HomeSort by relevance Sort by last modified time
    Searched refs:client_random (Results 1 - 25 of 35) sorted by null

1 2

  /external/boringssl/src/fipstools/
cavp_tlskdf_test.cc 50 std::vector<uint8_t> premaster, server_random, client_random, local
54 !t->GetBytes(&client_random, "clientHello_random") ||
58 !t->GetBytes(&key_block_client_random, "client_random") ||
70 sizeof(kMasterSecretLabel) - 1, client_random.data(),
71 client_random.size(), server_random.data(),
  /external/scapy/scapy/layers/tls/crypto/
prf.py 200 client_random, server_random):
203 client_random and server_random. See RFC 5246, section 6.3.
205 seed = client_random + server_random
214 client_random, req_len):
219 seed = server_random + client_random
285 def postprocess_key_for_export(self, key, client_random, server_random,
299 tbh = key + client_random + server_random
301 tbh = key + server_random + client_random
310 client_random + server_random,
314 def generate_iv_for_export(self, client_random, server_random
    [all...]
  /external/wpa_supplicant_8/src/eap_common/
eap_fast_common.h 99 const u8 *client_random, u8 *master_secret);
eap_fast_common.c 69 const u8 *client_random, u8 *master_secret)
75 wpa_hexdump(MSG_DEBUG, "EAP-FAST: client_random",
76 client_random, TLS_RANDOM_LEN);
83 * server_random + client_random, 48)
86 os_memcpy(seed + TLS_RANDOM_LEN, client_random, TLS_RANDOM_LEN);
  /external/wpa_supplicant_8/src/tls/
tlsv1_server.h 41 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
tlsv1_client.h 47 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
tlsv1_client_i.h 25 u8 client_random[TLS_RANDOM_LEN]; member in struct:tlsv1_client
tlsv1_server_i.h 26 u8 client_random[TLS_RANDOM_LEN]; member in struct:tlsv1_server
tlsv1_common.c 339 const u8 *client_random,
367 crypto_hash_update(ctx, client_random, TLS_RANDOM_LEN);
378 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random,
392 crypto_hash_update(ctx, client_random, TLS_RANDOM_LEN);
403 crypto_hash_update(ctx, client_random, TLS_RANDOM_LEN);
tlsv1_client.c 62 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN);
78 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, TLS_RANDOM_LEN);
517 * @server_random_first: seed is 0 = client_random|server_random,
518 * 1 = server_random|client_random
533 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random,
536 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN);
727 keys->client_random = conn->client_random;
tlsv1_common.h 263 const u8 *client_random,
267 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random,
tlsv1_server.c 68 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN);
84 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, TLS_RANDOM_LEN);
462 * @server_random_first: seed is 0 = client_random|server_random,
463 * 1 = server_random|client_random
478 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random,
481 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN);
624 keys->client_random = conn->client_random;
tlsv1_client_write.c 75 WPA_PUT_BE32(conn->client_random, now.sec);
76 if (random_get_bytes(conn->client_random + 4, TLS_RANDOM_LEN - 4)) {
78 "client_random");
81 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client_random",
82 conn->client_random, TLS_RANDOM_LEN);
107 os_memcpy(pos, conn->client_random, TLS_RANDOM_LEN);
tlsv1_server_write.c 130 conn->client_random, conn->server_random,
570 conn->client_random,
618 conn->rl.tls_version, conn->client_random,
tlsv1_client_read.c 245 conn->client_random, conn->server_random,
755 conn->client_random,
764 conn->rl.tls_version, conn->client_random,
    [all...]
  /external/boringssl/src/ssl/
handoff.cc 138 !CBB_add_asn1_octet_string(&seq, s3->client_random,
139 sizeof(s3->client_random)) ||
202 CBS_len(&client_rand) != sizeof(s3->client_random) ||
203 !CBS_copy_bytes(&client_rand, s3->client_random,
204 sizeof(s3->client_random)) ||
t1_enc.cc 322 if (!ssl3_prf(out_span, premaster, label, ssl->s3->client_random,
328 ssl->s3->client_random, ssl->s3->server_random)) {
362 ssl->s3->client_random);
367 ssl->s3->client_random);
413 OPENSSL_memcpy(seed.data(), ssl->s3->client_random, SSL3_RANDOM_SIZE);
  /external/syslinux/gpxe/src/include/gpxe/
tls.h 156 struct tls_client_random client_random; member in struct:tls_session
  /external/scapy/scapy/layers/tls/
session.py 124 client_random=b"",
134 client_random,
167 client_random,
203 iv = self.prf.generate_iv_for_export(client_random,
424 self.client_random = None
525 if self.client_random is None:
526 warning("Missing client_random while computing master_secret!")
531 self.client_random,
539 self.prcs.derive_keys(client_random=self.client_random,
    [all...]
handshake.py 275 Either for parsing or building, we store the client_random
282 self.tls_session.client_random = (struct.pack('!I',
721 m = s.client_random + s.server_random + raw(p)
745 s.client_random and s.server_random and
747 m = s.client_random + s.server_random + raw(self.params)
    [all...]
  /external/wpa_supplicant_8/src/crypto/
tls.h 15 const u8 *client_random; member in struct:tls_random
573 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
tls_openssl.c 75 os_memcpy(out, ssl->s3->client_random, SSL3_RANDOM_SIZE);
257 unsigned char client_random[SSL3_RANDOM_SIZE]; member in struct:tls_connection
3481 unsigned char client_random[SSL3_RANDOM_SIZE]; local
4519 unsigned char client_random[SSL3_RANDOM_SIZE]; local
    [all...]
  /external/syslinux/gpxe/src/net/
tls.c 303 DBGC_HD ( tls, &tls->client_random, sizeof ( tls->client_random ) );
311 &tls->client_random, sizeof ( tls->client_random ),
340 &tls->client_random, sizeof ( tls->client_random ) );
633 memcpy ( &hello.random, &tls->client_random, sizeof ( hello.random ) );
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_tls_common.c 151 if (keys.client_random == NULL || keys.server_random == NULL)
161 os_memcpy(out + 1, keys.client_random, keys.client_random_len);
  /external/curl/lib/vtls/
openssl.c 184 unsigned char client_random[SSL3_RANDOM_SIZE]; member in struct:ssl_tap_state
242 #define KEYLOG_PREFIX "CLIENT_RANDOM "
255 unsigned char client_random[SSL3_RANDOM_SIZE]; local
265 SSL_get_client_random(ssl, client_random, SSL3_RANDOM_SIZE);
272 memcpy(client_random, ssl->s3->client_random, SSL3_RANDOM_SIZE);
282 !memcmp(state->client_random, client_random, SSL3_RANDOM_SIZE)) {
288 memcpy(state->client_random, client_random, SSL3_RANDOM_SIZE)
    [all...]

Completed in 331 milliseconds

1 2