/external/wpa_supplicant_8/src/eap_common/ |
eap_fast_common.h | 99 const u8 *client_random, u8 *master_secret);
|
eap_fast_common.c | 69 const u8 *client_random, u8 *master_secret) 75 wpa_hexdump(MSG_DEBUG, "EAP-FAST: client_random", 76 client_random, TLS_RANDOM_LEN); 83 * server_random + client_random, 48) 86 os_memcpy(seed + TLS_RANDOM_LEN, client_random, TLS_RANDOM_LEN);
|
/external/wpa_supplicant_8/src/tls/ |
tlsv1_server.h | 41 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
|
tlsv1_client.h | 47 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
|
tlsv1_client_i.h | 25 u8 client_random[TLS_RANDOM_LEN]; member in struct:tlsv1_client
|
tlsv1_server_i.h | 26 u8 client_random[TLS_RANDOM_LEN]; member in struct:tlsv1_server
|
tlsv1_common.c | 339 const u8 *client_random, 367 crypto_hash_update(ctx, client_random, TLS_RANDOM_LEN); 378 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random, 392 crypto_hash_update(ctx, client_random, TLS_RANDOM_LEN); 403 crypto_hash_update(ctx, client_random, TLS_RANDOM_LEN);
|
tlsv1_client.c | 62 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); 78 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, TLS_RANDOM_LEN); 517 * @server_random_first: seed is 0 = client_random|server_random, 518 * 1 = server_random|client_random 533 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, 536 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); 727 keys->client_random = conn->client_random;
|
tlsv1_common.h | 263 const u8 *client_random, 267 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random,
|
tlsv1_server.c | 68 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); 84 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, TLS_RANDOM_LEN); 462 * @server_random_first: seed is 0 = client_random|server_random, 463 * 1 = server_random|client_random 478 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, 481 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); 624 keys->client_random = conn->client_random;
|
tlsv1_client_write.c | 75 WPA_PUT_BE32(conn->client_random, now.sec); 76 if (random_get_bytes(conn->client_random + 4, TLS_RANDOM_LEN - 4)) { 78 "client_random"); 81 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client_random", 82 conn->client_random, TLS_RANDOM_LEN); 107 os_memcpy(pos, conn->client_random, TLS_RANDOM_LEN);
|
tlsv1_server_write.c | 130 conn->client_random, conn->server_random, 570 conn->client_random, 618 conn->rl.tls_version, conn->client_random,
|
tlsv1_client_read.c | 245 conn->client_random, conn->server_random, 758 conn->client_random, 767 conn->rl.tls_version, conn->client_random, [all...] |
tlsv1_server_read.c | 202 os_memcpy(conn->client_random, pos, TLS_RANDOM_LEN); 204 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client_random", 205 conn->client_random, TLS_RANDOM_LEN); [all...] |
/external/wpa_supplicant_8/src/crypto/ |
tls.h | 15 const u8 *client_random; member in struct:tls_random 343 * @server_random_first: seed is 0 = client_random|server_random, 344 * 1 = server_random|client_random 353 * client_random|server_random (or server_random|client_random). For TLSv1.2 and 562 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
|
tls_openssl.c | 65 os_memcpy(out, ssl->s3->client_random, SSL3_RANDOM_SIZE); 222 unsigned char client_random[SSL3_RANDOM_SIZE]; member in struct:tls_connection 4172 unsigned char client_random[SSL3_RANDOM_SIZE]; local [all...] |
/external/boringssl/src/ssl/ |
t1_enc.c | 268 ssl->s3->client_random, SSL3_RANDOM_SIZE); 564 ssl->s3->client_random, SSL3_RANDOM_SIZE, 596 memcpy(seed, ssl->s3->client_random, SSL3_RANDOM_SIZE);
|
s3_srvr.c | 701 /* The client_random is the V2ClientHello challenge. Truncate or 776 CBS client_random, session_id, cipher_suites, compression_methods; local 842 !CBS_get_bytes(&client_hello, &client_random, SSL3_RANDOM_SIZE) || 855 memcpy(ssl->s3->client_random, CBS_data(&client_random), SSL3_RANDOM_SIZE); [all...] |
s3_both.c | 175 if (!ssl_log_master_secret(ssl, ssl->s3->client_random, SSL3_RANDOM_SIZE,
|
s3_clnt.c | 690 * renegerate the client_random. The random must be reused. */ 692 !ssl_fill_hello_random(ssl->s3->client_random, 693 sizeof(ssl->s3->client_random), 0 /* client */)) { 705 !CBB_add_bytes(&cbb, ssl->s3->client_random, SSL3_RANDOM_SIZE) || [all...] |
internal.h | [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_tls_common.c | 151 if (keys.client_random == NULL || keys.server_random == NULL) 161 os_memcpy(out + 1, keys.client_random, keys.client_random_len);
|
eap_server_fast.c | 121 const u8 *client_random, 263 eap_fast_derive_master_secret(pac_key, server_random, client_random, [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_tls_common.c | 362 keys.client_random == NULL || keys.server_random == NULL) 372 os_memcpy(out + 1, keys.client_random, keys.client_random_len); [all...] |
eap_fast.c | 75 const u8 *client_random, 83 if (client_random == NULL || server_random == NULL || 107 server_random, client_random, [all...] |