HomeSort by relevance Sort by last modified time
    Searched refs:server_random (Results 1 - 25 of 34) sorted by null

1 2

  /external/boringssl/src/fipstools/
cavp_tlskdf_test.cc 50 std::vector<uint8_t> premaster, server_random, client_random, local
53 !t->GetBytes(&server_random, "serverHello_random") ||
57 !t->GetBytes(&key_block_server_random, "server_random") ||
71 client_random.size(), server_random.data(),
72 server_random.size())) {
  /external/scapy/scapy/layers/tls/crypto/
prf.py 200 client_random, server_random):
203 client_random and server_random. See RFC 5246, section 6.3.
205 seed = client_random + server_random
213 def derive_key_block(self, master_secret, server_random,
219 seed = server_random + client_random
285 def postprocess_key_for_export(self, key, client_random, server_random,
299 tbh = key + client_random + server_random
301 tbh = key + server_random + client_random
310 client_random + server_random,
314 def generate_iv_for_export(self, client_random, server_random,
    [all...]
  /external/wpa_supplicant_8/src/eap_common/
eap_fast_common.h 98 void eap_fast_derive_master_secret(const u8 *pac_key, const u8 *server_random,
eap_fast_common.c 68 void eap_fast_derive_master_secret(const u8 *pac_key, const u8 *server_random,
77 wpa_hexdump(MSG_DEBUG, "EAP-FAST: server_random",
78 server_random, TLS_RANDOM_LEN);
83 * server_random + client_random, 48)
85 os_memcpy(seed, server_random, TLS_RANDOM_LEN);
  /external/wpa_supplicant_8/src/tls/
tlsv1_server.h 42 const u8 *server_random, u8 *master_secret);
tlsv1_client.h 48 const u8 *server_random, u8 *master_secret);
tlsv1_client_i.h 26 u8 server_random[TLS_RANDOM_LEN]; member in struct:tlsv1_client
tlsv1_server_i.h 27 u8 server_random[TLS_RANDOM_LEN]; member in struct:tlsv1_server
tlsv1_common.c 340 const u8 *server_random,
368 crypto_hash_update(ctx, server_random, TLS_RANDOM_LEN);
379 const u8 *server_random,
393 crypto_hash_update(ctx, server_random, TLS_RANDOM_LEN);
404 crypto_hash_update(ctx, server_random, TLS_RANDOM_LEN);
tlsv1_client.c 63 os_memcpy(seed + TLS_RANDOM_LEN, conn->server_random,
77 os_memcpy(seed, conn->server_random, TLS_RANDOM_LEN);
517 * @server_random_first: seed is 0 = client_random|server_random,
518 * 1 = server_random|client_random
532 os_memcpy(seed, conn->server_random, TLS_RANDOM_LEN);
537 os_memcpy(seed + TLS_RANDOM_LEN, conn->server_random,
731 keys->server_random = conn->server_random;
tlsv1_common.h 264 const u8 *server_random,
268 const u8 *server_random,
tlsv1_server_write.c 56 WPA_PUT_BE32(conn->server_random, now.sec);
57 if (random_get_bytes(conn->server_random + 4, TLS_RANDOM_LEN - 4)) {
59 "server_random");
62 wpa_hexdump(MSG_MSGDUMP, "TLSv1: server_random",
63 conn->server_random, TLS_RANDOM_LEN);
88 os_memcpy(pos, conn->server_random, TLS_RANDOM_LEN);
130 conn->client_random, conn->server_random,
571 conn->server_random, server_params,
619 conn->server_random, server_params,
tlsv1_server.c 69 os_memcpy(seed + TLS_RANDOM_LEN, conn->server_random,
83 os_memcpy(seed, conn->server_random, TLS_RANDOM_LEN);
462 * @server_random_first: seed is 0 = client_random|server_random,
463 * 1 = server_random|client_random
477 os_memcpy(seed, conn->server_random, TLS_RANDOM_LEN);
482 os_memcpy(seed + TLS_RANDOM_LEN, conn->server_random,
628 keys->server_random = conn->server_random;
tlsv1_client_read.c 145 os_memcpy(conn->server_random, pos, TLS_RANDOM_LEN);
147 wpa_hexdump(MSG_MSGDUMP, "TLSv1: server_random",
148 conn->server_random, TLS_RANDOM_LEN);
245 conn->client_random, conn->server_random,
