/external/scapy/scapy/layers/tls/crypto/ |
D | prf.py | 200 client_random, server_random): argument 205 seed = client_random + server_random 214 client_random, req_len): argument 219 seed = server_random + client_random 285 def postprocess_key_for_export(self, key, client_random, server_random, argument 299 tbh = key + client_random + server_random 301 tbh = key + server_random + client_random 310 client_random + server_random, 314 def generate_iv_for_export(self, client_random, server_random, argument 328 tbh = client_random + server_random [all …]
|
/external/rust/crates/quiche/deps/boringssl/src/util/fipstools/cavp/ |
D | cavp_tlskdf_test.cc | 51 std::vector<uint8_t> premaster, server_random, client_random, in TestTLSKDF() local 55 !t->GetBytes(&client_random, "clientHello_random") || in TestTLSKDF() 71 sizeof(kMasterSecretLabel) - 1, client_random.data(), in TestTLSKDF() 72 client_random.size(), server_random.data(), in TestTLSKDF()
|
/external/boringssl/src/util/fipstools/cavp/ |
D | cavp_tlskdf_test.cc | 51 std::vector<uint8_t> premaster, server_random, client_random, in TestTLSKDF() local 55 !t->GetBytes(&client_random, "clientHello_random") || in TestTLSKDF() 71 sizeof(kMasterSecretLabel) - 1, client_random.data(), in TestTLSKDF() 72 client_random.size(), server_random.data(), in TestTLSKDF()
|
/external/curl/lib/vtls/ |
D | keylog.c | 116 const unsigned char client_random[CLIENT_RANDOM_SIZE], in Curl_tls_keylog_write() 139 line[pos++] = hex[client_random[i] >> 4]; in Curl_tls_keylog_write() 140 line[pos++] = hex[client_random[i] & 0xF]; in Curl_tls_keylog_write()
|
D | keylog.h | 47 const unsigned char client_random[32],
|
/external/scapy/scapy/layers/tls/ |
D | session.py | 124 client_random=b"", argument 134 client_random, 167 client_random, 203 iv = self.prf.generate_iv_for_export(client_random, 424 self.client_random = None 525 if self.client_random is None: 531 self.client_random, 539 self.prcs.derive_keys(client_random=self.client_random, 542 self.pwcs.derive_keys(client_random=self.client_random,
|
/external/wpa_supplicant_8/src/eap_common/ |
D | eap_fast_common.c | 69 const u8 *client_random, u8 *master_secret) in eap_fast_derive_master_secret() argument 76 client_random, TLS_RANDOM_LEN); in eap_fast_derive_master_secret() 86 os_memcpy(seed + TLS_RANDOM_LEN, client_random, TLS_RANDOM_LEN); in eap_fast_derive_master_secret()
|
D | eap_fast_common.h | 99 const u8 *client_random, u8 *master_secret);
|
/external/wpa_supplicant_8/src/tls/ |
D | tlsv1_common.c | 339 const u8 *client_random, in tlsv12_key_x_server_params_hash() argument 367 crypto_hash_update(ctx, client_random, TLS_RANDOM_LEN); in tlsv12_key_x_server_params_hash() 378 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random, in tls_key_x_server_params_hash() argument 392 crypto_hash_update(ctx, client_random, TLS_RANDOM_LEN); in tls_key_x_server_params_hash() 403 crypto_hash_update(ctx, client_random, TLS_RANDOM_LEN); in tls_key_x_server_params_hash()
|
D | tlsv1_server.c | 68 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); in tlsv1_server_derive_keys() 84 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, TLS_RANDOM_LEN); in tlsv1_server_derive_keys() 496 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, in tlsv1_server_prf() 499 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); in tlsv1_server_prf() 651 keys->client_random = conn->client_random; in tlsv1_server_get_random()
|
D | tlsv1_client.c | 62 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); in tls_derive_keys() 78 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, TLS_RANDOM_LEN); in tls_derive_keys() 548 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, in tlsv1_client_prf() 551 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); in tlsv1_client_prf() 751 keys->client_random = conn->client_random; in tlsv1_client_get_random()
|
D | tlsv1_common.h | 263 const u8 *client_random, 267 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random,
|
D | tlsv1_server_i.h | 26 u8 client_random[TLS_RANDOM_LEN]; member
