/external/boringssl/src/fipstools/ |
cavp_tlskdf_test.cc | 50 std::vector<uint8_t> premaster, server_random, client_random, local 53 !t->GetBytes(&server_random, "serverHello_random") || 57 !t->GetBytes(&key_block_server_random, "server_random") || 71 client_random.size(), server_random.data(), 72 server_random.size())) {
|
/external/scapy/scapy/layers/tls/crypto/ |
prf.py | 200 client_random, server_random): 203 client_random and server_random. See RFC 5246, section 6.3. 205 seed = client_random + server_random 213 def derive_key_block(self, master_secret, server_random, 219 seed = server_random + client_random 285 def postprocess_key_for_export(self, key, client_random, server_random, 299 tbh = key + client_random + server_random 301 tbh = key + server_random + client_random 310 client_random + server_random, 314 def generate_iv_for_export(self, client_random, server_random, [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
eap_fast_common.h | 98 void eap_fast_derive_master_secret(const u8 *pac_key, const u8 *server_random,
|
eap_fast_common.c | 68 void eap_fast_derive_master_secret(const u8 *pac_key, const u8 *server_random, 77 wpa_hexdump(MSG_DEBUG, "EAP-FAST: server_random", 78 server_random, TLS_RANDOM_LEN); 83 * server_random + client_random, 48) 85 os_memcpy(seed, server_random, TLS_RANDOM_LEN);
|
/external/wpa_supplicant_8/src/tls/ |
tlsv1_server.h | 42 const u8 *server_random, u8 *master_secret);
|
tlsv1_client.h | 48 const u8 *server_random, u8 *master_secret);
|
tlsv1_client_i.h | 26 u8 server_random[TLS_RANDOM_LEN]; member in struct:tlsv1_client
|
tlsv1_server_i.h | 27 u8 server_random[TLS_RANDOM_LEN]; member in struct:tlsv1_server
|
tlsv1_common.c | 340 const u8 *server_random, 368 crypto_hash_update(ctx, server_random, TLS_RANDOM_LEN); 379 const u8 *server_random, 393 crypto_hash_update(ctx, server_random, TLS_RANDOM_LEN); 404 crypto_hash_update(ctx, server_random, TLS_RANDOM_LEN);
|
tlsv1_client.c | 63 os_memcpy(seed + TLS_RANDOM_LEN, conn->server_random, 77 os_memcpy(seed, conn->server_random, TLS_RANDOM_LEN); 517 * @server_random_first: seed is 0 = client_random|server_random, 518 * 1 = server_random|client_random 532 os_memcpy(seed, conn->server_random, TLS_RANDOM_LEN); 537 os_memcpy(seed + TLS_RANDOM_LEN, conn->server_random, 731 keys->server_random = conn->server_random;
|
tlsv1_common.h | 264 const u8 *server_random, 268 const u8 *server_random,
|
tlsv1_server_write.c | 56 WPA_PUT_BE32(conn->server_random, now.sec); 57 if (random_get_bytes(conn->server_random + 4, TLS_RANDOM_LEN - 4)) { 59 "server_random"); 62 wpa_hexdump(MSG_MSGDUMP, "TLSv1: server_random", 63 conn->server_random, TLS_RANDOM_LEN); 88 os_memcpy(pos, conn->server_random, TLS_RANDOM_LEN); 130 conn->client_random, conn->server_random, 571 conn->server_random, server_params, 619 conn->server_random, server_params,
|
tlsv1_server.c | 69 os_memcpy(seed + TLS_RANDOM_LEN, conn->server_random, 83 os_memcpy(seed, conn->server_random, TLS_RANDOM_LEN); 462 * @server_random_first: seed is 0 = client_random|server_random, 463 * 1 = server_random|client_random 477 os_memcpy(seed, conn->server_random, TLS_RANDOM_LEN); 482 os_memcpy(seed + TLS_RANDOM_LEN, conn->server_random, 628 keys->server_random = conn->server_random;
|
tlsv1_client_read.c | 145 os_memcpy(conn->server_random, pos, TLS_RANDOM_LEN); 147 wpa_hexdump(MSG_MSGDUMP, "TLSv1: server_random", 148 conn->server_random, TLS_RANDOM_LEN); 245 conn->client_random, conn->server_random, 756 conn->server_random, server_params, 765 conn->server_random, server_params, [all...] |
