HomeSort by relevance Sort by last modified time
    Searched refs:client_random (Results 1 - 25 of 28) sorted by null

1 2

  /external/wpa_supplicant_8/src/eap_common/
eap_fast_common.h 99 const u8 *client_random, u8 *master_secret);
eap_fast_common.c 69 const u8 *client_random, u8 *master_secret)
75 wpa_hexdump(MSG_DEBUG, "EAP-FAST: client_random",
76 client_random, TLS_RANDOM_LEN);
83 * server_random + client_random, 48)
86 os_memcpy(seed + TLS_RANDOM_LEN, client_random, TLS_RANDOM_LEN);
  /external/wpa_supplicant_8/src/tls/
tlsv1_server.h 41 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
tlsv1_client.h 47 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
tlsv1_client_i.h 25 u8 client_random[TLS_RANDOM_LEN]; member in struct:tlsv1_client
tlsv1_server_i.h 26 u8 client_random[TLS_RANDOM_LEN]; member in struct:tlsv1_server
tlsv1_common.c 339 const u8 *client_random,
367 crypto_hash_update(ctx, client_random, TLS_RANDOM_LEN);
378 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random,
392 crypto_hash_update(ctx, client_random, TLS_RANDOM_LEN);
403 crypto_hash_update(ctx, client_random, TLS_RANDOM_LEN);
tlsv1_client.c 62 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN);
78 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, TLS_RANDOM_LEN);
517 * @server_random_first: seed is 0 = client_random|server_random,
518 * 1 = server_random|client_random
533 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random,
536 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN);
727 keys->client_random = conn->client_random;
tlsv1_common.h 263 const u8 *client_random,
267 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random,
tlsv1_server.c 68 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN);
84 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, TLS_RANDOM_LEN);
462 * @server_random_first: seed is 0 = client_random|server_random,
463 * 1 = server_random|client_random
478 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random,
481 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN);
624 keys->client_random = conn->client_random;
tlsv1_client_write.c 75 WPA_PUT_BE32(conn->client_random, now.sec);
76 if (random_get_bytes(conn->client_random + 4, TLS_RANDOM_LEN - 4)) {
78 "client_random");
81 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client_random",
82 conn->client_random, TLS_RANDOM_LEN);
107 os_memcpy(pos, conn->client_random, TLS_RANDOM_LEN);
tlsv1_server_write.c 130 conn->client_random, conn->server_random,
570 conn->client_random,
618 conn->rl.tls_version, conn->client_random,
tlsv1_client_read.c 245 conn->client_random, conn->server_random,
758 conn->client_random,
767 conn->rl.tls_version, conn->client_random,
    [all...]
tlsv1_server_read.c 202 os_memcpy(conn->client_random, pos, TLS_RANDOM_LEN);
204 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client_random",
205 conn->client_random, TLS_RANDOM_LEN);
    [all...]
  /external/wpa_supplicant_8/src/crypto/
tls.h 15 const u8 *client_random; member in struct:tls_random
343 * @server_random_first: seed is 0 = client_random|server_random,
344 * 1 = server_random|client_random
353 * client_random|server_random (or server_random|client_random). For TLSv1.2 and
562 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
tls_openssl.c 65 os_memcpy(out, ssl->s3->client_random, SSL3_RANDOM_SIZE);
222 unsigned char client_random[SSL3_RANDOM_SIZE]; member in struct:tls_connection
4172 unsigned char client_random[SSL3_RANDOM_SIZE]; local
    [all...]
  /external/boringssl/src/ssl/
t1_enc.c 268 ssl->s3->client_random, SSL3_RANDOM_SIZE);
564 ssl->s3->client_random, SSL3_RANDOM_SIZE,
596 memcpy(seed, ssl->s3->client_random, SSL3_RANDOM_SIZE);
s3_srvr.c 701 /* The client_random is the V2ClientHello challenge. Truncate or
776 CBS client_random, session_id, cipher_suites, compression_methods; local
842 !CBS_get_bytes(&client_hello, &client_random, SSL3_RANDOM_SIZE) ||
855 memcpy(ssl->s3->client_random, CBS_data(&client_random), SSL3_RANDOM_SIZE);
    [all...]
s3_both.c 175 if (!ssl_log_master_secret(ssl, ssl->s3->client_random, SSL3_RANDOM_SIZE,
s3_clnt.c 690 * renegerate the client_random. The random must be reused. */
692 !ssl_fill_hello_random(ssl->s3->client_random,
693 sizeof(ssl->s3->client_random), 0 /* client */)) {
705 !CBB_add_bytes(&cbb, ssl->s3->client_random, SSL3_RANDOM_SIZE) ||
    [all...]
internal.h     [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_tls_common.c 151 if (keys.client_random == NULL || keys.server_random == NULL)
161 os_memcpy(out + 1, keys.client_random, keys.client_random_len);
eap_server_fast.c 121 const u8 *client_random,
263 eap_fast_derive_master_secret(pac_key, server_random, client_random,
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_tls_common.c 362 keys.client_random == NULL || keys.server_random == NULL)
372 os_memcpy(out + 1, keys.client_random, keys.client_random_len);
    [all...]
eap_fast.c 75 const u8 *client_random,
83 if (client_random == NULL || server_random == NULL ||
107 server_random, client_random,
    [all...]

Completed in 177 milliseconds

1 2