|
D | tlsv1_server.h | 42 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
|
D | tlsv1_client.h | 48 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
|
D | tlsv1_client_i.h | 25 u8 client_random[TLS_RANDOM_LEN]; member
|
D | tlsv1_client_write.c | 78 WPA_PUT_BE32(conn->client_random, now.sec); in tls_send_client_hello() 79 if (random_get_bytes(conn->client_random + 4, TLS_RANDOM_LEN - 4)) { in tls_send_client_hello() 85 conn->client_random, TLS_RANDOM_LEN); in tls_send_client_hello() 110 os_memcpy(pos, conn->client_random, TLS_RANDOM_LEN); in tls_send_client_hello()
|
/external/rust/crates/quiche/deps/boringssl/src/ssl/ |
D | t1_enc.cc | 276 ssl->s3->client_random, ssl->s3->server_random)) { in tls1_generate_master_secret() 309 ssl->s3->client_random); in SSL_generate_key_block() 350 OPENSSL_memcpy(seed.data(), ssl->s3->client_random, SSL3_RANDOM_SIZE); in SSL_export_keying_material()
|
D | handoff.cc | 314 !CBB_add_asn1_octet_string(&seq, s3->client_random, in SSL_serialize_handback() 315 sizeof(s3->client_random)) || in SSL_serialize_handback() 437 CBS_len(&client_rand) != sizeof(s3->client_random) || in SSL_apply_handback() 438 !CBS_copy_bytes(&client_rand, s3->client_random, in SSL_apply_handback() 439 sizeof(s3->client_random)) || in SSL_apply_handback()
|
/external/boringssl/src/ssl/ |
D | t1_enc.cc | 202 ssl->s3->client_random); in generate_key_block() 291 ssl->s3->client_random, ssl->s3->server_random)) { in tls1_generate_master_secret() 370 OPENSSL_memcpy(seed.data(), ssl->s3->client_random, SSL3_RANDOM_SIZE); in SSL_export_keying_material()
|
D | handoff.cc | 349 !CBB_add_asn1_octet_string(&seq, s3->client_random, in SSL_serialize_handback() 350 sizeof(s3->client_random)) || in SSL_serialize_handback() 472 CBS_len(&client_rand) != sizeof(s3->client_random) || in SSL_apply_handback() 473 !CBS_copy_bytes(&client_rand, s3->client_random, in SSL_apply_handback() 474 sizeof(s3->client_random)) || in SSL_apply_handback()
|
/external/wpa_supplicant_8/src/crypto/ |
D | tls_wolfssl.c | 81 unsigned char client_random[RAN_LEN]; member 1985 keys->client_random = conn->client_random; in tls_connection_get_random() 1987 ssl, conn->client_random, sizeof(conn->client_random)); in tls_connection_get_random() 2023 byte *client_random; in tls_connection_get_eap_fast_key() local 2039 &server_len, &client_random, &client_len); in tls_connection_get_eap_fast_key() 2041 os_memcpy(seed + RAN_LEN, client_random, RAN_LEN); in tls_connection_get_eap_fast_key() 2086 unsigned char client_random[RAN_LEN]; in tls_sess_sec_cb() local 2093 if (wolfSSL_get_client_random(s, client_random, in tls_sess_sec_cb() 2094 sizeof(client_random)) == 0 || in tls_sess_sec_cb() 2106 client_random, server_random, secret); in tls_sess_sec_cb()
|
D | tls.h | 15 const u8 *client_random; member 619 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
|
D | tls_openssl.c | 83 os_memcpy(out, ssl->s3->client_random, SSL3_RANDOM_SIZE); in SSL_get_client_random() 297 unsigned char client_random[SSL3_RANDOM_SIZE]; member 4104 keys->client_random = conn->client_random; in tls_connection_get_random() 4106 ssl, conn->client_random, sizeof(conn->client_random)); in tls_connection_get_random() 4216 unsigned char client_random[SSL3_RANDOM_SIZE]; in tls_connection_get_eap_fast_key() local 4252 SSL_get_client_random(ssl, client_random, sizeof(client_random)); in tls_connection_get_eap_fast_key() 4258 os_memcpy(rnd + SSL3_RANDOM_SIZE, client_random, SSL3_RANDOM_SIZE); in tls_connection_get_eap_fast_key() 5572 s->s3->client_random, in tls_sess_sec_cb() 5575 unsigned char client_random[SSL3_RANDOM_SIZE]; in tls_sess_sec_cb() local 5581 SSL_get_client_random(s, client_random, sizeof(client_random)); in tls_sess_sec_cb() [all …]
|
/external/wpa_supplicant_8/src/eap_server/ |
D | eap_server_tls_common.c | 177 if (keys.client_random == NULL || keys.server_random == NULL) in eap_server_tls_derive_session_id() 187 os_memcpy(out + 1, keys.client_random, keys.client_random_len); in eap_server_tls_derive_session_id()
|