/external/boringssl/src/ssl/ |
handoff.cc | 136 !CBB_add_asn1_octet_string(&seq, s3->server_random, 137 sizeof(s3->server_random)) || 198 CBS_len(&server_rand) != sizeof(s3->server_random) || 199 !CBS_copy_bytes(&server_rand, s3->server_random, 200 sizeof(s3->server_random)) ||
|
t1_enc.cc | 323 ssl->s3->server_random)) { 328 ssl->s3->client_random, ssl->s3->server_random)) { 361 return ssl3_prf(out_span, master_key, label, ssl->s3->server_random, 366 return tls1_prf(digest, out_span, master_key, label, ssl->s3->server_random, 414 OPENSSL_memcpy(seed.data() + SSL3_RANDOM_SIZE, ssl->s3->server_random,
|
tls13_client.cc | 73 CBS body = msg.body, extensions, server_random, session_id; local 77 !CBS_get_bytes(&body, &server_random, SSL3_RANDOM_SIZE) || 91 if (!CBS_mem_equal(&server_random, kHelloRetryRequest, SSL3_RANDOM_SIZE)) { 222 CBS body = msg.body, server_random, session_id, extensions; local 227 !CBS_get_bytes(&body, &server_random, SSL3_RANDOM_SIZE) || 247 if (CBS_mem_equal(&server_random, kHelloRetryRequest, SSL3_RANDOM_SIZE)) { 253 OPENSSL_memcpy(ssl->s3->server_random, CBS_data(&server_random),
|
handshake_server.cc | 706 ssl->s3->server_random[0] = now.tv_sec >> 24; 707 ssl->s3->server_random[1] = now.tv_sec >> 16; 708 ssl->s3->server_random[2] = now.tv_sec >> 8; 709 ssl->s3->server_random[3] = now.tv_sec; 710 if (!RAND_bytes(ssl->s3->server_random + 4, SSL3_RANDOM_SIZE - 4)) { 720 OPENSSL_memcpy(ssl->s3->server_random + SSL3_RANDOM_SIZE - 734 !CBB_add_bytes(&body, ssl->s3->server_random, SSL3_RANDOM_SIZE) || 795 !CBB_add_bytes(cbb.get(), ssl->s3->server_random, SSL3_RANDOM_SIZE)) { [all...] |
/external/syslinux/gpxe/src/include/gpxe/ |
tls.h | 154 uint8_t server_random[32]; member in struct:tls_session
|
/external/scapy/scapy/layers/tls/ |
session.py | 125 server_random=b"", 133 server_random, 168 server_random, 204 server_random, 425 self.server_random = None 527 if self.server_random is None: 528 warning("Missing server_random while computing master_secret!") 532 self.server_random) 540 server_random=self.server_random, [all...] |
handshake.py | 348 Either for parsing or building, we store the server_random 360 self.tls_session.server_random = (struct.pack('!I', 409 Either for parsing or building, we store the server_random along with 418 s.server_random = self.random_bytes 721 m = s.client_random + s.server_random + raw(p) 745 s.client_random and s.server_random and 747 m = s.client_random + s.server_random + raw(self.params) [all...] |
/external/wpa_supplicant_8/src/crypto/ |
tls.h | 17 const u8 *server_random; member in struct:tls_random 574 const u8 *server_random, u8 *master_secret);
|
tls_openssl.c | 85 os_memcpy(out, ssl->s3->server_random, SSL3_RANDOM_SIZE); 258 unsigned char server_random[SSL3_RANDOM_SIZE]; member in struct:tls_connection 3482 unsigned char server_random[SSL3_RANDOM_SIZE]; local 4520 unsigned char server_random[SSL3_RANDOM_SIZE]; local [all...] |
/external/syslinux/gpxe/src/net/ |
tls.c | 305 DBGC_HD ( tls, &tls->server_random, sizeof ( tls->server_random ) ); 312 &tls->server_random, sizeof ( tls->server_random ) ); 339 &tls->server_random, sizeof ( tls->server_random ), 830 memcpy ( &tls->server_random, &hello_a->random, 831 sizeof ( tls->server_random ) ); [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_tls_common.c | 151 if (keys.client_random == NULL || keys.server_random == NULL) 162 os_memcpy(out + 1 + keys.client_random_len, keys.server_random,
|