756 conn->server_random, server_params,
765 conn->server_random, server_params,
    [all...]
  /external/boringssl/src/ssl/
handoff.cc 136 !CBB_add_asn1_octet_string(&seq, s3->server_random,
137 sizeof(s3->server_random)) ||
198 CBS_len(&server_rand) != sizeof(s3->server_random) ||
199 !CBS_copy_bytes(&server_rand, s3->server_random,
200 sizeof(s3->server_random)) ||
t1_enc.cc 323 ssl->s3->server_random)) {
328 ssl->s3->client_random, ssl->s3->server_random)) {
361 return ssl3_prf(out_span, master_key, label, ssl->s3->server_random,
366 return tls1_prf(digest, out_span, master_key, label, ssl->s3->server_random,
414 OPENSSL_memcpy(seed.data() + SSL3_RANDOM_SIZE, ssl->s3->server_random,
tls13_client.cc 73 CBS body = msg.body, extensions, server_random, session_id; local
77 !CBS_get_bytes(&body, &server_random, SSL3_RANDOM_SIZE) ||
91 if (!CBS_mem_equal(&server_random, kHelloRetryRequest, SSL3_RANDOM_SIZE)) {
222 CBS body = msg.body, server_random, session_id, extensions; local
227 !CBS_get_bytes(&body, &server_random, SSL3_RANDOM_SIZE) ||
247 if (CBS_mem_equal(&server_random, kHelloRetryRequest, SSL3_RANDOM_SIZE)) {
253 OPENSSL_memcpy(ssl->s3->server_random, CBS_data(&server_random),
handshake_server.cc 706 ssl->s3->server_random[0] = now.tv_sec >> 24;
707 ssl->s3->server_random[1] = now.tv_sec >> 16;
708 ssl->s3->server_random[2] = now.tv_sec >> 8;
709 ssl->s3->server_random[3] = now.tv_sec;
710 if (!RAND_bytes(ssl->s3->server_random + 4, SSL3_RANDOM_SIZE - 4)) {
720 OPENSSL_memcpy(ssl->s3->server_random + SSL3_RANDOM_SIZE -
734 !CBB_add_bytes(&body, ssl->s3->server_random, SSL3_RANDOM_SIZE) ||
795 !CBB_add_bytes(cbb.get(), ssl->s3->server_random, SSL3_RANDOM_SIZE)) {
    [all...]
  /external/syslinux/gpxe/src/include/gpxe/
tls.h 154 uint8_t server_random[32]; member in struct:tls_session
  /external/scapy/scapy/layers/tls/
session.py 125 server_random=b"",
133 server_random,
168 server_random,
204 server_random,
425 self.server_random = None
527 if self.server_random is None:
528 warning("Missing server_random while computing master_secret!")
532 self.server_random)
540 server_random=self.server_random,
    [all...]
handshake.py 348 Either for parsing or building, we store the server_random
360 self.tls_session.server_random = (struct.pack('!I',
409 Either for parsing or building, we store the server_random along with
418 s.server_random = self.random_bytes
721 m = s.client_random + s.server_random + raw(p)
745 s.client_random and s.server_random and
747 m = s.client_random + s.server_random + raw(self.params)
    [all...]
  /external/wpa_supplicant_8/src/crypto/
tls.h 17 const u8 *server_random; member in struct:tls_random
574 const u8 *server_random, u8 *master_secret);
tls_openssl.c 85 os_memcpy(out, ssl->s3->server_random, SSL3_RANDOM_SIZE);
258 unsigned char server_random[SSL3_RANDOM_SIZE]; member in struct:tls_connection
3482 unsigned char server_random[SSL3_RANDOM_SIZE]; local
4520 unsigned char server_random[SSL3_RANDOM_SIZE]; local
    [all...]
  /external/syslinux/gpxe/src/net/
tls.c 305 DBGC_HD ( tls, &tls->server_random, sizeof ( tls->server_random ) );
312 &tls->server_random, sizeof ( tls->server_random ) );
339 &tls->server_random, sizeof ( tls->server_random ),
830 memcpy ( &tls->server_random, &hello_a->random,
831 sizeof ( tls->server_random ) );
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_tls_common.c 151 if (keys.client_random == NULL || keys.server_random == NULL)
162 os_memcpy(out + 1 + keys.client_random_len, keys.server_random,

Completed in 1061 milliseconds

1 2