudo_bytes(&(s->s3->client_random[SSL3_RANDOM_SIZE-i]),i) <= 0)
452 memcpy(p,&(s->s3->client_random[SSL3_RANDOM_SIZE-i]),i);
476 memcpy(p, s->s3->client_random, SSL3_RANDOM_SIZE);
641 &(s->s3->client_random[SSL3_RANDOM_SIZE-i]),i);
d1_clnt.c 248 /* mark client_random uninitialized */
249 memset(s->s3->client_random,0,sizeof(s->s3->client_random));
803 p=s->s3->client_random;
805 /* if client_random is initialized, reuse it, we are
807 for (i=0;p[i]=='\0' && i<sizeof(s->s3->client_random);i++) ;
808 if (i==sizeof(s->s3->client_random))
812 RAND_pseudo_bytes(p,sizeof(s->s3->client_random)-4);
823 memcpy(p,s->s3->client_random,SSL3_RANDOM_SIZE);
    [all...]
t1_enc.c 301 s->s3->client_random,SSL3_RANDOM_SIZE,
511 s->s3->client_random,SSL3_RANDOM_SIZE,
522 s->s3->client_random,SSL3_RANDOM_SIZE,
627 { int z; for (z=0; z<SSL3_RANDOM_SIZE; z++) printf("%02X%c",s->s3->client_random[z],((z+1)%16)?' ':'\n'); }
1095 s->s3->client_random,SSL3_RANDOM_SIZE,
1105 BIO_dump_fp(stderr, (char *)s->s3->client_random, SSL3_RANDOM_SIZE);
    [all...]
s3_enc.c 193 EVP_DigestUpdate(&s1,s->s3->client_random,SSL3_RANDOM_SIZE);
331 er1= &(s->s3->client_random[0]);
341 er2= &(s->s3->client_random[0]);
844 EVP_DigestUpdate(&ctx,&(s->s3->client_random[0]),
  /external/wpa_supplicant_8/src/eap_server/
eap_server_tls_common.c 92 if (keys.client_random == NULL || keys.server_random == NULL ||
99 os_memcpy(rnd, keys.client_random, keys.client_random_len);
  /external/chromium_org/third_party/openssl/openssl/patches/
tls1_change_cipher_state_rewrite.patch 288 - s->s3->client_random,SSL3_RANDOM_SIZE,
295 + s->s3->client_random, SSL3_RANDOM_SIZE,
312 - s->s3->client_random,SSL3_RANDOM_SIZE,
320 + s->s3->client_random, SSL3_RANDOM_SIZE,
  /external/wpa_supplicant_8/src/eap_peer/
eap_tls_common.c 319 if (keys.client_random == NULL || keys.server_random == NULL ||
326 os_memcpy(rnd, keys.client_random, keys.client_random_len);
373 if (keys.client_random == NULL || keys.server_random == NULL ||
384 os_memcpy(out + 1, keys.client_random, keys.client_random_len);
    [all...]
  /external/chromium_org/net/third_party/nss/ssl/
derive.c 356 ** client_random + server_random);
375 ** client_random + server_random);
391 ** iv_block = PRF("", "IV block", client_random + server_random);

Completed in 1353 milliseconds

1 2