/third_party/mbedtls/programs/ssl/ |
D | ssl_test_common_source.c | 31 const unsigned char client_random[32], in eap_tls_key_derivation() 44 memcpy( keys->randbytes, client_random, 32 ); in eap_tls_key_derivation() 53 const unsigned char client_random[32], in nss_keylog_export() 76 "%02x", client_random[j] ); in nss_keylog_export() 123 const unsigned char client_random[32], in dtls_srtp_key_derivation() 136 memcpy( keys->randbytes, client_random, 32 ); in dtls_srtp_key_derivation()
|
/third_party/curl/lib/vtls/ |
D | keylog.c | 116 const unsigned char client_random[CLIENT_RANDOM_SIZE], in Curl_tls_keylog_write() 139 line[pos++] = hex[client_random[i] >> 4]; in Curl_tls_keylog_write() 140 line[pos++] = hex[client_random[i] & 0xF]; in Curl_tls_keylog_write()
|
D | keylog.h | 47 const unsigned char client_random[32],
|
/third_party/node/test/common/ |
D | tls.js | 21 this.client_random = crypto.randomBytes(32); 30 Buffer.concat([this.client_random, 36 this.client_random]), 46 this.version, this.client_random, this.ciphers, compressions,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/ |
D | tlsv1_common.c | 339 const u8 *client_random, in tlsv12_key_x_server_params_hash() argument 367 crypto_hash_update(ctx, client_random, TLS_RANDOM_LEN); in tlsv12_key_x_server_params_hash() 378 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random, in tls_key_x_server_params_hash() argument 392 crypto_hash_update(ctx, client_random, TLS_RANDOM_LEN); in tls_key_x_server_params_hash() 403 crypto_hash_update(ctx, client_random, TLS_RANDOM_LEN); in tls_key_x_server_params_hash()
|
D | tlsv1_server.c | 68 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); in tlsv1_server_derive_keys() 84 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, TLS_RANDOM_LEN); in tlsv1_server_derive_keys() 496 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, in tlsv1_server_prf() 499 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); in tlsv1_server_prf() 651 keys->client_random = conn->client_random; in tlsv1_server_get_random()
|
D | tlsv1_client.c | 86 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); in tls_derive_keys() 102 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, TLS_RANDOM_LEN); in tls_derive_keys() 572 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, in tlsv1_client_prf() 575 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); in tlsv1_client_prf() 775 keys->client_random = conn->client_random; in tlsv1_client_get_random()
|
D | tlsv1_common.h | 263 const u8 *client_random, 267 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random,
|
D | tlsv1_server_i.h | 26 u8 client_random[TLS_RANDOM_LEN]; member
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/ |
D | tlsv1_common.c | 339 const u8 *client_random, in tlsv12_key_x_server_params_hash() argument 367 crypto_hash_update(ctx, client_random, TLS_RANDOM_LEN); in tlsv12_key_x_server_params_hash() 378 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random, in tls_key_x_server_params_hash() argument 392 crypto_hash_update(ctx, client_random, TLS_RANDOM_LEN); in tls_key_x_server_params_hash() 403 crypto_hash_update(ctx, client_random, TLS_RANDOM_LEN); in tls_key_x_server_params_hash()
|
D | tlsv1_server.c | 68 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); in tlsv1_server_derive_keys() 84 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, TLS_RANDOM_LEN); in tlsv1_server_derive_keys() 496 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, in tlsv1_server_prf() 499 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); in tlsv1_server_prf() 651 keys->client_random = conn->client_random; in tlsv1_server_get_random()
|
D | tlsv1_client.c | 62 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); in tls_derive_keys() 78 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, TLS_RANDOM_LEN); in tls_derive_keys() 548 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, in tlsv1_client_prf() 551 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); in tlsv1_client_prf() 751 keys->client_random = conn->client_random; in tlsv1_client_get_random()
|
D | tlsv1_common.h | 263 const u8 *client_random, 267 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
