/external/wpa_supplicant_8/src/tls/ |
tlsv1_client_i.h | 25 u8 client_random[TLS_RANDOM_LEN]; member in struct:tlsv1_client
|
tlsv1_server_i.h | 26 u8 client_random[TLS_RANDOM_LEN]; member in struct:tlsv1_server
|
/external/wpa_supplicant_8/src/crypto/ |
tls.h | 15 const u8 *client_random; member in struct:tls_random 343 * @server_random_first: seed is 0 = client_random|server_random, 344 * 1 = server_random|client_random 353 * client_random|server_random (or server_random|client_random). For TLSv1.2 and 562 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
|
tls_openssl.c | 65 os_memcpy(out, ssl->s3->client_random, SSL3_RANDOM_SIZE); 222 unsigned char client_random[SSL3_RANDOM_SIZE]; member in struct:tls_connection 4172 unsigned char client_random[SSL3_RANDOM_SIZE]; local [all...] |
/external/boringssl/src/ssl/ |
s3_srvr.c | 701 /* The client_random is the V2ClientHello challenge. Truncate or 776 CBS client_random, session_id, cipher_suites, compression_methods; local 842 !CBS_get_bytes(&client_hello, &client_random, SSL3_RANDOM_SIZE) || 855 memcpy(ssl->s3->client_random, CBS_data(&client_random), SSL3_RANDOM_SIZE); [all...] |
/external/boringssl/src/include/openssl/ |
ssl.h | 3930 uint8_t client_random[SSL3_RANDOM_SIZE]; member in struct:ssl3_state_st [all...] |