/external/boringssl/src/fipstools/ |
cavp_tlskdf_test.cc | 50 std::vector<uint8_t> premaster, server_random, client_random, local 54 !t->GetBytes(&client_random, "clientHello_random") || 58 !t->GetBytes(&key_block_client_random, "client_random") || 70 sizeof(kMasterSecretLabel) - 1, client_random.data(), 71 client_random.size(), server_random.data(),
|
/external/scapy/scapy/layers/tls/crypto/ |
prf.py | 200 client_random, server_random): 203 client_random and server_random. See RFC 5246, section 6.3. 205 seed = client_random + server_random 214 client_random, req_len): 219 seed = server_random + client_random 285 def postprocess_key_for_export(self, key, client_random, server_random, 299 tbh = key + client_random + server_random 301 tbh = key + server_random + client_random 310 client_random + server_random, 314 def generate_iv_for_export(self, client_random, server_random [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
eap_fast_common.h | 99 const u8 *client_random, u8 *master_secret);
|
eap_fast_common.c | 69 const u8 *client_random, u8 *master_secret) 75 wpa_hexdump(MSG_DEBUG, "EAP-FAST: client_random", 76 client_random, TLS_RANDOM_LEN); 83 * server_random + client_random, 48) 86 os_memcpy(seed + TLS_RANDOM_LEN, client_random, TLS_RANDOM_LEN);
|
/external/wpa_supplicant_8/src/tls/ |
tlsv1_server.h | 41 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
|
tlsv1_client.h | 47 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
|
tlsv1_client_i.h | 25 u8 client_random[TLS_RANDOM_LEN]; member in struct:tlsv1_client
|
tlsv1_server_i.h | 26 u8 client_random[TLS_RANDOM_LEN]; member in struct:tlsv1_server
|
tlsv1_common.c | 339 const u8 *client_random, 367 crypto_hash_update(ctx, client_random, TLS_RANDOM_LEN); 378 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random, 392 crypto_hash_update(ctx, client_random, TLS_RANDOM_LEN); 403 crypto_hash_update(ctx, client_random, TLS_RANDOM_LEN);
|
tlsv1_client.c | 62 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); 78 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, TLS_RANDOM_LEN); 517 * @server_random_first: seed is 0 = client_random|server_random, 518 * 1 = server_random|client_random 533 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, 536 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); 727 keys->client_random = conn->client_random;
|
tlsv1_common.h | 263 const u8 *client_random, 267 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random,
|
tlsv1_server.c | 68 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); 84 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, TLS_RANDOM_LEN); 462 * @server_random_first: seed is 0 = client_random|server_random, 463 * 1 = server_random|client_random 478 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, 481 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); 624 keys->client_random = conn->client_random;
|
tlsv1_client_write.c | 75 WPA_PUT_BE32(conn->client_random, now.sec); 76 if (random_get_bytes(conn->client_random + 4, TLS_RANDOM_LEN - 4)) { 78 "client_random"); 81 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client_random", 82 conn->client_random, TLS_RANDOM_LEN); 107 os_memcpy(pos, conn->client_random, TLS_RANDOM_LEN);
|
tlsv1_server_write.c | 130 conn->client_random, conn->server_random, 570 conn->client_random, 618 conn->rl.tls_version, conn->client_random,
|
tlsv1_client_read.c | 245 conn->client_random, conn->server_random, 755 conn->client_random, 764 conn->rl.tls_version, conn->client_random, [all...] |
/external/boringssl/src/ssl/ |
handoff.cc | 138 !CBB_add_asn1_octet_string(&seq, s3->client_random, 139 sizeof(s3->client_random)) || 202 CBS_len(&client_rand) != sizeof(s3->client_random) || 203 !CBS_copy_bytes(&client_rand, s3->client_random, 204 sizeof(s3->client_random)) ||
|
t1_enc.cc | 322 if (!ssl3_prf(out_span, premaster, label, ssl->s3->client_random, 328 ssl->s3->client_random, ssl->s3->server_random)) { 362 ssl->s3->client_random); 367 ssl->s3->client_random); 413 OPENSSL_memcpy(seed.data(), ssl->s3->client_random, SSL3_RANDOM_SIZE);
|
/external/syslinux/gpxe/src/include/gpxe/ |
tls.h | 156 struct tls_client_random client_random; member in struct:tls_session
|
/external/scapy/scapy/layers/tls/ |
session.py | 124 client_random=b"", 134 client_random, 167 client_random, 203 iv = self.prf.generate_iv_for_export(client_random, 424 self.client_random = None 525 if self.client_random is None: 526 warning("Missing client_random while computing master_secret!") 531 self.client_random, 539 self.prcs.derive_keys(client_random=self.client_random, [all...] |
handshake.py | 275 Either for parsing or building, we store the client_random 282 self.tls_session.client_random = (struct.pack('!I', 721 m = s.client_random + s.server_random + raw(p) 745 s.client_random and s.server_random and 747 m = s.client_random + s.server_random + raw(self.params) [all...] |
/external/wpa_supplicant_8/src/crypto/ |
tls.h | 15 const u8 *client_random; member in struct:tls_random 573 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
|
tls_openssl.c | 75 os_memcpy(out, ssl->s3->client_random, SSL3_RANDOM_SIZE); 257 unsigned char client_random[SSL3_RANDOM_SIZE]; member in struct:tls_connection 3481 unsigned char client_random[SSL3_RANDOM_SIZE]; local 4519 unsigned char client_random[SSL3_RANDOM_SIZE]; local [all...] |
/external/syslinux/gpxe/src/net/ |
tls.c | 303 DBGC_HD ( tls, &tls->client_random, sizeof ( tls->client_random ) ); 311 &tls->client_random, sizeof ( tls->client_random ), 340 &tls->client_random, sizeof ( tls->client_random ) ); 633 memcpy ( &hello.random, &tls->client_random, sizeof ( hello.random ) ); [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_tls_common.c | 151 if (keys.client_random == NULL || keys.server_random == NULL) 161 os_memcpy(out + 1, keys.client_random, keys.client_random_len);
|
/external/curl/lib/vtls/ |
openssl.c | 184 unsigned char client_random[SSL3_RANDOM_SIZE]; member in struct:ssl_tap_state 242 #define KEYLOG_PREFIX "CLIENT_RANDOM " 255 unsigned char client_random[SSL3_RANDOM_SIZE]; local 265 SSL_get_client_random(ssl, client_random, SSL3_RANDOM_SIZE); 272 memcpy(client_random, ssl->s3->client_random, SSL3_RANDOM_SIZE); 282 !memcmp(state->client_random, client_random, SSL3_RANDOM_SIZE)) { 288 memcpy(state->client_random, client_random, SSL3_RANDOM_SIZE) [all...] |