D | eap_fast_common.c | 69 const u8 *client_random, u8 *master_secret) in eap_fast_derive_master_secret() argument 76 client_random, TLS_RANDOM_LEN); in eap_fast_derive_master_secret() 86 os_memcpy(seed + TLS_RANDOM_LEN, client_random, TLS_RANDOM_LEN); in eap_fast_derive_master_secret()
|
D | eap_fast_common.h | 99 const u8 *client_random, u8 *master_secret);
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
D | eap_fast_common.c | 69 const u8 *client_random, u8 *master_secret) in eap_fast_derive_master_secret() argument 76 client_random, TLS_RANDOM_LEN); in eap_fast_derive_master_secret() 86 os_memcpy(seed + TLS_RANDOM_LEN, client_random, TLS_RANDOM_LEN); in eap_fast_derive_master_secret()
|
D | eap_fast_common.h | 99 const u8 *client_random, u8 *master_secret);
|
/third_party/openssl/test/recipes/30-test_evp_data/ |
D | evpkdf.txt | 21 Ctrl.client_random = hexseed:e5acaf549cd25c22d964c0d930fa4b5261d2507fad84c33715b7b9a864020693 30 Ctrl.client_random = hexseed:d58a7b1cd4fedaa232159df652ce188f9d997e061b9bf48e83b62990440931f6 37 Ctrl.client_random = hexseed:36c129d01a3200894b9179faac589d9835d58775f9b5ea3587cb8fd0364cae8c 46 Ctrl.client_random = hexseed:62e1fd91f23f558a605f28478c58cf72637b89784d959df7e946d3f07bd1b616 55 Ctrl.client_random = hexseed:62e1fd91f23f558a605f28478c58cf72637b89784d959df7e946d3f07bd1b616
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
D | tls_wolfssl.c | 80 unsigned char client_random[RAN_LEN]; member 1978 keys->client_random = conn->client_random; in tls_connection_get_random() 1980 ssl, conn->client_random, sizeof(conn->client_random)); in tls_connection_get_random() 2016 byte *client_random; in tls_connection_get_eap_fast_key() local 2032 &server_len, &client_random, &client_len); in tls_connection_get_eap_fast_key() 2034 os_memcpy(seed + RAN_LEN, client_random, RAN_LEN); in tls_connection_get_eap_fast_key() 2079 unsigned char client_random[RAN_LEN]; in tls_sess_sec_cb() local 2086 if (wolfSSL_get_client_random(s, client_random, in tls_sess_sec_cb() 2087 sizeof(client_random)) == 0 || in tls_sess_sec_cb() 2099 client_random, server_random, secret); in tls_sess_sec_cb()
|
D | tls.h | 15 const u8 *client_random; member 619 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
D | tls_wolfssl.c | 81 unsigned char client_random[RAN_LEN]; member 1985 keys->client_random = conn->client_random; in tls_connection_get_random() 1987 ssl, conn->client_random, sizeof(conn->client_random)); in tls_connection_get_random() 2023 byte *client_random; in tls_connection_get_eap_fast_key() local 2039 &server_len, &client_random, &client_len); in tls_connection_get_eap_fast_key() 2041 os_memcpy(seed + RAN_LEN, client_random, RAN_LEN); in tls_connection_get_eap_fast_key() 2086 unsigned char client_random[RAN_LEN]; in tls_sess_sec_cb() local 2093 if (wolfSSL_get_client_random(s, client_random, in tls_sess_sec_cb() 2094 sizeof(client_random)) == 0 || in tls_sess_sec_cb() 2106 client_random, server_random, secret); in tls_sess_sec_cb()
|
D | tls.h | 15 const u8 *client_random; member 619 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
|
/third_party/openssl/ssl/ |
D | t1_enc.c | 74 SSL3_RANDOM_SIZE, s->s3->client_random, SSL3_RANDOM_SIZE, in tls1_generate_key_block() 381 printf("%02X%c", s->s3->client_random[z], in tls1_setup_key_block() 498 s->s3->client_random, SSL3_RANDOM_SIZE, in tls1_generate_master_secret() 511 BIO_dump_fp(stderr, (char *)s->s3->client_random, SSL3_RANDOM_SIZE); in tls1_generate_master_secret() 548 memcpy(val + currentvalpos, s->s3->client_random, SSL3_RANDOM_SIZE); in tls1_export_keying_material()
|
/third_party/openssl/doc/man3/ |
D | SSL_get_client_random.pod | 30 total size of the client_random value. 67 In current versions of the TLS protocols, the length of client_random 73 Finally, though the "client_random" and "server_random" values are called
|
/third_party/openssl/test/ |
D | bad_dtls_test.c | 47 static unsigned char client_random[SSL3_RANDOM_SIZE]; variable 149 if (!PACKET_copy_bytes(&pkt, client_random, SSL3_RANDOM_SIZE)) in validate_client_hello() 361 client_random, SSL3_RANDOM_SIZE, in send_finished()
|